© 2009 Pearson Education, Inc. Publishing as Prentice Hall Network Standards Chapter 2 Updated January 2009 Raymond Panko’s Business Data Networks and.

Slides:



Advertisements
Similar presentations
20.1 Chapter 20 Network Layer: Internet Protocol Copyright © The McGraw-Hill Companies, Inc. Permission required for reproduction or display.
Advertisements

Intermediate TCP/IP TCP Operation.
Network Standards Layered Architectures Chapter 2 Updated January 2007 Panko’s Business Data Networks and Telecommunications, 6th edition Copyright 2007.
Chapter 2 1 Panko and Panko Business Data Networks and Telecommunications, 8 th Edition © 2011 Pearson Education, Inc. Publishing as Prentice Hall.
1 William Stallings Data and Computer Communications 7 th Edition Chapter 2 Protocols and Architecture.
Module A.  This is a module that some teachers will cover while others will not  This module is a refresher on networking concepts, which are important.
Networking Theory (Part 1). Introduction Overview of the basic concepts of networking Also discusses essential topics of networking theory.
Network Standards Layered Architectures
Data Communications Architecture Models. What is a Protocol? For two entities to communicate successfully, they must “speak the same language”. What is.
William Stallings Data and Computer Communications 7 th Edition Chapter 2 Protocols and Architecture.
Ch 23 1 Based on Data Communications and Networking, 4th Edition. by Behrouz A. Forouzan, McGraw-Hill Companies, Inc., 2007 Ameera Almasoud.
COE 342: Data & Computer Communications (T042) Dr. Marwan Abu-Amara Chapter 2: Protocols and Architecture.
 The Open Systems Interconnection model (OSI model) is a product of the Open Systems Interconnection effort at the International Organization for Standardization.
Gursharan Singh Tatla Transport Layer 16-May
Lecturer: Tamanna Haque Nipa
The OSI and TCP/IP Models Last Update Copyright 2009 Kenneth M. Chipps Ph.D.
Process-to-Process Delivery:
1 Standards Chapter 2 Copyright 2003 Prentice-Hall Panko’s Business Data Networks and Telecommunications, 4 th edition.
© 2009 Pearson Education, Inc. Publishing as Prentice Hall Network Standards Layered Architectures Chapter 2 Panko’s Business Data Networks and Telecommunications,
© 2009 Pearson Education, Inc. Publishing as Prentice Hall Network Standards Chapter 2 Raymond Panko’s Business Data Networks and Telecommunications, 7th.
NetworkProtocols. Objectives Identify characteristics of TCP/IP, IPX/SPX, NetBIOS, and AppleTalk Understand position of network protocols in OSI Model.
Presentation on Osi & TCP/IP MODEL
Lecture 2 TCP/IP Protocol Suite Reference: TCP/IP Protocol Suite, 4 th Edition (chapter 2) 1.
What is a Protocol A set of definitions and rules defining the method by which data is transferred between two or more entities or systems. The key elements.
Protocol Architecture
Chapter 2 1 Panko and Panko Business Data Networks and Security, 9 th Edition © 2013 Pearson.
Characteristics of Communication Systems
© 2007 Cisco Systems, Inc. All rights reserved.Cisco Public ITE PC v4.0 Chapter 1 1 Network Services Networking for Home and Small Businesses – Chapter.
Computers Are Your Future Tenth Edition Chapter 8: Networks: Communicating & Sharing Resources Copyright © 2009 Pearson Education, Inc. Publishing as Prentice.
William Stallings Data and Computer Communications 7 th Edition Data Communications and Networks Overview Protocols and Architecture.
TCP/IP Essentials A Lab-Based Approach Shivendra Panwar, Shiwen Mao Jeong-dong Ryoo, and Yihan Li Chapter 5 UDP and Its Applications.
© 2007 Cisco Systems, Inc. All rights reserved.Cisco Public 1 Version 4.0 Network Services Networking for Home and Small Businesses – Chapter 6.
Mukesh N. Tekwani Elphinstone College Mumbai
Chapter 2 1 Panko and Panko Business Data Networks and Security, 9 th Edition © 2013 Pearson.
Chapter Three Network Protocols By JD McGuire ARP Address Resolution Protocol Address Resolution Protocol The core protocol in the TCP/IP suite that.
COS 338 Day 4. DAY 3 Agenda Questions? Write-up for Lab due next class Assignment 2 Posted Due on September 26 Assignment 1 Review 1 A, 1 B, 1 C, 2 D’s.
1 Standards Chapter 2 (Revised August 2002) Copyright 2003 Prentice-Hall Panko’s Business Data Networks and Telecommunications, 4 th edition.
1 LAN Protocols (Week 3, Wednesday 9/10/2003) © Abdou Illia, Fall 2003.
TCP: A Closer Look Transmission Control Protocol.
University of the Western Cape Chapter 12: The Transport Layer.
© 2009 Pearson Education, Inc. Publishing as Prentice Hall Network Standards Chapter 3 Updated January 2009 Raymond Panko’s Business Data Networks and.
1 Figure 3-2: TCP/IP Standards (Study Figure) Origins  Defense Advanced Research Projects Agency (DARPA) created the ARPANET  An internet connects multiple.
Network Standards Layered Architectures Chapter 2 Panko’s Business Data Networks and Telecommunications, 6th edition Copyright 2007 Prentice-Hall May only.
William Stallings Data and Computer Communications
Network Protocols and Standards (Part 2). The OSI Model In 1984, the International Organization for Standardization (ISO) defined a standard, or set of.
S305 – Network Infrastructure Chapter 5 Network and Transport Layers.
1 Chapters 2 & 3 Computer Networking Review – The TCP/IP Protocol Architecture.
© 2009 Pearson Education, Inc. Publishing as Prentice Hall Network Standards Chapter 2 Updated January 2009 Raymond Panko’s Business Data Networks and.
1 12-Jan-16 OSI network layer CCNA Exploration Semester 1 Chapter 5.
Enterprise Network Systems TCP Mark Clements. 3 March 2008ENS 2 Last Week – Client/ Server Cost effective way of providing more computing power High specs.
1 Review – The Internet’s Protocol Architecture. Protocols, Internetworking & the Internet 2 Introduction Internet standards Internet standards Layered.
Data Communication Network Models
Network Models. The OSI Model Open Systems Interconnection (OSI). Developed by the International Organization for Standardization (ISO). Model for understanding.
The OSI Model. Understanding the OSI Model In early 1980s, manufacturers began to standardize networking so that networks from different manufacturers.
Network Standards Layered Architectures Chapter 2 Panko’s Business Data Networks and Telecommunications, 6th edition Copyright 2007 Prentice-Hall May only.
What is a Protocol A set of definitions and rules defining the method by which data is transferred between two or more entities or systems. The key elements.
Layered Standards Architectures
Chapter 5 Network and Transport Layers
Chapter 2 Updated January 2009
Layered Architectures
Networking for Home and Small Businesses – Chapter 6
Standards Basics.
Networking Concepts Module A Copyright Pearson Prentice Hall 2013.
Networking for Home and Small Businesses – Chapter 6
Topic 5: Communication and the Internet
Process-to-Process Delivery:
Net 323 D: Networks Protocols
Network Architecture Models
Layered Standards Architectures
Networking for Home and Small Businesses – Chapter 6
Presentation transcript:

© 2009 Pearson Education, Inc. Publishing as Prentice Hall Network Standards Chapter 2 Updated January 2009 Raymond Panko’s Business Data Networks and Telecommunications, 7th edition May only be used by adopters of the book

© 2009 Pearson Education, Inc. Publishing as Prentice Hall : Network Standards Network Standards –Network standards govern the exchange of messages between hardware or software processes on different host computers, including message order, semantics, syntax, reliability, and connection orientation –Also known as protocols –Computers are not intelligent, so standards must be very rigid 2-2 Message

© 2009 Pearson Education, Inc. Publishing as Prentice Hall 1. Message Standards (Protocols) Message syntax Message semantics Message order

© 2009 Pearson Education, Inc. Publishing as Prentice Hall : Network Standards Network Standards Govern –Message Syntax (organization) Like human grammar, but more rigid Header, data field, and trailer (Figure 2-2) –Message order Turn taking, order of messages in a complex transaction, who must initiate communication, etc. –Message semantics (meaning) HTTP request message: “Please give me this file” HTTP response message: Here is the file. (Or, I could not comply for the following reason)

© 2009 Pearson Education, Inc. Publishing as Prentice Hall : General Message Organization General Message Syntax (Organization) –General Message Organization (Figure 2-4) –Primary parts of messages Data Field (content to be delivered) Header (everything before the data field) Trailer (everything after the data field) –The header and trailer act like a delivery envelope for the data field HeaderData FieldTrailer

© 2009 Pearson Education, Inc. Publishing as Prentice Hall : General Message Organization General Message Syntax (Organization) –Header and trailer are further divided into fields TrailerData FieldHeader Other Header Field Destination Address Field is Used by Switches and Routers Like the Address on an Envelope Message with all three parts

