* Your assessment is very important for improving the workof artificial intelligence, which forms the content of this project
Download Network protocols
Net neutrality wikipedia , lookup
Network tap wikipedia , lookup
Computer security wikipedia , lookup
Wake-on-LAN wikipedia , lookup
Deep packet inspection wikipedia , lookup
Net neutrality law wikipedia , lookup
Cracking of wireless networks wikipedia , lookup
Computer network wikipedia , lookup
Zero-configuration networking wikipedia , lookup
Airborne Networking wikipedia , lookup
Recursive InterNetwork Architecture (RINA) wikipedia , lookup
Internet protocol suite wikipedia , lookup
MAKERERE UNIVERSITY College of Computing and Information Sciences School of Computing and Informatics Technology BIT 1102: COMMUNICATIONS TECHNOLOGY AND THE INTERNET 6.LAN ACCESS METHODS/NETWORK PROTOCOLS Network Protocol 2 Just like Human beings communicate using languages such as English, French or Swahili, Computers / Nodes on a network need to follow a standard in order to transmit to each other. So, a network protocol can be defined as a set of rules (a language) governing devices communicating on a network. BIT 1102: Communications Technology & the Internet Network Protocol 3 It is a formal description of digital message formats and the rules for exchanging those messages in or between computing systems and in telecommunications. BIT 1102: Communications Technology & the Internet What’s a protocol? 4 . Hi TCP connection req Hi TCP connection response Got the time? 2:00pm <file> time Qn: Other human protocols? BIT 1102: Communications Technology & the Internet Who develops these Standards? 5 Several international bodies are dedicated to developing acceptable standard standards for communicating on the network. These include, IEEE: Institute of Electrical and Electronic Engineers (www.ieee.org) IETF = Internet Engineering Task Force (www.ietf.org) ITU: International Tele Communications Union(www.itu.int). ANSI= American National Standards Institute(www.ansi.org). BIT 1102: Communications Technology & the Internet Network protocols 6 There are many protocols currently in use for various purposes such as: LAN access methods Ethernet Token ring TCP IP SMTP and many more. BIT 1102: Communications Technology & the Internet Access Control Methods 7 A LAN Access method describes how the devices access the network and share the transmission facilities Two primary access control methods exist for computers to communicate with each other over the network Token based access Carrier Sense Multiple Access with Collision Detection (CSMA/CD) Other methods will be explored in computer Networks BIT 1102: Communications Technology & the Internet Ethernet 8 Ethernet is one of the most common and widely used network protocols that uses methods known as 1. Carrier Sense Multiple Access with Collusion Detection (CSMA/CD). 2. Carrier Sense Multiple Access with Collision Avoidance (CSMA/CA). BIT 1102: Communications Technology & the Internet Carrier Sense Multiple Access(CSMA) 9 Multiple Access Any of the network devices can transmit data onto the network at will; there is no central controller A broadcast network where all stations see all frames, regardless of whether they represent an intended destination Each station must examine received frames to determine if the station is a destination. If so, the frame is passed to a higher protocol layer for appropriate processing. Carrier Sense Before sending data, stations listen to the network to see if it is already in use. If in use, the station wishing to transmit waits, otherwise it transmits BIT 1102: Communications Technology & the Internet CSMA/CD 10 In this method, the computer “listens” to the network before transmitting. If the network is clear, the computer / node sends the transmission. Sometimes when using CSMA/CD, two computers may begin transmitting at the same time. When this occurs, there is data collision and both computers back off and wait for a random time to re-transmit. The delay however is minimal and does not greatly affect the network speed. BIT 1102: Communications Technology & the Internet Ethernet cont’d 11 Ethernet protocol runs on topologies such as Bus, tree and star. Fiber optic, Coaxial, wireless and twisted pair are the main channels supported by Ethernet at speeds of 10Mps . (Fast Ethernet and Gigabit Ethernet transmit at 100Mps and 1000 Mps respectively) BIT 1102: Communications Technology & the Internet ii) Carrier Sense Multiple Access with Collision Avoidance 12 Unlike CSMA/CD, Carrier Sense Multiple access with Collision Avoidance (CSMA/CA) involves listening in to the network in order to “avoid” collisions. In CSMA/CA, before any actual transmission occurs, the sender must broadcast an intension to transmit, and only transmits when the network is clear. If the network is busy, the sending computer withdraws the transmission and re-broadcasts after a pre defined interval. BIT 1102: Communications Technology & the Internet ii) Carrier Sense Multiple Access with Collision Avoidance 13 1. Sender send a request-to-send (RTS) frame to receiver and indicates the time needed to complete data transmission 2. Receiver send clear-to-send (CTS) frame, indicates time to complete data transmission