Layered Standards Architectures

Slides:



Advertisements
Similar presentations
Network Standards Layered Architectures Chapter 2 Updated January 2007 Panko’s Business Data Networks and Telecommunications, 6th edition Copyright 2007.
Advertisements

Module A.  This is a module that some teachers will cover while others will not  This module is a refresher on networking concepts, which are important.
Networking Theory (Part 1). Introduction Overview of the basic concepts of networking Also discusses essential topics of networking theory.
Network Standards Layered Architectures
Lecturer: Tamanna Haque Nipa
1 Protocol Interaction (ISO’s Open Systems Interconnection (OSI model)) the 7 layers.
1 Standards Chapter 2 Copyright 2003 Prentice-Hall Panko’s Business Data Networks and Telecommunications, 4 th edition.
© 2009 Pearson Education, Inc. Publishing as Prentice Hall Network Standards Layered Architectures Chapter 2 Panko’s Business Data Networks and Telecommunications,
A Closer Look at HTTP, TCP, IP, and PPP Chapter 3 Copyright 2001 Prentice Hall Revision 2: July 2001.
© 2009 Pearson Education, Inc. Publishing as Prentice Hall Network Standards Chapter 2 Raymond Panko’s Business Data Networks and Telecommunications, 7th.
NetworkProtocols. Objectives Identify characteristics of TCP/IP, IPX/SPX, NetBIOS, and AppleTalk Understand position of network protocols in OSI Model.
Lecture 2 TCP/IP Protocol Suite Reference: TCP/IP Protocol Suite, 4 th Edition (chapter 2) 1.
What is a Protocol A set of definitions and rules defining the method by which data is transferred between two or more entities or systems. The key elements.
Protocol Architecture
Chapter 2 1 Panko and Panko Business Data Networks and Security, 9 th Edition © 2013 Pearson.
© 2007 Cisco Systems, Inc. All rights reserved.Cisco Public 1 Version 4.0 Network Services Networking for Home and Small Businesses – Chapter 6.
COS 338 Day 4. DAY 3 Agenda Questions? Write-up for Lab due next class Assignment 2 Posted Due on September 26 Assignment 1 Review 1 A, 1 B, 1 C, 2 D’s.
© 2009 Pearson Education, Inc. Publishing as Prentice Hall Network Standards Chapter 2 Updated January 2009 Raymond Panko’s Business Data Networks and.
1 Standards Chapter 2 (Revised August 2002) Copyright 2003 Prentice-Hall Panko’s Business Data Networks and Telecommunications, 4 th edition.
1 LAN Protocols (Week 3, Wednesday 9/10/2003) © Abdou Illia, Fall 2003.
1 Figure 3-2: TCP/IP Standards (Study Figure) Origins  Defense Advanced Research Projects Agency (DARPA) created the ARPANET  An internet connects multiple.
Network Standards Layered Architectures Chapter 2 Panko’s Business Data Networks and Telecommunications, 6th edition Copyright 2007 Prentice-Hall May only.
Part E: Standards Layered Standards Architectures TCP, IP, and TCP/IP Other Architectures.
S305 – Network Infrastructure Chapter 5 Network and Transport Layers.
© 2009 Pearson Education, Inc. Publishing as Prentice Hall Network Standards Chapter 2 Updated January 2009 Raymond Panko’s Business Data Networks and.
1 12-Jan-16 OSI network layer CCNA Exploration Semester 1 Chapter 5.
1 Review – The Internet’s Protocol Architecture. Protocols, Internetworking & the Internet 2 Introduction Internet standards Internet standards Layered.
Point-to-Point Protocol
Network Models. The OSI Model Open Systems Interconnection (OSI). Developed by the International Organization for Standardization (ISO). Model for understanding.
Network Standards Layered Architectures Chapter 2 Panko’s Business Data Networks and Telecommunications, 6th edition Copyright 2007 Prentice-Hall May only.
1 28-Sep-16 S Ward Abingdon and Witney College CCNA Exploration Semester 1 OSI network layer CCNA Exploration Semester 1 Chapter 5.
Roadmap  Introduction to Basics  Computer Network – Components | Classification  Internet  Clients and Servers  Network Models  Protocol Layers.
© 2006 Cisco Systems, Inc. All rights reserved.Cisco Public 1 OSI network layer CCNA Exploration Semester 1 – Chapter 5.
OSI Model OSI MODEL. Communication Architecture Strategy for connecting host computers and other communicating equipment. Defines necessary elements for.
OSI Model OSI MODEL.
Network Models.
What is a Protocol A set of definitions and rules defining the method by which data is transferred between two or more entities or systems. The key elements.
Chapter 5 Network and Transport Layers
Network Standards Chapter 2 Panko and Panko
Click to edit Master subtitle style
TCP/IP Internetworking
Chapter 2 Updated January 2009
Review of TCP/IP Internetworking
The OSI Model and the TCP/IP Protocol Suite
Process-to-Process Delivery, TCP and UDP protocols
OSI Protocol Stack Given the post man exemple.
Layered Architectures
TCP/IP Internetworking
Standards Basics.
TCP/IP Internetworking
TCP Transport layer Er. Vikram Dhiman LPU.
Net 431: ADVANCED COMPUTER NETWORKS
Review of TCP/IP Internetworking
Networking Concepts Module A Copyright Pearson Prentice Hall 2013.
The OSI Model and the TCP/IP Protocol Suite
Chapter 20 Network Layer: Internet Protocol
Process-to-Process Delivery:
Figure 3-23: Transmission Control Protocol (TCP) (Study Figure)
TCP/IP Protocol Suite: Review
Lecture 2: Overview of TCP/IP protocol
Net 323 D: Networks Protocols
1 TRANSMISSION CONTROL PROTOCOL / INTERNET PROTOCOL (TCP/IP) K. PALANIVEL Systems Analyst, Computer Centre Pondicherry University, Puducherry –
OSI Model OSI MODEL.
Network Architecture Models
Layered Standards Architectures
The OSI Model and the TCP/IP Protocol Suite
Network Architecture Models: Layered Communications
OSI Model 7 Layers 7. Application Layer 6. Presentation Layer
NET 323D: Networks Protocols
Transport Layer 9/22/2019.
Presentation transcript:

