1: Review Of Semester 1v2 in Sem 2v2 1.1.1.1. Provide an overview of encapsulation. Networking evolves to support current and future applications. By dividing.

Slides:



Advertisements
Similar presentations
OSI Model Discuss the major influences of user requirements on network evolution Identify at least 3 reasons why the industry uses a layered network.
Advertisements

OSI Model OSI MODEL.
Chapter 2 Network Models.
© 2007 Cisco Systems, Inc. All rights reserved.Cisco Public 1 Version 4.0 Communicating over the Network Network Fundamentals – Chapter 2.
Networking Theory (Part 1). Introduction Overview of the basic concepts of networking Also discusses essential topics of networking theory.
Protocols and the TCP/IP Suite
OSI Model.
Introduction To Networking
Data Communications Architecture Models. What is a Protocol? For two entities to communicate successfully, they must “speak the same language”. What is.
Review on Networking Technologies Linda Wu (CMPT )
COE 342: Data & Computer Communications (T042) Dr. Marwan Abu-Amara Chapter 2: Protocols and Architecture.
Chapter 2 Network Models.
COMPUTER NETWORKS.
The OSI Model A layered framework for the design of network systems that allows communication across all types of computer systems regardless of their.
 The Open Systems Interconnection model (OSI model) is a product of the Open Systems Interconnection effort at the International Organization for Standardization.
© 2007 Cisco Systems, Inc. All rights reserved.Cisco Public 1 Version 4.0 Communicating over the Network Network Fundamentals – Chapter 2.
NETWORKING CONCEPTS. TCP/IP The TCPIIP protocol suite was developed prior to the OSI model TCP/IP protocol suite was defined as having four layers: Host-to-network,
Protocols and the TCP/IP Suite Chapter 4. Multilayer communication. A series of layers, each built upon the one below it. The purpose of each layer is.
NetworkProtocols. Objectives Identify characteristics of TCP/IP, IPX/SPX, NetBIOS, and AppleTalk Understand position of network protocols in OSI Model.
OSI Reference Model & Layered Communication Sritrusta Sukaridhoto.
Presentation on Osi & TCP/IP MODEL
Lecture 2 TCP/IP Protocol Suite Reference: TCP/IP Protocol Suite, 4 th Edition (chapter 2) 1.
SEED Infotech Pvt. Ltd. 1 Networking in Java. SEED Infotech Pvt. Ltd. 2 Objectives of This Session Describe issues related to any type of network using.
THE OSI MODEL AND THE TCP/IP PROTOCOL SUITE CS 1202 Lectur3 part2.
ACM 511 Chapter 2. Communication Communicating the Messages The best approach is to divide the data into smaller, more manageable pieces to send over.
Internet Addresses. Universal Identifiers Universal Communication Service - Communication system which allows any host to communicate with any other host.
THE OSI REFERENCE MODEL Open Systems Interconnection (OSI) International Organization for Standardization( ISO)
© McLean HIGHER COMPUTER NETWORKING Lesson 1 – Protocols and OSI What is a network protocol Description of the OSI model.
Department of Electronic Engineering City University of Hong Kong EE3900 Computer Networks Introduction Slide 1 A Communications Model Source: generates.
The OSI Model and the TCP/IP Protocol Suite Outline: 1.Protocol Layers 2.OSI Model 3.TCP/IP Model 4.Addressing 1.
Chapter Three Network Protocols By JD McGuire ARP Address Resolution Protocol Address Resolution Protocol The core protocol in the TCP/IP suite that.
