1 Communication Protocols Course: CIS 3003 Fundamental of Information Technology.

48
1 Communication Protocols Course: CIS 3003 Fundamental of Information Technology

Transcript of 1 Communication Protocols Course: CIS 3003 Fundamental of Information Technology.

1

Communication Protocols

Course: CIS 3003Fundamental of

Information Technology

2

Protocol

• Allow individuals to communicate with each other.

• Every day protocols:– Greeting – Writing order– Letter / address– Traffic signals and signs

3

OSI Model

• Open Systems Interconnection (OSI)

• Allows computers to communicate

• Layer abstraction• Similar communication

functionalities in the same layer.

• Layer communicates through interface.

4

Layer 1 – Physical Layer Protocols

• Define electrical, optical, and mechanical specification between a device and transmission medium such as fiber optical, coaxial, or twisted pair cables.

• Voltage level , transmission rate, signal timing, connection specification.

• Example protocols: T568A and T568B standards for Category 5 Ethernet cable, SDH and SONET for fiber optic cable.

5

Cat-5 Ethernet cable• Standard organizations:

– Telecommunications Industry Association and Electronic Industries Alliance

• Protocols: TIA/EIA-568-A, TIA/EIA-568-B, TIA/EIA-568-C

• Specifications:– Cabling Type: unshielded 4

twisted pairs – Maximum distance: 100 meters– Bent at most 4 times the

diameter of the cable. – Connector– Cable termination standards– Performance characteristics – Methods of testing installed

cable.

6

Layer 2 – Data Link Layer

• Describes how to access a particular physical medium such as Ethernet cable, fiber optic cable, and wireless.

• Collision detection, avoidance, frame format, channelization.

• Examples: CSMA/CD, Token Ring, IEEE 802.11 for Wi-Fi, TDMA/CDMA, IEEE 802.15 for Bluetooth, IEEE 802.16 for WiMAX.

7

CSMA/CD & CSMA/CA

• Carrier Sense Multiple Access with

• Carrier sense: after detect a busy signal– 1-persistent: node sends

out immediately once the medium is free.

– p-persistent: node sends out frame or waits with a probability.

• Collision Detection:• Collision Avoidance

8

IEEE 802.11

• Organization: – Institute of Electrical and

Electronics Engineers

• Frequency: 2.401-2.483• Channel width: 20 MHz• Uses CSMA/CA

• Data rates• MIMO: Multiple input

and output streams (i.e. antennas).

• Modulations: phase shift and frequency.

9

IEEE 802.2

• Logical link control.• Provides interface to upper network layer

protocols to control a link layer protocol. • Allows a network layer to unicast, multicast, or

broadcast using several procedures– Broadcast MAC addrs: FF:FF:FF:FF:FF:FF– Multicast: 01:00:5e:00:00:00 - 01:00:5e:7f:ff:ff

• Offer several methods of sending data over a physical link.

10

IEEE 802.2 Procedure Types

• Type 1: unacknowledged connectionless to single, multiple, or all nodes in the network

• Type 2: connection-oriented link to a node.

• Type 3: acknowledged connectionless supports only point-to-point connection.

• Connection-oriented– Validate link before send out

data and a failed link is communicated to upper layer.

– RTS/CTS.

• Connectionless– Link not validated first.

• Acknowledgement– Frame acknowledgment

with sequence number. – ACK/NACK

11

Layer 3 – Network Layer

• Defines topology• Uses of routing table to route data• IP address• Wired and Wireless routing protocols

12

Layer 4 – Transport Layer

• Provides end to end communication.• Provides an interface to application protocols

to send data over network. • Example protocols: TCP (Transmission Control

Protocol), UDP (User Datagram Protocol), etc.

13

TCP vs. UDP• TCP: Transmission Control Protocol. UDP: User

Datagram Protocol. • TCP provides error checkings: UDP does not.

– Buffers out-of-order data– Discard duplicate packets– Resends erroneous data

• TCP provides congestion control; UDP does not.• TCP sets up and maintains connection; UDP does not. • TCP slower; UDP faster.

– Non-time critical applications: HTTP, HTPS, FTP, Telnet – Time critical applications: VoIP, IPTV, online gaming, DNS

14

TCP Congestion Control

Slow start

Congestion Avoidance

15

TCP Connection Setup

16

TCP header

17

UDP header

18

Layer 5: Session Layer

• Opens, maintains, and closes a session. – Session: semi-permanent dialogue consists of

requests and responses that occur between applications

• Example protocols: RPC (Remote Procedure Calls), H.245 (Call Control Protocol for Multimedia Communication).

19

H.245

• Conveys information needed for multimedia transmission such as such as encryption keys, flow control, jitter management, preference requests, as well as the opening and closing of logical channels used to carry media streams.

20

Remote Procedure Calls (RPC)

• Allows one computer to call a procedure that resides on a remote computer

• Steps to use a RPC– A client calls the client stub

with a function and parameters.

– The stubs packs the function and parameters into a message and sends them to kernel.

– The kernel sends the message to server

– The kernel at the server end passes the function and parameters to the server stub.

– The server stub calls the procedure on the server and passes the parameter.

– The server stub sends result in a reverse direction.

21

RPC Example

22

Layer 6 – Presentation Layer

• Formats and encodes information from an application so that other computers using the same standard can understand

• Provides serialization; converts a complex data structure used by an application into a format such as XML to be sent over a network. – Java, .NET, and C/C++ provides serialization. – MPEG, ASCII, Unicode are example formats that

can be sent over network.