Layered Standards Architectures Chapter 2 Panko’s Business Data Networks and Telecommunications, 5th edition Copyright 2005 Prentice-Hall

Semantics Syntax Timing Messages Semantics Syntax Timing

Figure 2-1: How Standards Govern Interactions Standards Govern the Exchange of Messages Messages must be governed by strict rules Because computers are not intelligent Here are the elements of a small PC network using Ethernet LAN technology. We will look at each of these elements in this chapter. First, there is an Ethernet switch or an Ethernet hub (we will look at the differences between switches and hubs). Second, there are client PCs and serve PCrs. Note that a small PC network can have multiple clients and multiple servers. Ethernet requires each station to have a 48-bit “MAC” address. As we will see later, this address is expressed for human reading as six 2-characer combinations as shown in this figure. Third, stations are connected to the hub or switch using UTP wiring. To connect our network to the Internet, there is an access router. Essentially, the small Ethernet PC network becomes another network on the Internet connected by a router. Finally, there is a broadband modem for fast Internet access.

Figure 2-1: How Standards Govern Interactions, Continued Message Semantics (Meaning) Only a few message types are allowed because computers do not have the intelligence to handle open-ended communication In HTTP, request and response messages Here are the elements of a small PC network using Ethernet LAN technology. We will look at each of these elements in this chapter. First, there is an Ethernet switch or an Ethernet hub (we will look at the differences between switches and hubs). Second, there are client PCs and serve PCrs. Note that a small PC network can have multiple clients and multiple servers. Ethernet requires each station to have a 48-bit “MAC” address. As we will see later, this address is expressed for human reading as six 2-characer combinations as shown in this figure. Third, stations are connected to the hub or switch using UTP wiring. To connect our network to the Internet, there is an access router. Essentially, the small Ethernet PC network becomes another network on the Internet connected by a router. Finally, there is a broadband modem for fast Internet access.

