Unit 9
Unit 9
9.0 OBJECTIVES
After going through this Unit, you will be able to understand and appreciate:
What are protocols;
Difference between computing and communication protocols;
Need for communication protocols;
31
Network Fundamentals Difference between connection-oriented and connectionless protocols;
Basic packet transfer protocols like IP, TCP and UDP;
Most widely used network computing architecture: Client-Server;
File transfer and remote login application protocols like FTP and Telnet;
Convergent cell switching in ATM networks;
Fast routing technique using labels: MPLS;
Numbering schemes used for landline and mobile phones;
How network computers are addressed world over;
Details of IPv4 addressing scheme;
IPv6 features briefly; and
Web access protocols for both wired and wireless networks.
9.1 INTRODUCTION
Quest for new knowledge is the central theme of human existence. All of us, whether
we realise or not, are in the process of acquiring new knowledge all the time. When we
ask a question, we are seeking knowledge. When we answer a query, we give information
to the person posing the question. When a person assimilates the given information, we
say that the person has acquired knowledge. Knowledge is spread via information that
is communicated from one person to another in some form: oral, writing etc. Thus,
knowledge, information and information communication are three entities that are closely
inter-related.
It is often said that we are in the information age. In the last about six decades, information
in the world has been growing at an exponential rate, i.e. doubling every 10 years.
Information Communication Technology (ICT) has grown leaps and bound in the last
30 - 40 years. Instant transfer of information from one part of the world to any other
part is a reality today. Underlying this development is the convergence of computer and
communication technologies. This convergence process started in late 1960s and has
led to the development of worldwide computer network that is now known popularly
as Internet. A large number of home and office local area networks (LANs) and
innumerable personal computers all over the world have been interconnected to form
Internet. Hence, it aptly said that Internet is a network of networks. Information travels
in the form of data packets on Internet and hence it is also called a data network. Data
packets are of fixed length, say 2048 bytes, i.e. 2" bytes. Long messages are broken
into as many packets as required before transmission. Because of packet-based
transmission, the Internet also carries the nomenclature Packet Data Network (PDN).
Since Internet is an open public network, another related nomenclature that is used
sometimes is Packet Switched Public Data network (PSPDN). Internet is not limited
to its presence only on the land but is also in ships at the seas and in planes in the air.
United Nations today has 192 countries of the world as its members. Almost all these
countries have Internet connection in place. About 200,000 LANs are connected to
the Internet. Over 1.5 billion people, i.e. a quarter of the world population has access
to Internet. With the evolution of Internet, our life-style is changing. A number of our
day-to-day activities are being carried out on the Internet. Clearly, the society is evolving
32
towards a networked community with electronic information as the central commodity.
One might term the society of the 21st century as the Networked Electronic Communication
Information Society (NEIS). It is a society in which activities are centred on networks Protocols and Network
Addressing
and the main commodity on the networks is electronic information in digital form.
It is important to realise that with alt its massive presence, Internet is still evolving.
Today’s Internet services are predominantly text and data oriented with only sprinkles
of graphics, still pictures and slow motion video. Experience shows that Internet is slow
for many network applications. Internet is basically designed for data transport. Real
time services like voice and video transmissions experience serious quality problems.
The key to the solution of current Internet problems lies in building Global Information
Infrastructure (GII) that would have adequate capacity and efficiency to support full-
scale services including high quality audio and motion video and high-resolution graphics
envisioned for NEIS.
Information exchange between computers that are connected to a massive worldwide
network cannot happen without standard procedures and sets of rules that govern such
an exchange. A comprehensive collection of such standard sets of rules and procedures
are called communication protocols. Furthermore, every entity on the Internet needs
to be identified uniquely. This is done by assigning a network address to each entity.
Communication protocols and network addressing are the subject matter of this unit.
Header Payload
(a) A Generalised Packet format
Mandatory Optional
Fixed length Variable length
(b) Datagram header Darts
.....................................................................................................................
.....................................................................................................................
46 Telnet sessions may run into occasional problems. The application program on the
remote computer may malfunction or freeze. The local computer then hangs. We need Communication
a mechanism to come out of this situation. Remember that during a Telnet session, two Protocols and Network
Addressing
programs are running: one the program on the remote computer and the other the
Telnet client on the local machine. Telnet makes a provision to switch between these
two programs. Once a Telnet session is established, every keystroke by the user is
passed on to the remote computer. A special combination keystroke, like Ctrl +], is
reserved to revert to the local program. The Telnet client examines every keystroke of
the user before passing on the same to the remote machine. If the special combination
key is pressed, it stops communication with the remote machine and allows
communication with the local client program. The user can then terminate connection
with the remote computer, close the Telnet client and resume local operations.
Self-Check Exercise
Note: i) Write your answers in the space given below.
ii) Check your answers with the answers given at the end of this Unit.
14) Let the IGNOU LIS course modules be available on a fictitious FTP server called
“cm.lis@Jgnou.ac.in”. Write down the FTP commands and responses to download
this unit to your computer.
.....................................................................................................................
.....................................................................................................................
.....................................................................................................................
.....................................................................................................................