23

JavaSerialization

24

Java Serializable Object

25

Java – Write Serializable Object

The text file can then be sent over a network to another computer.

26

Java – Read Serializable Object

Receiver needs to understand the format to read the binary file.

27

Same data in different formats

28

Layer 7 – Application Layer

• Provides services to application programs so that the programs can communicate with each other.– Determines how to reach another party such as a

web site.– Authenticates an application program. – Determines what lower level protocols to use.

• Example protocols: HTTP, FTP (File Transfer Protocol, Telnet, BitTorrent, DHCP (Dynamic Host Configuration Protocol).

29

HTTP

• Hypertext Transfer Protocol

• Organizations: – Internet Engineering

Task Force (IETF)– World Wide Web

Consortium (W3C)

• RFC 2616– Requests for Comments

• Request methods:– HEAD, GET, POST, PUT,

DELETE, TRACE, OPTIONS, CONNECT, PATCH

– Safe methods: retrieve information only, no unintended change on the server. Used by search engine.

– URL: Uniform Resource Locator. Points to an Internet resource.

30

URL

• Uniform Resource Locator.• Points to an Internet resource. • A parameter to the HTTP methods. • URL Examples: http://www.google.com/,

https://my.ucf.edu/index.html.

31

Various Internet browsers

32

Browser and server

33

Bit Torrent protocol

• Peer-to-peer file sharing protocol

• Describes how a node retrieves pieces of a file from other peers in a network.

• Uses a hash function to associate pieces to the corresponding file.

• TCP as the transport layer protocol.

34

Various programs using Bit Torrent

35

TCP/IP – Alternatives to OSI Model

• Four layers• Network layer is mainly

of Internet Protocol (IP). • Transport layer is mainly

Transport Control Protocol (TCP).

• Compared to OSI, there are no separated layers for session or presentation protocols.

36

Organizations behind protocols

• No single organization, government, or company assumes responsibility for establishing the enormous number of standards required for network communications.

• A complex matrix of organizations assumes responsibility for setting standards in various areas– National, International, Professional organizations,

Consortia of technology companies, public.

37

ANSI (an-see)

• American National Standards Institute– http://www.ansi.org/ – Founded in 1918. One of the oldest standards

institutions in the world– Private, nonprofit organization with participating

members from businesses, organizations, academic institutions, and governmental agencies

• Promotes and coordinates standards that are in the nation’s economic interest

• Protocol: ADSL

38

EIA

• The Electronic Industries Alliance– http://www.ecaus.org/eia/site/index.html – Trade organization of more than 2500 companies

involved in manufacturing electronic systems and components

– Telecommunications Industry Association (TIA): http://www.tiaonline.org/

• Specifies electrical standards for a variety of networking components: TIA/EIA-568 for Ethernet cables.

39

ISO (eye-so)

• International Organization for Standardization.– International standards-setting organization– Made up of national standards bodies from more than 150

countries– ANSI represents United States

• Protocol: – ISO 9660 or Compact Disc

File System: an image file standard of optical disk such as CD, DVD, or Blue Ray

40

IEEE (I-Triple-E)

• Institute of Electrical and Electronics Engineers– http://www.ieee.org/publications_standards/

index.html – Nonprofit professional organization of engineers– http://www.ewh.ieee.org/r3/orlando/Osm112003/

student.htm IEEE Orlando Branch

• Important IEEE specifications include Ethernet, token ring, and wireless LAN standards

41

IETF

• Internet Engineering Task Force: – Has no formal membership, but has more than 100

“working groups” that advance Internet standards http://www.ietf.org/

• Group most directly responsible for developing Internet protocol standards

• Since 1969, an electronically published archive known as the “request for comments,” or RFC series, has documented the Internet standards process. RFC 2988 specifies TCP.

42

W3C

• World Wide Web Consortium– http://www.w3.org/ http://www.w3.org/standards/ – http://www.w3schools.com/html/ – Founded in 1994

• Promoting continued development of Web technologies and ensuring interoperable, vendor-independent Web standards.

• Standards: HTML, XML, Web service (in progress).

43

ITU

• International Telecommunication Union– http://www.itu.int/en/Pages/default.aspx – International telecommunications standards

organization operating under the auspices of the United Nations

44

NIST

• National Institute of Standards and Technology – http://www.nist.gov/index.html – United States– Dates back to 1901

• Standard: Encryption protocol such as Advanced Encryption Standard.

45

Summary

• Computing devices can exchange information over a network if they adhere to standard rules called protocols

• Protocols perform a number of functions, including how to format information in binary code, how to indicate the initiation or termination of a connection, and how to append standard addressing information prior to transmission.

46

Summary

• The OSI reference model is a framework that groups the many protocols and protocol functions required to exchange information over a network.

• The TCP/IP protocol suite is the group of communications protocols that exchange over the public Internet (and private TCP/IP networks)

47

Summary

• Many standards-setting organizations establish communication protocols; organizations work for companies that have a stake in the outcome of protocol design and include ANSI, EIA, NIST, the IEEE, the IETF, the ITU, the ISO, and the W3C.

48

Summary

• Protocols have economic implications because they represent a means of control over competing equipment and software manufacturers, determine how innovative markets can be, and sometimes even serve as barriers to trade in global IT markets