© 2009 Pearson Education, Inc. Publishing as Prentice Hall : General Message Organization Data FieldHeader Other Header Field Destination Address Field Message without a trailer

© 2009 Pearson Education, Inc. Publishing as Prentice Hall : General Message Organization Header Other Header Field Destination Address Field Message with only a header e.g. TCP supervisory messages are pure headers (there is no data field content to deliver)

© 2009 Pearson Education, Inc. Publishing as Prentice Hall 2. Reliability Error Detection and Correction

© 2009 Pearson Education, Inc. Publishing as Prentice Hall : Reliable Transmission Control Protocol (TCP) Session The Transmission Control Protocol (TCP) is an important standard in Internet transmission TCP –Receiver acknowledges each correctly-received TCP message (called a TCP segment) –If an acknowledgments is not received by the sender, the sender retransmits the TCP segment –This gives reliability: error detection AND error correction 2

© 2009 Pearson Education, Inc. Publishing as Prentice Hall : Reliable TCP Session Client PC TCP Process Webserver TCP Process 4. Data = HTTP Request 5. ACK (4) 6. Data = HTTP Response 7. ACK (6) Carry HTTP Req & Resp (4) Request-Response Cycle for Data Transfer TCP Segment (Message) 4 Carries an HTTP Request Segment 5 Acknowledges It There Is No Need to Resend 1

© 2009 Pearson Education, Inc. Publishing as Prentice Hall : Reliable TCP Session Client PC TCP Process Webserver TCP Process Carry HTTP Req & Resp (4) 8. Data = HTTP Request (Error) 8. Data = Retransmits HTTP Request because No ACK was received 9. ACK (8) Error Handling 3 No receipt, so so no ACK

© 2009 Pearson Education, Inc. Publishing as Prentice Hall Unreliable Protocols HTTP is an unreliable protocol –If an HTTP message is lost, there is no retransmission Some protocols detect errors, dropping incorrect messages –There is no retransmission, so these protocols are unreliable –There must be both error detection and error correction for a protocol to be reliable 2-13 Message

© 2009 Pearson Education, Inc. Publishing as Prentice Hall 3. Connection-Oriented and Connectionless Protocols

© 2009 Pearson Education, Inc. Publishing as Prentice Hall : Connection-Oriented and Connectionless Protocols Client PC TCP Process Webserver TCP Process Connection-Opening Messages Time Connection-Closing Messages Messages During the Connection In TCP Connection-oriented protocols have formal openings and closings, like human telephone calls

© 2009 Pearson Education, Inc. Publishing as Prentice Hall : Connection-Oriented and Connectionless Protocols Message (No Sequence Number) Connectionless Protocol AB Message with Sequence Number A1 Message with Sequence Number A2 Close Connection Connection-Oriented Protocol Open Connection AB Message with Sequence Number B1 Connectionless protocols, like HTTP simply send messages without prior connection openings and without subsequent connection closings Connection-oriented protocols give each message a unique sequence number 4

© 2009 Pearson Education, Inc. Publishing as Prentice Hall : Advantages and Disadvantages of Connection-Oriented Protocols Advantages –Connection-oriented protocols give each message a sequence number Thanks to sequence numbers, the parties can tell when a message is lost (There will be a gap in the sequence numbers) Error messages, such as ACKs, can refer to specific messages according to the sequence numbers of these messages –Long messages can be fragmented into many smaller messages that can fit inside of packets The fragments will be given sequence numbers so that they can be assembled at the other end Fragmentation followed by reassembly is an important concept in networking

© 2009 Pearson Education, Inc. Publishing as Prentice Hall : Advantages and Disadvantages of Connection- Oriented Protocols Disadvantages –Connection-oriented protocols place a heavy load on networks and on computers connected to the Internet For example, we will see in Chapter 8 that it takes about 7 messages to open and close a connection This is high overhead if only one or two content messages will be sent during a connection. –Connections-oriented protocols require more processing time on each host Error detection and correction take up many processing cycles for each message

© 2009 Pearson Education, Inc. Publishing as Prentice Hall 4. The Hybrid TCP/IP-OSI Standards Architecture

© 2009 Pearson Education, Inc. Publishing as Prentice Hall Building Architectures Develop plan for what rooms a building they will have and how they will be related physically Afterward, define individual rooms 2-20 Living Room Kitchen Bathroom Master Bedroom Bedroom 2 Bedroom 3 Bathroom

