Layering protocols
Layering protocols
1
3/27/2023
2
3/27/2023
3
3/27/2023
FTP is a Protocol or Service which is used to transfer files TFTP is a Protocol or Service which is responsible to HTTP is a Protocol or Service which is used to transfer web
or directories from one host to another host. transfer files. information over the network or Internet.
It is used to exchange files between hosts over the network It is the older or simple form of FTP which is used to It is service which is used transmit web applications or web
(LAN) or Internetwork or Internet. download or upload files between network hosts or Internet. pages in the network or Internet.
A user on a client end, called the FTP Client, can download It uses UDP to transfer files, so it is not responsible for the HTTP uses TCP to transmit web information. An administrator
or upload the files or directories from the server end, called reliable communication. can configure or manage HTTP Service through Web or
the FTP Server. Because it uses UDP, so it does not provide HTTP Application or program.
It uses TCP to transfer data, so it is responsible for the acknowledgement and does not provide security features. HTTP works on logical port no. 80…..
reliable communication of data with acknowledgement. TFTP works on logical port no. 69 …...
It uses TCP, so it provides security features.
An Administrator can configure or manage the FTP Service
through FTP Program or Application.
FTP works on logical port no. 21 ….
HTTPS is also a Protocol or Service like HTTP which is used SMTP is a Protocol or Service which is used to transfer POP is a Protocol or service which is used to retrieve e-mails
to transfer web information over the network or Internet but it from e-mail database server.
is more secure than HTTP.
e- mail messages across the network or Internet. It helps
Like SMTP which is used to sending e-mails, POP is a
It is secure because it works on the basis of certificate.
in sending e-mails messages such as text or message service which is used to receive e-mails.
It is a service which is used transmit web applications or web
with an attachment file. POP has some versions like POP2, POP3 etc…
pages in the network or Internet. Through SMTP a user can send mail to the multiple POP2 works on logical port no. 109….. and POP3 works on
HTTP uses TCP to transmit web information. An administrator recipients at the same time. logical port no. 110…..
can configure or manage HTTPS Service through Web
It uses TCP to send e-mail messages, so it provides
Application or program.
HTTPS works on logical port no. 443…..
reliable delivery of e-mails.
SMTP works on logical port no. 25……
4
3/27/2023
DHCP is a Protocol or Service which is used to provide NFS is a Protocol or Service which is used to make
automatic hosts TCP/IP configuration. communication possible between two different operating
TCP/IP configuration includes IP Address, Subnet Mask, systems based hosts.
Default Gateway and DNS IP Addresses.
DHCP is used for the IP Addresses distribution over the It allows hosts on different operating system to share files
network or in the Internet. and disk storage…..
The server which is responsible to provide IP Addresses in
the network, known as DHCP Server, and the hosts which NFS works on logical port no. 944…
are taking IP Address from the Server, known as DHCP
Client.
DHCP uses UDP to provide TCP/IP configuration over the
network.
DHCP Server works on logical port no. 67….and DHCP Client
works on logical port no. 68…
5
3/27/2023
TCP is a Protocol which is responsible for the transportation of UDP is a Protocol which is responsible for the transportation
data. SCTP is a Protocol which is also used for data transport.
of data.
TCP is a Connection-Oriented and Reliable Transport Protocol. It is also Connection-Oriented and reliable transport protocol
UDP is a Connection-less/stateless and unreliable Transport
Connection-Oriented means a virtual connection must be that offers acknowledgement, error-free and non-duplicated
Protocol.
established between the sender and the receiver before the transmission of multiple streams of data.
actual transmission occurs. Connectionless means UDP is not responsible to establish a
virtual connection between sender and receiver before Unlike TCP, SCTP makes sure that multiple streams of data
It is a Reliable protocol because it gives the actual will be transmitted simultaneously.
acknowledgement of each transmission of data and also transmission.
responsible for the retransmission of data if some packets don’t It provides unreliable transport protocol because it does not SCTP can be used to manage connections over wireless
arrive error-free. provide any acknowledgement of the transmission. It just network and transmission of multimedia data.
It is also responsible for the error checking and error correction. adds port addresses and error control information to the data It supports new applications such as voice over the Internet.
Overall, it provides the reliable transport of data. and delivers the data. So it is fast transport protocol
compared to TCP. It combines the best features of TCP and UDP.
It divides the data into segments each having a sequence
number. These sequence numbers are useful at the receiving Unlike TCP, it does not provide error correction but it provides Protocol Number: 132
end to rearrange the segments into original order. error checking on the data.
Protocol Number: 6 Protocol Number: 17
IP is a transmission mechanism used by the TCP/IP protocol. ICMP is a protocol which is used by network hosts to send
IP is a connectionless and unreliable datagram protocol and notification of datagram problems such as query and error
provides no error-checking. reporting messages back to the sending device.
IP transfers data in the form of packets called datagram. Its only function is to report problems to the original sender
not to correct them.
IP does not reorder the data once they reach the destination.
Also, IP does not keep a track of the routes of the datagram.
