Architectures. Many tasks involved in encoding, protecting and transmitting user application data as bit stream. Network Architecture is how tasks are.

Slides:



Advertisements
Similar presentations
Layer 1 of the TCP/IP protocol stack: Network Access Layer (NAL). Functions, performed on the layer. МАС address in Ethernet networks. Layer 1 of the TCP/IP.
Advertisements

Data Communications System By Ajarn Preecha Pangsuban.
1 William Stallings Data and Computer Communications 7 th Edition Chapter 2 Protocols and Architecture.
PROTOCOLS AND ARCHITECTURE Lesson 2 NETS2150/2850.
Chapter 2: Protocols and Architecture
1ISM - © 2010 Houman Younessi Lecture 5 Convener: Houman Younessi Information Systems Spring 2011.
Protocols and the TCP/IP Suite Chapter 4 (Stallings Book)
OSI Model MIS 416 – Module II Spring 2002 Networking and Computer Security.
Protocols and the TCP/IP Suite
Chapter 1 Read (again) chapter 1.
Computer Network Architecture and Programming
EE 4272Spring, 2003 Protocols & Architecture A Protocol Architecture is the layered structure of hardware & software that supports the exchange of data.
1 Review of Important Networking Concepts Introductory material. This module uses the example from the previous module to review important networking concepts:
William Stallings Data and Computer Communications 7 th Edition Chapter 2 Protocols and Architecture.
ECS 152A 1. Introduction. A Communications Model Source —generates data to be transmitted Transmitter —Converts data into transmittable signals Transmission.
Network Architectures Week 3 – OSI and The Internet.
COE 342: Data & Computer Communications (T042) Dr. Marwan Abu-Amara Chapter 2: Protocols and Architecture.
Chapter 2 Network Models.
Microcomputer Networking II St. Cloud State University MCS 426, Fall 1999 Instructor: Adomas Svirskas The ISO/OSI Reference Model The Model Functionality.
The OSI Model A layered framework for the design of network systems that allows communication across all types of computer systems regardless of their.
 The Open Systems Interconnection model (OSI model) is a product of the Open Systems Interconnection effort at the International Organization for Standardization.
OIS Model TCP/IP Model.
Lecturer: Tamanna Haque Nipa
1 Review of Important Networking Concepts Introductory material. This slide uses the example from the previous module to review important networking concepts:
OSI Model Honolulu Community College Cisco Academy Training Center
Presentation on Osi & TCP/IP MODEL
What is a Protocol A set of definitions and rules defining the method by which data is transferred between two or more entities or systems. The key elements.
Protocol Architectures. Simple Protocol Architecture Not an actual architecture, but a model for how they work Similar to “pseudocode,” used for teaching.
Protocols and the TCP/IP Suite
Internet Addresses. Universal Identifiers Universal Communication Service - Communication system which allows any host to communicate with any other host.
William Stallings Data and Computer Communications 7 th Edition Data Communications and Networks Overview Protocols and Architecture.
Computer Networks (CS 132/EECS148) General Networking Example Karim El Defrawy Donald Bren School of Information and Computer Science University of California.
Service Primitives Six service primitives that provide a simple connection-oriented service 4/23/2017
