Communication Protocols
Communication Protocols
A communication protocol defines the set of rules that specify the modalities of
operation of communication between two computers. There are a multitude of protocols, it is about
Here to state the main protocols used. The inventory of these protocols can be carried out separately from
OSI model. Here are some protocols:
Physical layer:
CSMA/CDCarrier Sense Multiple Access / Collision Detectionmultiple access protocol, by detection of
carrier and collision,
RS 232: standard for serial communication standardization,
USB(Universal Serial Busseries transmission bus computer used to connect peripherals
computer science to a computer.
IEEE 1394: protocol for multiplexed serial interface (data and control signals) whose name
commercial is Firewire,
Bluetooth: standards for establishing a radio connection over a short distance (from 10 to 100 m),
2. Link layer:
Ethernet: packet-switched local network protocol (IEEE 802.3 standard),
HDLC(High-Level Data Link Controlframe transfer protocol with error control (ISO 3309)
PPP(Point-to-Point ProtocolTransmission protocol for the Internet (is an interconnection of networks
independent individuals who maintain their own identity in a global public network making accessible
services such as the World Wide Web, email, instant messaging, and sharing
files.), heavily based on HDLC, used to establish a connection between two hosts,
IEEE 802: standard for wireless connections supporting Wi-Fi technology,
3. Network layer:
NetBEUI(NetBios Extended User Interfacenon-routable local network protocol
IPX/SPX(Internetwork Packet Exchange/ Sequenced Packet Exchangepacket transmission protocol to
through a local area network, developed by Novell (Novel NetWare),
IP(Internet Protocol): Internet communication protocol based on a unique addressing service for
the entirety of connected equipment :
IPv4 (version 4): IP address on 32 bits (4 bytes from 0 to 255),
IPv6 (version 6): IP address based on 128 bits (16 bytes: 8 groups of 2 bytes),
ATM(Asynchronous Transfer Modedata transmission protocol by 53-byte cells,
4. Transport layer:
TCP(Transmission Control Protocoltransport protocol, used by the Internet, reliable in connected mode
(establishment of a communication session to exchange data) that splits a message by
packets (sender side) and recomposes them after verification (receiver side); the size of the packets depends on the
network (MTUMaximum Transmission Unit),
UDP(User Datagram Protocoltransport protocol, used by the Internet, unreliable in connectionless mode,
5. Session layer:
SIP(Session Initiation Protocolopen standard protocol for session management,
AppleTalk: Apple communication protocol most often based on Ethernet frames,
TLS(Transport Layer Security), formerly named SSL (Secure Socket Layersecurity protocol
exchanges on the Internet operating in client-server mode; it authenticates the server, ensures the
the confidentiality and integrity of the exchanged data,
6. Application layer:
HTTP(HyperText Transfer Protocolclient-server protocol developed for the World Wide Web (WWW),
HTTPS(Secure) « it'sHTTP+SSLSecure HTTP protocol relying on the TLS protocol,
SSH(Secure Shellprotocol that requires an 'encrypted' encryption key exchange at the start of the connection,
FTP(File Transfer Protocolclient-server protocol intended for file exchange,
SNMP(Simple Network Management ProtocolNetwork management protocol used by administrators
to manage the equipment, supervise and diagnose network issues,
POP3(Post Office Protocol V3) ouIMAP(Internet Message Access Protocolmessaging protocols
electronics used to retrieve emails,
IRC(Internet Relay Chattextual communication protocol used for instant messaging,
ancestor of XMPPExtensible Messaging and Presence Protocol),
XMPP: standard client/server protocol for instant messaging for message exchanges,
instantaneous or not, formatXML(eXtensible Markup Languagegeneric markup computer language,
SMTP(Simple Mail Transfer ProtocolMessaging protocol used to transfer email.
In addition to these protocols, there are recommendations that integrate several layers of the OSI model, for example.
X25, there are also defined protocols to standardize transactions exchanged within a sector.
of activities given (order, receipt notice, shipping notice, call for tenders, etc.).
EDI(Electronic Data InterchangeComputerized Data Exchange formalizes the exchanged messages = define
syntax and semantics, example: IATA (air transport), SWIFT (banking), RosettaNet (electronics).
The multiplicity of standards poses a problem during international exchanges (exchanges between Europe and Asia,
for example) or intersectoral (companies supplying electronic components to a manufacturer
automobile, for example). In this situation, a common language, EDIFACT Data Exchange
Computerized for Administration, Commerce, and Transportation: is defined as a global standard and
multisectoral.
8. User Datagram Protocol
So far, we have considered the recipient machine as a global entity. In fact, the
machines execute processes that are the real recipients of datagrams. However, indicating
a particular process, on a specific machine, is not very flexible. For this reason, the
TCP/IP designers introduced an intermediate abstraction, qualifiable as an abstract destination, the "
protocol ports.
Each port is identified by a positive integer, and the local operating system provides an interface that the
processes used to specify a port. Most OS provide synchronous access to the ports. The
Received data is kept for a certain time in a queue, until a process comes.
to extract them.
To communicate with a remote port, the sender needs to know both the IP address of the machine
destination and the port number associated with the protocol on this machine. Each message sent contains the
times the destination port number on the destination machine, and the source port number on the machine
source to which the answers will be addressed.
8.1 The UDP protocol
In the TCP/IP protocol suite, UDP ("User Datagram Protocol") provides the basic mechanism that
allows application programs to send datagrams to other application programs. The
UDP protocol provides protocol ports that allow for distinguishing different programs
of application.
In addition to the data sent, UDP messages contain the destination and source port numbers.
UDP provides an unreliable delivery service, in a connectionless mode, that uses IP to route the
messages between machines. A program that uses UDP must manage issues of reliability, loss of
messages, duplications, delays, desynchronizations, and loss of connectivity.
Trap: the software works well on a simple local network but not on a large interconnection.
8.2 Structure of UDP messages
A user datagram consists of two parts: a UDP header and a data field.
0 8 15 16 31
UDP source port UDP destination port