KEMBAR78
Communication Protocols | PDF | Transmission Control Protocol | Port (Computer Networking)
0% found this document useful (0 votes)
16 views4 pages

Communication Protocols

This document describes the main communication protocols used at the various layers of the OSI model, namely at the physical, data link, network, transport, and application levels. It also explains how the UDP and TCP protocols function.
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
16 views4 pages

Communication Protocols

This document describes the main communication protocols used at the various layers of the OSI model, namely at the physical, data link, network, transport, and application levels. It also explains how the UDP and TCP protocols function.
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
You are on page 1/ 4

The communication protocols

A communication protocol defines the set of rules that specify the modalities of
operation of communication between two computers. There are a multitude of protocols, it is about
Here to state the main protocols used. The inventory of these protocols can be carried out separately from
OSI model. Here are some protocols:
Physical layer:
CSMA/CDCarrier Sense Multiple Access / Collision Detectionmultiple access protocol, by detection of
carrier and collision,
RS 232: standard for serial communication standardization,
USB(Universal Serial Busseries transmission bus computer used to connect peripherals
computer science to a computer.
IEEE 1394: protocol for multiplexed serial interface (data and control signals) whose name
commercial is Firewire,
Bluetooth: standards for establishing a radio connection over a short distance (from 10 to 100 m),
2. Link layer:
Ethernet: packet-switched local network protocol (IEEE 802.3 standard),
HDLC(High-Level Data Link Controlframe transfer protocol with error control (ISO 3309)
PPP(Point-to-Point ProtocolTransmission protocol for the Internet (is an interconnection of networks
independent individuals who maintain their own identity in a global public network making accessible
services such as the World Wide Web, email, instant messaging, and sharing
files.), heavily based on HDLC, used to establish a connection between two hosts,
IEEE 802: standard for wireless connections supporting Wi-Fi technology,
3. Network layer:
NetBEUI(NetBios Extended User Interfacenon-routable local network protocol
IPX/SPX(Internetwork Packet Exchange/ Sequenced Packet Exchangepacket transmission protocol to
through a local area network, developed by Novell (Novel NetWare),
IP(Internet Protocol): Internet communication protocol based on a unique addressing service for
the entirety of connected equipment :
IPv4 (version 4): IP address on 32 bits (4 bytes from 0 to 255),
IPv6 (version 6): IP address based on 128 bits (16 bytes: 8 groups of 2 bytes),
ATM(Asynchronous Transfer Modedata transmission protocol by 53-byte cells,
4. Transport layer:
TCP(Transmission Control Protocoltransport protocol, used by the Internet, reliable in connected mode
(establishment of a communication session to exchange data) that splits a message by
packets (sender side) and recomposes them after verification (receiver side); the size of the packets depends on the
network (MTUMaximum Transmission Unit),
UDP(User Datagram Protocoltransport protocol, used by the Internet, unreliable in connectionless mode,
5. Session layer:
SIP(Session Initiation Protocolopen standard protocol for session management,
AppleTalk: Apple communication protocol most often based on Ethernet frames,
TLS(Transport Layer Security), formerly named SSL (Secure Socket Layersecurity protocol
exchanges on the Internet operating in client-server mode; it authenticates the server, ensures the
the confidentiality and integrity of the exchanged data,
6. Application layer:
HTTP(HyperText Transfer Protocolclient-server protocol developed for the World Wide Web (WWW),
HTTPS(Secure) « it'sHTTP+SSLSecure HTTP protocol relying on the TLS protocol,
SSH(Secure Shellprotocol that requires an 'encrypted' encryption key exchange at the start of the connection,
FTP(File Transfer Protocolclient-server protocol intended for file exchange,
SNMP(Simple Network Management ProtocolNetwork management protocol used by administrators
to manage the equipment, supervise and diagnose network issues,
POP3(Post Office Protocol V3) ouIMAP(Internet Message Access Protocolmessaging protocols
electronics used to retrieve emails,
IRC(Internet Relay Chattextual communication protocol used for instant messaging,
ancestor of XMPPExtensible Messaging and Presence Protocol),
XMPP: standard client/server protocol for instant messaging for message exchanges,
instantaneous or not, formatXML(eXtensible Markup Languagegeneric markup computer language,
SMTP(Simple Mail Transfer ProtocolMessaging protocol used to transfer email.
In addition to these protocols, there are recommendations that integrate several layers of the OSI model, for example.
X25, there are also defined protocols to standardize transactions exchanged within a sector.
of activities given (order, receipt notice, shipping notice, call for tenders, etc.).
EDI(Electronic Data InterchangeComputerized Data Exchange formalizes the exchanged messages = define
syntax and semantics, example: IATA (air transport), SWIFT (banking), RosettaNet (electronics).
The multiplicity of standards poses a problem during international exchanges (exchanges between Europe and Asia,
for example) or intersectoral (companies supplying electronic components to a manufacturer
automobile, for example). In this situation, a common language, EDIFACT Data Exchange
Computerized for Administration, Commerce, and Transportation: is defined as a global standard and
multisectoral.
8. User Datagram Protocol
So far, we have considered the recipient machine as a global entity. In fact, the
machines execute processes that are the real recipients of datagrams. However, indicating
a particular process, on a specific machine, is not very flexible. For this reason, the
TCP/IP designers introduced an intermediate abstraction, qualifiable as an abstract destination, the "
protocol ports.
Each port is identified by a positive integer, and the local operating system provides an interface that the
processes used to specify a port. Most OS provide synchronous access to the ports. The
Received data is kept for a certain time in a queue, until a process comes.
to extract them.
To communicate with a remote port, the sender needs to know both the IP address of the machine
destination and the port number associated with the protocol on this machine. Each message sent contains the
times the destination port number on the destination machine, and the source port number on the machine
source to which the answers will be addressed.
8.1 The UDP protocol
In the TCP/IP protocol suite, UDP ("User Datagram Protocol") provides the basic mechanism that
allows application programs to send datagrams to other application programs. The
UDP protocol provides protocol ports that allow for distinguishing different programs
of application.
In addition to the data sent, UDP messages contain the destination and source port numbers.
UDP provides an unreliable delivery service, in a connectionless mode, that uses IP to route the
messages between machines. A program that uses UDP must manage issues of reliability, loss of
messages, duplications, delays, desynchronizations, and loss of connectivity.
Trap: the software works well on a simple local network but not on a large interconnection.
8.2 Structure of UDP messages
A user datagram consists of two parts: a UDP header and a data field.
0 8 15 16 31
UDP source port UDP destination port

