What Is a Network Protocols Chapter 8
Network Protocols
Protocols are essential characteristics that make computer systems work
Effectively. They are like maps that dictators and systems follow.
Perform specific tasks. Can be difficult to run without a protocol
Something on the computer. Technically, a protocol can be defined as a statement.
Rules that form the basis of communication. Protocols are agreed upon as a set
Policies to make things work. There are protocols specific to various aspects of wireless communication
Customized for you. In this chapter we will take a closer look
The different protocols we have.
Internet protocol
Internet protocols are a set of formats and rules for digital messagesRequired for proper message exchange between computers
A single network or a group of interconnected networks. this system
Some of the instructions use the so-called Internet protocol suite.
This is most often referred to as TCP/IP. These message exchanges are
Communication between computers and networks takes place in the form of datagrams
(Also called data packets). The most important Internet layer of the Internet protocol suite is IP.
IP is a collection of multiple communication protocols.
It consists of four abstraction layers. These layers are: link layer, internet
layer, transport layer, application layer.
IP has one main function: to send datagrams.
Sends the source to the specified host. This transport is controlled by address
in the package. IP systems have specific addressing methods.
A label is placed on (internally) the datagram. This process is called
Encapsulation.
Types of internet protocols
What do you think the Internet is? many people make mistakesThink of the Internet as the popular World Wide Web (WWW). The WWW is just one part of the vast Internet and is made up of other components such as FTP, Gopher, and Telnet. Several protocols are used on the Internet, each with its own standards and usage.
Electronic mail
In fact, there are three protocols that make any email easier
I understand. These are Simple Mail Transfer Protocol (SMTP), Internet.
Message Access Protocol (IMAP) and Post Office Protocol 3 (POP3).
SMTP is a protocol used to send email from an email address.
mailbox, the latter two are required to receive mail. virtual
All ISPs have frameworks that support these three.
protocol.
File transfer protocol
This is abbreviated as FTP and is the protocol used
Transfer files from one computer to another. This is also often used
When you upload a web page to a server so it can be viewed around the world
wide web. To use FTP, you need a special program called a client.
HTTP (World Wide Web)
This is called Hypertext Transfer Protocol. This is the protocol used
Through a web server, you will be able to view your website in one place.
Web browser. For each web address you want to visit when looking up
The prefix http:// appears in the address bar. Most of this information is available
Some browsers allow this and will display it in the web address bar.
Enable FTP. This will tell the browser its type.
Expected information.
News (Usenet)
Network News Transfer Protocol is used to facilitate UseNet. That is
It's similar to a forum on a website. UseNet has
It's also a forum for businesses that covers a variety of topics.
Subject. UseNet can be used in many fields including computers
Related topics, science, discussions and more.
Gopher
This is also a tool used on the Internet. There is every possibility that you will
I don't know of any such protocol. Primarily used to enable.
A browser that lets you search for information without knowing your location
material. You can search and complete the list of information
Please send them.
Telnet
This is a protocol that allows services to be provided to specific remote computers
Direct access from anywhere in the world. Able to operate a computer
It's like you're sitting right in front of me. When you log in,
You can control remote computers far away.
Transmission Control Protocol (TCP)
It is one of the most important wireless communication protocols. it is
Basically it is also used to transmit data over the network. This protocol has been deprecated
Fully integrated with Internet Protocol (IP) and referenced by Duo.
As TCP/IP. The IP portion of the network is addressed and
TCP is responsible for transporting data packets from a source to a destination.
Controls that ensure transmission reliability.
What does TCP do?
As already mentioned, TCP is intended to ensure reliable data transmission.
You can get it. On the Internet, data is transmitted via packets. package
A unit of data that is sent independently over a network. do this once
Once the package reaches its destination, it is sorted and reassembled.
Data transmission in a particular network occurs in multiple layers, each with its own.
Layers perform functions that complement those of other layers. of
TCP and IP are designed to work together in each layer stack. Information.
TCP is responsible for controlling the data being sent, and IP is responsible for controlling it.
Channeling within the network. And if there is a presence
Wi-Fi controls transmission within your local network. By now, you should understand the basic functionality of TCP.
“We are responsible for ensuring the reliability of the transmission process.”
There are several factors that determine the reliability of a transmission. a reliable transmission
A packet that is not lost during transmission. In other words: H. Everyone achieves their goals
goal.
Eliminates delays that affect data quality . All data reassembled in an orderly manner package.
How TCP works
During each transmission, all packets are marked (numbered) by TCP.
Apart from numbering, TCP also assigns a deadline by which every packet is sent.
