TELEMEDICINE.

Slides:



Advertisements
Similar presentations
OSI Model OSI MODEL.
Advertisements

Chapter 5: TCP/IP and OSI Business Data Communications, 5e.
1 William Stallings Data and Computer Communications 7 th Edition Chapter 2 Protocols and Architecture.
PROTOCOLS AND ARCHITECTURE Lesson 2 NETS2150/2850.
1ISM - © 2010 Houman Younessi Lecture 5 Convener: Houman Younessi Information Systems Spring 2011.
Chapter 4 : TCP/IP and OSI Business Data Communications, 4e.
Semester Copyright USM EEE442 Computer Networks Introduction: Protocols En. Mohd Nazri Mahmud MPhil (Cambridge, UK) BEng (Essex, UK)
Chapter 15 – Part 2 Networks The Internal Operating System The Architecture of Computer Hardware and Systems Software: An Information Technology Approach.
Protocols and the TCP/IP Suite
Data Communications Architecture Models. What is a Protocol? For two entities to communicate successfully, they must “speak the same language”. What is.
William Stallings Data and Computer Communications 7 th Edition Chapter 2 Protocols and Architecture.
COE 342: Data & Computer Communications (T042) Dr. Marwan Abu-Amara Chapter 2: Protocols and Architecture.
Protocol Reference Model of OSI
 The Open Systems Interconnection model (OSI model) is a product of the Open Systems Interconnection effort at the International Organization for Standardization.
OIS Model TCP/IP Model.
Lecturer: Tamanna Haque Nipa
Chapter 5: TCP/IP and OSI Business Data Communications, 6e.
Lecture slides prepared for “Business Data Communications”, 7/e, by William Stallings and Tom Case, Chapter 8 “TCP/IP”.
Protocols and the TCP/IP Suite Chapter 4. Multilayer communication. A series of layers, each built upon the one below it. The purpose of each layer is.
OSI AND TCP/IP MODELS. Outline Introduction OSI Model TCP/IP Model IPv4 vs. IPv6.
Presentation on Osi & TCP/IP MODEL
What is a Protocol A set of definitions and rules defining the method by which data is transferred between two or more entities or systems. The key elements.
Protocol Architectures. Simple Protocol Architecture Not an actual architecture, but a model for how they work Similar to “pseudocode,” used for teaching.
Protocols and the TCP/IP Suite
William Stallings Data and Computer Communications 7 th Edition Data Communications and Networks Overview Protocols and Architecture.
Service Primitives Six service primitives that provide a simple connection-oriented service 4/23/2017
Department of Electronic Engineering City University of Hong Kong EE3900 Computer Networks Introduction Slide 1 A Communications Model Source: generates.
Data and Computer Communications Chapter 2 – Protocol Architecture, TCP/IP, and Internet-Based Applications.
The OSI Model.
Chapter 15 – Part 2 Networks The Internal Operating System The Architecture of Computer Hardware and Systems Software: An Information Technology Approach.
William Stallings Data and Computer Communications
CHAPTER 4 PROTOCOLS AND THE TCP/IP SUITE Acknowledgement: The Slides Were Provided By Cory Beard, William Stallings For Their Textbook “Wireless Communication.
Open System Interconnection Describe how information from a software application in one computer moves through a network medium to a software application.
Chapter 4 : TCP/IP and OSI Business Data Communications, 4e.
1 Chapter 4. Protocols and the TCP/IP Suite Wen-Shyang Hwang KUAS EE.
Protocol Suits and Layering Models OSI Model Dr. Abraham UTPA.
Network Models. The OSI Model Open Systems Interconnection (OSI). Developed by the International Organization for Standardization (ISO). Model for understanding.
TUNALIData Communications1 Chapter 2 Protocols and Architecture.
Protocol Architectures. Simple Protocol Architecture Not an actual architecture, but a model for how they work Similar to “pseudocode,” used for teaching.
Computer Engineering and Networks, College of Engineering, Majmaah University Protocols OSI reference MODEL TCp /ip model Mohammed Saleem Bhat
Roadmap  Introduction to Basics  Computer Network – Components | Classification  Internet  Clients and Servers  Network Models  Protocol Layers.
Computer Networks with Internet Technology William Stallings Chapter 2 Protocols and the TCP/IP Protocol Suite.
McGraw-Hill©The McGraw-Hill Companies, Inc., 2000 Lecture 3 : Network Architectures 1.
OSI Model OSI MODEL. Communication Architecture Strategy for connecting host computers and other communicating equipment. Defines necessary elements for.
OSI Model OSI MODEL.
Network Models.
What is a Protocol A set of definitions and rules defining the method by which data is transferred between two or more entities or systems. The key elements.
Networking Using the OSI Model.
The OSI Model & TCP/IP model
Protocols and the TCP/IP Suite
Lecture (2).
OSI Model & TCP/IP.
Computer Networks with Internet Technology William Stallings
Chapter 1 Introduction Computer Networks, Fifth Edition by Andrew Tanenbaum and David Wetherall, © Pearson Education-Prentice Hall, 2011.
ISO/OSI Model and Collision Domain
Lecturer, Department of Computer Application
Understand the OSI Model Part 2
DEPARTMENT OF COMPUTER SCIENCE
Protocol Architectures
Protocols and the TCP/IP Suite
Data and Computer Communications by William Stallings Eighth Edition
Chapter 3: Open Systems Interconnection (OSI) Model
OSI Model The Seven Layers
Chapter 15 – Part 2 Networks The Internal Operating System
OSI Model OSI MODEL.
Protocols and the TCP/IP Suite
OSI Reference Model Unit II
OSI Model 7 Layers 7. Application Layer 6. Presentation Layer
LEARNING COMPUTER NETWORKS OSI Model (layers). Why a layered model?  Easier to teach communication process.  Speeds development, changes in one layer.
Unit – III Network Essentials
Presentation transcript:

TELEMEDICINE

Why Use Protocol Architecture? Data communications requires complex procedures Sender identifies data path/receiver Systems negotiate preparedness Applications negotiate preparedness Translation of file formats For all tasks to occur, high level of cooperation is required

Modular Approach Breaks complex tasks into subtasks Each module handles specific subset of tasks Communication occurs between different modules on the same system between similar modules on different systems

Advantages of Modularity Easier application development Network can change without all programs being modified

Three-Layer Model Distributed data communications involves three primary components: Networks Computers Applications Three corresponding layers Network access layer Transport layer Application layer

Network Access Layer Concerned with exchange of data between computer and network Includes addressing, routing, prioritizing, etc Different networks require different software at this layer Example: X.25 standard for network access procedures on packet-switching networks

Transport Layer Concerned with reliable transfer of information between applications Independent of the nature of the application Includes aspects like flow control and error checking

Application Layer Logic needed to support various applications Each type of application (file transfer, remote access) requires different software on this layer

Addressing Each computer on a network requires a unique address on that network Each application requires a unique address within the computer to allow support for multiple applications (service access points, or SAP)

Data Transmission Application layer creates data block Transport layer appends header to create PDU (protocol data unit) Destination SAP, Sequence #, Error- Detection Code Network layer appends another header Destination computer, facilities (e.g. “priority”)

Simplified Architecture

Standardized Protocol Architectures Vendors like standards because they make their products more marketable Customers like standards because they enable products from different vendors to interoperate Two protocol standards are well- known: TCP/IP: widely implemented OSI: less used, but widely known and still useful for modeling/conceptualizing

Tasks involved in sending a letter

Introduction OSI The Open System Interconnection Reference Model (OSI Reference Model or OSI Model) is an abstract description for layered communications and computer network protocol design. It divides network architecture into seven layers which, from top to bottom, are the Application, Presentation, Session, Transport, Network, Data Link, and Physical Layers. It is therefore often referred to as the OSI Seven Layer Model.

OSI History In 1978, the International Standars Organization (ISO) began to develop its OSI framework architecture. OSI has two major components: an abstract model of networking, called the Basic Reference Model or seven-layer model, and a set of specific protocols.

OSI History The concept of a 7 layer model was provided by the work of Charles Bachman, then of Honeywell.  Various aspects of OSI design evolved from experiences with the Advanced Research Projects Agency Network (ARPANET) and the fledgling Internet.