and reserves channel for the sender 3. Sender transmits the data and receiver responds with an ACK frame, ensuring reliable transmission 4. RTS and CTS frames let other stations know of the data transmission so that collision is avoided BIT 1102: Communications Technology & the Internet CSMA/CA cont’d 14 Local talk protocol developed by Macintosh computers is an example of a protocol that uses CSMA/CA. CSMA/CA is also used on networks where by the medium of transmission does not allow for collision detection. In wireless LANs, for example, not all stations may be able to detect each other so CSMA/CD is not an option. CSMA/CA transmits at lower speeds of about 230kb/s BIT 1102: Communications Technology & the Internet Token Ring 15 How does Token work? BIT 1102: Communications Technology & the Internet Ring protocol Token ring Explained 16 Developed by IBM, this protocol uses a special electronic frame known as a token which is passed from computers connected together in a logical “ring”. If a computer has data to transmit, the data is attached to the token which is passed round the “ring” until it reaches the destination. At this point, the receiving computer captures the data and releases the empty token. If the token arrives at a computer without anything to transmit, it simply proceeds to the next computer. BIT 1102: Communications Technology & the Internet Token Ring cont’d 17 Though once popular, the token ring protocol has lost popularity to the Ethernet protocol and is rarely used currently. Defined under IEEE 802.5. Token ring Networks Transmit between 4Mbps to 1GBps over twisted pair or fiber optic cable BIT 1102: Communications Technology & the Internet FDDI 18 Developed by the ANSI, Fibre Distributed Data Interface (FDDI) is a network protocol that enables transmission over long distances. (It generally connects two or more LANs) at high speeds, mainly over fiber optic cable. FDDI uses Dual Ring topology using a Token mechanism as discussed (see token ring) The “Dual” ring topology refers to two rings, one of which will operate if there’s no problem on the network. If there’s failure on the primary ring, transmission then moves to the backup ring. BIT 1102: Communications Technology & the Internet Fiber-Distributed Data Interface (FDDI) 19 FDDI provides a standard for data transmission in a local area network that can extend in range up to 200 kilometers (124 miles). In addition to covering large geographical areas, FDDI local area networks can support thousands of users. As a standard underlying medium it uses optical fiber (though it can use copper cable, in which case one can refer to CDDI). BIT 1102: Communications Technology & the Internet Asynchronous Transfer Mode (ATM) 20 A highly complex network protocol that involves the transmission of all data in packets of a fixed size (53 Bytes). ATM protocols are connection-oriented ie transmission only starts when the channel is known to be free. While ATM is wide spread in WANs, it has generally failed to gain popularity as a LAN protocol. The MFA (Frame Relay Alliance) Forum (formerly ATM Forum) is a Consortium regulating this protocol (mfaforum.org) BIT 1102: Communications Technology & the Internet Internet Protocol (IP) 21 Internet protocol (IP): IP is used to transfer data from one computer to another on a Network. IP is able to achieve this based on an IP address, which is a Unique number assigned (Either manually or automatically) to each computer on the Network. IPV4 (version 4) in most use currently. IPV6 is being migrated to in many organizations as well. BIT 1102: Communications Technology & the Internet Transport Control Protocol (TCP) 22 While IP is only concerned with delivering data packets, the Transmission Control Protocol (TCP) ensures reliable and accurate delivery of the data packets across the network. TCP and IP together (TCP/IP) form the basic communication “language” or protocol used on the Internet. BIT 1102: Communications Technology & the Internet Other Common protocols 23 Simple Mail Transfer Protocol (SMTP): This protocol is used in sending and receiving of Electronic mails (e-mail). Dynamic Host Configuration protocol: This protocol is used to automatically assign IP addresses to “hosts” or work stations on a network. A DHCP server is normally configured to perform this task. BIT 1102: Communications Technology & the Internet Other Common protocols cont’d 24 Hyper Text Transfer Protocol (HTTP): This is a protocol used for exchanging information on the World wide Web (www) Its standards development has been coordinated by the IETF and the W3C (World Wide Web Consortium) Secure Socket Layer (SSL) protocol: The predecessor to Transport Layer Security(TLS) , SSL is concerned with the security of a message being relayed over a network e.g. the internet (Security to be covered in a later chapter) BIT 1102: Communications Technology & the Internet Other Common protocols cont’d 25 The File Transfer Protocol (FTP): Is used widely on the Internet for transferring files to and from a remote host. FTP is commonly used for uploading pages to a Web site and for providing online file archives. BIT 1102: Communications Technology & the Internet 26 Thank you BIT 1102: Communications Technology & the Internet