© 2009 Pearson Education, Inc. Publishing as Prentice Hall 2-21 Standards Architecture A Standards Architecture Is a Broad Plan for Creating Standards –Break the problem into smaller pieces for ease of development –Develop standards for the individual pieces Assign individual standards to specialists in each area –The dominant architecture today is the hybrid TCP/IP- OSI standards architecture shown in the next slide

© 2009 Pearson Education, Inc. Publishing as Prentice Hall2-22 Figure 2-8: Hybrid TCP/IP-OSI Architecture General Purpose (Core Layer) LayerSpecific Layer Purpose Application-application communication Application (5)Application-application interworking Transmission of a packet across an internet Transport (4)Host-host communication Internet (3)Packet delivery across an internet Transmission of a frame across a single network (switched or wireless LAN or WAN) Data Link (2)Frame delivery across a network Physical (1)Device-device connection

© 2009 Pearson Education, Inc. Publishing as Prentice Hall : Physical and Data Link Layer Standards in a Switched or Wireless Network A physical link is a connection between two devices: A-X1 (host-switch), X1-X2 (switch-switch), X2-R1 (switch-router) 1 A data link is a frame’s path though a single switched or wireless network: A-R1 (host-router)

© 2009 Pearson Education, Inc. Publishing as Prentice Hall : Internet and Data Link Layers in a Routed Network A data link is a frame’s path through a single switched network. There are individual switched or wireless networks in the figure, so there are three data links A route is a packet’s path all the way through the internet. There always is a single route because there is only one packet 1

© 2009 Pearson Education, Inc. Publishing as Prentice Hall : Internet and Data Link Layers in a Routed Network Host B Host A Network X Network Y Network Z R1 R2 Data Link A-R1 Data Link R3-B Data Link R1-R2 Route A-B 3 Data Links: One per Network A simplified view 3 1 Route through the internet

© 2009 Pearson Education, Inc. Publishing as Prentice Hall : Internet and Data Link Layers in a Routed Network Host A Mobile Client Station Server Station Switch X2 Switch X1 Switch Data Link A-R1 Router R1 Packet Frame X Network X Route A-B In Network X: Two destination addresses: Packet: Host B (destination host) Frame: Router R1

© 2009 Pearson Education, Inc. Publishing as Prentice Hall : Internet and Data Link Layers in a Routed Network Router R1 Router R2 Packet Frame Y To Network X To Network Z Network Y Data Link R1-R2 Route A-B In Network Y: Two destination addresses: Packet: Host B (destination host) Frame: Router R2

© 2009 Pearson Education, Inc. Publishing as Prentice Hall : Internet and Data Link Layers in a Routed Network Host B Mobile Client Stations Switch Z1 Switch X2 Switch Z2 Packet Frame Z Network Z Router R2 Router Data Link R2-B In Network Z: Two destination addresses: Packet: Host B (destination host) Frame: Host B

© 2009 Pearson Education, Inc. Publishing as Prentice Hall 2-29 Figure 2-10: Internet and Data Link Layers in an Internet Internet and Transport Layers –An internet is a group of switched or wireless networks connected by routers so that any application on any host on any network can communicate with any application on any other host on any other network –Internet and transport layer standards govern communication across an internet composed of two or more switched or wireless networks

© 2009 Pearson Education, Inc. Publishing as Prentice Hall : Internet and Transport Layers Standards The internet layer carries packets on the route between the two hosts, across a series of routers. There will be many hops across pairs of routers, so internet layer protocols are kept very simple to reduce cost The transport layer adds functionality for the two hosts to talk with each other to fix errors and do other things 1

© 2009 Pearson Education, Inc. Publishing as Prentice Hall : Internet and Transport Layers Standards The internet layer carries packets on the route between the two hosts, across a series of routers. There will be many hops across pairs of routers, so internet layer protocols are kept very simple to reduce cost The transport layer adds functionality for the two hosts to talk with each other to fix errors and do other things 1 Transport Layer End-to-End (Host-to-Host) TCP is reliable and connection-oriented UDP is unreliable and connectionless Internet Layer Hop-by-Hop (Router to Router) IP is connectionless and unreliable

© 2009 Pearson Education, Inc. Publishing as Prentice Hall : Application Layer Standards Application Layer Standards –Govern how two applications work with each other, even if they are from different vendors There are many application layer standards because there are many applications –World Wide Web (HTTP) – (SMTP, POP, etc.) –FTP (FTP) –Database (ODBC) –Etc. –There are more application layer standards than any other type of standards

© 2009 Pearson Education, Inc. Publishing as Prentice Hall 2-33 Standards Layers: Recap Application (5) Transport (4) Internet (3) Data Link (2) Physical (1) Be able to repeat this in your sleep! Be able to repeat this in your sleep!

