CN Network Software
CN Network Software
Network Software
Network Software
• Protocol Hierarchies
• Design Issues for the Layers
• Connection-Oriented and Connectionless Services
• Service Primitives
• The Relationship of Services to Protocols
Protocol Hierarchies
A network protocol
Is the set of very detailed rules, sequences, message formats,
and procedures that computer systems use and understand
when exchanging data with each other
Network Software
Protocol Hierarchies
• Addressing
• Error Control
• Flow Control
• Multiplexing
• Routing
Design Issues for the Layers
• Addressing:Every layer needs a mechanism for identifying the
senders and receivers that are involved in a particular
message.
• Error Control: Error detection. error correction,
• Multiplexing:Share network bandwidth dynamically,
• Flow control:how to keep a fast sender from swamping a slow
receiver with data. Congestion control
• Routing :Another reliability issue is finding a working path
through may be some links or routers that are broken
The network should automatically make this decision
Quality of service
• It is interesting to observe that the network has more
resources to offer than simply bandwidth.
• For uses such as carrying live video, the timeliness of
delivery matters a great deal.
• Most networks must provide service to applications that
want this real-time delivery at the same time that they
provide service to applications that want high throughput.
• Quality of service is the name given to mechanisms that
reconcile these competing demands.
• Confidentiality
• Authentication
• integrity
Connection-Oriented and Connectionless
Services
• Layers can offer two different types of service to
the layers above them:
-connection-oriented
-connectionless.
connection-oriented: is modeled after the
telephone system
To use a connection-oriented network service, the
service user first establishes a connection, uses the
connection, and then releases the connection
Connection-Oriented and Connectionless
Services
connectionless service: is modeled after the
postal system.
Each message (letter) carries the full destination
address.
Each one is routed through the intermediate
nodes inside the system independent of all the
subsequent messages.
If two messages are send , may be the first one arrive last
store-and-forward switching
Connection-Oriented and Connectionless
Services
Each service the can be characterized by the quality
of service.
1.Relaiable : In the sense they never loose data.
How??? Use Acko
- Message sequence ( boundary are preserved)
When two 1024-byte messages are sent, they
arrive as two distinct 1024-byte messages never as
one 2048-byte message.
- Byte sequence( nor sure about the send message )
2. Unreliable: delay are unacceptable ( Digitized
voice)
Unreliable-meaning not acknowledged
Connectionless Services
Not all application requires connection
eg : Email.
Connection less service often called as Datagram service
Analogy : telegram
• In other situations, the convenience of not having to
establish a connection to send one message is desired,
but reliability is essential
Eg:It is like sending a registered &letter and requesting a
return receipt.
Text messaging on mobile phones is an example
Connectionless Services
• request-reply:example, amobile phone client
might send a query to a map server to retrieve
the map data for the current location.
• Using unreliable communication may be
confusing at first…………………
• For example, Ethernet does not provide reliable
communication.
• In particular,many reliable services are built on
top of an unreliable datagram service
Connection-Oriented and Connectionless Services
The OSI
reference
model .
1. Reference Models
1. The OSI Reference Model
7 application
6 presentation
5 session
4 transport
3 network
2 data link
1 physical
The principles that were applied to arrive at the seven layers can be briefly
summarized as follows:
1. A layer should be created where a different abstraction
is needed.
2. Each layer should perform a well-defined function.
3. The function of each layer should be chosen with an
eye toward defining internationally standardized
protocols.
4. The layer boundaries should be chosen to minimize the
information flow across the interfaces.
5. The number of layers should be large enough that distinct
functions need not be thrown together in the same layer out of
necessity and small enough that the architecture does not
become unwieldy.
•
Physical Layer
The main task of the physical layer is to transmit raw bits over a
communication channel.
Typical questions here are:
-how many volts should be used to represent 1 and 0,
-how many microseconds a bit lasts,
- whether the transmission may proceed simultaneously
in both directions,
- how the initial connection is established and how it is
turn down,
- how many pins the network connector has and what
each pin is used for.
• The design issues deal with mechanical, electrical, and procedural
interfaces, and the physical transmission medium, which lies below
the physical layer.
• The user of the physical layer may be sure that the given stream of bits was
encoded and transmitted. He cannot be sure that the data came to the
destination without error. This issue is solved in higher layers.
DataLink Layer
• The main task of the data link layer is to take a raw
transmission facility and transform it into a line that
appears free of undetected transmission errors to the
network layer.
• To accomplish this, the sender breaks the input data into data
frames (typically a few hundred or a few thousand
bytes),transmits the frames sequentially, and processes the
acknowledgment frames sent back by the receiver.
Data link Layer
The issues that the layer has to solve:
To create and to recognize frame boundaries ,typically by
attaching special bit patterns to the beginning and end of the
frame
To solve the problem caused by damaged, lost or duplicate
frames
To keep a fast transmitter from drowning a slow receiver.
If the line is bi-directional, the acknowledgment frames
compete for the use of the line with data frames.
Broadcast networks have an additional issue in the data
link layer: how to control access to the shared channel.
A special sub layer of the data link layer
(medium access sublayer- MAC ) deals with the
problem.
The Network Layer
• The main task of the network layer is to
determine how data can be delivered from
source to destination.