Figure 2-2: Hypertext Transfer Protocol (HTTP) Interactions 1. HTTP Request Message Asking for a File Browser Webserver Application Client PC Webserver 2. HTTP Response Message Delivering the File

Figure 2-1: How Standards Govern Interactions, Continued Message Syntax (Organization) Cannot be freely structured like human sentences Rigidly structured In HTTP, lines of text (Figure 2-3) Most lines are of the form “Keyword: Information” Here are the elements of a small PC network using Ethernet LAN technology. We will look at each of these elements in this chapter. First, there is an Ethernet switch or an Ethernet hub (we will look at the differences between switches and hubs). Second, there are client PCs and serve PCrs. Note that a small PC network can have multiple clients and multiple servers. Ethernet requires each station to have a 48-bit “MAC” address. As we will see later, this address is expressed for human reading as six 2-characer combinations as shown in this figure. Third, stations are connected to the hub or switch using UTP wiring. To connect our network to the Internet, there is an access router. Essentially, the small Ethernet PC network becomes another network on the Internet connected by a router. Finally, there is a broadband modem for fast Internet access.

Figure 2-3: Syntax of HTTP Request and Response Messages HTTP Request Message GET /reports/project1/final.htm HTTP/1.1[CRLF] Host: faculty.fairfield.edu[CRLF]

Figure 2-3: Syntax of HTTP Request and Response Messages, Continued HTTP Response Message HTTP/1.1 200 OK[CRLF] Date: Tuesday, 20-MAR-2004 18:32:15 GMT[CRLF] Server: name of server software[CRLF] MIME-version: 1.0[CRLF] Content-type: text/plain[CRLF] [CRLF] File to be downloaded

Figure 2-1: How Standards Govern Interactions, Continued Message Syntax (Organization) General Message Organization (Figure 2-4) Primary components Data Field (content to be delivered) Header (everything before the data field) Trailer (everything after the data field) Header and trailer are further divided into fields Here are the elements of a small PC network using Ethernet LAN technology. We will look at each of these elements in this chapter. First, there is an Ethernet switch or an Ethernet hub (we will look at the differences between switches and hubs). Second, there are client PCs and serve PCrs. Note that a small PC network can have multiple clients and multiple servers. Ethernet requires each station to have a 48-bit “MAC” address. As we will see later, this address is expressed for human reading as six 2-characer combinations as shown in this figure. Third, stations are connected to the hub or switch using UTP wiring. To connect our network to the Internet, there is an access router. Essentially, the small Ethernet PC network becomes another network on the Internet connected by a router. Finally, there is a broadband modem for fast Internet access.

Figure 2-4: General Message Organization Trailer Data Field Header Other Header Field Address Field Message with all three parts

Figure 2-4: General Message Organization, Continued Data Field Header Other Header Field Address Field Message without a trailer Usually only data link layer messages have trailers

Figure 2-4: General Message Organization, Continued Header Message with only a header e.g. TCP supervisory messages are pure headers Other Header Field Address Field

Figure 2-1: How Standards Govern Interactions, Continued Message Timing Constraints When may a process transmit? At any time? Only when some event happens? Turn-taking in conversations In client/server computing, server cannot respond unless it receives a request Many more complex examples exist (for instance, in TCP later in this chapter) Here are the elements of a small PC network using Ethernet LAN technology. We will look at each of these elements in this chapter. First, there is an Ethernet switch or an Ethernet hub (we will look at the differences between switches and hubs). Second, there are client PCs and serve PCrs. Note that a small PC network can have multiple clients and multiple servers. Ethernet requires each station to have a 48-bit “MAC” address. As we will see later, this address is expressed for human reading as six 2-characer combinations as shown in this figure. Third, stations are connected to the hub or switch using UTP wiring. To connect our network to the Internet, there is an access router. Essentially, the small Ethernet PC network becomes another network on the Internet connected by a router. Finally, there is a broadband modem for fast Internet access.

