Presentation is loading. Please wait.

Presentation is loading. Please wait.

COMPUTER COMMUNICATION AND NETWORKS 3(3-0).  Protocols  The OSI model  Functions of the layers.

Similar presentations


Presentation on theme: "COMPUTER COMMUNICATION AND NETWORKS 3(3-0).  Protocols  The OSI model  Functions of the layers."— Presentation transcript:

1 COMPUTER COMMUNICATION AND NETWORKS 3(3-0)

2  Protocols  The OSI model  Functions of the layers

3 Protocols  To communicate, entities must agree on protocol.  Protocol is a set of rules that govern communication.  The layered functionality of the different protocols in the OSI Mode is called a Protocol Stack

4 Standards sssstandards that allow computers to connect to one another and enable computers and peripheral devices to exchange information with as little error as possible TTTThe first Ethernet standard was published in 1980.

5 Network Protocols A communication protocol is a set of rules that specify the format and meaning of messages exchanged between computers across a network. A set of related protocols that are designed for compatibility are called protocol suite.

6 Human and Computer Protocols Hi Got the time? 2:00 time Human ProtocolComputer Protocol Web client Web server open connection OK send me data

7 Protocols and Standards By one company or Organization Close Standard Industry standard Open standard Free of Charge Changes are Hard sometimes

8 Layering  What is it?  Building complex systems is hard! Approach: “Divide and conquer”.Approach: “Divide and conquer”. Split job into smaller jobs, or layers.Split job into smaller jobs, or layers.  Analogy to other fields. Building a house: digging, foundation, framing, etc.Building a house: digging, foundation, framing, etc. Car assembly line…Car assembly line…  Basic idea: each step dependent on the previous step but does not need to be aware of how the previous step was done.

9 Analogy: Air Travel  The problem: air travel.  Decomposed into series of steps: Arrival at airport Check-in Boarding Takeoff Departure from airport Baggage claim Deplane Landing Traveling

10 More on the air travel analogy… Arrival Check-in Boarding Takeoff Departing airport Departure Baggage claim Deplane Landing Arriving airport Traveling intermediate air traffic sites Airplane routing

11 Layered Protocol Design Layering model is a solution to the problem of complexity in network protocols The model divides the network protocols into layers, each of which solves part of the network communication problem –Each layer has its own protocol! Each layer implements a service to the layer above –Relying on services provided by the layers below.

12 Layers  Layers are the different components that need to be designed/implemented when designing/implementing networks.  Each layer responsible for a set of functions.  Top layer relies on services provided by bottom layer.  Layer makes it service available to higher layer through an interface.

13 The OSI Model  OSI stands for Open Systems Interconnection  It is a model that covers all aspects of network communication  Purpose is to open communication between different systems without requiring changes to the underlying hardware and software

14 The OSI Model (cont.)  It is a layered framework for the design of network systems  Please Do Not Touch Steve’s Pet Alligator  All People Seem To Need Data Processing  Please Do Not Throw Sausage Pizza Away

15

16 The OSI Model (cont.)  Each layer has its own set of well- defined functions  Layers communicate and interact with the layers immediately above and below

17 An Exchange Using the OSI Model

18 The OSI Model (cont.)  Each layer in the sending machine adds its information in the form of header and trailer.  Each layer in the receiving machine gets information related to it and passes the rest to upper layers.

19 Data Name at Different OSI model layers  Application  Presentation  Session  Transport  Network  Data Link  Physical  Message  Packets  Datagram and segment  Datagram  Frames  Bits

20 Functions of the layers  1:Physical Layer Coordinates the functions required to transmit a bit stream over a physical medium.Coordinates the functions required to transmit a bit stream over a physical medium. Deals with the mechanical and electrical specs of the mediumDeals with the mechanical and electrical specs of the medium Defines the procedures that physical devices had to perform for trans. to occurDefines the procedures that physical devices had to perform for trans. to occur

21 Functions of the layers (cont.)  Physical layer concerns with the following; Physical characteristics of interfaces and mediaPhysical characteristics of interfaces and media Representation of bitsRepresentation of bits Data rate (the transmission rate)Data rate (the transmission rate) Synchronization of bitsSynchronization of bits Line configurationLine configuration Physical topologyPhysical topology Transmission modeTransmission mode

22 Functions of the layers (cont.) Data Link Layer  This layer breaks the input data into frames, transmits the frames sequentially, and processes the acknowledged frames sent back by the receiver. It adds a header and trailer to the frames it creates.  It makes it to appear error free to upper layer  Data Link Layer is Sub divided  MAC (Media Access Control)  LLC (Logical Link Control)

23 Functions of the layers (cont.)  Data link layer responsibilities are; FramingFraming Physical addressingPhysical addressing Flow controlFlow control Error controlError control It Adds a header and trailer to the frames its creates

24 MEDIA ACCESS CONTROL  It is responsible for physical addressing and access to the network media, only one device at a time may transmit on any type of media..  Addressing  Contention  Deterministic  Addressing The Data Link layer is responsible for the physical addresses of devices on the network. Every device on a network has a hard-coded address attached to it.  Example The address for Ethernet card would be 00-AA-00-59-65-71.