Their goal must have been achieved. Whenever there is a reception
Packet,The source device is notified by a packet named,.
knowledge.
If confirmation cannot be obtained after the deadline
The source sends another copy of the packet. Once this is done, it's you
Make sure the packages are relocated properly. TCP addressing
In contrast to IP, TCP does not have a sophisticated addressing system. for
IP is called an IP address. The most important fact is that TCP does not do this
You must have one! TCP framework uses only numbers
Provided for identification by the operating device
Source and receiver packages.
The identification number is called a port. For example on the internet
Browsers use port 80 for TCP. Email uses port 25. This port is
When a number is used in addition to the IP address so that something can be retrieved.
Like "192.168.66.5.80".
User Datagram Protocol (UDP)
Don't get confused by the different protocols that exist. You may not need everything.
Throughout your entire career. In fact, most of them are done automatically, just like her.
You can get it and just do your job. Another important protocol is the user
Datagram Protocol (UDP). UDP is the simplest transport layer
Communication protocols commonly found in TCP/IP protocols
Sweet.
It cannot be called the simplest in vain, since it consists of a minimum of elements.
Amount of communication components and mechanisms. In some cases,
UDP is notoriously unreliable. However, since it uses IP services,
This optimizes performance.
The obvious flaw in the UDP framework is that the receiver does this.
Unlike TCP, no acknowledgments are created for received packets. actually,
The sender doesn't wait for it. That's a really big gap in the framework
It won't be filled.
UDP requirements
You may be wondering why you need to use this framework in the wireless space.
Communication when there are other reliable alternatives. Yes, it's UDP.
Mainly used when different confirmation packages are used.
Similar bandwidth to which the original data is transmitted. for example,
Use UDP when streaming video, as packet loss is not noticed. What are the characteristics of UDP? This framework is mainly used when there is no need for it.
To confirm data
Also, if the data is only sent in one direction, UDP
Convenient
Very simple, perfect for communication
query
Not connection oriented
No congestion control mechanism provided
Data provided may not be orderable
I am stateless
Ideal for use with streaming applications such as VoIP.
UDP Header
There are four main parameters of the UDP header.
Source port: this is the 16bits information on the UDP whose
function is the identification of the packet’s source
Destination port: This is also a 16 bits information with the
function of identifying application level service at the particular
destination
Length: This is a specification of the whole length of the UDP
packet.
Checksum: This is the parameter that serves as storage for the
value of checksum generated at the packet’s source before
transmission.
Applications of UDP
There are several areas where UDP is used in the transmission of data, and
these are;
- Domain Name Services
- Simple Network Management Protocol
- Trivial File Transfer Protocol
- Routing informational protocol
- Kerberos
The systems in which UDP is used in data transfer are however not limited
to these.
Wireless Network Protocols
In most cases, wireless networks are mistaken to be Wi-Fi networks. But as
established earlier in this book, Wi-Fi is different from wireless
communication technology. Wireless network protocols are proven to be of
immense use in consumer devices.
LTE
The LTE technology has a design which enhances data rates as well as other
problems experienced in old phone protocols, such as roaming problems.
On this protocol, rate reaches up to about 100 Mbps. However good this
technology may be, there is still a limitation as the phone carriers are not
deployed in some areas. This lack of phone carriers is due to high cost of
installation and government regulations.
LTE technology however is not designed to support home and LAN
networks, but designed to support consumers in longer distances.
Wi-Fi
We have discussed the whole concept of Wi-Fi earlier in this book. Well,
the technology has become the default connection technology employed in
homes, offices and other personal areas. The technology became popular in
the late 1990s. There are cases in which the technology can be controlled to
travel over longer distance. But in most cases, they are best suited for more
personal and home use.
WI-Fi actually has the protected access security protocols which adds a
level of authentication to the network, as well as data encryption. This
access technology is mainly to prevent third party from having access to the
network or mining personal data.
Bluetooth
This is one of the most popular wireless technology in the world. It was
created in the 1990s and it i=has risen to become ubiquitous. Unlike the WiFi, just a minimal amount of power is needed to run the Bluetooth
effectively. Hence, Bluetooth is designed to only travel shorter distances
when compared to the Wi-Fi. In many equipment, Bluetooth has been
replaced by WI-Fi.
60 GHz Protocols – WirelessHD and WiGig
Video streaming has become a very popular activity to engage in on the
personal computer. This has necessitated a wireless network protocol that
can better support it. These were created in the 2000s to offer high
definition streams.
Wireless Home Automation Protocols – Z – Wave and Zigbee
These are wireless protocols designed for home automation. They are
designed to make use of low energy consumption.
