* Your assessment is very important for improving the workof artificial intelligence, which forms the content of this project
Download A Big Test Result - Knowledge Systems Institute
Server Message Block wikipedia , lookup
Airborne Networking wikipedia , lookup
Wake-on-LAN wikipedia , lookup
Distributed firewall wikipedia , lookup
Cracking of wireless networks wikipedia , lookup
Computer network wikipedia , lookup
Deep packet inspection wikipedia , lookup
Zero-configuration networking wikipedia , lookup
Recursive InterNetwork Architecture (RINA) wikipedia , lookup
Routing in delay-tolerant networking wikipedia , lookup
Introduction to Computer Networks Introduction to Protocols This lesson offers an introduction to protocols and their function in a networking environment. The Function of Protocols • Protocols are rules and procedures for communicating. • In a network environment: • 1. There are many protocols. • 2. Some protocols work only at particular OSI layers. • 3. Protocols can also work together in a protocol stack, or suite. How Protocols Work • Protocols at the sending computer: • 1.Break the data into smaller sections, called packets, • 2.Add addressing information to the packets • 3.Prepare the data for transmission through the NIC and out onto the network cable. How Protocols Work (2) • Protocols at the receiving computer : • 1.Take the data packets off the cable. • 2.Bring the data packets into the computer through the NIC. • 3.Strip the data packets of all the transmitting information that was added by the sending computer. • 4.Copy the data from the packets to a buffer for reassembly. • 5.Pass the reassembled data to the application Routable Protocols • Data that is sent from one LAN to another along any of several available paths is said to be routed. • The protocols that support multipath LAN-to-LAN communications are known as routable protocols. • Because routable protocols can be used to tie several LANs together and create new wide-area environments, they are becoming more important in modern internetworking environment. Protocol Stacks • A protocol stack is a combination of protocols. • Each layer specifies a different protocol for handling a function of the communication process. The Binding Process • The Binding Process connects protocols to each other and the NICs. • Protocols and NICs can be mixed and matched on an as-needed basis. • The binding order determines the sequence in which the operating system runs the protocol. • When multiple protocols are bound to a single NIC, the binding order is the sequence in which the protocols will be utilized to attempt a successful connection. Standard Stacks • The computer industry has designated several kinds of stacks as standard protocol models. • The ISO/OSI protocol suite. • The IBM Systems Network Architecture: DLC/SNA. • Novell NetWare IPX/SPX. • Apple's AppleTalk. • The Internet protocol suite, TCP/IP. Protocol Types. • The communication tasks, that networks need to perform, are grouped into one of three protocol type Application Protocols • They provide application-to-application interaction and data exchange. • Popular Application Protocols include: • APPC (Advanced Program-to-Program Communication) • FTAM (File Transfer Access and Management) • X.400 (e-mail standard) • X.500 (directory standard) Application Protocols (2) • SMTP (Simple Mail Transfer Protocol) • FTP (File Transfer Protocol) • SNMP (Simple Network Management Protocol) • Telnet • Microsoft SMBs (Netbios) • Novell NCP • Http of web Transport Protocols • Transport protocols facilitate communication sessions between computers and ensure that data is able to move reliably between computers. • Popular transport protocols include: • TCP, UDP • SPX • NetBEUI (NetBIOS extended user interface) • NWLink (The Microsoft implementation of the IPX/SPX protocol.) Network Protocols • These protocols handle addressing and routing information, and retransmission requests. • Popular network protocols include: • IP • IPX • NWLink • NetBEUI Manufacturer compatibility • The OSI reference model is used to define which protocols should be used at each layer. Manufacturer compatibility (2) • Products from different manufacturers that subscribe to this model can communicate witheach other. Implementing and Removing Protocols • Protocols are implemented and removed in much the same way that drivers are added and removed. • Essential protocols are installed automatically at the same time the initial operating system is installed on the computer. • To install extra protocols, the corresponding services should be installed too; and the binding process should be invoked again. • To remove protocols, the corresponding services should be removed first. Because these services need the protocols to work.