25  Contention Any device can transmit whenever it needs to. It allows equal access to the network media, but at the expense of possible collisions. Collisions occur when two devices try to transmit at the same time and disrupt each other’s signaling. Devices listen for other signals on the media before transmitting. Collisions are not totally eliminated, but they are kept down to manageable form. It is called CSMA (Carrier Sense Multiple Access.  It has two types  CSMA/CD A stands for Carrier Sense Multiple Access/Collision Detection.  CSMA/CA A stands for Carrier Sense Multiple Access/Collision Avoidance

26 Deterministic  Unlike a contention-based network, where devices are free to transmit whenever they want, a deterministic network  The two types of deterministic networks are token passing and polling

27 LOGICAL LINK CONTROL  The Logical Link Control (LLC) sublayer of the Data Link layer establishes and maintains data link connections between network devices. It is responsible for any flow control and error correction found in this layer  The following are connection services the LLC sublayer supplies  Unacknowledged connectionless service  Connection-oriented service

28 Functions of the layers (cont.) 3:Network Layer The third layer of the OSI model is the Network layer. This layer is responsible for routing information from one network device to another. The Network layer decides what path data will take if the destination device is located on another network. The third layer of the OSI model is the Network layer. This layer is responsible for routing information from one network device to another. The Network layer decides what path data will take if the destination device is located on another network.

29 Functions of the layers (cont.)  Network layer responsibilities are; RoutingRouting  One of the functions of the network layer is to route the packets to their final destination in an internetwork environment.

30 Functions of the layers (cont.)  SWITCHING: Datagram switching describes how data is forwarded across an inter network. There are three main methods  Circuit Switching: In circuit switching, a dedicated connection is made between the two communicating devices. Two advantages of this method are no congestion (because the link is dedicated) and almost no channel-access delay. The disadvantages are inefficient use of the media and a possible long wait to establish a connection.

31 Network Layer  Message Switching: With message switching the data is sent from device to device in whole across the network. This is also known as store and forward. Devices must store all the information as it is sent in whole. The media is used more efficiently with this method, and congestion can be controlled.  Packet Switching: A combination of circuit switching and message switching. With packet switching, data is broken into small pieces and routed from device to device. Devices that forward the data only need to keep the information in memory instead of in physical storage, because data was split

32 Functions of the layers (cont.)  4:Transport Layer Responsible for the source to destination delivery of the entire message.Responsible for the source to destination delivery of the entire message. Ensures that whole message arrives in order.Ensures that whole message arrives in order.

33 Functions of the layers (cont.)  Transport layer responsibilities are; Service-point addressingService-point addressing  Not only from computer-to-computer connection, but also from process to process, so it gets the entire message to correct process(running program) on that computers Segmentation and reassemblySegmentation and reassembly  Divided into transmittable segments with a unique sequence number Connection controlConnection control  Can be connectionless or connection oriented Flow controlFlow control Error controlError control

34 Transport Layer  Provide acknowledgment of successful transmission  Flow control Partition data into packets and assign each one a sequence numberPartition data into packets and assign each one a sequence number Provide service to assemble the received packets back into their original orderProvide service to assemble the received packets back into their original order Error detection and correctionError detection and correction  Lowest layer to which application programs are typically written

35 Functions of the layers (cont.)  5:Session Layer Is the network dialog controller which establishes, maintains and synchronizes the interaction between communicating systems.Is the network dialog controller which establishes, maintains and synchronizes the interaction between communicating systems.

36 Functions of the layers (cont.)  Session layer responsibilities are; Manage who can transmit data at a certain time and for how longManage who can transmit data at a certain time and for how long SynchronizationSynchronization  Adds checkpoints into a stream of data.

37 Session Layer  Enable data exchange between application to application EstablishmentEstablishment SynchronizationSynchronization Re-establishmentRe-establishment

38 Functions of the layers (cont.)  6:Presentation Layer Concerned with the syntax of the information exchanged between two systems.Concerned with the syntax of the information exchanged between two systems.

39 Functions of the layers (cont.)  Presentation layer responsibilities are; TranslationTranslation  Changes information into a stream of bits which is a common format for different systems. EncryptionEncryption  The sender transforms the original information to another form and receiver transforms the message to its original form for privacy reasons. CompressionCompression  Data compression reduces the number of bits to be retransmitted, it is important at the transmission of multimedia data.

