Protocol and protocol architecture

Slides:



Advertisements
Similar presentations
CCNA – Network Fundamentals
Advertisements

Chapter 5: TCP/IP and OSI Business Data Communications, 5e.
Data and Computer Communications Eighth Edition by William Stallings Lecture slides by Lawrie Brown Chapter 2 – Protocol Architecture, TCP/IP, and Internet-Based.
1 William Stallings Data and Computer Communications 7 th Edition Chapter 2 Protocols and Architecture.
Data and Computer Communications Eighth Edition by William Stallings Lecture slides by Lawrie Brown Chapter 2 – Protocol Architecture, TCP/IP, and Internet-Based.
PROTOCOLS AND ARCHITECTURE Lesson 2 NETS2150/2850.
Chapter 4 : TCP/IP and OSI Business Data Communications, 4e.
Semester Copyright USM EEE442 Computer Networks Introduction: Protocols En. Mohd Nazri Mahmud MPhil (Cambridge, UK) BEng (Essex, UK)
Protocols and the TCP/IP Suite
EE 4272Spring, 2003 Protocols & Architecture A Protocol Architecture is the layered structure of hardware & software that supports the exchange of data.
Data Communications Architecture Models. What is a Protocol? For two entities to communicate successfully, they must “speak the same language”. What is.
William Stallings Data and Computer Communications 7 th Edition Chapter 2 Protocols and Architecture.
ECS 152A 1. Introduction. A Communications Model Source —generates data to be transmitted Transmitter —Converts data into transmittable signals Transmission.
TCP: Software for Reliable Communication. Spring 2002Computer Networks Applications Internet: a Collection of Disparate Networks Different goals: Speed,
COE 342: Data & Computer Communications (T042) Dr. Marwan Abu-Amara Chapter 2: Protocols and Architecture.
Computer Networks with Internet Technology William Stallings
The OSI Model A layered framework for the design of network systems that allows communication across all types of computer systems regardless of their.
 The Open Systems Interconnection model (OSI model) is a product of the Open Systems Interconnection effort at the International Organization for Standardization.
Gursharan Singh Tatla Transport Layer 16-May
OIS Model TCP/IP Model.
Chapter 5: TCP/IP and OSI Business Data Communications, 6e.
Lecture slides prepared for “Business Data Communications”, 7/e, by William Stallings and Tom Case, Chapter 8 “TCP/IP”.
Protocols and the TCP/IP Suite Chapter 4. Multilayer communication. A series of layers, each built upon the one below it. The purpose of each layer is.
Process-to-Process Delivery:
Chapter 17 Networking Dave Bremer Otago Polytechnic, N.Z. ©2008, Prentice Hall Operating Systems: Internals and Design Principles, 6/E William Stallings.
Data and Computer Communications Eighth Edition by William Stallings Lecture slides by Lawrie Brown Chapter 2 – Protocol Architecture, TCP/IP, and Internet-Based.
Presentation on Osi & TCP/IP MODEL
What is a Protocol A set of definitions and rules defining the method by which data is transferred between two or more entities or systems. The key elements.
Protocol Architectures. Simple Protocol Architecture Not an actual architecture, but a model for how they work Similar to “pseudocode,” used for teaching.
Protocols and the TCP/IP Suite
William Stallings Data and Computer Communications 7 th Edition Data Communications and Networks Overview Protocols and Architecture.
Lect1..ppt - 01/06/05 CDA 6505 Network Architecture and Client/Server Computing Lecture 2 Protocols and the TCP/IP Suite by Zornitza Genova Prodanoff.
Data and Computer Communications Chapter 2 – Protocol Architecture, TCP/IP, and Internet-Based Applications 1.
