Presentation is loading. Please wait.

Presentation is loading. Please wait.

2.1 Chapter 2 Network Models Copyright © The McGraw-Hill Companies, Inc. Permission required for reproduction or display.

Similar presentations


Presentation on theme: "2.1 Chapter 2 Network Models Copyright © The McGraw-Hill Companies, Inc. Permission required for reproduction or display."— Presentation transcript:

1 2.1 Chapter 2 Network Models Copyright © The McGraw-Hill Companies, Inc. Permission required for reproduction or display.

2 2.2 2-1 LAYERED TASKS We use the concept of layers in our daily life. As an example, let us consider two friends who communicate through postal mail. The process of sending a letter to a friend would be complex if there were no services available from the post office. Sender, Receiver, and Carrier Hierarchy Topics discussed in this section:

3 2.3 Figure 2.1 Tasks involved in sending a letter

4 2.4 2-2 THE OSI MODEL Established in 1947, the International Standards Organization (ISO) is a multinational body dedicated to worldwide agreement on international standards. An ISO standard that covers all aspects of network communications is the Open Systems Interconnection (OSI) model. It was first introduced in the late 1970s. Layered Architecture Peer-to-Peer Processes Encapsulation Topics discussed in this section:

5 2.5 ISO is the organization. OSI is the model. Note

6 Open Systems/ Interconnection (OSI) Each layer support the layers above it and offers services to the layers below Each layer performs unique and specific task A layer only has knowledge of its neighbour layers only A layer service is independent of the implementation Introduction to the OSI layer

7 An attempt for a framework for developing networking technologies OSI became a tool for explaining the Networking in general Before OSI was created people created their Software/Hardware as they wanted it to be. There was not any compatibility. Now OSI is used as a rule set for all vendors to create their Software/Hardware by using the standards. How OSI was created and how

8 Remember The OSI model is not a protocol; it is model for understanding and designing a network architecture that is flexible, robust and interoperable An open system is a model that allows any two different systems to communicate regardless of their underlying architecture (hardware or software). 2.8

9 2.9 Figure 2.2 Seven layers of the OSI model

10 2.10 Figure 2.3 The interaction between layers in the OSI model

11 2.11 Figure 2.4 An exchange using the OSI model

12 2.12 2-3 LAYERS IN THE OSI MODEL In this section we briefly describe the functions of each layer in the OSI model. Physical Layer Data Link Layer Network Layer Transport Layer Session Layer Presentation Layer Application Layer Topics discussed in this section:

13 Physical Layer The physical layer coordinates the functions required to transmit a bit stream over a physical medium. It also defines the procedures and functions that physical devices and interfaces have to perform for transmission occur. 2.13

14 2.14 Figure 2.5 Physical layer

15 2.15 The physical layer is responsible for movements of individual bits from one hop (node) to the next. Note

16 OSI REFERENCE The physical layer is concerned with the following: Physical characteristics of interfaces and media: The physical layer defines the characteristics of the interface between devices and the transmission media, including its type. Representation of the bits: the physical layer data consist of a stream of bits without any interpretation. To be transmitted, bits must be encoded into signals – electrical or optical-. The physical layer defines the type of encoding. Data rate: The physical layer defines the transmission rate, the number of bits sent each second. Data Transmission and Reception (half duplex, full duplex ) Topology and Physical Network Design (mesh, ring, bus) PDU: bit 2.16

17 2.17 Figure 2.6 Data link layer

18 2.18 The data link layer is responsible for moving frames from one hop (node) to the next. Note

19 2.19 Figure 2.7 Hop-to-hop delivery

20 DATA LINK LAYER The data link layer transforms the physical layer, a raw transmission facility, to a reliable link and is responsible for node-to-node delivery. It makes the physical layer appear error free to the upper layer (network layer). 2.20

21 Functions of the data link layer: Framing. The data link layer divides the stream of bits received from the network layer into data units called frames. Physical addressing. If frames are to be distributed to different systems on the network, the data link layer adds a header to the frame to define the physical address of the sender (source address) and/or receiver (destination address) of the frame. If the frame is intended for a system outside the sender’s network, the receiver address is the address of the device that connects one network to the next. 2.21

22 2.22

23 Flow Control. If the rate at which the data are absorbed by the receiver is less than the rate produced in the sender, the data link layer imposes a flow control mechanism to prevent overwhelming the receiver. Error control. The data link layer adds reliability to the physical layer by adding mechanisms to detect and retransmit damaged or lost frames. Error control is normally achieved through a trailer to the end of the frame. Access Control. When two or more devices are connected to the same link, data link layer protocols are necessary to determine which device has control over the link at any time. 2.23

24 OSI REFERENCE 2. Data Link Layer 2.1. Logical Link Control (LLC ) Establishment and control of logical links between local devices on a network. 2.2. Media Access Control (MAC) The procedures used by devices to control access to the network medium. Frame sequencing Frame acknowledgment Addressing Frame error checking PDU: frame 2.24