UDP message length Control total


Data ..................................

The total control calculation is optional => to gain speed.

8.3 Reserved and unreserved port numbers


Some ports are reserved, but the majority is left at the disposal of the sites or the
local application programs. The reserved numbers are assigned in ascending order starting from the values the
lower. The larger values can be allocated dynamically.
The TX uses TFTP (port 69) to load their X server software.
Reliable transfer in connected mode (TCP)
TCP aims to enable the reliable transfer of information regardless of the bitrate, volume, or
the distance, and this regardless of the networks forming the interconnection.
9.1 Properties of reliable delivery services
Connection orientation. During the transfer of large volumes of data, the bit streams are broken down into
octets (8 bits). A reliable delivery service transmits to the destination machine as many bits as the sender does.
sent from the source machine.
Virtual circuits. Application programs view connections as dedicated hardware circuits.
Reliability is an illusion ensured by reliable delivery service.
Buffered transfers. Applications use any data size that seems suitable to them. The software
Communication is free to compose or decompose the flow into packets independent of the choice of
the application (for efficiency purposes). Applications can force the emission of data (even if the
the tampon is not full) through a mechanism called 'push'. The push command acts endwise.
in the end, it forces the transmission and the handover. On the other hand, the size of the records remains the responsibility of the
lower sofas.
Unstructured connections. Applications that use TCP must define and understand the structure.
application data exchanged.
Simultaneous bidirectional connections ("full duplex"). Application programs see two
independent flows, in opposite directions. The underlying protocol can send control information
related to a transfer sense in the TCP header of segments sent in the reverse direction ('piggy backing').
9.2 Ensure reliability
The fundamental technique is called positive acknowledgment with retransmission.
acknowledgment with retransmission "). The receiver communicates with the sender and sends acknowledgment of
Reception at each arrival of data. The source keeps a copy of the emitted packets and waits for an acknowledgment.
of receipt before sending the next packet. The sender triggers a timer when it sends a packet
and retransmits the packet if the timeout expires before the acknowledgment arrives.
The scheme becomes more complex when the underlying layer duplicates a packet (data or acknowledgement of
Reception). In general, reliable protocols detect duplicate packets by assigning a
sequence number and requiring the receiver to remember the received numbers. Conversely, for
avoid ambiguities due to delayed or duplicated acknowledgments, acknowledgment protocols
positive and retransmissions mention the sequence numbers in the acknowledgments. The
The receiver can thus correctly associate the acknowledgments with the corresponding packets.
9.3 The concept of sliding window
The positive acknowledgment protocol wastes a significant amount of bandwidth, as the transmission
the dispatch of a new package is delayed until the corresponding acknowledgment of receipt has been received by
the sender of the previous packet.
The sliding window technique involves sending a small number of packets without waiting for the acknowledgment of
receipt of a package to send the next one. This system, based on the fact that a network operates more
often it does not work, allows to achieve a significantly higher throughput than a simple protocol
positive accused.
9.4 The Transmission Control Protocol (TCP)
TCP is a protocol, not an application. The document related to the protocol only defines the functions.
the protocol, not the precise way to access these functions. TCP assumes very little about the
underlying communication system. It can be used with a large number of delivery systems
packets, including the IP datagram delivery service.
9.5 Ports, connections and connection ends
Like UDP, TCP is located above IP in the layered model. TCP (like UDP) allows for
several applications communicate at the same time, by demultiplexing the received information towards the
different user programs, based on port numbers to identify the final destinations on
a given machine.
Application
Reliable stream (TCP)
Interconnection (IP)
..................Network interface...................
TCP uses connections, rather than port, as its main concept. Connections are then identified
at their two ends. A connection endpoint is defined by a pair of integers
(machine, port). A connection is defined by a pair of endpoints ((machine i, port i), (machine j, port
j)).
The concept of connection allows sharing the same endpoint among multiple connections. Thus, it is
It is possible to design server programs that ensure simultaneous service for multiple connections.
without the need for specific local port numbers for each connection.
9.6 Variable window size and flow control
With TCP, the window size varies over time. Each acknowledgment indicates the number of bytes
correctly received and contains a window size indication ("window advertisement") that indicates the
number of additional bytes that the receiver is willing to accept. When the size indications of
the windows are lower than the previous value, the window reduces as it moves.
The variable window size mechanism enables flow control as well as transfer.
reliable. In extreme cases, the receiver gives a zero window size indication to stop the
data transmission.
9.7 Structure of segments
9.8 Timing and retransmissions
9.9 Precise sampling of loop time
9.10 Karn's Algorithm and Delay Augmentation
9.11 Establishment of a TCP connection
TCP uses a three-step process:
Sender Network Receiver
----> SYN seq x ----->
<---- SYN seq y, ACK x+1 <-----
----> ACK y+1 ----->
The three-step process allows for correct synchronization between the two ends of the
Connection, as TCP ignores additional connection requests received after the establishment of the
connection (due to the possible retransmission of the initial request). Each end is ready to
transfer data and both parties agreed on the departure sequence numbers

9.12 Release of a TCP connection


TCP uses a modified three-step process to release a connection:
Sender Network Receiver
----> END seq x ----->
<---- ACK x+1 <-----
Messages to applications
to warn of the end
application responses
<---- END and, ACK x+1 <-----
-----> ACK y+1 ----->
9.13 Reserved TCP port numbers
Like UDP, TCP combines static and dynamic association. Fewer than 256 ports are reserved, the rest
is made available for applications. (FTP 21 and 20, Telnet 23).
9.14 TCP Performance
Despite its complexity, TCP is a very efficient protocol. The TCP software that operates on the Internet can
ensure a sustained throughput of 8 Mbit/s between two stations connected by a 10 Mbit/s Ethernet network. Cray
Research Inc. achieved speeds of over 600 Mbit/s, which is a value of the same order of magnitude as a
bus.

You might also like