ISO Layer Model Lecture 9 October 16, 2000. The Need for Protocols Multiple hardware platforms need to have the ability to communicate. Writing communications.

Slides:



Advertisements
Similar presentations
OSI Model OSI MODEL.
Advertisements

OSI Model OSI LAYER / MODEL.
Answers of Exercise 7 1. Explain what are the connection-oriented communication and the connectionless communication. Give some examples for each of the.
© 2007 Cisco Systems, Inc. All rights reserved.Cisco Public 1 Version 4.0 OSI Transport Layer Network Fundamentals – Chapter 4.
TCP/IP1 The Underlying Technologies. What is inside the Internet? Or What are the key underlying technologies that make it work so successfully? –Packet.
Networking Theory (Part 1). Introduction Overview of the basic concepts of networking Also discusses essential topics of networking theory.
1 Fall 2005 Protocols and layering Qutaibah Malluhi Computer Science and Engineering Qatar University.
Chapter 15 – Part 2 Networks The Internal Operating System The Architecture of Computer Hardware and Systems Software: An Information Technology Approach.
CSCI 4550/8556 Computer Networks
EE 4272Spring, 2003 Protocols & Architecture A Protocol Architecture is the layered structure of hardware & software that supports the exchange of data.
Data Communications Architecture Models. What is a Protocol? For two entities to communicate successfully, they must “speak the same language”. What is.
CS335 Networking & Network Administration Tuesday, April 20, 2010.
WXES2106 Network Technology Semester /2005 Chapter 8 Intermediate TCP CCNA2: Module 10.
TCP: Software for Reliable Communication. Spring 2002Computer Networks Applications Internet: a Collection of Disparate Networks Different goals: Speed,
Error Checking continued. Network Layers in Action Each layer in the OSI Model will add header information that pertains to that specific protocol. On.
 The Open Systems Interconnection model (OSI model) is a product of the Open Systems Interconnection effort at the International Organization for Standardization.
OIS Model TCP/IP Model.
SEPT, 2005CSI Part 2.2 Protocols and Protocol Layering Robert Probert, SITE, University of Ottawa.
Process-to-Process Delivery:
Protocol Layering Chapter 10. Looked at: Architectural foundations of internetworking Architectural foundations of internetworking Forwarding of datagrams.
1 Semester 2 Module 10 Intermediate TCP/IP Yuda college of business James Chen
Network Property and ISO Reference Model Network Ownership: Private and Public Connectionless Network and Connect-Oriented Network Network Performance.
Internet Addresses. Universal Identifiers Universal Communication Service - Communication system which allows any host to communicate with any other host.
Department of Electronic Engineering City University of Hong Kong EE3900 Computer Networks Introduction Slide 1 A Communications Model Source: generates.
1 Chapter 16 Protocols and Protocol Layering. 2 Protocol  Agreement about communication  Specifies  Format of messages (syntax)  Meaning of messages.
COMPUTER NETWORKS Ms. Mrinmoyee Mukherjee Assistant Professor
TCP Lecture 13 November 13, TCP Background Transmission Control Protocol (TCP) TCP provides much of the functionality that IP lacks: reliable service.
26-TCP Dr. John P. Abraham Professor UTPA. TCP  Transmission control protocol, another transport layer protocol.  Reliable delivery  Tcp must compensate.
University of the Western Cape Chapter 12: The Transport Layer.
Fundamentals of Computer Networks ECE 478/578 Lecture #19: Transport Layer Instructor: Loukas Lazos Dept of Electrical and Computer Engineering University.
TCP1 Transmission Control Protocol (TCP). TCP2 Outline Transmission Control Protocol.
Spring 2006Computer Networks1 Chapter 2 Network Models.
The Transmission Control Protocol (TCP) Application Services (Telnet, FTP, , WWW) Reliable Stream Transport (TCP) Connectionless Packet Delivery.
TCOM 509 – Internet Protocols (TCP/IP) Lecture 03_b Protocol Layering Instructor: Dr. Li-Chuan Chen Date: 09/15/2003 Based in part upon slides of Prof.
COP 4930 Computer Network Projects Summer C 2004 Prof. Roy B. Levow Lecture 3.
Chapter 15 – Part 2 Networks The Internal Operating System The Architecture of Computer Hardware and Systems Software: An Information Technology Approach.
William Stallings Data and Computer Communications
Lecture 4 Overview. Ethernet Data Link Layer protocol Ethernet (IEEE 802.3) is widely used Supported by a variety of physical layer implementations Multi-access.
Chapter 24 Transport Control Protocol (TCP) Layer 4 protocol Responsible for reliable end-to-end transmission Provides illusion of reliable network to.
Network Protocols and Standards (Part 2). The OSI Model In 1984, the International Organization for Standardization (ISO) defined a standard, or set of.
Open System Interconnection Describe how information from a software application in one computer moves through a network medium to a software application.
Chapter 16 Protocols and Layering. Network Communication Protocol an agreement that specifies the format and meaning of messages computers exchange Network.
Transmission Control Protocol (TCP) BSAD 146 Dave Novak Sources: Network+ Guide to Networks, Dean 2013.
Protocol Layering Chapter 11.
1 End-to-End Protocols User Datagram Protocol (UDP) Transmission Control Protocol(TCP)
IP1 The Underlying Technologies. What is inside the Internet? Or What are the key underlying technologies that make it work so successfully? –Packet Switching.
1 Protocols and Protocol Layering. 2 Protocol Agreement about communication Specifies –Format of messages –Meaning of messages –Rules for exchange –Procedures.
McGraw-Hill Chapter 23 Process-to-Process Delivery: UDP, TCP Copyright © The McGraw-Hill Companies, Inc. Permission required for reproduction or display.
TCP/IP1 Address Resolution Protocol Internet uses IP address to recognize a computer. But IP address needs to be translated to physical address (NIC).
TCP/IP Protocol Suite Suresh Kr Sharma 1 The OSI Model and the TCP/IP Protocol Suite Established in 1947, the International Standards Organization (ISO)
Process-to-Process Delivery:
The OSI Model. History of OSI Model ISO began developing the OSI model in It is widely accepted as a model for understanding network communication.
Computer Engineering and Networks, College of Engineering, Majmaah University Protocols OSI reference MODEL TCp /ip model Mohammed Saleem Bhat
Protocols and layering Network protocols and software Layered protocol suites The OSI 7 layer model Common network design issues and solutions.
OSI Model OSI MODEL. Communication Architecture Strategy for connecting host computers and other communicating equipment. Defines necessary elements for.
OSI Model OSI MODEL.
Chapter 7: Transport Layer
Ch 16 Protocols and Layering
(Ownership, Service Paradigm, Measures of Performance)
Click to edit Master subtitle style
Lecturer, Department of Computer Application
DEPARTMENT OF COMPUTER SCIENCE
Protocols and Layering
Process-to-Process Delivery:
OSI Model OSI MODEL.
Introduction and Overview
Protocols and Protocol Layering
Computer Networks Protocols
Protocols and Protocol Layering
Error Checking continued
Presentation transcript:

ISO Layer Model Lecture 9 October 16, 2000

The Need for Protocols Multiple hardware platforms need to have the ability to communicate. Writing communications code in this instance is non- portable (platform-dependent). Protocols provide a high-level interface method to the communications medium. The protocol itself is a set of rules by which the software and hardware must follow in order to communicate properly.

Need for Protocols (cont.) Multiple types of protocols exist. RS-232 is form of a protocol in the sense that strict rules must be followed for communication to occur between devices. Network protocols cover almost all communications between two or more computers. – Transferring an ASCII file – Point-to-point encryption

Protocol Suites A single, all-encompassing protocol is not only inefficient, but also wasteful on CPU, memory resources. Programmers have created smaller suites which provide the rule sets for communication within that protocol. The suites are also divided into smaller pieces, called layers.

The ISO Layer Model

Why the Layer Model? It is simple to visualize how software interacts with hardware. Topmost layer is closest to the user. Bottom layer is the furthest away from the user.

Layer Breakdown Layer 1: Physical – The physical network hardware, medium. Layer 2: Data Link – How data is organized into frames, and how to transmit those frames. Byte/bit stuffing, checksums. Layer 3: Network – How addresses are assigned, and how packets are transmitted from one end of the network to the other.

Layer Breakdown (cont.) Layer 4: Transport – How to reliably transfer data. Layer 5: Session – How to start sessions (connections) with remote devices, machines. (Sockets) Layer 6: Presentation – How to represent data. Does int, char replacements. Layer 7: Application – How one user-level program requests a connection to another machine, and how the machine responds.

Protocol Stacks The protocol is divided into modules. Each module corresponds to a different level in the layer model. All of the modules put together is the “stack.” Theoretically, a given module can only communicate with the module above and below it.

Stack Examples

Communication With Stacks

Stack Interaction Because the stack dictates how computers communicate, machines utilizing one type of stack cannot communicate with a machine running another type of stack. Netware v. TCP/IP But machines can concurrently run more than one stack!

Layering At each level where the packet is processes, additional information beyond the actual data is added or removed. At the Layer 2, a checksum is added before being sent to Layer 1. When the Layer 2 of the receiving machine receives the packet, it strips off the header and the checksum footer.

A Layered Frame

Protocol Dependent Information The previous picture is a general idea. Some protocols specify that all additional information must be appended instead of prepended, etc.

Layering Overhead Because the sending computer adds information to the frame, the receiving machine must undo the changes before the frame is passed to the next layer. Because layers must undo changes that the counterpart creates, code for the other layers can be independently created and updated without affecting the other layers!

Data At Each Layer

Protocol Optimization Techniques Protocols utilize different methods depending on the focus and goal of the protocol. Sequencing – To avoid out-of-order delivery – To avoid duplicate packets Packet Retransmission – When a packet is received, an ACK is sent back. If the ACK isn’t received by the transmitter, packet is resent. (Bound by time.)

Optimization Techniques (cont.) Avoiding Excessive Delay – Each transmission is assigned an ID. Packets must contain a valid ID to be accepted for a given “conversation.” p. 213 Flow Control to Avoid Overrun – Machines do no communicate at the same rate. – Sliding Window method.

The Sliding Window The sliding window concept greatly increases protocol throughput. All packets in a given “window” are sent sequentially, without waiting for an immediate ACK. Once all packets in a window have been sent, transmitter waits for all ACKs to be received before continuing on to next window.

Network Congestion If a single computer sends, no congestion on network link. If more than one computer sends, packet queuing must occur, so some congestion exists.

Network Congestion (cont.) If congestion persists over time, packets fill the switch’s memory, and will begin to be discarded. Retransmission can fix this problem, but if the congestion still exists when the retransmission occurs, those packets will also be discarded. This scenario is called congestion collapse.

Avoiding Congestion If a switch is having congestion, send a message back to the sender informing them of the congestion. Packet loss as an estimate of congestion. Rate control – Temporary rate reduction – Sliding window size reduction

Protocol Design Flow control vs. congestion control – Flow control sends more packets to improve throughput – Congestion control reduces the number of packets Sequence number – Too small, miscommunication, confusion – Too big, wasted bandwidth, overhead