25 2.25 Figure 2.8 Network layer

26 2.26 The network layer is responsible for the delivery of individual packets from the source host to the destination host. Note

27 2.27 Figure 2.9 Source-to-destination delivery

28 2.28

29 The network layer is responsible for routing datagrams from one host to another. Logical addressing. The physical addressing implemented by the data link layer handles the addressing problem locally. The network layer adds a header to the packet coming from the upper layer, among other things, includes the logical address of the sender and receiver. Routing. When independent networks or links are connected together to create an internetwork (a network of networks) or a large network, the connecting devices (called routers or gateways) route or switch the packets to their final destination. 2.29

30 Summary Addressing (IPV4) Encapsulation (Inserts a header with source and destination IPs) Routing (Move a packet over the Internet) Decapsulation (Open the packet and check the destination host) IP is connectionless Functions: Logical addressing. Routing 2.30

31 2.31 Figure 2.10 Transport layer

32 2.32 The transport layer is responsible for the delivery of a message from one process to another. Note

33 The transport layer is responsible for process-to-process delivery of the entire message. The transport layer ensures that the whole message arrives intact and in order, overseeing both error control and flow control at the process-to-process level. 2.33

34 2.34 Figure 2.11 Reliable process-to-process delivery of a message

35 Functions Port addressing: computer often run several processes (running programs) at the same time. Process-to-process delivery means delivery from a specific process on one computer to a specific process on the other. The transport layer header include a type of address called port address. The network layer gets each packet to the correct computer; the transport layer gets the entire message to the correct process on that computer. 2.35

36 Segmentation and reassembly: a message is divided into transmittable segments, each having a sequence number. These numbers enable the transport layer to reassemble the message correctly upon arrival at the destination. Connection control: The transport layer can be either connectionless or connection- oriented. TCP – Web Browser UDP – Video Streaming Applications 2.36

37 Flow control: the transport layer performs a flow control end to end. The data link layer performs flow control across a single link. Error control: the transport layer performs error control end to end. The data link layer performs control across a single link. 2.37

38 2.38 Figure 2.12 Session layer

39 2.39 The session layer is responsible for dialog control and synchronization. Note

40 The session layer is the network dialog controller. It was designed to establish, maintain, and synchronize the interaction between communicating devices EXAMPLE Sessions are used to keep track of individual connections to remote servers. Your web browser is an excellent example of the use of sessions. Your web browser (an application layer object) opens a web page. That page contains text, graphics, Macromedia Flash objects and perhaps a Java applet. The graphics, the Flash object and the Java applet are all stored as separate files on the web server. To access them, a separate download must be started. Your web browser opens a separate session to the web server to download each of the individual files. The session layer keeps track of which packets and data belong to which file and keeps track of where they go (in this case, to your web browser).applicationweb pageweb serverweb browser 2.40

41 2.41 Figure 2.13 Presentation layer

42 2.42 The presentation layer is responsible for translation, compression, and encryption. Note

43 The presentation layer is responsible for the delivery and formatting of information to the application layer for further processing or display. [4] It relieves the application layer of concern regarding syntactical differences in data representation within the end-user systems. An example of a presentation service would be the conversion of an EBCDIC-coded text computer file to an ASCII-coded file. [4] datauser EBCDICcomputer file ASCII 2.43

44 The presentation layer was designed to handle the syntax and semantics of the information exchanged between the two systems. It was designed for data translation, encryption, decryption, and compression. 2.44

45 2.45 Figure 2.14 Application layer

46 2.46 The application layer is responsible for providing services to the user. Note

47 2.47 Figure 2.15 Summary of layers

48 2.48 2-4 TCP/IP PROTOCOL SUITE The layers in the TCP/IP protocol suite do not exactly match those in the OSI model. The original TCP/IP protocol suite was defined as having four layers: host-to- network, internet, transport, and application. However, when TCP/IP is compared to OSI, we can say that the TCP/IP protocol suite is made of five layers: physical, data link, network, transport, and application. Physical and Data Link Layers Network Layer Transport Layer Application Layer Topics discussed in this section:

49 2.49 Figure 2.16 TCP/IP and OSI model

50 2.50 2-5 ADDRESSING Four levels of addresses are used in an internet employing the TCP/IP protocols: physical, logical, port, and specific. Physical Addresses Logical Addresses Port Addresses Specific Addresses Topics discussed in this section:

51 2.51 Figure 2.17 Addresses in TCP/IP

52 2.52 Figure 2.18 Relationship of layers and addresses in TCP/IP

53 2.53 In Figure 2.19 a node with physical address 10 sends a frame to a node with physical address 87. The two nodes are connected by a link (bus topology LAN). As the figure shows, the computer with physical address 10 is the sender, and the computer with physical address 87 is the receiver. Example 2.1

54 2.54 Figure 2.19 Physical addresses

55 2.55 Most local-area networks use a 48-bit (6-byte) physical address written as 12 hexadecimal digits; every byte (2 hexadecimal digits) is separated by a colon, as shown below: Example 2.2 07:01:02:01:2C:4B A 6-byte (12 hexadecimal digits) physical address.