© 2009 Pearson Education, Inc. Publishing as Prentice Hall 5. Syntax Examples: Ethernet and IP

© 2009 Pearson Education, Inc. Publishing as Prentice Hall Syntax How Messages are Organized –Usually organized as a succession of parts called fields –Fields are a few or many bits long 2-35 Field 1 Field 2 Field 3 Field 4 Field 5 Field 6

© 2009 Pearson Education, Inc. Publishing as Prentice Hall 2-36 Octets Field length may be measured in bits Field length also may be measured in octets An octet is a group of eight bits In computer science, an octet is called a byte Octet = 8 Bits

© 2009 Pearson Education, Inc. Publishing as Prentice Hall 2-37 Figure 2-11: Ethernet Frame Preamble (7 octets) Start of Frame Delimiter (1 octet) Destination MAC Address (48 bits) Source MAC Address (48 bits) Length (2 octets) LLC Subheader (7 octets) Packet (usually IP Packet) (variable) PAD (variable) Frame Check Sequence (4 octets) Start End Data Field This is an Ethernet Frame The address fields give the Ethernet addresses of the source and destination hosts Each address is 48-bits long Ethernet addresses are called MAC addresses

© 2009 Pearson Education, Inc. Publishing as Prentice Hall 2-38 Figure 2-11: Ethernet Frame Preamble (7 octets) Start of Frame Delimiter (1 octet) Destination MAC Address (48 bits) Source MAC Address (48 bits) Length (2 octets) LLC Subheader (7 octets) Packet (usually IP Packet) (variable) PAD (variable) Frame Check Sequence (4 octets) Start End Data Field The Ethernet frame usually contains an IP address in its data field

© 2009 Pearson Education, Inc. Publishing as Prentice Hall 2-39 Figure 2-11: Ethernet Frame Preamble (7 octets) Start of Frame Delimiter (1 octet) Destination MAC Address (48 bits) Source MAC Address (48 bits) Length (2 octets) LLC Subheader (7 octets) Packet (usually IP Packet) (variable) PAD (variable) Frame Check Sequence (4 octets) Start End Data Field The sender computes a value and puts it in the Frame Check Sequence Field The sender does the same calculation. If its value matches the transmitted value, the frame is OK If the value is different, an error has occurred. The receiver drops the frame. Ethernet is not reliable

© 2009 Pearson Education, Inc. Publishing as Prentice Hall : Internet Protocol (IP) Packet Bit 0Bit 31 Version Number (4 bits) Header Length (4 bits) Diff-Serv (8 bits) Total Length (16 bits) Identification (16 bits)Flags (3 bits) Fragment Offset (13 bits) Time to Live (8 bits)Protocol (8 bits)Header Checksum (16 bits) Source IP Address (32 bits) Destination IP Address (32 bits) Options (if any)Padding (to 32-bit boundary) Data Field (dozens, hundreds, or thousands of bits) Often contains a TCP segment The IP packet is a long string of bits It is drawn 32 bits on a line The first line is bits 0 through 31 (binary counting starts at zero) The next line is bits 32 through 63

© 2009 Pearson Education, Inc. Publishing as Prentice Hall : Internet Protocol (IP) Packet Bit 0Bit 31 Version Number (4 bits) Header Length (4 bits) Diff-Serv (8 bits) Total Length (16 bits) Identification (16 bits)Flags (3 bits) Fragment Offset (13 bits) Time to Live (8 bits)Protocol (8 bits)Header Checksum (16 bits) Source IP Address (32 bits) Destination IP Address (32 bits) Options (if any)Padding (to 32-bit boundary) Data Field (dozens, hundreds, or thousands of bits) Often contains a TCP segment The receiver uses the header checksum field to check for errors If an error is found, the receiver discards the packet As in Ethernet, there is no retransmission, so IP is not reliable

© 2009 Pearson Education, Inc. Publishing as Prentice Hall : Internet Protocol (IP) Packet Bit 0Bit 31 Version Number (4 bits) Header Length (4 bits) Diff-Serv (8 bits) Total Length (16 bits) Identification (16 bits)Flags (3 bits) Fragment Offset (13 bits) Time to Live (8 bits)Protocol (8 bits)Header Checksum (16 bits) Source IP Address (32 bits) Destination IP Address (32 bits) Options (if any)Padding (to 32-bit boundary) Data Field (dozens, hundreds, or thousands of bits) Often contains a TCP segment The source and destination IP addresses are each 32 bits long