OSI Layers OSI Model Data unit Layer Function Host layers Data 7. Application Network process to application 6. Presentation Data representation, encryption and decryption 5. Session Interhost communication Segments 4. Transport End-to-end connections and reliability, Flow control Media layers Packet 3. Network Path determination and logical addressing Frame 2. Data Link Physical addressing Bit 1. Physical Media, signal and binary transmission Going from layer 1 to 7: Please Do Not Throw Sausage Pizza Away Going from layer 7 to 1: All People Seem To Need Data Processing

The interaction between layers in the OSI model

An exchange using the OSI model

Physical layer

Layer1: Physical Layer The Physical Layer defines the electrical and physical specifications for devices. In particular, it defines the relationship between a device and a physical medium. This includes the layout of pin, voltages, cable specification, hubs, repeaters,  network adapters, host bus adapters, and more. network adapters, host bus adapters, and more.

Layer1: Physical Layer The major functions and services performed by the Physical Layer are: Establishment and termination of a connection to a communication medium. Participation in the process whereby the communication resources are effectively shared among multiple users. For example, flow control. Modulation, or conversion between the representation of digital data in user equipment and the corresponding signals transmitted over a communications channel. These are signals operating over the physical cabling (such as copper and optical fiber) or over a radio link.

Layer1: Physical Layer con. The same applies to local-area networks, such as Ethernet. ITU-T( International Telecommunication Union Telecommunication Standardization Sector) and IEEE802.1I. Personal area networks such as Bluetooth and IEEE 802.15.4.

Data link layer

Layer 2: Data Link Layer The Data Link Layer provides the functional and procedural means to transfer data between network entities and to detect and possibly correct errors that may occur in the Physical Layer. Originally, this layer was intended for point-to-point and point-to-multipoint media, characteristic of wide area media in the telephone system. The data link layer is divided into two sub-layers by IEEE.

Layer 2: Data Link Layer One is Media Access Control (MAC) and another is Logical Link Control (LLC). Mac is lower sub-layer, and it defines the way about the media access transfer, such as CSMA/CD/CA(Carrier Sense Multiple Access/Collision Detection/Collision Avoidance) LLC provides data transmission method in different network. It will re-package date and add a new header.

Hop-to-hop delivery

Network layer

Layer 3: Network Layer The Network Layer provides the functional and procedural means of transferring variable length data sequences from a source to a destination via one or more networks, while maintaining the quality of service requested by the Transport Layer.

Layer 3: Network Layer The Network Layer performs network routing functions, perform fragmentation and reassembly, report delivery errors. Routers operate at this layer—sending data throughout the extended network and making the Internet possible.

the source host to the destination host. Note The network layer is responsible for the delivery of individual packets from the source host to the destination host.

Source-to-destination delivery

Transport layer

Layer 4: Transport Layer The Transport Layer provides transparent transfer of data between end users, providing reliable data transfer services to the upper layers. The Transport Layer controls the reliability of a given link through flow control, segmentation/desegmentation, and error control.

Layer 4: Transport Layer Feature Name TP0 TP1 TP2 TP3 TP4 Connection oriented network Yes Connectionless network No Concatenation and separation Segmentation and reassembly Error Recovery Reinitiate connection (if an excessive number of PDUs are unacknowledged) multiplexing and demultiplexing over a single virtual circuit Explicit flow control Retransmission on timeout Reliable Transport Service

Session layer

Note The session layer is responsible for dialog control and synchronization.

Layer 5: Session Layer The Session Layer controls the dialogues (connections) between computers. It establishes, manages and terminates the connections between the local and remote application. It provides for full-duplex, half-duplex, or simplex operation, and establishes checkpointing, adjournment, termination, and restart procedures. 

Layer 5: Session Layer The OSI model made this layer responsible for graceful close of sessions, which is a property of the Transmission Control Protocol, and also for session check pointing and recovery, which is not usually used in the Internet Protocol Suite. The Session Layer is commonly implemented explicitly in application environments that use remote procedure calls.

Presentation layer

Note The presentation layer is responsible for translation, compression, and encryption.