NETWORKING FUNDAMENTALS. Bandwidth Bandwidth is defined as the amount of information that can flow through a network connection in a given period of time.Bandwidth.
The OSI Model.
University of the Western Cape Chapter 12: The Transport Layer.
UNDERSTANDING THE HOST-TO-HOST COMMUNICATIONS MODEL - OSI LAYER & TCP/IP MODEL 1.
Topology, refers to the physical and logical diagrams which summarize network connections and information flow.
First, by sending smaller individual pieces from source to destination, many different conversations can be interleaved on the network. The process.
William Stallings Data and Computer Communications
Communication Networks - Overview CSE 3213 – Fall November 2015.
Institute of Technology Sligo - Dept of Computing Chapter 12 The Transport Layer.
Prepared by Engr.Jawad Ali BSc(Hons)Computer Systems Engineering University of Engineering and Technology Peshawar.
Network Protocols and Standards (Part 2). The OSI Model In 1984, the International Organization for Standardization (ISO) defined a standard, or set of.
CHAPTER 4 PROTOCOLS AND THE TCP/IP SUITE Acknowledgement: The Slides Were Provided By Cory Beard, William Stallings For Their Textbook “Wireless Communication.
Open System Interconnection Describe how information from a software application in one computer moves through a network medium to a software application.
Individual Project 1 Sarah Pritchard. Fran, a customer of your company, would like to visit your company’s website from her home computer… How does your.
Network Models.
Net 221D:Computer Networks Fundamentals
ISDS 4120 Project 1 DWAYNE CARRAL JR 3/27/15. There are seven layers which make up the OSI (Open Systems Interconnection Model) which is the model for.
Voice Over Internet Protocol (VoIP) Copyright © 2006 Heathkit Company, Inc. All Rights Reserved Presentation 5 – VoIP and the OSI Model.
2.1 Chapter 2 Network Models – cont. Copyright © The McGraw-Hill Companies, Inc. Permission required for reproduction or display.
2016/3/11 1 Data Link Layer. 2016/3/11 2 Two basic services of Data Link Allows the upper layers to access the media using techniques such as framing.
Data Communication Network Models
TCP/IP Protocol Suite Suresh Kr Sharma 1 The OSI Model and the TCP/IP Protocol Suite Established in 1947, the International Standards Organization (ISO)
Week #8 OBJECTIVES Chapter #5. CHAPTER 5 Making Networks Work Two Networking Models –OSI OPEN SYSTEMS INTERCONNECTION PROPOSED BY ISO –INTERNATIONAL STANDARDS.
Network Models. The OSI Model Open Systems Interconnection (OSI). Developed by the International Organization for Standardization (ISO). Model for understanding.
Mr. Sathish Kumar. M Department of Electronics and Communication Engineering I’ve learned that people will forget what you said, people will forget what.
Welcome Back Cisco Semester 1 & 2 Review. Why are Networks Complex Environments?? They involve: They involve: –Interconnections to networks outside an.
Network Models.
Networking Using the OSI Model.
The OSI Model and the TCP/IP Protocol Suite
1: Review Of Semester 1v2 in Sem 2v2
Layered Architectures
IOS Network Model 2nd semester
The OSI Model and the TCP/IP Protocol Suite
Chapter 3: Open Systems Interconnection (OSI) Model
OSI Model The Seven Layers
Data Link Layer 2019/2/19.
The OSI Model and the TCP/IP Protocol Suite
The TCP/IP Model.
LEARNING COMPUTER NETWORKS OSI Model (layers). Why a layered model?  Easier to teach communication process.  Speeds development, changes in one layer.
Presentation transcript:

1: Review Of Semester 1v2 in Sem 2v Provide an overview of encapsulation. Networking evolves to support current and future applications. By dividing and organizing the networking tasks into separate layers/functions, new applications can be handled without problems. The OSI reference model organizes network functions into seven categories, called layers. The task of most network managers is to configure the three lowest layers. Peer-to-peer functions use encapsulation and de- encapsulation as the interface for the layers.

Describe three needs that drive enterprise network improvements. The enterprise is a corporation, agency, school, or other organization that ties together its data, communication, computing, and file servers. Developments on the enterprise network include:  interconnected LANs that provide access to computers or file servers in other locations  higher bandwidth on the LANs to satisfy the needs of the end users  technologies that can be relayed for WAN service

Why Layered Network Model

Each layer uses its own layer protocol to communicate with its peer layer in another system. Each layer's protocol exchanges information, called protocol data units (PDUs), with its peer layers. For example, in TCP/IP the transport layer of TCP communicates with the peer TCP function by using segments. Each layer uses the services of the layer below it in order to communicate with its peer layer.

Step 1 A computer converts an message into alphanumeric characters that can be used by the internetworking system. This is the data. Step 2 The message data then changes to segments for transport on the internetwork system. The transport function ensures that the message hosts at both ends of the system can reliably communicate. Step 3 The data then forms a packet, or datagram, that also contains a network header that includes a source and destination logical address. The address helps the network devices send the packet across the network along a chosen path. Step 4 Each network device puts the packet into a frame. The frame enables the device to connect to the next directly-connected network device on the link. Step 5 The frame changes to a pattern of 1s and 0s for transmission on the medium (usually a wire). Some clocking function enables the devices to distinguish bits as they travel across the medium.

The physical layer provides access to the network media. The data link layer provides support for communication over several types of data links, such as Ethernet/IEEE media. Addressing schemes such as Media Access Control (MAC) and Internet Protocol (IP) provide a very structured method for finding and delivering data to computers or to other hosts on a network.

 Bridges that connect LAN segments and help filter traffic  Hubs that concentrate LAN connections and allow use of twisted-pair copper media  Ethernet switches that offer full-duplex, dedicated bandwidth to segments or desktops  Routers that offer many services, including internetworking and broadcast control

Ethernet—The first of the major LAN technologies, it runs the largest number of LANs. Token Ring—From IBM, it followed Ethernet and is now widely used in a large number of IBM networks. FDDI—Also using tokens, it is now a popular campus LAN. We will be studying the Ethernet IEEE LAN standards.

The 10Base-5 and 10Base-2 standards provide access for several stations to the same LAN segment. Stations are attached to the segment by a cable that runs from an attachment unit interface (AUI) in the station to a transceiver that is directly attached to the Ethernet coaxial cable.  10Base-2 (thin Ethernet) - allows coaxial cable network segments up to 185 m. long  10Base-5 (thick Ethernet) - allows coaxial cable network segments up to 500 m. long  10Base-T - carries Ethernet frames on inexpensive twisted-pair wiring

The Ethernet and data links prepare data for transport across the physical link that joins two devices. For example, as this graphic shows, three devices can be directly attached to each other over the Ethernet LAN.

The purpose of this target indicator is to show the listening and transmitting parts of CSMA/CD. The host listens for silence on the LAN (CS, Carrier Sense). Every host on the LAN is free to transmit when it hears silence (MA, Multiple Access). One node’s transmission traverses the entire network and is received and examined by every node.

Broadcasting is a powerful tool that can send a single frame to many stations at the same time. Broadcasting uses a data link destination address of all 1s (FFFF.FFFF.FFFF in hexadecimal). When improperly used, broadcasting can seriously affect the performance of stations by unnecessarily interrupting them. Broadcasts should, therefore, be used only when the MAC address of the destination is unknown, or when the destination is all stations

When a station wishes to transmit a signal, it checks the network to determine whether another station is currently transmitting. If the network is not being used, the station proceeds with the transmission. While sending a signal, the station monitors the network to ensure that no other station is transmitting at that time. If two stations transmit at the same time if this should occur, they would cause a collision. All stations stop sending frames for a randomly selected time period.

Two important types of addresses are data link layer addresses and network layer addresses. Data link layer addresses, also called physical hardware addresses or MAC addresses, are typically unique for each network connection. In fact, for most LANs, data link layer addresses are located on the NIC (network interface card).

One way in which the sender can ascertain that MAC address that it needs is to use an ARP (Address Resolution Protocol). Router will provide its own MAC address if the host and destination are on different subnets.

