The last week of CST 311 focused on summarizing layers 5-2 of the Internet protocol suite, and discussed some of the security considerations of networking. The following provides a summary of the Internet protocol suite:
5th layer (application): Contains “application” data, or arbitrary data that is sent by applications over the network. Many backbone protocols of the Internet are implemented in the application layer – one such example is DNS.
4th layer (transport): Provides two major protocols: TCP and UDP. These protocols provide abstractions over layer 3 datagrams. TCP provides a connection-oriented, reliable, and in-order byte stream abstraction for sending data between endpoints. UDP is a simpler protocol; it provides few guarantees, but due to its simple nature, often provides greater throughput and reduced latency.
3rd layer (network): Implements the essential routing functions of the Internet. The Internet Protocol is arguably the most important network-layer protocol. Every interface connected to the Internet has an “IP address,” and routers can, using these IP addresses, (in combination with some complex routing protocols), forward packets towards their destination.
2nd layer (link): Defines how link-layer frames traverse a single link. The Ethernet protocol is ubiquitous in modern networks – it drives much of the link layer around the world. The Ethernet protocol assigns every interface a unique “MAC address.” A target device’s MAC address must be specified in a link-layer frame for the frame to be delivered to the target. Switches use MAC addresses, along with a protocol called ARP, to route traffic based on MAC addresses. Note that ARP only operates within a single subnet; thus, while every interface in the world has a unique MAC address, MAC addresses can only be used to address a device within the current subnet.