Connection-Oriented and Connectionless Protocols

Figure 2-5: Connectionless and Connection-Oriented Protocols Message 1 (Seq. Num = A1) Message 2 (Seq. Num = A2) Close Connection Connection-Oriented Protocol Open Connection A B Message 3 (Seq. Num B1) Message (No Sequence Number) Connectionless Protocol A B

Webserver Application Figure 2-5: Connectionless and Connection-Oriented Protocols, Continued Client PC Browser Webserver Webserver Application HTTP Request No Openings No Closings

Figure 2-6: Transmission Control Protocol (TCP) Session Client PC Transport Process Webserver Transport Process 1. SYN (Open) Open (3) 2. SYN, ACK (1) (Acknowledgment of 1) 3. ACK (2) TCP 3-Way Connection Open

Figure 2-6: Transmission Control Protocol (TCP) Session, Continued Client PC Transport Process Webserver Transport Process 4. Data = HTTP Request Carry HTTP Req & Resp (4) 5. ACK (4) 6. Data = HTTP Response 7. ACK (6) Request-Response Cycle for Data Transfer

Figure 2-6: Transmission Control Protocol (TCP) Session, Continued Client PC Transport Process Webserver Transport Process 8. Data = HTTP Request (Error) 9. Data = HTTP Request (No ACK so Retransmit) Carry HTTP Req & Resp (4) 10. ACK (9) 11. Data = HTTP Response 12. ACK (11) Error Handling

Figure 2-6: Transmission Control Protocol (TCP) Session, Continued If acknowledgements are not sent by the receiver, the sender retransmits the TCP segment This gives reliability Note: An ACK may be combined with the next message if the next message is sent quickly enough

Figure 2-6: Transmission Control Protocol (TCP) Session, Continued Client PC Transport Process Webserver Transport Process 13. FIN (Close) 14. ACK (13) Close (4) 15. FIN 16. ACK (15) 4-Way Close

The TCP/IP-OSI Hybrid Standards Architecture

Figure 2-7: TCP/IP-OSI Architecture Layer Specific Purpose General Purpose Application (5) Application-application interworking Transport (4) Host-host communication Transmission across an internet Internet (3) Packet delivery across an internet Data Link (2) Frame delivery across a network Transmission across a single network (LAN or WAN) Physical (1) Device-device connection

Figure 2-7: TCP/IP-OSI Architecture, Continued Physical and Data Link Layer Standards Govern Communication Through a Single Network LAN or WAN

Figure 2-7: TCP/IP-OSI Architecture, Continued Physical Layer Physical layer standards govern transmission between adjacent devices connected by a transmission medium Host A Physical Link A-X1 Switch X1

Figure 2-7: TCP/IP-OSI Architecture, Continued Data Link Layer Data link layer standards govern the transmission of frames across a single network—typically by sending them through several switches along the data link Data link layer standards also govern frame organization, timing constraints, and reliability

Figure 2-8: Physical and Data Link Layer Standards 3 Physical Link 1 Data Link 2 Switches Host A Switch Data Link A-R1 Switch Physical Link A-X1 Server Station Switch X1 Physical Link X1-X2 Physical Link X2-R1 Mobile Client Station Switch X2 Router R1

Figure 2-7: TCP/IP-OSI Architecture, Continued Internet and Transport Layers An internet is a group of networks connected by routers so that any application on any host on any network can communicate with any application on any other host on any other network Internet and transport layer standards govern communication across an internet composed of two or more single networks

Figure 2-7: TCP/IP-OSI Architecture, Continued Internet Layer Internet layer standards govern the transmission of packets across an internet— typically by sending them through several routers along the route Internet layer standards also govern packet organization, timing constraints, and reliability

Figure 2-9: Internet and Data Link Layer Standards Host A Data Link A-R1 R1 Network X Network Y 3 Data Links: One per Network 1 Route per Internet Data Link R1-R2 Network Z Route A-B R2 Host B Data Link R2-B

Figure 2-9: Internet and Data Link Layer Standards, Continued Frame X Details in Network X Packet Data Link A-R1 Switch Host A Switch Frame X Destination Addresses: Packet: Host B (Destination Host) Frame: Router R1 Server Station Switch X1 Mobile Client Station Switch X2 Route A-B Router R1 Network X

Figure 2-9: Internet and Data Link Layer Standards, Continued Details in Network Y To Network X Route A-B Router R1 Frame Y Data Link R1-R2 Packet Frame Y Destination Addresses: Packet: Host B (Destination Host) Frame: Router R2 To Network Z Router R2 Network Y

Figure 2-9: Internet and Data Link Layer Standards, Continued Details in Network Z Packet Data Link R2-B Frame Z Switch Z1 Host B Switch Router R2 Frame Z Destination Addresses: Packet: Host B (Destination Host) Frame: Host B Switch Z2 Mobile Client Stations Switch X2 Router Network Z