Network Routing Protocols
Ever heard something called the routing protocol, and you just wonder what
that is? It’s pretty simple. A routing protocol makes use of software and
some routing algorithms to determine the best mode of transfer of data and
information between nodes. The main functions of the routing protocols are
to create a router communication, as well as an overall network topology
understanding. In some cases, the routing protocol is also referred to as the
routing policy.
In a bid to foster a more effective communication between computers, the
routing protocols have been developed and innovated over time. The
working of the routing protocol is pretty simple.
Discovery: The process of identifying other routers situated on
the network
Route management: Keep tabs on the various potential
destination on a network
Path determination: This is the process in which the protocol
makes a decision on where it should send the network message.
There are some routing protocols that give a full details of mapping of the
network links, while others just allow routers to work with lesser
information.
Classes of Routing Protocols
There are 3 major classes of routing protocols
Distance Vector routing protocol
These protocols are designed to help choose the best paths (in the basis of
hop counts) needed to reach a destination on particular network, in a
particular direction. Some of the protocols in this class are dynamic, which
makes them optimal for the performance of the function. One of such is
RIP. In this framework, the hop counts are the various routers that exist
between a source and the destination network. Of all the various possible
paths, the one with the least hop count is decided to be the best path.
Features
- The network update are exchanged periodically
- The updates are always broadcast
- The routers in this framework make decisions premised on
information from neighboring routers.
Disadvantages
- The periodic exchange of information most times result in an
unnecessary traffic
- The exchange also results in security issues
- The broadcast of network periodically most often than not will
create unneeded traffic.
Link State Routing Protocols
Unlike the other protocol, these routing protocols know more about the
internetwork. These are also known as SPF (shortest path first). An example
of this is OSPF.
Features
- The updates in this protocol can only be initiated when there is a
change in topology.
- Only that much updates are exchanged which is requested by the
neighbor router.
There are three tables that this routing protocol maintains, which are;
- Neighbor table: This is the table that serves as a repository of
information about the neighbors of the router only.
- Topology table: This is the table with the information about the
whole topology, which include both the best and back up routes that
information packet can take.
- Routing table: This is the array of the best routes on the network.
Advanced distance vector routing protocol
This is somewhat of a hybrid, a culmination of both the link and vector
routing protocols. One example of routing protocol in this class is the
Enhanced Interior Gateway Routing Protocol.
Types of Network routing protocols
As explained above, all the routing protocols are classified into three. There
are several routing protocols that makes the wireless and wired networks
function effectively. These are;
Routing information protocol
This is the routing network that is extensively used in both local and wide
area networks. It is shortened as RIP, and its functioning is premised on the
distance vector algorithm. The protocol has been defined since 1988, and
has since then had two versions. You can use any of the versions nowadays.
Interior gateway routing protocol
This routing protocol is one made by CISCO, and it is used in routers to
exchange routing data within an independent system.
Open shortest path first
This is an active routing protocol that is used in internet protocol. It is an
example of the link state routing protocol and it includes all the major group
of interior gateway protocols. This protocol is mainly used in companies
with a big network.
Exterior gateway protocol
This is the ultimate routing protocol for the internet, and it was specified in
1982 by Eric C. EGP. It was initially expressed in RFC827, but properly
specified in RFC 904 in the year 1984. The topology on this network
routing protocol is like a tree.
Enhanced interior gateway routing protocol.
This is another type of the distance vector routing protocol, but it is fitted
with advanced technology to reduce the unsteadiness that occurs whenever
there is a change in topology. It enjoy a general optimization based on
DUAL work, as well as a loop free operation. This network protocol also
offers a means of speedy junction.
Order Gateway Protocol
These are the core network routing protocols found on the internet and is
responsible for the maintenance of a table of internet protocol that are
designed to allow network reaching capabilities within AS.
Intermediate system to intermediate system
This is a great protocol that is used by network devices to decide the best
route to promote datagram, from one end to another of a packet on a
switched network. This process is what is referred to as routing.
Network Security Protocols
The network security protocols are a type of network protocols that make
sure that data and information being transferred over a network are kept
safe and secure. These define the processes and methodology needed in
securing network data from any illegal attacks.
These protocols are simply designed to make sure that data sent and
received via the internet is kept safe and away from the prying eyes of
illegitimate users. Hacking and other cyber-crimes are at an all-time high.
Hence, you want to be really conscious of your security.
HTTPS: This is the protocol used in protection of internet
traffic. Anyone not on the traffic cannot access information that
is transmitted via HTTPS.