40 Functions of the layers (cont.)  7:Application Layer Enables the user whether human or software to access the network and provides user interfaces.Enables the user whether human or software to access the network and provides user interfaces.

41 Functions of the layers (cont.)  Application layer responsibilities are; Network Virtual TerminalNetwork Virtual Terminal  Is a software version of the physical terminal and allows a user to log on to a remote host. File transfer,access and management(FTAM)File transfer,access and management(FTAM)  Allows a user to access files in a remote computer and to manage or control them. Mail servicesMail services  Provides the basis for email forwarding and storage.

42 Application Layer  Dictate the semantics of how requests for services are made, such as requesting a file or checking for email.  The container for all applications and protocols Telnet, HTTP, POP, SMTP, Finger, FTP, etc.Telnet, HTTP, POP, SMTP, Finger, FTP, etc.  Virtually all distributed systems are applications  In Java, almost all network software written will be for the application.

43 OSI Layers  A typical message as it appears on the network. 2-2

44 Functions of the layers (cont.)

45 LayerFunctionProtocolsNetwork Component s Application User Interface  used for applications specifically written to run over the network  allows access to network services that support applications;  directly represents the services that directly support user applications  handles network access, flow control and error recovery  Example apps are file transfer-mail, DNS; FTP; SMTP; TELNET; etc Gateway Presentation Translation  Translates from application to network format and vice-versa  all different formats from all sources are made into a common uniform format that the rest of the OSI model can understand  responsible for protocol conversion, character conversion,data encryption / decryption, expanding graphics commands, data compression  sets standards for different systems to provide seamless communication from multiple protocol stacks  not always implemented in a network protocol Gateway Redirector Session "syncs and sessions"  establishes, maintains and ends sessions across the network  responsible for name recognition (identification) so only the designated parties can participate in the session  provides synchronization services by planning check points in the data stream => if session fails, only data after the most recent checkpoint need be transmitted  manages who can transmit data at a certain time and for how long  Examples are interactive login and file transfer connections, the session would connect and re-connect if there was an interruption; recognize names in sessions and register names in history NetBIOS Mail Slots Gateway

46 Transport packets; flow control & error-handling  additional connection below the session layer  manages the flow control of data between parties across the network  divides streams of data into chunks or packets; the transport layer of the receiving computer reassembles the message from packets  "train" is a good analogy => the data is divided into identical units  provides error-checking to guarantee error-free data delivery, with on losses or duplications  provides acknowledgment of successful transmissions; requests retransmission if some packets don’t arrive error-free  provides flow control and error-handling TCP, NetBIOS / NetBEUI ATP Gateway Advanced Cable Tester Brouter Network addressing; routing  translates logical network address and names to their physical address (e.g. computername ==> MAC address)  responsible for o addressing o determining routes for sending o managing network problems such as packet switching, data congestion and routing  if router can’t send data frame as large as the source computer sends, the network layer compensates by breaking the data into smaller units. At the receiving end, the network layer reassembles the data  think of this layer stamping the addresses on each train car IP; ARP; RARP, ICMP; RIP; OSFP; IGMP; IPX NWLink NetBEUI OSI DDP DECnet Brouter Router Frame Relay Device ATM Switch Advanced Cable Tester

47 Data Link data frames to bits  turns packets into raw bits 100101 and at the receiving end turns bits into packets.  handles data frames between the Network and Physical layers  the receiving end packages raw data from the Physical layer into data frames for delivery to the Network layer  responsible for error-free transfer of frames to other computer via the Physical Layer  this layer defines the methods used to transmit and receive data on the network. It consists of the wiring, the devices use to connect the NIC to the wiring, the signaling involved to transmit / receive data and the ability to detect signaling errors on the network media Logical Link Control  error correction and flow control  manages link control and defines SAPs 802.1 OSI Model 802.2 Logical Link Control Bridge Switch ISDN Router Intelligent Hub NIC Advanced Cable Tester Media Access Control  communicates with the adapter card  controls the type of media being used: 802.3 CSMA/CD (Ethernet) 802.4 Token Bus (ARCnet) 802.5 Token Ring 802.12 Demand Priority Physical hardware; raw bit stream  transmits raw bit stream over physical cable  defines cables, cards, and physical aspects  defines NIC attachments to hardware, how cable is attached to NIC  defines techniques to transfer bit stream to cable IEEE 802 IEEE 802.2 ISO 2110 ISDN Repeater Multiplexer Hubs  Passive  Active TDR Oscilloscope Amplifier


Download ppt "COMPUTER COMMUNICATION AND NETWORKS 3(3-0).  Protocols  The OSI model  Functions of the layers."

Similar presentations


Ads by Google