Frames and Packets In an internet with hosts separated by N networks, there will be: 2 hosts One route (between the two hosts) N frames (one in each network) N-1 routers (change frames between each pair of networks)

Figure 2-7: TCP/IP-OSI Architecture, Continued Transport Layer Transport layer standards govern aspects of end-to-end communication between two end hosts that are not handled by the data link layer These standards also allow hosts to work together even if the two computers are from different vendors and have different internal designs

Figure 2-10: Internet and Transport Layer Standards end-to-end (host-to-host) TCP is connection-oriented, reliable Server Client PC Internet Layer (usually IP) hop-by-hop (host-router or router-router) connectionless, unreliable Router 1 Router 2 Router 3

Figure 2-7: TCP/IP-OSI Architecture, Continued Application Layer The application layer governs how two applications work with each other, even if they are from different vendors

Transport and Application Layer Standards App A App B App C App D Application Layer (App B – App C) Transport Layer end-to-end (host-to-host) (Client PC – Server) Client PC Server Most hosts are multitasking machines that run multiple applications simultaneously. Hosts need to communicate; So do pairs of applications

Standards Layers: Recap Application (5) Transport (4) Internet (3) Data Link (2) Physical (1)

Figure 2-11: Why Layer? Breaking up large tasks into smaller tasks and assigning tasks to different individuals is common in all fields Specialization in standards design (EEs for physical layer, application specialists for application layer, etc.) Simplification in standards design for individual standards If you change a standard at one layer, you do not have to change standards at other layers

Syntax Examples

Octet Octets Field lengths may be measured in octets An octet is a group of eight bits In computer science, an octet is called a byte Octet

Figure 2-12: Ethernet Frame Preamble (7 octets) 10101010 … Start of Frame Delimiter (1 octet) 10101011 Destination Ethernet (MAC) Address (48 bits) Source Ethernet (MAC) Address (48 bits) Length (2 octets) Length of Data Field …

Figure 2-12: Ethernet Frame, Continued Data Field (variable length) LLC Subheader (usually 7 octets) Usually IP Packet PAD (added if data field < 46 octets) Frame Check Sequence (32 bits)

Figure 2-12: Ethernet Frame, Continued Frame Check Sequence (32 bits) Sender computes the frame check sequence field value based on contents of other fields Receiver recomputes the field value If the values match, there have been no errors If the values do not match, there is an error The receiver simply discards the frame Unreliable: error detection but not error correction

Figure 2-13: Ethernet Switching Decision Switching Table Port Host 10 A1-44-D5-1F-AA-4C 13 B2-CD-13-5B-E4-65 15 C3-2D-55-3B-A9-4F 16 D4-47-55-C4-B6-9F Ethernet Switch D4-47-55-C4-B6-9F UTP UTP from Port 15 UTP UTP Frame To C3… Frame To C3… C3-2D-55-3B-A9-4F A1-44-D5-1F-AA-4C B2-CD-13-5B-E4-65

Figure 2-14: Internet Protocol (IP) Packet Bit 0 Bit 31 Version (4 bits) Header Length (4 bits) Diff-Serv (8 bits) Total Length (16 bits) Identification (16 bits) Flags (3 bits) Fragment Offset (13 bits) Time to Live (8 bits) Protocol (8 bits) Header Checksum (16 bits) Source IP Address (32 bits) Destination IP Address (32 bits) Options (if any) Padding (to 32-bit boundary) Data Field (dozens, hundreds, or thousands of bits) Often contains a TCP segment

Figure 2-14: Internet Protocol (IP) Packet, Continued Bit 0 Bit 31 Version (4 bits) Header Length (4 bits) Diff-Serv (8 bits) Total Length (16 bits) Identification (16 bits) Flags (3 bits) Fragment Offset (13 bits) Time to Live (8 bits) Protocol (8 bits) Header Checksum (16 bits) Version is Bits 0-3 Header length is Bits 4-7 Diff Serv is Bits 8-15 Total Length is Bits 16-31 Identification is Bits 32-47 Time to live is Bits 48-55

Vertical Communication

Figure 2-15: Layered Communication on the Source Host Application Process HTTP Message Transport Process HTTP Message TCP Hdr Encapsulation of HTTP Message in Data Field of TCP Segment

