0% found this document useful (0 votes)
6 views

chapter 4

The document discusses network communication protocols and models, emphasizing the importance of protocol suites and their functions in data transfer. It outlines the OSI reference model and the TCP/IP protocol suite, detailing the responsibilities of each layer in these models. Additionally, it covers data encapsulation, addressing in networks, and the relationship between logical and physical addresses.

Uploaded by

zechariha2
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PPT, PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
6 views

chapter 4

The document discusses network communication protocols and models, emphasizing the importance of protocol suites and their functions in data transfer. It outlines the OSI reference model and the TCP/IP protocol suite, detailing the responsibilities of each layer in these models. Additionally, it covers data encapsulation, addressing in networks, and the relationship between logical and physical addresses.

Uploaded by

zechariha2
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PPT, PDF, TXT or read online on Scribd
You are on page 1/ 60

Network Models

Rules that Govern Communications


 Communication in networks is governed by pre-defined
rules called protocols.
 A group of inter-related protocols that are necessary to
perform a communication function is called a protocol
suite. These protocols are implemented in software and
hardware that is loaded on each host and network device
 Networking protocols suites describe processes such as:
- The format or structure of the message
- The process by which networking devices share
information about pathways with other networks
- How and when error and system messages are passed
between devices
- The setup and termination of data transfer sessions
 Individual protocols in a protocol suite may be vendor-
specific and proprietary.
2
Using Layer Models…
 Two types of networking models
 A reference model provides a common reference for
maintaining consistency within all types of network
protocols and services. A reference model is not
intended to be an implementation specification or to
provide a sufficient level of detail to define precisely the
services of the network architecture. The primary
purpose of a reference model is to aid in clearer
understanding of the functions and process involved
Ex: OSI model
 A protocol model provides a model that closely
matches the structure of a particular protocol suite. The
hierarchical set of related protocols in a suite typically
represents all the functionality required to interface the
human network with the data network.
3
 Ex: TCP/IP model
The OSI Reference Model
 ISO
 Established in 1947, is a multinational body
dedicated to worldwide agreement on
international standards.
 The Open Systems Interconnection
protocols are a family of information
exchange standards developed jointly by
the ISO and the ITU-T. The standardization
process began in 1977
 An ISO standard that covers all aspects of
network communications is the Open
Systems Interconnection (OSI) model.
4
The OSI Reference Model
 The OSI reference model
is the primary model for
network
communications.
 Allows you to view the
network functions that
occur at each layer.
 It is a framework that
you can use to
understand how
information travels
throughout a network
 7 layers -- each of which
illustrates a particular
network function.

5
The application layer is responsible for
providing services to the user.

1-6
Application layer

1-7
Application Layer
 Network virtual terminal, e.g. PuTTY,
FileZilla
 Directory services, e.g. X.500, LDAP
 E-mail services, e.g. X.400, SMTP
 File Transfer, Access and Management,
e.g. FTAM, FTP

1-8
The presentation layer is responsible for translation, compression, and encryption.

1-9
Presentation layer

1-10
Presentation Layer
Translation
Encryption
Compression

1-11
The session layer is responsible for dialog control and synchronization.

1-12
Session layer

1-13
Session layer
 Performs name recognition and related
security
 Synchronization between sender and receiver
 Assignment of time for transmission
 Start time
 End time etc.

1-14
The transport layer is responsible for the delivery
of a message from one process to another.

1-15
Transport layer

1-16
Reliable process-to-process delivery of a message

1-17
Transport layer
 Service-point addressing
 Segmentation
 Reassembly
 Connection control
 Flow control
 Error control

1-18
The network layer is responsible for the
delivery of individual packets from
the source host to the destination host.

1-19
Network layer

1-20
Source-to-destination delivery

1-21
Network Layer
Logical
addressing
Routing

1-22
The data link layer is responsible for moving
frames from one hop (node) to the next.

1-23
Data link layer

1-24
Hop-to-hop delivery

1-25
Data-link layer
 Framing
 Physical addressing
 Flow control
 Error control
 Access control

1-26
The physical layer is responsible for movements of
individual bits from one hop (node) to the next.

1-27
Physical layer

1-28
Physical Layer
 Physical characteristics of
interfaces and medium
 Representation of bits.
 Data rate.
 Synchronization of bits.
 Transmission mode.
 Physical topology.

1-29
Summary of layers

1-30
The interaction between layers in the OSI model

1-31
TCP/IP PROTOCOL SUITE

32
TCP/IP PROTOCOL SUITE
The layers in the TCP/IP protocol suite do not
exactly match those in the OSI model.
The original TCP/IP protocol suite was defined
as having four layers:
host-to-network, internet, transport, and
application.

However, when TCP/IP is compared to OSI, we


can say that the TCP/IP protocol suite is made
of five layers:

physical, data link, network, transport, and


application.
1-33
TCP/IP and OSI model

1-34
TCP/IP Model

35
Comparison
--Both have application
layers, though they
include very different
services
--Both have comparable
transport and network
(Internet) layers
--TCP/IP combines the
presentation and
session layer issues into
its application layer
--TCP/IP combines the
OSI data link and
physical layers into one
layer
--TCP/IP appears
simpler because it has
fewer layers
36
TCP/IP Application Layer
• Ensures that the data is properly packaged
before being passed on.
• Handles high-level protocols, representation,
encoding, and dialog control.
There are lots of protocols
• Simple Network Management Protocol
(SNMP) – allows network managers to
Application
manage configurations, statistics,
performance, and security.
• Domain Name System (DNS) – used to
translate domain names into IP addresses.