Department of Electronic Engineering City University of Hong Kong EE3900 Computer Networks Introduction Slide 1 A Communications Model Source: generates.
Data and Computer Communications Chapter 2 – Protocol Architecture, TCP/IP, and Internet-Based Applications.
Topic 2 – Protocol Architecture 1 FIT1005 FIT – Monash University Topic 2 - Protocol Architecture Reference: Chapter 2 – Stallings 7E.
The OSI Model.
University of the Western Cape Chapter 12: The Transport Layer.
TCP/IP TCP/IP LAYERED PROTOCOL TCP/IP'S APPLICATION LAYER TRANSPORT LAYER NETWORK LAYER NETWORK ACCESS LAYER (DATA LINK LAYER)
Chapter 15 – Part 2 Networks The Internal Operating System The Architecture of Computer Hardware and Systems Software: An Information Technology Approach.
TCP/IP Honolulu Community College Cisco Academy Training Center Semester 2 Version 2.1.
Chapter 2 Protocols and the TCP/IP Suite 1 Chapter 2 Protocols and the TCP/IP Suite.
William Stallings Data and Computer Communications
Lecture 4 Overview. Ethernet Data Link Layer protocol Ethernet (IEEE 802.3) is widely used Supported by a variety of physical layer implementations Multi-access.
CHAPTER 4 PROTOCOLS AND THE TCP/IP SUITE Acknowledgement: The Slides Were Provided By Cory Beard, William Stallings For Their Textbook “Wireless Communication.
Department of Electronic Engineering City University of Hong Kong EE3900 Computer Networks Protocols and Architecture Slide 1 Use of Standard Protocols.
1 Chapter 4. Protocols and the TCP/IP Suite Wen-Shyang Hwang KUAS EE.
Protocols Used for communications between entities in a system Used for communications between entities in a system Must speak the same language Must speak.
Protocol Suits and Layering Models OSI Model Dr. Abraham UTPA.
Voice Over Internet Protocol (VoIP) Copyright © 2006 Heathkit Company, Inc. All Rights Reserved Presentation 5 – VoIP and the OSI Model.
Data Communication Network Models
TCP/IP Protocol Suite Suresh Kr Sharma 1 The OSI Model and the TCP/IP Protocol Suite Established in 1947, the International Standards Organization (ISO)
Network Models. The OSI Model Open Systems Interconnection (OSI). Developed by the International Organization for Standardization (ISO). Model for understanding.
TUNALIData Communications1 Chapter 2 Protocols and Architecture.
Roadmap  Introduction to Basics  Computer Network – Components | Classification  Internet  Clients and Servers  Network Models  Protocol Layers.
Data and Computer Communications Chapter 2 – Protocol Architecture, TCP/IP, and Internet-Based Applications.
Computer Networks with Internet Technology William Stallings Chapter 2 Protocols and the TCP/IP Protocol Suite.
OSI Model OSI MODEL. Communication Architecture Strategy for connecting host computers and other communicating equipment. Defines necessary elements for.
What is a Protocol A set of definitions and rules defining the method by which data is transferred between two or more entities or systems. The key elements.
Lecture (2).
Distributed Systems.
Computer Networks with Internet Technology William Stallings
Protocols and the TCP/IP Suite
Data and Computer Communications by William Stallings Eighth Edition
Process-to-Process Delivery:
TCP/IP Protocol Suite: Review
1 TRANSMISSION CONTROL PROTOCOL / INTERNET PROTOCOL (TCP/IP) K. PALANIVEL Systems Analyst, Computer Centre Pondicherry University, Puducherry –
Chapter 2. Protocols and Architecture
Protocols and the TCP/IP Suite
Process-to-Process Delivery: UDP, TCP
Presentation transcript:

Protocol and protocol architecture When computers, terminals, and/or other data processing devices exchange data, there must be a data path between the two computers (terminals/processing devices), either directly or via a communication network. Means of connection of communicating systems: Point-to-point Multiple broadcast network

Protocol and protocol architecture Means of connection of communicating systems: Switched network Internet

Protocol If you want to transfer a file from one computer to another, in addition to data path, you need to perform the following tasks: The source system must activate the direct data communication path or inform the communication network of the identity of the desired destination system. The source system must ascertain that the destination system is prepared to received data. The file transfer application on the source system must ascertain that the file management program on the destination system is prepared to accept and store the file for this particular user. If the file formats used on the two systems are incompatible, one or the other system must perform a format translation function.

Protocol For two entities to communicate successfully, they must follow some mutually acceptable conventions between them. These conventions are referred to as a protocol. Protocol may be defined as a set of rules governing the exchange of data between two entities. The key elements of a protocol: Syntax: format and signal levels Semantics: control information for coordination and error handling. Timing: Speed matching and sequencing.

Protocol architecture It is clear that there must be a high degree of cooperation between two computers if you want to transfer data from one computer to another. Instead of implementing the logic for this as a single module, the task is broken up into subtasks, each of which is implemented separately. There are many advantages associated with the structured set of modules to implement the communications function. This structure is referred to as a protocol architecture.

Principle used for protocol architecture The communications functions are partitioned into a hierarchical set of layers. Each layer performs a related subset of the functions required to communicate with another system. It relies on the next lower layer to perform more primitive functions and to conceal the details of those functions. Ideally, the layers should be defined so that changes in one layer do not require changes in the other layers. Thus, we have decomposed one problem into a a number of more manageable subproblems. This partitioning should group functions logically and should have enough layers to make each layer manageably small. However, the number of layer should not be too many because of increased processing overhead.

TCP/IP and OSI RM Two protocol architectures have served as the basis for the development of interoperable communications standards: the TCP/IP protocol suite and the OSI reference model. TCP/IP is the most widely used interoperable architecture. OSI RM has become the standard model for classifying communications functions.

TCP/IP Protocol Architecture

Communications functions A small set of functions that form the basis of all protocols. Not all protocols have all functions because it would involve a significant duplication of effort. We can group protocol functions into the following categories: Encapsulation Segmentation & reassembly Connection control Ordered delivery Flow control Error control Addressing Multiplexing Transmission services

Communications functions Encapsulation Each protocol data unit (PDU) contains not only data but also control information. Some PDU contains only control information and no data. The control information can be the address of the sender and/or receiver, error-detecting code, or protocol control (how to implement the protocol functions). Segmentation Whether the application entity sends data in messages or in a continuous stream, lower-level protocols may need to break the data up into blocks of some smaller bounded size. This process is called segmentation. An ATM network is limited to blocks of 53 octets, Ethernet has a maximum size of 1526 octets. Without a maximum block size, one station could monopolize a multipoint medium. Error control may be more efficient with smaller PDU size.

Communications functions Reassemble The counterpart of segmentation is reassembly. Eventually, the segmented data must be reassembled into messages appropriate to the application level. If PDUs arrive out of order, the task will be more complicated. Connection control Data transfer can be of two types: connectionless (e.g. datagram) and connection-oriented (virtual circuit). Connection-oriented data transfer is preferred if stations anticipate a lengthy exchange of data and/or certain details of their protocol must be worked out dynamically.

Communications functions Connection control A logical connection is established between two entities. Three phases are: Connection establishment, data transfer, connection termination. During the connection establishment one station will issue a connection request to the other. The receiving entity accepts or rejects the request and, the connection is considered to be established. A central authority may or may not be involved. Both entities must be using the same protocol. Following connection establishment, the data transfer phase is entered. During this phase, both data and control information are exchanged. Data and acknowledgement can be exchanged in both direction. Finally, one side or both sides can terminate the connection by sending a termination request. Central authority also can forcibly terminate a connection.

Communications functions Protocol entity Connection request Connection accept Data Acknowledgement Terminate connection request Terminate connection accept Multiple exchanges The phase of a connection-oriented data transfer

Communications functions Ordered Delivery If two communicating entities are in different hosts connected by a network, there is a risk that PDUs will not arrive in the order in which they were sent, because they may traverse different paths through the network. In connection-oriented protocols, it is required that PDU order be maintained. Flow control Flow control is a function performed by a receiving entity to limit rate of data that is sent by a transmitting entity. It must be performed at various layers of the protocols. The simplest form of flow control is a stop-and –wait procedure, in which each PDU must be acknowledged before the next can be sent. More efficient protocols involve some form of credit provided to the transmitter, which is the amount of data that can be sent without an acknowledgement.