Department of Electronic Engineering City University of Hong Kong EE3900 Computer Networks Introduction Slide 1 A Communications Model Source: generates.
Data and Computer Communications Chapter 2 – Protocol Architecture, TCP/IP, and Internet-Based Applications.
Network Protocol Hierarchies
OSI Model. Topics What is the OSI Model? What is a Protocol? Why 7 Layers? The 7 Layers – Application – Presentation – Session – Transport – Network –
Spring 2006Computer Networks1 Chapter 2 Network Models.
2.1 Chapter 2 Network Models Copyright © The McGraw-Hill Companies, Inc. Permission required for reproduction or display.
MODULE I NETWORKING CONCEPTS.
Chapter 15 – Part 2 Networks The Internal Operating System The Architecture of Computer Hardware and Systems Software: An Information Technology Approach.
William Stallings Data and Computer Communications
Network Protocols and Standards (Part 2). The OSI Model In 1984, the International Organization for Standardization (ISO) defined a standard, or set of.
1 ECEN “Internet Protocols and Modeling”, Spring 2011 Slide 5.
Department of Electronic Engineering City University of Hong Kong EE3900 Computer Networks Protocols and Architecture Slide 1 Use of Standard Protocols.
Network Models.
Protocols Used for communications between entities in a system Used for communications between entities in a system Must speak the same language Must speak.
Lecture # 02 Network Models Course Instructor: Engr. Sana Ziafat.
Communication Architecture and Network Protocol Layering Networks and Protocols Prepared by: TGK First Prepared on: Last Modified on: Quality checked by:
OSI ARCHITECTURE IN OSI, ACTUAL INFORMATION IS OVERHEADED BY PROTOCOL LAYERS IF ALL SEVEN LAYERS ARE OVERHEADED, THEN AS LITTLE AS 15% OF THE TRANSMITTED.
1 Computer Communication & Networks Lecture 3 Layering and Protocol Stacks (contd.) Waleed Ejaz.
- 1 - DPNM Review of Important Networking Concepts J. Won-Ki Hong Dept. of Computer Science and Engineering POSTECH Tel:
TCP/IP Protocol Suite Suresh Kr Sharma 1 The OSI Model and the TCP/IP Protocol Suite Established in 1947, the International Standards Organization (ISO)
Network Models. The OSI Model Open Systems Interconnection (OSI). Developed by the International Organization for Standardization (ISO). Model for understanding.
Chapter 2: Protocols and Architecture COE 341: Data & Computer Communications (Term 061) Dr. Radwan E. Abdel-Aal.
Lecture # 02 Network Models Course Instructor: Engr. Sana Ziafat.
TUNALIData Communications1 Chapter 2 Protocols and Architecture.
Roadmap  Introduction to Basics  Computer Network – Components | Classification  Internet  Clients and Servers  Network Models  Protocol Layers.
OSI Model OSI MODEL. Communication Architecture Strategy for connecting host computers and other communicating equipment. Defines necessary elements for.
OSI Model OSI MODEL.
Network Models.
OSI model vs. TCP/IP MODEL
Layered Architectures
Lec 5 Layers Computer Networks Al-Mustansiryah University
Layer 1 of the TCP/IP protocol stack: Network Access Layer (NAL)
Chapter 3: Open Systems Interconnection (OSI) Model
1 TRANSMISSION CONTROL PROTOCOL / INTERNET PROTOCOL (TCP/IP) K. PALANIVEL Systems Analyst, Computer Centre Pondicherry University, Puducherry –
OSI Model OSI MODEL.
Chapter 2. Protocols and Architecture
Review of Important Networking Concepts
Presentation transcript:

Architectures. Many tasks involved in encoding, protecting and transmitting user application data as bit stream. Network Architecture is how tasks are grouped (into layers) –e.g, the number of layers and layer functionality.

Different architectures (eg. TCP, SNA, Decnet, ISO etc.) have different number, order and composition of layers. ISO and TCP/IP most frequently cited No ideal architecture - see Tanenbaum Also, requirements of architecture change with time

Terminology hosts (terminals, TEs) terminate all layers nodes (stations, exchanges, switches, routers or IMPs) lowest two or three. Nodes connected by channels (pairs, fibre, solid media, microwave, satellite, mobile links).

Standards documents define interface requirements - –not implementation. –interface between layers (up/down) or across. Documents refer to :- –Service Specification - the services provided by a layer to the layer above (up/down flows) –Layer Protocols - how entities at the same layer, but in different locations, exchange information (across)

–Information (data structures) passed between layers (up/down) in form of Service Data Units (SDUs). –Service provided by lower layers accessed at SAPs; addresses, port numbers, entry points etc.

Information passed across network is contained within PDUs (Protocol Data Units.) Protocols operate across the network between entities in logically linked peer layers. Service user (layer N+1) uses Service Primitives to indicate service required of layer N.

The provider (layer N) uses primitives to respond and request services from layer N- 1. If the layer protocol (across the network) is a Confirmed service there are four basic primitives; Confirmed set {request, indication, response, confirm} Unconfirmed and there are only two.

Primitives (abstract concept) used to communicate up/down stack and go between layers via SAPs. The generation of a primitive usually results in the release of a PDU. Primitive types dependent on service (CONS/CLNS).

Applications Layer - (AL) Provides communications services to user application processes which are not part of the model. Some entities in AL provide specific services (SASEs) –e.g MMS Others common services (CASEs). –e.g. ACSE

Components of AL are User Element (UE), which is the actual i/f between applications and the stack, CASEs and SASEs. AL Services accessed using primitives which are issued and accepted by user application. Issued through A- SAP and tagged as A- SOMETHING.request etc.

In AL, CONNECT is ASSOCIATE. ASSOCIATE creates logical link between peer entities in communicating ALs. After ASSOCIATE, specific service (SASE) identified as best suiting needs of user application. ASSOCIATE indicates , FTAM or whatever.

SASEs attempt to make individual properties of host machine OPEN - accessible to all not just similar marks. Files Systems : FTAM makes irrelevant the fact that accesses could be to Unix m/c, PC, IBM or whatever. ftp for UNIX m/cs only. FTAM makes all real file structures look like a standard (virtual) filestore; all remote file systems now look the same.

Machine Tools : MMS for communication within manufacturing environment (cells). All manufacturing devices are made to look the same (Virtual Manufacturing Devices, VMDs). Dialogue between them is standardised - MMS. Eg. Puma robot could talk MMS with any brand of remote machine tool. CIM

Terminals : With VT emulation all terminals/keyboards look the same. Thus 'Break' key made to look as though it works the same on every machine; 'cursor home' code sequence is the same, and so on Key word when referring to SASEs is VIRTUAL; key concept is OPEN - anything to anything.

The standardised descriptions of (virtually) everything are passed to the PL which codes them into a standard (transfer) syntax for transmission across the network. The coding may include compression etc but always includes ASN.1 type conversions.

P resentation Layer. Concerned with syntax (bit encoding) not semantics (L7) Usual topics, compression, encryption, fec etc - all about changing bit patterns. Main element of L6 however is ASN.1 - crops up "everywhere" - OSI, TCP/IP, GSM, INs, CIM etc. A standard (efficient?) way of encoding user messages into bits.

In OSI-RM, ASN.1 split between L7 and L6 - L7 parses user data into standard ASN.1 data structures. L6 encodes data structures. L6 takes in (at PSAP) HL descriptions of user data and outputs (as SSAP) an encoded bit stream.

The other presentation layer services to mention are, –Compression - frequency depended coding (Huffman), run length encoding and string encoding (Ziv Lempel). –Be aware of type differences and overall aim - ie. producing a reduced length bit stream. –Encryption - why needed, overview of principle but not detail. Result - indecipherable bit stream. –Fec - Add bits to bit stream in strategic places so that errors can be corrected not just detected.

Most common technique is Hamming - described in all the references. Any future encoding operations will be here, in L6

Session layer. Very controversial Many think it is not needed See notes for details –e.g. no session layer in TCP/IP architecture

Summary - L7-L5 Application Layer analyses user input - what does it mean? (semantics). Passes a description of user input to PL. Presentation Layer takes standardised descriptions and encodes it into bit stream (syntax) - abstract syntax (compressed, encrypted?) results.

Session Layer takes encoded bit stream and manages bit flow between “application processes”. The three layers are about data processing. Transport Layer (just above the network) now takes bit stream (modified by L5) and gets it ready for transmission.