© 2009 Pearson Education, Inc. Publishing as Prentice Hall : Internet Protocol (IP) Packet Bit 0Bit 31 Version Number (4 bits) Header Length (4 bits) Diff-Serv (8 bits) Total Length (16 bits) Identification (16 bits)Flags (3 bits) Fragment Offset (13 bits) Time to Live (8 bits)Protocol (8 bits)Header Checksum (16 bits) Source IP Address (32 bits) Destination IP Address (32 bits) Options (if any)Padding (to 32-bit boundary) Data Field (dozens, hundreds, or thousands of bits) Often contains a TCP segment The data field usually contains a TCP segment or UDP datagram

© 2009 Pearson Education, Inc. Publishing as Prentice Hall 6. Reliability Options at the Transport Layer TCP versus UDP

© 2009 Pearson Education, Inc. Publishing as Prentice Hall : Why Not Make All Layers Reliable? Reliability Is Expensive –When errors are rare (in hops between routers and switches), the cost is not justified –Switches and routers would be much more expensive if they did hop-by-hop error correction –There are many switch and router hops, so doing error correction between hops would be very expensive –Error correction at the transport layer corrects errors made at lower layers, making correction at lower layer unnecessary as well as expensive

© 2009 Pearson Education, Inc. Publishing as Prentice Hall : Why Not Make All Layers Reliable? Why Does Doing Error Correction at the Transport Layer Make Sense? First, –There are only two transport processes: one on the source host, one on the destination host –So error correction has to be done only once, keeping cost low Second, –The transport process is just below the application layer –So doing error correction at the transport layer frees the application layer from doing error correction 2

© 2009 Pearson Education, Inc. Publishing as Prentice Hall : TCP and UDP at the Transport Layer Not all applications need reliability –Voice over IP cannot wait for lost or damaged packets to be retransmitted –Network management protocols need to place as low a burden on the network as possible –Both types of applications use the simpler User Datagram Protocol (UDP) instead of TCP

© 2009 Pearson Education, Inc. Publishing as Prentice Hall : TCP and UDP at the Transport Layer ComparisonTCPUDP LayerTransport* Connection-orientation?Connection- oriented Connectionless Reliable?ReliableUnreliable Burden on the two hostsHighLow Traffic burden on the networkHighLow *Note: TCP and UDP are the only transport-layer protocols

© 2009 Pearson Education, Inc. Publishing as Prentice Hall 7. Vertical Communication Between Layer Processes on the Same Host

© 2009 Pearson Education, Inc. Publishing as Prentice Hall : Layered Communication on the Source Host Each layer requires a process (hardware) or software) on the host In this section, we will see how these layer processes work together on the source and destination hosts, beginning with the source host

© 2009 Pearson Education, Inc. Publishing as Prentice Hall : Layered Communication on the Source Host Application Process HTTP Message Transport Process Passes Message Down to Transport Process The process begins when a browser creates an HTTP request message 2 HTTP Message Fragment 1 If the application message is long, the transport process will first fragment it into fragments small enough to fit into single packets HTTP Message Fragment 2 HTTP Message Fragment 3 New Not in the Book

© 2009 Pearson Education, Inc. Publishing as Prentice Hall : Layered Communication on the Source Host Transport Process HTTP Message TCP Hdr For TCP, The transport process encapsulate each HTTP message In the data field of a TCP message (TCP segment) by adding a TCP header 2

© 2009 Pearson Education, Inc. Publishing as Prentice Hall : Layered Communication on the Source Host When a layer process (N) creates a message, it passes it down to the next- lower-layer process (N-1) immediately The receiving process (N-1) will encapsulate the Layer N message, that is, place it in the data field of its own (N-1) message

© 2009 Pearson Education, Inc. Publishing as Prentice Hall : Layered Communication on the Source Host Transport Process HTTP Message Internet Process TCP Hdr HTTP Message TCP Hdr 1 The transport process then passes the message down to the internet layer process IP Hdr The internet layer process encapsulates The TCP segment in the data field of an IP Packet

© 2009 Pearson Education, Inc. Publishing as Prentice Hall : Layered Communication on the Source Host Internet Process HTTP Message TCP Hdr IP Hdr Data Link Process HTTP Message TCP Hdr IP Hdr Eth Hdr Eth Trlr Encapsulation of IP Packet in Data Field of Ethernet Frame 1