Layer 6: Presentation Layer The Presentation Layer establishes a context between Application Layer entities, in which the higher-layer entities can use different syntax and semantics, as long as the presentation service understands both and the mapping between them. This layer provides independence from differences in data representation (e.g., encryption) by translating from application to network format, and vice versa. This layer formats and encrypts data to be sent across a network, providing freedom from compatibility problems. It is sometimes called the syntax layer.

Application layer

Layer 7: Application Layer  The application layer is the OSI layer closest to the end user, which means that both the OSI application layer and the user interact directly with the software application. Application layer functions typically include: identifying communication partners, determining resource availability, synchronizing communication. 

Layer 7: Application Layer Identifying communication partners Determines the identity and availability of communication partners for an application with data to transmit. Determining resource availability Decide whether sufficient network or the requested communication exist. Synchronizing communication All communication between applications requires cooperation that is managed by the application layer.

Summary of layers

OSI Feature Open system standards over the world Rigorously defined structured, hierarchical network model Complete description of the function Provide standard test procedures

TCP/IP - OSI Comparison

TCP/IP - OSI Comparison Application Presentation Session (Layers 7-5) Transport Transport (Layer 4) Internet Network (Layer 3) Network Interface Data Link Physical (Layers 1-2)

TCP/IP Transmission Control Protocol/Internet Protocol Developed by DARPA No official protocol standard Identifies 5 Layers Application Host-to-Host (transport) Internet Network Access Physical

TCP/IP Physical Layer Physical interface between a DTE (Data Terminal Equipment) (e.g. computer or terminal) and a transmission medium Specifies: Characteristics of medium Nature of signals Data rate

TCP/IP Network Access Exchange of data between systems on a shared network Utilizes address of host and destination Can also prioritize transmission Software at this layer depends on network Segregation means that no other software needs to be concerned about net specifics

TCP/IP Internet Layer An Internet is an interconnection of two or more networks Internet layer handles tasks similar to network access layer, but between networks rather than between nodes on a network Uses IP for addressing and routing across networks Implemented in workstations and routers

TCP/IP Transport Layer Also called host-to-host layer Reliable exchange of data between applications Uses TCP protocols for transmission

TCP/IP Application Layer Logic needed to support variety of applications Separate module supports each type of application (e.g. file transfer)

TCP & UDP Most TCP/IP applications use TCP for transport layer TCP provides a connection (logical association) between two entities to regulate flow check errors UDP (User Datagram Protocol) does not maintain a connection, and therefore does not guarantee delivery, preserve sequences, or protect against duplication

IP and IPv6 IP provides for 32-bit source and destination addresses IPv6 (1996 standard) provides for 128-bit addresses Migraqtion to IPv6 will be a very slow process

TCP/IP Applications SMTP (Simple Mail Transfer Protocol) Basic e-mail facility, transferring messages among hosts FTP (File Transfer Protocol) Sends files from one system to another on user command Telnet Remote login capability, allowing a user to emulate a terminal on the remote system

Internetworking Interconnected networks, usually implies TCP/IP Can appear to users as a single large network The global Internet is the largest example, but intranets and extranets are also examples

Routers Equipment used to interconnect independent networks Several essential functions Provide a link between networks Provide routing and delivery of data between processes on systems from different networks Provide the above functions without requiring modification of the attached networks

Router Issues Addressing schemes Maximum packet size Interfaces Reliability

TCP Segment (TCP PDU) Source port (16 bits) Destination port (16 bits) Sequence number (32 bits) Acknowledgment number (32 bits) Data Offset (4 bits) Reserved (6 bits) Flags (6 bits) : Ex. ACK Window (16 bits) Checksum (16 bits) Urgent Pointer (16 bits) Options (variable)

IPv4 Header Version (4 bits) Internet header length (4 bits) Type of Service (8 bits) Total Length (16 bits) Identification (16 bits) Flags (3 bits) Fragment Offset (13 bits) Time to Live (8 bits) Protocol (8 bits) Header Checksum (16 bits) Source Address ( 32 bits) Destination Address (32 bits) Options (variable) Padding (variable)

TCP/IP Stack

TCP/IP Encapsulation

Why Layering Considered Harmful? As a result of inter-layer dependencies, increased layering can quickly lead to violation of the Simplicity Principle. Industry experience has taught us that increased layering frequently increases complexity.