What Is a Network Protocols Chapter 8

Goodlink

 

Network Protocols


Protocols are essential characteristics that make computer systems work 
Effectively. They are like maps that dictators and systems follow. 
Perform specific tasks. Can be difficult to run without a protocol 
Something on the computer. Technically, a protocol can be defined as a statement. 
Rules that form the basis of communication. Protocols are agreed upon as a set 
Policies to make things work. There are protocols specific to various aspects of wireless communication 
Customized for you. In this chapter we will take a closer look 
The different protocols we have. 

Internet protocol 

Internet protocols are a set of formats and rules for digital messages 
Required for proper message exchange between computers 
A single network or a group of interconnected networks. this system 
Some of the instructions use the so-called Internet protocol suite. 
 This is most often referred to as TCP/IP. These message exchanges are 
Communication between computers and networks takes place in the form of datagrams 
(Also called data packets). The most important Internet layer of the Internet protocol suite is IP. 
IP is a collection of multiple communication protocols. 
It consists of four abstraction layers. These layers are: link layer, internet 
layer, transport layer, application layer. 
IP has one main function: to send datagrams. 
Sends the source to the specified host. This transport is controlled by address 
in the package. IP systems have specific addressing methods. 
 A label is placed on (internally) the datagram. This process is called 
Encapsulation. 

Types of internet protocols 

What do you think the Internet is? many people make mistakes 
 Think of the Internet as the popular World Wide Web (WWW). The WWW is just one part of the vast Internet and is made up of other components such as FTP, Gopher, and Telnet. Several protocols are used on the Internet, each with its own standards and usage.

Electronic mail 

In fact, there are three protocols that make any email easier 

I understand. These are Simple Mail Transfer Protocol (SMTP), Internet. 

Message Access Protocol (IMAP) and Post Office Protocol 3 (POP3). 

SMTP is a protocol used to send email from an email address. 

mailbox, the latter two are required to receive mail. virtual 

All ISPs have frameworks that support these three. 

protocol. 

File transfer protocol 

This is abbreviated as FTP and is the protocol used 

Transfer files from one computer to another. This is also often used 

When you upload a web page to a server so it can be viewed around the world 

wide web. To use FTP, you need a special program called a client. 

HTTP (World Wide Web) 

This is called Hypertext Transfer Protocol. This is the protocol used 

 Through a web server, you will be able to view your website in one place. 

Web browser. For each web address you want to visit when looking up 

 The prefix http:// appears in the address bar. Most of this information is available 

Some browsers allow this and will display it in the web address bar. 

Enable FTP. This will tell the browser its type. 

Expected information. 

News (Usenet) 

Network News Transfer Protocol is used to facilitate UseNet. That is 

It's similar to a forum on a website. UseNet has 

 It's also a forum for businesses that covers a variety of topics. 

Subject. UseNet can be used in many fields including computers 

Related topics, science, discussions and more.

Gopher

This is also a tool used on the Internet. There is every possibility that you will 

I don't know of any such protocol. Primarily used to enable. 

A browser that lets you search for information without knowing your location 

material. You can search and complete the list of information 

Please send them. 

Telnet 

This is a protocol that allows services to be provided to specific remote computers 

 Direct access from anywhere in the world. Able to operate a computer 

It's like you're sitting right in front of me. When you log in, 

You can control remote computers far away. 

Transmission Control Protocol (TCP) 

It is one of the most important wireless communication protocols. it is 

Basically it is also used to transmit data over the network. This protocol has been deprecated 

Fully integrated with Internet Protocol (IP) and referenced by Duo. 

As TCP/IP. The IP portion of the network is addressed and 

TCP is responsible for transporting data packets from a source to a destination. 

Controls that ensure transmission reliability. 

What does TCP do?

 As already mentioned, TCP is intended to ensure reliable data transmission. 

 You can get it. On the Internet, data is transmitted via packets. package 

 A unit of data that is sent independently over a network. do this once 

 Once the package reaches its destination, it is sorted and reassembled. 

Data transmission in a particular network occurs in multiple layers, each with its own. 

Layers perform functions that complement those of other layers. of 

TCP and IP are designed to work together in each layer stack. Information. 

TCP is responsible for controlling the data being sent, and IP is responsible for controlling it. 

Channeling within the network. And if there is a presence 

Wi-Fi controls transmission within your local network. By now, you should understand the basic functionality of TCP. 

“We are responsible for ensuring the reliability of the transmission process.” 

There are several factors that determine the reliability of a transmission. a reliable transmission 

A packet that is not lost during transmission. In other words: H. Everyone achieves their goals 

goal. 

Eliminates delays that affect data quality . All data reassembled in an orderly manner package.