Figure 2-15: Layered Communication on the Source Host, Continued When a layer process (N) creates a message, it passes it down to the next-lower-layer process (N-1) immediately The receiving process (N-1) will encapsulate the Layer N message, that is, place it in the data field of its own (N-1) message

Figure 2-15: Layered Communication on the Source Host, Continued Transport Process HTTP Message TCP Hdr Internet Process HTTP Message TCP Hdr IP Hdr Encapsulation of TCP Segment in Data Field of IP Packet

Figure 2-15: Layered Communication on the Source Host, Continued Internet Process HTTP Message TCP Hdr IP Hdr Data Link Process Eth Trlr HTTP Message TCP Hdr IP Hdr Eth Hdr Encapsulation of IP Packet in Data Field of Ethernet Frame

Figure 2-15: Layered Communication on the Source Host, Continued Data Link Process Eth Trlr HTTP Message TCP Hdr IP Hdr Eth Hdr Physical Process

Figure 2-15: Layered Communication on the Source Host, Continued The following is the final frame for a an HTTP message on an Ethernet LAN Eth Trlr HTTP Message TCP Hdr IP Hdr Eth Hdr L2 L5 L4 L3 L2

Figure 2-15: Layered Communication on the Source Host, Continued The following is the final frame for a an SMTP (e-mail) message on PPP telephone modem connection PPP Trlr SMTP Message TCP Hdr IP Hdr PPP Hdr L2 L5 L4 L3 L2 Note: HTTP is NOT the application layer message, as it is in webservice. PPP replaces Ethernet.

Figure 2-15: Layered Communication on the Source Host, Continued The following is the final frame for a packet carrying a supervisory TCP segment: Eth Trlr TCP Hdr IP Hdr Eth Hdr L2 L4 L3 L2 Supervisory TCP segments are initiated by the Transport layer process (Layer 4), so Layer 5 is not involved. TCP supervisory messages consist entirely of headers. The header carries supervisory information, so no TCP data field exists in supervisory TCP messages.

Figure 2-16: Decapsulation on the Destination Host Eth Trlr HTTP Message TCP Hdr IP Hdr Eth Hdr Data Link Process Physical Process

Figure 2-16: Decapsulation on the Destination Host, Continued HTTP Message TCP Hdr IP Hdr Internet Process Eth Trlr HTTP Message TCP Hdr IP Hdr Eth Hdr Data Link Process Decapsulation of IP Packet from Data Field of Ethernet Frame

Figure 2-16: Decapsulation on the Destination Host, Continued HTTP Message TCP Hdr Transport Process HTTP Message TCP Hdr IP Hdr Internet Process Decapsulation of TCP Segment from Data Field of IP Packet

Figure 2-16: Decapsulation on the Destination Host, Continued HTTP Message Application Process HTTP Message TCP Hdr Transport Process Decapsulation of HTTP Message from Data Field of TCP Segment

Figure 2-17: Layered End-to-End Communication Routers Have Three Layers --- Each Router Port Has Two Switches Have Two Layers --- Each Switch Port Has One Layer Source and Destination Hosts Have 5 Layers Int App DL Trans Phy Source Host Switch 1 Switch 2 Router 1 Switch 3 Router 2 Destination Host

Hypertext Transfer Protocol Figure 2-18: Protocols Protocols are standards that govern interactions between hardware and software processes at the same layer but on different hosts Hypertext Transfer Protocol Int App DL Trans Phy Source Host Switch 1 Switch 2 Router 1 Switch 3 Router 2 Destination Host

Figure 2-18: Protocols, Continued Hypertext Transfer Protocol Int App DL Trans Phy Transmission Control Protocol Internet Protocol Source Host Switch 1 Switch 2 Router 1 Switch 3 Router 2 Destination Host

OSI, TCP/IP, and Other Standards Architectures

Figure 2-19: OSI and TCP/IP Standards Agency(ies) ISO (International Organization for Standardization) ITU-T (International Telecommunications Union— Standards Sector) IETF (Internet Engineering Task Force)