© 2009 Pearson Education, Inc. Publishing as Prentice Hall : Layered Communication on the Source Host Data Link Process HTTP Message TCP Hdr IP Hdr Eth Hdr Eth Trlr Physical Process Physical Layer converts the bits of the frame into signals. There are no messages at the physical layer, so there is no encapsulation at the physical layer The data link process passes the frame down to the physical layer 1

© 2009 Pearson Education, Inc. Publishing as Prentice Hall : Layered Communication on the Source Host Recap

© 2009 Pearson Education, Inc. Publishing as Prentice Hall : Layered Communication on the Source Host The following is the final frame for an HTTP message on an Ethernet LAN HTTP Message TCP Hdr IP Hdr Eth Hdr Eth Trlr L5L4L3L2 Notice the Pattern: From Right to Left: L2, L3, L4, L5, maybe L2 Start with the highest-layer message (in this case, 5) Add headers for each lower layer (L4, L3, and L2, in this case) Don’t forget the possible trailing L2 trailer 4

© 2009 Pearson Education, Inc. Publishing as Prentice Hall : Decapsulation on the Destination Host

© 2009 Pearson Education, Inc. Publishing as Prentice Hall : Layered End-to-End Communication Encapsulation and decapsulation also occurs on each switch and router along the way In switches, the highest layer is the data link layer, so switches are called Layer 2 devices On routers, the highest layer is the internet layer, So routers are called Layer 3 devices

© 2009 Pearson Education, Inc. Publishing as Prentice Hall 2-61 Figure 2-18: Layered Message Exchange Initiated at the Internet Layer The application layer process does not always initiate communication In ICMP, the internet layer initiates the communication and so is the highest layer

© 2009 Pearson Education, Inc. Publishing as Prentice Hall : Combining Horizontal and Vertical Communication Horizontal communication using protocols lets processes talk to their peers on other hosts, switches, or routers Vertical communication links processes on the same device Horizontal and vertical communication work together to provide message delivery

© 2009 Pearson Education, Inc. Publishing as Prentice Hall 8. OSI, TCP/IP, and Other Standards Architectures

© 2009 Pearson Education, Inc. Publishing as Prentice Hall : The Hybrid TCP/IP-OSI Architecture Broad PurposeTCP/IPOSIHybrid TCP/IP-OSI ApplicationsApplicationApplication (Layer 7)Application (Layer 5) Presentation (Layer 6) Session (Layer 5) InternetworkingTransportTransport (Layer 4)TCP/IP Transport Layer (Layer 4) InternetNetwork (Layer 3)TCP/IP Internet Layer (Layer 3) Communication within a single switched LAN or WAN Use OSI Standards Here Data Link (Layer 2)Data Link (OSI) Layer (Layer 2) Physical (Layer 1)Physical OSI Layer (Layer 1) The TCP/IP-OSI Architecture draw its standards from two different Standards architectures—TCP/IP and OSI

© 2009 Pearson Education, Inc. Publishing as Prentice Hall : The Hybrid TCP/IP-OSI Architecture Dominance: –The Hybrid TCP/IP-OSI Architecture governs the Internet and dominates internal corporate internets –OSI standards dominate the physical and data link layers (which govern communication within individual networks) almost exclusively. OSI has 100% dominance at this layer –TCP/IP dominates the internet and transport layer in internetworking and governs 80% to 90% percent of all corporate traffic above the data link layer

© 2009 Pearson Education, Inc. Publishing as Prentice Hall 2-66 Figure 2-21: OSI and TCP/IP OSITCP/IP Standards Agency or Agencies ISO (International Organization for Standardization) ITU-T (International Telecommunications Union– Telecommunications Standards Sector) IETF (Internet Engineering Task Force) DominanceNearly 100% at physical and data link layers 80% to 90% at the internet and transport layers Documents Are Called VariousMostly RFCs (requests for comments)

© 2009 Pearson Education, Inc. Publishing as Prentice Hall : OSI and TCP/IP Notes: –Do not confuse OSI (the architecture) with ISO (the organization) –The acronyms for ISO and ITU-T do not match their names, but these are the official names and acronyms

© 2009 Pearson Education, Inc. Publishing as Prentice Hall : OSI Layers Layer Number OSI NamePurposeUse 1PhysicalPhysical connections between adjacent devices Nearly 100% dominant 2Data LinkEnd-to-end transmission in a single switched network. Frame organization. Switch operation Nearly 100% dominant 3NetworkGenerally equivalent to the TCP/IP internet layer. However, OSI network layer standards are not compatible with TCP/IP internet layer standards Rarely used 4TransportGenerally equivalent to the TCP/IP transport layer. However, OSI transport layer standards are not compatible with TCP/IP transport layer standards Rarely used Although Layers 3 and 4 are architecturally Similar in TCP/IP and OSI, individual standards from the two architectures are not compatible at these layers Again, OSI Layers 1 and 2 Are almost universally used