Firewall: This is a popular security protocol on networks. This
protocol is extensively used in the E-commerce sector, to protect
components which include Internet Payment Gateway, Server
based Wallets and payment servers. If these are ever
compromised, several users will be affected financially.
There are three main categories of the firewall;
- Packet filter
- Filter circuit level
- Application-layer filters
Packet filters are saddled with the responsibility of passing data that
pass through a network interface. The information needed at this point
is; IP-address, port numbers and destination. You can easily install
and implement this firewall on your wireless network. The high side
is that, it can be easily maintained. However, it offers a very low
protection level.
The filter circuit is the intermediate level of firewall security. This is
designed to monitor agreement activities at the junction of the client
and external host, checking if the requested session is valid. This
firewall type is not so expensive and is best used to protect private
networks. However, it does not filter packets.
The application level filters provides your network with the highest
level of firewall protection you can think of. However, it is a more
complex design and comes at extra cost.
IPSEC: This is a security protocol designed to encrypt data at
the level of the network. There are three main protocols
embedded in this; authentication header, encapsulating secure
payload (ESP) and the internet key exchange (IKE).
The authentication header is responsible for providing data origin
authentication, data integrity and security from repetitive messages.
The ESP is designed to offer validation and integrity for the payload,
but it does not do so for the IP header.
For the IKE protocol, its main function is to solve the problems of key
distribution protocols.
Other than the three main protocols running within the IPSEC
framework, there are also two main configurations. The very first
configuration bears the network layer protocol. While there is also the
second configuration which is used for closing data within the
network.
PCT: This is shorthand for the Private Communication
Technology, and it has a basic working process like the SSL. The
only difference between the PCT and the SSL is the size of the
message in transit. Compared to the SSL, the messages on PCT
are smaller. Browsers like the Microsoft Explorer 3 makes use of
PCT. Unlike the SSL however, the PCT has more options in the
negotiation of an algorithm and data formats.
Network Management Protocols
The names spells it all out. Network management protocols are suites of
protocols that take charge of the definition of processes, and policies that
manage, monitor and maintain a computer network. This set of instructions
are known to convey and manage the various operations and
communications that take place on a particular computer network.
In every management protocol, there is always the proposition of
architectures and procedures needed to extract, collect, transfer, store and
report information related to management. If you are looking to understand
any management protocol, make sure you understand the architecture. This
is really important.
Types of the Network Management Protocols
In this section of the book, we take a look at three of the most popular
protocols you really need to know. There are others, but they comes at a
reduced relevance, relative to these;
ICMP
This is a network layer protocol which is a concrete part of the group of
sub-protocols that are associated with the IP protocol. The main function of
this protocol is the validation of faults, and also the ensuring of
performance. It detects errors and send information back in that light. This
is why the main messages y ICMP are error messages and control
messages.
This is the protocol used in the calculation of factors like latency, response
time or packet loss, etc.
SNMP
This is the Simple Network Management Protocol, which is the application
layer that oversees failures, performance and actions. The framework of
SNMP is to gather, organize and communicate management information on
the various devices situated on the network. This protocol is used in quite a
number of hardware components, to ensure diversity of devices and also
diversity of marks.
SNMP Architecture
There are two basic components of the SNMP framework, which are the
SNMP agents and the SNMP administrators.
The SNMP agents are a bunch of software that run everything related to the
elements that needs to be managed. They primarily collect data on the
device
SNMP administrators are more involved in the management and monitoring
section of the network. They serve as the centralized location for all data
sent and stored.
How are data organized in SNMP?
Data that are in for management on the SNMP are known as objects.
OIDs (Object identifier): These are basic elements with the primary
function of identifying objects. The OIDs are always in the format:
.1.3.6.1.4.1.9.9.276.1.1.1.1.11. The extraction of this number comes from
the system of hierarchical organization that starts by identifying the
producer of the object.
MIBs (Management Information base) are the basic format that data from
the SNMP agents to the SNMP managers follow.
WMI
This is the Windows Management Instrumentation. This is mainly used in
systems and devices that run on the Windows software. On the WMI
framework, there is the model that represents, obtain and share management
information on any hardware that runs on windows.
The Architecture
There are three fundamental entities on the WMI architecture, which are the
WMI providers, WMI infrastructure and the administration applications.
The providers is in-charge of getting any management information from one
object or the other.
The infrastructure is the framework designed to bridge the gap between
suppliers and the management tools.
Protocols are what make things work on any computer network. It sort of
the order and rules that guide every operation. If there are no protocols
handling the various aspects of what goes on in a network, you can only
imagine the amount of disarray.
Comments
Post a Comment