How TCP works

During each transmission, all packets are marked (numbered) by TCP. 
Apart from numbering, TCP also assigns a deadline by which every packet is sent. 
Their goal must have been achieved. Whenever there is a reception 
Packet,The source device is notified by a packet named,. 
knowledge. 
If confirmation cannot be obtained after the deadline 
The source sends another copy of the packet. Once this is done, it's you 
Make sure the packages are relocated properly. TCP addressing 
In contrast to IP, TCP does not have a sophisticated addressing system. for 
IP is called an IP address. The most important fact is that TCP does not do this 
 You must have one! TCP framework uses only numbers 
Provided for identification by the operating device 
Source and receiver packages. 
The identification number is called a port. For example on the internet 
Browsers use port 80 for TCP. Email uses port 25. This port is 
When a number is used in addition to the IP address so that something can be retrieved. 
Like "192.168.66.5.80". 
User Datagram Protocol (UDP) 
Don't get confused by the different protocols that exist. You may not need everything. 
Throughout your entire career. In fact, most of them are done automatically, just like her. 
You can get it and just do your job. Another important protocol is the user 
Datagram Protocol (UDP). UDP is the simplest transport layer 
Communication protocols commonly found in TCP/IP protocols 
Sweet. 
It cannot be called the simplest in vain, since it consists of a minimum of elements. 
Amount of communication components and mechanisms. In some cases, 
UDP is notoriously unreliable. However, since it uses IP services, 
This optimizes performance. 
The obvious flaw in the UDP framework is that the receiver does this. 
Unlike TCP, no acknowledgments are created for received packets. actually, 
The sender doesn't wait for it. That's a really big gap in the framework 
It won't be filled. 
UDP requirements 
You may be wondering why you need to use this framework in the wireless space. 
Communication when there are other reliable alternatives. Yes, it's UDP. 
Mainly used when different confirmation packages are used. 
Similar bandwidth to which the original data is transmitted. for example, 
Use UDP when streaming video, as packet loss is not noticed. What are the characteristics of UDP? This framework is mainly used when there is no need for it. 
To confirm data 
Also, if the data is only sent in one direction, UDP 
Convenient 
Very simple, perfect for communication 
query 
Not connection oriented 
No congestion control mechanism provided 
Data provided may not be orderable 
I am stateless 
Ideal for use with streaming applications such as VoIP.

UDP Header

There are four main parameters of the UDP header.

Source port: this is the 16bits information on the UDP whose

function is the identification of the packet’s source

Destination port: This is also a 16 bits information with the

function of identifying application level service at the particular

destination

Length: This is a specification of the whole length of the UDP

packet.

Checksum: This is the parameter that serves as storage for the

value of checksum generated at the packet’s source before

transmission.

Applications of UDP

There are several areas where UDP is used in the transmission of data, and

these are;

- Domain Name Services

- Simple Network Management Protocol

- Trivial File Transfer Protocol

- Routing informational protocol

- Kerberos

The systems in which UDP is used in data transfer are however not limited

to these. 

Wireless Network Protocols

In most cases, wireless networks are mistaken to be Wi-Fi networks. But as

established earlier in this book, Wi-Fi is different from wireless

communication technology. Wireless network protocols are proven to be of

immense use in consumer devices.

LTE

The LTE technology has a design which enhances data rates as well as other

problems experienced in old phone protocols, such as roaming problems.

On this protocol, rate reaches up to about 100 Mbps. However good this

technology may be, there is still a limitation as the phone carriers are not

deployed in some areas. This lack of phone carriers is due to high cost of

installation and government regulations.

LTE technology however is not designed to support home and LAN

networks, but designed to support consumers in longer distances.

Wi-Fi

We have discussed the whole concept of Wi-Fi earlier in this book. Well,

the technology has become the default connection technology employed in

homes, offices and other personal areas. The technology became popular in

the late 1990s. There are cases in which the technology can be controlled to

travel over longer distance. But in most cases, they are best suited for more

personal and home use.

WI-Fi actually has the protected access security protocols which adds a

level of authentication to the network, as well as data encryption. This

access technology is mainly to prevent third party from having access to the

network or mining personal data.

Bluetooth

This is one of the most popular wireless technology in the world. It was

created in the 1990s and it i=has risen to become ubiquitous. Unlike the WiFi, just a minimal amount of power is needed to run the Bluetooth

effectively. Hence, Bluetooth is designed to only travel shorter distances

when compared to the Wi-Fi. In many equipment, Bluetooth has been

replaced by WI-Fi.

60 GHz Protocols – WirelessHD and WiGig

Video streaming has become a very popular activity to engage in on the

personal computer. This has necessitated a wireless network protocol that

can better support it. These were created in the 2000s to offer high

definition streams.