56 2.56 Figure 2.20 shows a part of an internet with two routers connecting three LANs. Each device (computer or router) has a pair of addresses (logical and physical) for each connection. In this case, each computer is connected to only one link and therefore has only one pair of addresses. Each router, however, is connected to three networks (only two are shown in the figure). So each router has three pairs of addresses, one for each connection. Example 2.3

57 2.57 Figure 2.20 IP addresses

58 2.58 Figure 2.21 shows two computers communicating via the Internet. The sending computer is running three processes at this time with port addresses a, b, and c. The receiving computer is running two processes at this time with port addresses j and k. Process a in the sending computer needs to communicate with process j in the receiving computer. Note that although physical addresses change from hop to hop, logical and port addresses remain the same from the source to destination. Example 2.4

59 2.59 Figure 2.21 Port addresses

60 2.60 The physical addresses will change from hop to hop, but the logical addresses usually remain the same. Note

61 2.61 Example 2.5 A port address is a 16-bit address represented by one decimal number as shown. 753 A 16-bit port address represented as one single number.

62 Operation of TCP and IP

63 Addressing Requirements two levels of addressing required each host on a subnet needs a unique global network address its IP address each application on a (multi-tasking) host needs a unique address within the host known as a port

64 Operation of TCP/IP

65 Transmission Control Protocol ( TCP) usual transport layer is (TCP) provides a reliable connection for transfer of data between applications a TCP segment is the basic protocol unit TCP tracks segments between entities for duration of each connection

66 TCP Header

67 User Datagram Protocol (UDP) an alternative to TCP no guaranteed delivery no preservation of sequence no protection against duplication minimum overhead Just adds port addressing to IP

68 UDP Header

69 IP Header

70 IPv6 Header

71 TCP/IP Applications have a number of standard TCP/IP applications such as Simple Mail Transfer Protocol (SMTP) File Transfer Protocol (FTP) – control and data connections Telnet

72 Some TCP/IP Protocols

73 OSI Open Systems Interconnection developed by the International Organization for Standardization (ISO) has seven layers – too many is a theoretical system delivered too late! TCP/IP is the de facto standard

74 OSI Layers

75 OSI v TCP/IP

76 Standardized Protocol Architectures

77 Layer Specific Standards

78 Service Primitives and Parameters define services between adjacent layers using: primitives to specify function performed parameters to pass data and control info

79 Primitive Types REQUESTA primitive issued by a service user to invoke some service and to pass the parameters needed to specify fully the requested service INDICATIONA primitive issued by a service provider either to: indicate that a procedure has been invoked by the peer service user on the connection and to provide the associated parameters, or notify the service user of a provider-initiated action RESPONSEA primitive issued by a service user to acknowledge or complete some procedure previously invoked by an indication to that user CONFIRMA primitive issued by a service provider to acknowledge or complete some procedure previously invoked by a request by the service user

80 Traditional vs Multimedia Applications traditionally Internet dominated by info retrieval applications typically using text and image transfer E.g. email, file transfer, web see increasing growth in multimedia applications involving massive amounts of data such as streaming audio and video

81 Elastic and Inelastic Traffic elastic traffic can adjust to delay & throughput changes over a wide range E.g. traditional “data” style TCP/IP traffic some applications more sensitive though inelastic traffic does not adapt to such changes E.g. “real-time” voice & video traffic need minimum requirements on net arch

82 Multimedia Taxonomy

83 Summary introduced need for protocol architecture TCP/IP protocol architecture OSI Model & protocol architecture standardization traditional vs multimedia application needs

84 MCQ  The process to process delivery of the entire message is the responsibility of the Network/Transport/Application/Physical layer.  As the data packet moves from the lower to the upper layers, headers are added/subtracted/rearranged/modified.  Following is an application layer service. Remote log-in/file transfer/mail service/all of the above

85 MCQ  Match the following with one of the five internet layers.  Communicates directly with user application program  Error correction and retransmission  Mechanical, electrical, and functional interface  Reassembly of data packets

86 Problems Q1. In a protocol suite, layer N is above layer (N-1). In the case of segmentation, is it necessary that each (N-1) level segment contain a copy of the level N-header? Why? Blocking means combining several level N PDUs into one (N-1) level PDU. In the case of blocking, is it necessary that each level- N PDU retain its own header? Why?

87 Problems Q2. A TCP segment of 1500 bit data and 160 bit header is sent to the IP layer. IP layer adds 160 bit header. It is then transmitted through a network which uses 24-bit packet header. The destination network can accept packet size of 800 bits. How many bits (including header) are delivered to the destination network layer?


Download ppt "2.1 Chapter 2 Network Models Copyright © The McGraw-Hill Companies, Inc. Permission required for reproduction or display."

Similar presentations


Ads by Google