02 Protocol Architecture
02 Protocol Architecture
Faculty of Computing
Protocol Architecture
Shashika Lokuliyana
Year 01 and Semester 01
Year 01 Semester 01 1
Lesson outline
• What are Protocols?
• Need for protocols in networking
• Protocol layering and Encapsulation
• TCP/IP protocol stack
• ISO/OSI reference model
• Comparison of OSI and TCP/IP
• Protocol
• Protocol Data Unit
• Encapsulation
• De-encapsuation
• Protocol architecture
• Protocol layering
• Protocol stack
• Protocol suite
• Protocol family
• Reference model
Rules for:
Protocols define the format, order of
… specific messages sent
messages sent and received
… specific actions taken
when message received, among network entities, and
or other events actions taken on message
transmission, receipt
What is the
time?
2 pm
Thank you
time Are these steps essential?
No problem.
Yes
What is the
time?
2 pm These two steps are optional.
- No “Thank you”
Thank you
time - Just “Thank you”
No problem - “Thank you” followed by
“No problem”
Client Server
What is the IP
address of
www.sliit.lk?
Use any of
108.156.133.34
108.156.133.43
108.156.113.114
108.156.113.114
time
9
Year 01 Semester 01 Year 01 Semester 01
Example: Web page request
GET /index.html
200 OK
<html/>
GET /image.png
2. Destination responds
with Clear to Send (CTS)
4. Destination responds
with ACK
• If no one is “speaking” even after that time period, it sends a Request to Send (RTS) to the intended recipient
• After receiving the RTS, the recipient (B) waits for a time period (SIFS = 16 μs)
• After receiving CTS, the sender waits for a time period (SIFS) and sends the data
• Other stations “keep quiet” for a time period specified in RTS/CTS messages
• After receiving the data, the recipient waits for a time period (SIFS) and sends an Acknowledgment
• Better if this big task can be broken into a number of smaller subtasks An example 5-layer architecture
• Each subtask can be performed by hardware and/or software layer specialized to do that
subtask
• Each layer can be modified independently, as long as the services provided to the upper
layer and the services expected from the lower layer do not change
• Peer layers at the two ends communicate using a protocol specific to that layer
• Can be changed without affecting the upper or lower layers
• Office assistant: Sends documents given by a secretary to the destination, and passes
received documents to the appropriate secretary
• Each layer provides services to the upper layer and uses the services provided by the
lower layer
• It is obvious that dividing the tasks in the office into subtasks and using specialized
persons to do each subtask is better than having a single person doing all the tasks
• Each person can be changed independently without affecting others in the office
• Engineer in Office A
communicating with
engineer in office B
• Using the services of
the normal secretary
• Note that the
message is
”encapsulated” by
each layer
• Message requires
confidentiality
§ Use the services of
confidential secretary
§ Message may be
encrypted
• The protocols in this layer depend on the actual transmission medium of the
link
• twisted-pair copper wire
• optical fiber
M
application Application exchanges messages to implement some application
application service using services of transport layer
Ht M
transport Transport-layer protocol transfers M (e.g., reliably) from transport
one process to another, using services of network layer
source destination
M
application application
Ht M
transport Transport-layer protocol transfers M (e.g., reliably) from transport
one process to another, using services of network layer
network Hn Ht M network
Network-layer protocol transfers transport-layer
segment [Ht | M] from one host to another, using link
link layer services link
§ network-layer protocol encapsulates
transport-layer segment [Ht | M] with
physical physical
network layer-layer header Hn to create a
network-layer datagram
source • Hn used by network layer protocol to destination
implement its service
Year 01 Semester 01 Year 01 Semester 01 27
Services, Layering and Encapsulation
M
application application
Ht M
transport transport
network Hn Ht M network
Network-layer protocol transfers transport-layer segment
[Ht | M] from one host to another, using link layer services
link Hl Hn Ht M link
Link-layer protocol transfers datagram [Hn| [Ht |M] from
host to neighboring host, using network-layer services
physical physical
§ link-layer protocol encapsulates network
datagram [Hn| [Ht |M], with link-layer
source header Hl to create a link-layer frame destination
Credit: https://dribbble.com/shots/7182188-Babushka-Boi
physical physical
source destination
switch
destination Hn Ht M network
M application Hl Hn Ht M link Hn Ht M
Ht M transport physical
Hn Ht M network
Hl Hn Ht M link router
physical
Year 01 Semester 01 Year 01 Semester 01 32
ISO / OSI reference model
• Chapter 1 - Introduction
James F. Kurose and Keith W. Ross, Computer Networking – A Top-
Down Approach, (8th Edition), Pearson, 2020