Wireless Home Automation Protocols – Z – Wave and Zigbee

These are wireless protocols designed for home automation. They are

designed to make use of low energy consumption.

Network Routing Protocols

Ever heard something called the routing protocol, and you just wonder what

that is? It’s pretty simple. A routing protocol makes use of software and

some routing algorithms to determine the best mode of transfer of data and

information between nodes. The main functions of the routing protocols are

to create a router communication, as well as an overall network topology

understanding. In some cases, the routing protocol is also referred to as the

routing policy.

In a bid to foster a more effective communication between computers, the

routing protocols have been developed and innovated over time. The

working of the routing protocol is pretty simple.

Discovery: The process of identifying other routers situated on

the network

Route management: Keep tabs on the various potential

destination on a network

Path determination: This is the process in which the protocol

makes a decision on where it should send the network message.

There are some routing protocols that give a full details of mapping of the

network links, while others just allow routers to work with lesser

information.

Classes of Routing Protocols

There are 3 major classes of routing protocols

Distance Vector routing protocol

These protocols are designed to help choose the best paths (in the basis of

hop counts) needed to reach a destination on particular network, in a

particular direction. Some of the protocols in this class are dynamic, which

makes them optimal for the performance of the function. One of such is

RIP. In this framework, the hop counts are the various routers that exist

between a source and the destination network. Of all the various possible

paths, the one with the least hop count is decided to be the best path.

Features

- The network update are exchanged periodically

- The updates are always broadcast

- The routers in this framework make decisions premised on

information from neighboring routers.

Disadvantages

- The periodic exchange of information most times result in an

unnecessary traffic

- The exchange also results in security issues

- The broadcast of network periodically most often than not will

create unneeded traffic.

Link State Routing Protocols

Unlike the other protocol, these routing protocols know more about the

internetwork. These are also known as SPF (shortest path first). An example

of this is OSPF.

Features

- The updates in this protocol can only be initiated when there is a

change in topology.

- Only that much updates are exchanged which is requested by the

neighbor router.

There are three tables that this routing protocol maintains, which are;

- Neighbor table: This is the table that serves as a repository of

information about the neighbors of the router only.

- Topology table: This is the table with the information about the

whole topology, which include both the best and back up routes that

information packet can take.

- Routing table: This is the array of the best routes on the network.

Advanced distance vector routing protocol

This is somewhat of a hybrid, a culmination of both the link and vector

routing protocols. One example of routing protocol in this class is the

Enhanced Interior Gateway Routing Protocol.

Types of Network routing protocols

As explained above, all the routing protocols are classified into three. There

are several routing protocols that makes the wireless and wired networks

function effectively. These are;

Routing information protocol

This is the routing network that is extensively used in both local and wide

area networks. It is shortened as RIP, and its functioning is premised on the

distance vector algorithm. The protocol has been defined since 1988, and

has since then had two versions. You can use any of the versions nowadays.

Interior gateway routing protocol

This routing protocol is one made by CISCO, and it is used in routers to

exchange routing data within an independent system.

Open shortest path first

This is an active routing protocol that is used in internet protocol. It is an

example of the link state routing protocol and it includes all the major group

of interior gateway protocols. This protocol is mainly used in companies

with a big network.

Exterior gateway protocol

This is the ultimate routing protocol for the internet, and it was specified in

1982 by Eric C. EGP. It was initially expressed in RFC827, but properly

specified in RFC 904 in the year 1984. The topology on this network

routing protocol is like a tree.

Enhanced interior gateway routing protocol.

This is another type of the distance vector routing protocol, but it is fitted

with advanced technology to reduce the unsteadiness that occurs whenever

there is a change in topology. It enjoy a general optimization based on

DUAL work, as well as a loop free operation. This network protocol also

offers a means of speedy junction.

Order Gateway Protocol

These are the core network routing protocols found on the internet and is

responsible for the maintenance of a table of internet protocol that are

designed to allow network reaching capabilities within AS.

Intermediate system to intermediate system

This is a great protocol that is used by network devices to decide the best

route to promote datagram, from one end to another of a packet on a

switched network. This process is what is referred to as routing.

Network Security Protocols

The network security protocols are a type of network protocols that make

sure that data and information being transferred over a network are kept

safe and secure. These define the processes and methodology needed in

securing network data from any illegal attacks.

These protocols are simply designed to make sure that data sent and

received via the internet is kept safe and away from the prying eyes of

illegitimate users. Hacking and other cyber-crimes are at an all-time high.

Hence, you want to be really conscious of your security.

HTTPS: This is the protocol used in protection of internet

traffic. Anyone not on the traffic cannot access information that

is transmitted via HTTPS.

