Secure Communication Protocols
Secure Communication Protocols
Protocols
Network Revision
The Main Concepts to understand Networking
• Data communications between remote parties can be achieved through a process called networking
• Networks exist so that data may be sent from one place to another-the basic concept of data communications
• Protocols and standards are vital to the implementation of data communications and networking.
• Protocols refer to the rules; a standard is a protocol that has been adopted by vendors and manufacturers.
• Network models serve to organize, unify, and control the hardware and software components of data
communications and networking.
Protocol Hierarchies
• To reduce their design complexity, most networks are organized as a stack of layers or levels, each one built upon
the one below it.
• The purpose of each layer is to offer certain services to the higher layers while shielding those layers from the
details of how the offered services are actually implemented
• When layer n on one machine carries on a conversation with layer n on another machine, the rules and
conventions used in this conversation are collectively known as the layer n protocol.
• Basically, a protocol is an agreement between the communicating parties on how communication is to proceed.
• The entities comprising the corresponding layers on different machines are called peers.
• The peers may be software processes, hardware devices, or even human beings.
• In other words, it is the peers that communicate by using the protocol to talk to each other.
Protocol Hierarchies
• In reality, no data are directly transferred from layer n on one machine to layer n on another
machine.
• A list of the protocols used by a certain system, one protocol per layer, is called a protocol
stack.
The Relationship of Services to Protocols
• Services and protocols are distinct concepts.
• The service defines what operations the layer is prepared to perform on behalf of its users, but
it says nothing at all about how these operations are implemented.
• A service relates to an interface between two layers, with the lower layer being the service
provider and the upper layer being the service user.
• A protocol, in contrast, is a set of rules governing the format and meaning of the packets, or
messages that are exchanged by the peer entities within a layer.
• They are free to change their protocols at will, provided they do not change the service visible
to their users.
• In this way, the service and the protocol are completely decoupled.
• This is a key concept that any network designer should understand well
PROTOCOLS
7
The key elements of a protocol are syntax,
semantics, and timing.
• Syntax. The term syntax refers to the structure or format of the data, meaning the order in which they are
presented.
For example, a simple protocol might expect the first 8 bits of data to be the address of the sender, the
second 8 bits to be the address of the receiver, and the rest of the stream to be the message itself.
• Semantics. The word semantics refers to the meaning of each section of bits.
How is a particular pattern to be interpreted, and what action is to be taken based on that interpretation?
For example, does an address identify the route to be taken or the final destination of the message?
• Timing. The term timing refers to two characteristics: when data should be sent and how fast they can be
sent.
For example, if a sender produces data at 100 Mbps but the receiver can process data at only 1 Mbps, the
transmission will overload the receiver and some data will be lost.
Figure 2.15 Summary of layers
2.9
Figure 2.11 Reliable process-to-process delivery of a message
2.14
Figure 2.16 TCP/IP and OSI model
2.15
Figure 2.18 Relationship of layers and addresses in TCP/IP
2.16
Figure 2.21 Port addresses
2.17
Figure 2.3 The interaction between layers in the OSI model
2.18
Don’t Confuse the Models
7 Application
6 Presentation Application
5 Session LAYER
4 Transport Transport
3 Network LAYER
Internet LAYER
2 Data Link Network
1 Physical Access LAYER
The Network Access Layer
The network access layer is also called the host-to-
network layer. It the layer that is concerned with all of the
issues that an IP packet requires to actually make a
physical link to the network media. It includes LAN and
WAN details, and all the details contained in the OSI
physical and data-link layers. NOTE: ARP & RARP work
at both the Internet and Network Access Layers.
The Internet Layer
The purpose of the Internet layer is to
select the best path through the network for
packets to travel. The main protocol that
functions at this layer is the Internet
Protocol (IP). Best path determination and
packet switching occur at this layer.
The Transport Layer
NOTE: TCP/IP transport layer using UDP does not always guarantee
reliable delivery of packets as the transport layer in the OSI model does.
• Network Protocol
A network protocol is a predefined set of messaging rules and message structures that the communicating
entities in a computer network must follow.
IP Datagram
Datagram
32
(IP format)the syntax and semantics of a
packet’s bits.
• Version number: These 4 bits specify the IP protocol version of the
datagram
• Header length (HLEN):4-bit field defines the total length of the datagram
header.
• Type of service: which defined how the datagram should be handled.
• Total length: A 16-bit field that defines the total length (H+D) of the IP
datagram in bytes.
• Time to live: Datagram has limited lifetime in its travel through an Internet.
• Protocol: 8-bit field defines the higher-level protocol that uses the services
of the IP layer.