Communications functions Error control Error control is needed to guard against loss and damage of data and control information. Error control is implemented as two separate functions: error detection and retransmission. To detect error, the sender insert an error-detecting code in the transmitted PDU, which is a function of the other bits in the PDU. The receiver checks the value of the code on the incoming PDU. If an error is detected, the receiver discards the PDU. If the sender does not get the acknowledgement from the receiver in a reasonable amount of time, the sender retransmits the PDU. Some protocols employ an error-correction code. In this case, the receiver not only detect the error, but also correct it. Error control must be performed at various layers of protocols.

Communications functions Error control A unique address is associated with each end system (e.g., workstation or server) and each intermediate system (e.g., router) in a configuration.Such an address is, in general, a network-level address. In the case of TCP/IP architecture, this is referred to as an IP address, or an internet address. In the case of OSI RM architecture, this is referred to as network service access point (NSAP). The network-level address is used to route a PDU through a network or networks to a system. Once data arrive at a destination system, they must be routed to some process or application in the system. A system supports multiple applications and an application may support multiple users.Each application and each concurrent user of an application, is assigned a unique identifier, referred to as a port in the TCP/IP architecture and as a service access point (SAP) in the OSI RM architecture.

Communications functions Multiplexing One form of multiplexing is supported by means of multiple connections into a single system. For example, with X.25, there can be multiple virtual circuits terminating in a single end system. We will discuss in detail later. Transmission services A protocol may provide a variety of additional services to the entities. Priority => We need to send some messages to the destination entity with minimum delay. For example, close connection request.Priority can be assigned on a message basis or connection basis. Security => Security mechanism, restricting access, may be invoked.

TCP/IP TCP/IP is a result of protocol research and development conducted on the experimental packet-switched network, ARPANET, funded by the Defense Advanced Research Projects Agency (DARPA), and generally referred to as the TCP/IP suite. This protocol suite consists of a large collection of protocols that have been issued as Internet standards. There is no official TCP/IP protocol model as there is in the case of OSI.

TCP/IP We can organize the communication task for TCP/IP into five relatively independent layers: Application Layer Transport Layer Network Layer (Internet Layer) Network Access Layer (Data Link Layer) Physical Layer Note that the physical and network access layers provide interaction between the end system and the network, where as the transport and application layers are known as end-to-end protocols because they support interaction between two end systems. The Internet layer has the flavor of both.

TCP/IP Layered protocol The TCP/IP protocol suite predates the OSI Reference Model by about a decade.  Despite this, the TCP/IP protocol suite can be mapped to the model. TCP/IP has fewer layers (4/5 layers) than the seven layers used in the OSI RM. In the OSI RM, data is passed down the stack when it is being sent to the net and data is passed up the stack when it is being received from the network. Each layer in the stack adds control information (header) to ensure proper delivery. Each layer treats all the information as data that it receives from the upper layer and encapsulates it with its own header. When data is received, the opposite happens. Each layer strips off its header before passing the data on to the layer above.

TCP/IP’s application layer TCP/IP ‘s application layer corresponds to layers 5,6,7 (Application, Presentation, and session layers ) of the OSI RM. TELNET ( a terminal emulation protocol) FTP ( a file transfer protocol) TFTP  (Trivial File Transfer Protocol ) SMTP ( simple mail transfer protocol) NSP (Name server protocol) SNMP (Simple network management protocol) UNIX "r" commands, such as rlogin, rsh, rcp (remote Copy), rdate (checking date from other host)

Transport layer The TCP/IP Transport layer protocols ensure that packets arrive in sequence and without error, by exchanging acknowledgments of data reception, and re-transmitting lost packets. This type of communication is known as "end-to-end" or "host-to-host". Two types of transport protocols at this level: TCP ( Transport Control Protocol ) UDP ( User Datagram Protocol )