Firewall: This is a popular security protocol on networks. This

protocol is extensively used in the E-commerce sector, to protect

components which include Internet Payment Gateway, Server

based Wallets and payment servers. If these are ever

compromised, several users will be affected financially.

There are three main categories of the firewall;

- Packet filter

- Filter circuit level

- Application-layer filters

Packet filters are saddled with the responsibility of passing data that

pass through a network interface. The information needed at this point

is; IP-address, port numbers and destination. You can easily install

and implement this firewall on your wireless network. The high side

is that, it can be easily maintained. However, it offers a very low

protection level.

The filter circuit is the intermediate level of firewall security. This is

designed to monitor agreement activities at the junction of the client

and external host, checking if the requested session is valid. This

firewall type is not so expensive and is best used to protect private

networks. However, it does not filter packets.

The application level filters provides your network with the highest

level of firewall protection you can think of. However, it is a more

complex design and comes at extra cost.

IPSEC: This is a security protocol designed to encrypt data at

the level of the network. There are three main protocols

embedded in this; authentication header, encapsulating secure

payload (ESP) and the internet key exchange (IKE).

The authentication header is responsible for providing data origin

authentication, data integrity and security from repetitive messages.

The ESP is designed to offer validation and integrity for the payload,

but it does not do so for the IP header.

For the IKE protocol, its main function is to solve the problems of key

distribution protocols.

Other than the three main protocols running within the IPSEC

framework, there are also two main configurations. The very first

configuration bears the network layer protocol. While there is also the

second configuration which is used for closing data within the

network.

PCT: This is shorthand for the Private Communication

Technology, and it has a basic working process like the SSL. The

only difference between the PCT and the SSL is the size of the

message in transit. Compared to the SSL, the messages on PCT

are smaller. Browsers like the Microsoft Explorer 3 makes use of

PCT. Unlike the SSL however, the PCT has more options in the

negotiation of an algorithm and data formats.

Network Management Protocols

The names spells it all out. Network management protocols are suites of

protocols that take charge of the definition of processes, and policies that

manage, monitor and maintain a computer network. This set of instructions

are known to convey and manage the various operations and

communications that take place on a particular computer network.

In every management protocol, there is always the proposition of

architectures and procedures needed to extract, collect, transfer, store and

report information related to management. If you are looking to understand

any management protocol, make sure you understand the architecture. This

is really important.

Types of the Network Management Protocols

In this section of the book, we take a look at three of the most popular

protocols you really need to know. There are others, but they comes at a

reduced relevance, relative to these;

ICMP

This is a network layer protocol which is a concrete part of the group of

sub-protocols that are associated with the IP protocol. The main function of

this protocol is the validation of faults, and also the ensuring of

performance. It detects errors and send information back in that light. This

is why the main messages y ICMP are error messages and control

messages.

This is the protocol used in the calculation of factors like latency, response

time or packet loss, etc.

SNMP

This is the Simple Network Management Protocol, which is the application

layer that oversees failures, performance and actions. The framework of

SNMP is to gather, organize and communicate management information on

the various devices situated on the network. This protocol is used in quite a

number of hardware components, to ensure diversity of devices and also

diversity of marks.

SNMP Architecture

There are two basic components of the SNMP framework, which are the

SNMP agents and the SNMP administrators.

The SNMP agents are a bunch of software that run everything related to the

elements that needs to be managed. They primarily collect data on the

device

SNMP administrators are more involved in the management and monitoring

section of the network. They serve as the centralized location for all data

sent and stored.

How are data organized in SNMP?

Data that are in for management on the SNMP are known as objects.

OIDs (Object identifier): These are basic elements with the primary

function of identifying objects. The OIDs are always in the format:

.1.3.6.1.4.1.9.9.276.1.1.1.1.11. The extraction of this number comes from

the system of hierarchical organization that starts by identifying the

producer of the object.

MIBs (Management Information base) are the basic format that data from

the SNMP agents to the SNMP managers follow.

WMI

This is the Windows Management Instrumentation. This is mainly used in

systems and devices that run on the Windows software. On the WMI

framework, there is the model that represents, obtain and share management

information on any hardware that runs on windows.

The Architecture

There are three fundamental entities on the WMI architecture, which are the

WMI providers, WMI infrastructure and the administration applications.

The providers is in-charge of getting any management information from one

object or the other.

The infrastructure is the framework designed to bridge the gap between

suppliers and the management tools.

Protocols are what make things work on any computer network. It sort of

the order and rules that guide every operation. If there are no protocols

handling the various aspects of what goes on in a network, you can only

imagine the amount of disarray.


wireless technology for the internet  Chapter 7

Wireless Network Computer Architecture Chapter 6

Comments

Popular posts from this blog

Networking Services

Dell Server Available

Cisco-sg350-28p-28-port