In a TCP/IP environment, end stations communicate with servers or other end stations. This can occur because each node using the TCP/IP protocol suite has a unique 32-bit logical address. This address is known as the IP address.

Subnets improve the efficiency of network addressing. Adding subnets does not change how the outside world sees the network, but within the organization, there is additional structure.

From an addressing standpoint, subnets are an extension of a network number. Network administrators determine the size of subnets based on the expansion needs of their organizations. Network devices use subnet masks to identify which part of the address is for the network and which part represents host addressing.

A host number of 0 is reserved for the wire (or subnet) address, and a host value of all 1s is reserved because it selects all hosts—that is, it is a broadcast. The 3 bits in the example are enough for the required five hosts per wire (actually, giving you host numbers 1 - 6).

6 host addresses and 30 useable subnets. BitsSubnet MaskSubnetsHosts

The presentation layer (Layer 6) formats and converts network application data into text, data encryption, graphics, video, audio, or whatever format is necessary for the receiving device to understand it. The session layer (Layer 5) establishes, manages, and terminates communication interactions between applications. NFS, SQL and X Windows System all operate at this layer The transport layer (Layer 4) is responsible for transporting and regulating the flow of information from source to destination, and for doing it reliably and accurately. Its functions include:  connection synchronization  flow control  error recovery  reliability through windowing The application layer (Layer 7) supports the communicating component of an application. It does not provide services to any other OSI layer. However, it does provide services to application processes lying outside the scope of the OSI model (e.g. spreadsheet programs, Telnet, WWW, etc.)

In the context of the OSI reference model, the application layer (Layer 7) supports the communicating component of an application.

The presentation layer (Layer 6) of the OSI reference model is responsible for presenting data in a form that a receiving device can understand. It serves as the translator - sometimes between different formats - for devices that need to communicate over a network, by providing code formatting and and conversion. Another function of Layer 6 is the encryption of data Layer 6 converts and translates the two different formats.  PICT -  TIFF -  JPEG -  MIDI -  MPEG -  QuickTime -

The session layer (Layer 5) establishes, manages, and terminates sessions between applications. It coordinates the service requests and responses that occur when applications establish communications between different hosts.

As the transport layer sends its data segments, it also ensures the integrity of the data. This transport is a connection-oriented relationship between communicating end systems. Some of the reasons for accomplishing reliable transport are as follows:  It ensures that senders receive acknowledgement of delivered segments.  It provides for retransmission of any segments that are not acknowledged.  It puts segments back into their correct sequence at the destination device.  It provides congestion avoidance and control.

One reason for using a multi-layer model such as the OSI reference model is so that multiple applications can share the same transport connection. Transport functionality is accomplished segment by segment. This means that different data segments from different applications, being sent to the same destination or to many destinations, are sent on a first-come, first-served basis.

In concept, one device places a call to another device that the other device must accept. Protocol software modules in the two operating systems communicate by sending messages across the network to verify that the transfer is authorized and that both sides are ready.

While data transfer is in progress, congestion can occur for two different reasons. First, a high-speed computer might generate traffic faster than a network can transfer it. Second, if many computers send datagrams simultaneously to a single destination, that destination can experience congestion.

Reliable connection-oriented data transfer means that data packets arrive in the same order in which they are sent. Protocols fail if any data packets are lost, damaged, duplicated, or received in the wrong order. In order to ensure transfer reliability, receiving devices must acknowledge receipt of each and every data segment.

Reliable delivery guarantees that a stream of data that is sent from one device will be delivered through a data link to another device without duplication or data loss. Positive acknowledgment with retransmission is one process that guarantees reliable delivery of data streams. It requires a recipient to send an acknowledgment message to the sender whenever it receives data.

Each of the upper-level layers performs its own functions. However, their functions depend on lower-layer services. All four upper layers - application (Layer 7), presentation (Layer 6), session (Layer 5), and transport (Layer 4) - can encapsulate data in end-to-end segments The End