TCP In the TCP/IP suite, the connection-oriented transport protocol is the transmission control protocol (TCP). To achieve a reliable service, the TCP transmits all data in units known as segments. Generally, TCP decides when a new segment is transmitted. At the destination side, the receiving TCP buffers the data received in a segment in a memory buffer associated with the application and delivers it when the buffer is full. This transmission consists of a starting point to open the connection and an ending point to close the connection. TCP attaches a header onto the transmitted data. This header contains a number of parameters that help processes on the sending machine get connected to peer processes on the receiving machine.

TCP TCP confirms that a packet has been reached its destination by establishing an end-to-end connection between sending and receiving hosts. TCP is therefore considered a "reliable, connection-oriented" protocol. In most open distributed applications we need a reliable message transport service. Example: the transfer of the contents of a file containing a customer’s bank record. In this application, even the corruption of a single bit is very important.

UDP protocol UDP, the other Transport layer protocol, provides datagram delivery service. UDP is an unreliable (no ACK), connectionless datagram protocol. It does not provide any means of verifying that connection was ever achieved between receiving and sending hosts.   As UDP eliminates the processes of establishing and verifying connections, applications that send small amounts of data use UDP rather than TCP. UDP is used when error correction is not needed. UDP is used for a single short request/response message exchange between two application protocols Simplex broadcast messages uses UDP.

Network layer Also known as the Internet Layer. Accepts and delivers packets for the network. It includes the powerful Internet protocol (IP), the ARP protocol, and the ICMP protocol.

IP protocol IP protocol and its associated routing protocols are possibly the most significant of the entire TCP/IP suite. IP is responsible for: IP addressing: The IP addressing conventions are part of the IP protocol. Host-to-host communication: IP determines the path a packet must take, based on the receiving host's IP address. Packet formatting: IP assembles packets into units known as IP datagrams. Fragmentation: If a packet is too large for transmission over the network media, IP on the sending hosts breaks the packet into smaller fragments. IP on the  receiving host reconstructs the fragments into the original packet.

ARP Protocol The Address Resolution Protocol (ARP) assists IP in directing datagrams to the appropriate receiving host by mapping the IP address (32 bits long) to unique physical Ethernet address (48 bits long). Example:  137.207.192.55 decimal (89 CF C0 37) hex ====>00:00:at:10:fc:15

RARP Protocol RARP translates addresses, but in the opposite direction. It converts physical Ethernet addresses to IP addresses. Example:  00:00:a7:10:fc:15 ====> 137.207.192.55 decimal (89 CF C0 37) hex The RARP protocol really has nothing to do with routing data from one system to another. It helps configure diskless systems (workstation with no local disk, or an X- terminal) by allowing workstations to learn their IP addresses. A diskless station has no disk to read its IP address from TCP/IP configuration file. However, every system knows its physical address because it is encoded in the Ethernet interface card (LAN adapter). The diskless Xterminal uses the Ethernet broadcast facility to ask which IP address maps to its physical Ethernet address. When a server on the network sees the request, it looks up the Ethernet address in the ether file (table) and if it finds a match, the server replies with the X- terminal's (or the workstation's) IP address.

ICMP Protocol Internet Control Message Protocol (ICMP) is the protocol responsible for detecting network error conditions and reporting on them. ICMP reports on: Flow control: When datagrams arrive too fast for processing, the receiver sends message to the sender to stop sending. Connectivity failure: When a destination host can't be reached. Redirection: Which tells a sending host to use another router. Checking remote hosts: ping server ===> server is alive.

Network Access Layer ( Data Link Layer) It provides error control and framing of the datagram. It ensures the reliable delivery of data across the underlying physical network. It encompasses the function of the physical layer by specifying the characteristics of the hardware to be used for the network. In this layer TCP/IP describes hardware standards such as IEEE802.3, the specification for Ethernet network media, and RS- 232, the specification for standard pin connector for PPP communication link.