The structure of the number is illustrated in Fig. 9.4. The maximum size of the number is
12 digits. The first digit is the zone number. The remaining 11 digits are divided between
Region C Region C
Delhi, NCR, od
1 U.P. & Bihar od
5
Haryana, Punjab
Mumbai, 2 Orissa 6
Maharashtra,
Kolkata & North East 3 Central 7
Tamil Nadu & Kerala 4 Karnataka & 8
Andhra
The sub area codes are kept to be of variable length. The general principle adopted is
that the sub areas with large population are assigned short codes of two digits (1 region
+ 1 sub area). The sub areas with smaller population are assigned longer codes of three
or more digits. For example, Delhi has a code ‘11’ and Noida ‘120’. Similarly, Mumbai
has a code ‘22’ whereas Bopal, a town near Ahemadabad has the code ‘2707’.
Operator code (OC) is used when there is more than one service provider in an area.
Until the early 90s, India had only the state operator, the Department of
Telecommunications, providing telecom services in the country. But now telecom is
opened up to private operators. We generally have more than one operator in major
cities and towns. The operator code is used to identify the different service providers.
Every service provider has more than one telephone exchange in a city. Exchange code
(EC) identifies the telephone exchange to which the subscriber is connected. Usually
two or three digits are provided for EC. If the number of exchanges exceeds 99, we
need three digits. This is the case in cities like Delhi and Mumbai. In smaller cities and
towns, only two digits may be used.
The last part of the national telephone number is the line number assigned to the subscriber
in the telephone exchange to which he/she is connected. Exchanges are usually designed
to support 1000 or 10,000 subscribers. Accordingly, the line number may have 3 or 4
digits.
9.15 SUMMARY
This unit has dealt with two distinct but closely related aspects: Internet communication
protocols and network addressing. Protocols are generally software programs that
implement the rules and procedures for communication. Some protocol functions are
implemented in hardware too. There are protocols for computing purposes as well.
Computing protocols are relatively a recent development. They define rules for information
exchange among processes within a computer. Communication protocols define rules
for exchange of information among computers. They deal with all aspects of
communication functions that are required for information exchange among computers
in a network or across networks.
An overview discussion of the communication protocols in Section 9.4 brings out their
general functionalities like breaking messages into packets, packet sequencing and
reassembly, message encapsulation and de-capsulation, error detection and correction
and loss recovery. A list of commonly used communication protocols is given in Section
9.5. Then, the basic or fundamental protocols without which Internet cannot function
are discussed in detail. They include IP, TCP and UDP. Internet Protocol (IP) is
responsible for transporting packets from source to destination. Transmission Control
Protocol (TCP) provides assured quality services that ensure errorless and lossless
data transmission. User Datagram Protocol (UDP) is a low overhead, fast and simple
protocol that delivers user messages on best-of-efforts basis.
60
The unit then covers Client-Server architecture that is fundamental to running remote Communication
applications on the Internet. It is the most widely used form of computation model on Protocols and Network
Addressing
data networks. It has evolved from interactive computing model of yesteryears.
Thereafter, two application level protocols that use client-server model for communication
are discussed. File Transfer Protocol (FTP) is used for transferring files from one computer
to another on the Internet. FTP works in an interactive mode using a repertoire of
commands. Remote login protocol (Telnet) allows an Internet user to log into a remote
time-sharing computer and access and execute programs on the remote machine.
The unit then focuses on two switching level communication protocols ATM and MPLS.
Asynchronous Transfer Mode (ATM) is the new communication protocol used in basic
telecommunication infrastructure. It uses the principle of cell switching that combines
the advantages of both circuit and packet switching techniques. ATM is extremely reliable
and fast. Routers use Multi Protocol Label Switching (MPLS) to speed up the process
of routing packets across networks.
The unit then turns its attention to addressing entities uniquely on the networks. First,
the numbering plans for telephone and mobile networks are discussed. Both international
numbering and national numbering in India are elaborated. Another important issue, viz.
number portability is then discussed. Number portability needs to be considered at
three levels: Location portability, Operator portability and Service portability.
Addressing in data networks is then discussed. Version 4 of IP address (IPv4) is
discussed in detail bringing out its limitations and merits. Developments in IPv6 are then
briefly presented.
Finally, the unit discusses the web communication protocols. The universally used
HyperText Transfer Protocol (HTTP) is described in detail. Brief features of wireless
web protocols Wireless Application Protocol (WAP) and Lightweight Transfer Protocol
(LTP) are then presented.
9.17 KEYWORDS
Client-Server : A computing and communication model used
extensively in Internet
Connectionless : A service or protocol that commences
information transfer without establishing a
connection with the destination
Connection-oriented : A service or protocol that establishes a
connection between the source and destination
before information transfer commences
DHCP : Dynamic Host Configuration Protocol
Encapsulation : The process of covering a packet with another
layer of header with a different format
Error control : The process of detecting and correcting errors
FTP : File Transfer Protocol
HTTP : HyperText Transfer Protocol
ICT : Information Communication Technology
ICMP : Internet Control Message Protocol
IMAP : Internet Message Access Protocol
Interoperability : Ability of different applications to interwork with
each other using common data
IP : Internet Protocol
IPv4 : IP Version 4 using 32-bit addresses
IPv6 : IP Version 6 using 128-bit addresses
LTP : Lightweight Transport Protocol
NEIS : Networked Electronic Information Society
Open Protocols : Protocols that follow industry standards and are
capable of running on a variety of platforms
POP3 : Post Office Protocol Version 3
Protocol : A set of rules and procedures for information
exchange between computers and applications 65
Network Fundamentals SMTP : Simple Mail Transfer Protocol
SNMP : Simple Network Management Protocol
TCP : Transmission Control Protocol
Telnet : Remote Login Protocol
UDP : User Datagram Protocol
WAP : Wireless Application Protocol.
66