Figure 2-19: OSI and TCP/IP, Continued Dominance Nearly 100% at physical and data link layers 70% to 80% at the Internet and transport layers. Also strong at the application layer Documents are Called Various Mostly RFCs (requests for comment)

Figure 2-19: OSI and TCP/IP, Continued Do not confuse OSI (the architecture) with ISO (the organization) The acronyms for ISO and ITU-T do not match their names, but these are the official names and acronyms

Figure 2-20: The Hybrid TCP/IP-OSI Architecture Broad Purpose Application Application Application (Layer 5) Applications Presentation Session Transport Transport Transport (Layer 4) Internetworking Internet Network Internet (Layer 3) Use OSI Standards Here Data Link Data Link (Layer 2) Communication within a single LAN or WAN Physical Physical (Layer 1)

Figure 2-20: The Hybrid TCP/IP-OSI Architecture, Continued Notes: The Hybrid TCP/IP-OSI Architecture is used on the Internet and dominates internal corporate networks OSI standards are used almost universally at the physical and data link layers (which govern communication within individual networks) TCP/IP is used for 70% to 80% of all corporate traffic at the internet and transport layers and is used heavily at the application layer.

Figure 2-21: OSI Session Layer (Manages a series of transactions) App 1 App 2 App 3 App 4 Transport Layer Network or Internet Client PC Server

Figure 2-21: OSI Session Layer, Continued Manages a series of transactions closely If there is a connection break, only have to retransmit transactions since the last rollback point TCP/IP Has No Session Layer The few applications that need to manage transaction series closely provide their own mechanisms In HTTP, cookies provide continuity across applications

Figure 2-22: OSI Presentation Layer (Transfer Syntax C) App 2 Internal Syntax A App 3 Internal Syntax B Presentation standards also include compression standards and data formatting standards (jpeg, etc.)

Figure 2-22: OSI Presentation Layer, Continued Transfer syntax Layer for application standards, such as jpeg TCP/IP Has No Presentation Layer MIME at least allows the sender to indicate the format of file delivered in a message

Figure 2-23: Other Major Standards Architectures IPX/SPX Used by older Novell NetWare file servers Popular option for newer Novell NetWare file servers SNA (Systems Network Architecture) Used by IBM mainframe computers AppleTalk Used by Apple Macintoshes

Figure 2-24: Characteristics of Protocols Discussed in the Chapter Layer Protocol Connection- Oriented /Connectionless Reliable/ Unreliable Strong / Weak Timing Constraints 5 (App) HTTP Connectionless Unreliable Weak 4 (Trans) TCP Connection- oriented Reliable Strong 3 (Internet) IP Connectionless Unreliable Weak 2 (DL) Ethernet Connectionless Unreliable Weak

Topics Covered Standards govern the semantics, syntax and timing of message exchanges Data field, header, and trailer Header and trailer subdivided into fields HTTP: Text request and response messages Connection-oriented versus connectionless TCP connections 3-way opens, data exchanges, 4-way closes

Topics Covered Reliability TCP/IP-OSI Architecture In TCP, receiver sends ACKs Senders retransmit non-acknowledged segments TCP/IP-OSI Architecture OSI is 100% dominant at Layers 1 and 2 TCP/IP is 70% to 80% dominant at Layers 3 and 4 TCP/IP is used heavily at Layer 5

Topics Covered Layered Standards Architecture Physical layer (between adjacent devices) Data link layer (across a switched network) Internet layer (across an internet) Transport layer (host-to-host) Application layer (application-to-application)

Topics Covered Ethernet Internet Protocol (IP) Source and destination addresses are 48 bits long Switches base output port decisions on 48-bit Ethernet addresses Unreliable: if detects an error, drops the frame Internet Protocol (IP) 32-bit addresses Show 32 bits on each line Unreliable: checks headers for errors but discards

Topics Covered Vertical Communication on the Source Host Layer process send message to the next-lower layer Encapsulation Final frame Vertical Communication on the Destination Host Decapsulation and passing up

Topics Covered Not All Devises Have All Layers Protocols Hosts: all five Routers: three Switches: two Protocols Standards that govern interactions between hardware and software practices at the same layer but on different hosts

Topics Covered OSI Architecture Other Standards Architectures Divides application layer into three layers Session Presentation Application Other Standards Architectures IPX/SPX SNA AppleTalk