37
TCP/IP Application Layer
 Has protocols to support file transfer, e-
mail, and remote login:
 File Transfer:
 Trivial File Transfer Protocol (TFTP) –
unreliable, connectionless User Datagram
Protocol (UDP) service used to transfer
configuration files, Cisco IOS images, and to
transfer files in a LAN.
 File Transfer Protocol (FTP) – reliable,
connection-oriented service that uses TCP to
transfer files between systems
 Network File System (NFS) – allows file
access to a remote storage device such as a
hard disk
38
TCP/IP Application Layer
 E-mail:
 Simple Mail Transfer Protocol (SMTP) –
administers the transmission of plain text e-mail
over computer networks.
 Remote access:
 Telnet –remotely access a computer, enabling a
user to login to an Internet host and execute
commands. A Telnet client is called a local host. A
Telnet server is called a remote host.

39
TCP/IP Transport Layer
 Provides a logical connection between a
source host and a destination host.
 Transport Layer protocols segment and
reassemble data sent by applications, into
the same data stream, between end
points.
 Provides end-to-end control and reliability
as data travels through the cloud,
accomplished through:
– sequence numbers, acknowledgments and
sliding windows.

40
TCP/IP Transport Layer

I just sent #10 I just received #10


Now I need #11

This shows sequence numbers and


acknowledgements.

41
TCP/IP Transport Layer
Sliding Windows

I just sent #11,


12 and 13 I just received #12
Now I need #13

Transport

This indicates that packet 13 either did not


arrive, or arrived with errors, and needs
retransmission.
42
TCP/IP Transport Layer
Sliding Windows

I just sent #13


and 14 I just received #14
Now I need #15

Transport

The sliding window has worked as the last


packet sent has arrived.

43
TCP/IP Transport Layer
 The only Transport layer protocols are
TCP and UDP.
 Transmission Control Protocol (TCP)
 Connection-oriented protocol
 End-to-end operation
 Flow control – sliding windows
 Reliability – sequence numbers and
acknowledgments
Transport
 User Datagram Protocol (UDP)
 Connectionless
 Unreliable (no acknowledgments or error
checking)

44
TCP/IP Internet Layer
 Two purposes are - determining the
best path and packet-switching.
 No error checking or correction
 Protocols:
 Internet Protocol (IP) - connectionless,
best-effort delivery routing of packets;
determines best path to destination
 Internet Control Message Protocol
Internet
(ICMP) – control and messaging
 Address Resolution Protocol (ARP) -
determines the MAC address, for a known IP
address.
 Reverse Address Resolution Protocol
(RARP) - determines the IP address for a
known MAC address.
45
TCP/IP Network Access Layer
 Allows an IP packet to make a physical link
to the network media
 Maps IP addresses to MAC addresses
 Encapsulates IP packets into frames
 Drivers for modem cards, and other devices
operate at the network access layer.
Network  Serial Line Internet Protocol (SLIP) and
Access
Point-to-Point Protocol (PPP) provide
network access.
 ARP and RARP also work at this layer.

46
Data Encapsulation
 Build the data
 Package the data
for end to end
support
(Segments)
 The data is put
into a packet or
datagram that
contains a
network header
with source and
destination
logical addresses
47
Data Encapsulation
 Each network device
must put the packet
into a frame.
 The frame must be
converted into a
pattern of 1s and 0s
(bits)
 ***Data  Segments
 Packet  Frames
 Bits

48
Data Encapsulation

49
Data de-capsulation

50
Addressing in the Network
 There are various types of addresses that must be
included to successfully deliver the data from a
source application running on one host to the
correct destination application running on another

51
Relationship of layers and addresses in TCP/IP

1-52
Physical addresses

1-53
Example

Most local-area networks use a 48-


bit (6-byte) physical address written
as 12 hexadecimal digits; every
byte (2 hexadecimal digits) is
separated by a colon, as shown
below: 07:01:02:01:2C:4B

A 6-byte (12 hexadecimal digits) physical address.

1-54
Example

Figure below shows a part of an internet


with two routers connecting three LANs.
Each device (computer or router) has a
pair of addresses (logical and physical) for
each connection. In this case, each
computer is connected to only one link
and therefore has only one pair of
addresses. Each router, however, is
connected to three networks (only two are
shown in the figure). So each router has
1-55
three pairs of addresses, one for each
Figure IP addresses

1-56
Example
Figure below shows two computers
communicating via the Internet. The
sending computer is running three
processes at this time with port addresses
a, b, and c. The receiving computer is
running two processes at this time with
port addresses j and k. Process a in the
sending computer needs to communicate
with process j in the receiving computer.
Note that although physical addresses
change
1-57
from hop to hop, logical and port
Figure Port addresses

1-58
The physical addresses will change from hop to hop,
but the logical addresses usually remain the same.

1-59
Example
A port address is a 16-bit address represented by one
decimal number as shown.

753
A 16-bit port address represented as one single number.

1-60

You might also like