© 2009 Pearson Education, Inc. Publishing as Prentice Hall : OSI Layers Layer Number OSI NamePurposeUse 5SessionInitiates and maintains a connection between application programs on different computers If a session is broken, only have to go back to the last rollback point Brilliant idea, but few applications need it and those that do have their own methods for managing sessions Rarely used 6PresentationDesigned to handle data formatting differences, data compression, and data encryption In practice, a category for general file format standards used in multiple applications Rarely used as a layer. However, many file format standards are assigned to this layer. 7ApplicationGoverns remaining application-specific matters Some OSI applications are used

© 2009 Pearson Education, Inc. Publishing as Prentice Hall : Other Major Standards Architectures IPX/SPX –Used by older Novell NetWare file servers for file and print service –Sometimes used in newer Novell NetWare file servers for consistency with older NetWare servers SNA (Systems Network Architecture) –Used by older IBM mainframe computers AppleTalk –Used by Apple Macintosh desktops and notebooks to talk to Macintosh servers

© 2009 Pearson Education, Inc. Publishing as Prentice Hall : Characteristics of Protocols Discussed in this Chapter LayerProtocolConnection- Oriented or Connectionless? Reliable or Unreliable? 5 (Application)HTTPConnectionlessUnreliable 4 (Transport)TCPConnection- oriented Reliable 4 (Transport)UDPConnectionlessUnreliable 3 (Internet)IPConnectionlessUnreliable 2 (Data Link)EthernetConnectionlessUnreliable

© 2009 Pearson Education, Inc. Publishing as Prentice Hall 9. Topics Covered

© 2009 Pearson Education, Inc. Publishing as Prentice Hall 2-73 Network Standards The Core of Networking Network Standards Govern –Message order (turn taking, etc.) –Message syntax (structure of messages) Header, data field, trailer Header is subdivided into header fields –Message semantics (meaning) –Reliable or unreliable operation Requires both error detection AND error correction –Connection-oriented or connectionless operation

© 2009 Pearson Education, Inc. Publishing as Prentice Hall 2-74 Architectures Hybrid TCP/IP-OSI Architecture –Layer 5: Application –Layer 4: Transport –Layer 3: Internet –Layer 2: Data Link –Layer 1: Physical Connections –Layer 1: Physical link between adjacent devices –Layer 2: Data link through a single switched network –Layer 3: route through a routed network (internet)

© 2009 Pearson Education, Inc. Publishing as Prentice Hall 2-75 Architectures Hybrid TCP/IP-OSI Architecture –OSI is nearly 100% dominant at Layers 1 and 2 –TCP/IP is 70% to 80% dominant at Layers 3 and 4 –Situation at Layer 5 is complex

© 2009 Pearson Education, Inc. Publishing as Prentice Hall 2-76 Syntax Examples Ethernet Frame –48-bit MAC address fields –Error detection and discarding; not reliable –Carries a packet in its data field Internet Protocol (IP) Packet –32-bit IP address fields –Error detection and discarding; not reliable –Usually carries a TCP or UDP message in its data field –Can also carry an ICMP message

© 2009 Pearson Education, Inc. Publishing as Prentice Hall 2-77 TCP and UDP The Only Protocols at the Transport Layer TCP is Reliable –Reliability is expensive –TCP fixes errors at all lower layers, giving the application process clean data –Error correction only has to be done once, on the source and destination hosts UDP is Unreliable –Low burden on the network and hosts –Useful if application cannot use reliability or prefers not to use it

© 2009 Pearson Education, Inc. Publishing as Prentice Hall 2-78 Vertical Communication

© 2009 Pearson Education, Inc. Publishing as Prentice Hall 2-79 Vertical and Horizontal Communication

© 2009 Pearson Education, Inc. Publishing as Prentice Hall2-80 All rights reserved. No part of this publication may be reproduced, stored in a retrieval system, or transmitted, in any form or by any means, electronic, mechanical, photocopying, recording, or otherwise, without the prior written permission of the publisher. Printed in the United States of America. Copyright © 2009 Pearson Education, Inc. Copyright © 2009 Pearson Education, Inc. Publishing as Prentice Hall