IP works on protocol no. 0…
6
3/27/2023
7
3/27/2023
Addressing
MAC Address
For the purpose of communication, or to identify a network device in the
network, a unique address for that particular device is needed. Network Device
like Computer, Router, Switch, Firewall etc.. must need a unique address for its
identification in the network.
Classification of Addressing
IP Address
MAC Address IP stands for Internet Protocol
MAC stands for Media IP Version 4
Access Controller 32-bit Address
48-bit Address Dotted-Decimal form
Hexa-decimal form IP Version 6
Exist on Network Interface 128-bit Address
Card (NIC) Hexa-Decimal form
Can be assign on
Operating System
8
3/27/2023
It is generally used in Wide Area Networks (WAN) or Internet. Unicast means one to one communication. When a data packet is Multicast means one to many communication. When a data packet is
Public IP Address is needed if any of the device in any network wants sent from a host with destination address which represents a single sent from a host to a group of hosts, a multicast communication takes
to communicate in Public network or WAN. Without public IP address host, a unicast communication takes place. place. Multicast addresses belongs to Class D addresses. These
any of the device cannot be communicate in public network or WAN addresses define an address for a group.
or Internet. Hence, a Unicast IP address which uniquely identifies a host in a
Organization has to pay cost for each public IP address to the particular network. Each host present on the Internet has at least one A host on a multicast network can have more than one Class D
Internet Service Provider (ISP). unique unicast IP address. multicast address. If a host have five multicast addresses, then the
Public IP address is unique in public network, a single public IP host belongs to five different multicast groups.
address cannot be used twice or more in public network or Internet.
An organization can also use public IP addresses in its private Multicasting on Internet is of two types, Local level and Global level.
network At local level, hosts on a LAN can form a group and can be assigned
if that network is not connected to the public network. a multicast address. While at global level, hosts on different networks
can form a group and can be assigned a multicast address.
9
3/27/2023
10
3/27/2023
Internetworking Devices/Components
NIC (Network Interface Card)
Features:
Repeater is a device which is used to boost or regenerate the data It is a physical layer device. It is also known as multiport repeater. Layer 2 device
signals at the time of communication. Repeater is a physical layer device Used to connect two Lan segments, means if u have two hubs in
which is responsible to filter the data signals along with regenerating the the network, then network broadcast can be limit by placing bridge
data signals. It is a update version of Amplifier, amplifier were regenerate Features: between hubs.
data signals but not responsible to filtration. It is a network device which is used to connect devices together in Bridging occur at the data link layer. This layer controls data
the handles
flow, transmission errors, provides physical and
Amplifier = Regenerate network addressing thes
In the Hub created network, when any single communication takes functions by usingtovarious
manage access data linkmedium.
the physical layer protocols.
Bridge provides e
Repeater = Regenerate + Filtration
place, then hub is responsible to forward the data to all its ports. Responsible to create Mac table.
Simply, it is not responsible to forward the data up to the actual Bridge uses a Software program to store Mac table.
host.
It has less number of ports than other layer 2 devices
It works on the basis of broadcast.
Bridge provides its ports speed between 10 to 100
mbps.
11
3/27/2023
Features:
Layer 2 device Types of Switches: 2 It stores mac-table in a software It stores mac-table in a chip named
program. ASIC.
It is responsible to filter and forwarddata packets through the Manageable Switches
network. Non- manageable Switches
3 Has less number of ports. Has higher number of ports than
It is a update version of bridge, it includes superior throughput bridges
performance, higher port density and greater flexibility.
Responsible to forward data frames on the basis of mac-address. Types of Switches on the basis of error handling:
4 Supports port speed between 10 – 100 Supports port speed from 10 to
Responsible to maintain Mac-table, in which it stores the Cut-through Switches mbps. 1000
mac addresses of all connected hosts. Store and Forward Switches mbps and more.
Because it maintains mac-table, so it also known as intelligent hub. Straight or Fragment free Switches.
5 Responsible to connect two Lan Responsible switching of data
It has in-built chip named ASIC (Application specific Integrated packets
segments.
Circuit) to store mac-table. between actual source and
destination.
Routers It stores the network number information in its routing Router Ports and
table.
Interfaces
Responsible to perform path selection.
Router is a interconnectivity device which is used to forward the Never forwards broadcast packets.
data packets between from one network to another network. Perform Packet Switching (switch packet from one subnet S.no. Port/Interface Description
Features: to 1 Console To configure router locally
another).
Layer 3 device
Also responsible for Packet Filteration (Access-Control
WAN connectivity device. 2 Auxilary To configure router remotely
List)
Its primary function is to forward the packets by checking its
Also responsible for Address Translation (NAT).
destination address (IP). 3 Ethernet/Fast Ethernet/Gigabit Used to connect LAN (LAN Interface).
Responsible to forward the data packets from one IP based network Ethernet
to another.
Types of Routers:
It is an intelligent device, because it maintains the Routing Table 4 Serial Used to connect with WAN (Router) (WAN
Modular
for the path selection, through which it can choose the best path for Interface)
the communication. Non-modular (Fixed)
It understands IP address, so it forwards the data packets on the 5 Basic Rate Interface Used to connect ISDN
basis of IP address of source and destination.
12
3/27/2023
13