Lecture 4 Communication Network Protocols

Slides:



Advertisements
Similar presentations
Communication Protocols II Ninth Meeting. TCP/IP family.
Advertisements

© 2007 Cisco Systems, Inc. All rights reserved.Cisco Public 1 Version 4.0 Network Services Networking for Home and Small Businesses – Chapter 6.
Networking Theory (part 2). Internet Architecture The Internet is a worldwide collection of smaller networks that share a common suite of communication.
Chapter 15 – Part 2 Networks The Internal Operating System The Architecture of Computer Hardware and Systems Software: An Information Technology Approach.
OSI Model.
Introduction To Networking
Understanding Networks. Objectives Compare client and network operating systems Learn about local area network technologies, including Ethernet, Token.
Communication Protocols III Tenth Meeting. Connections in TCP A wants to send to B. What is the packet next move? A travels through hub and bridge to.
OSI Model 7 Layers 7. Application Layer 6. Presentation Layer
Data Networking Fundamentals Unit 7 7/2/ Modified by: Brierley.
 The Open Systems Interconnection model (OSI model) is a product of the Open Systems Interconnection effort at the International Organization for Standardization.
OIS Model TCP/IP Model.
1 Protocol Interaction (ISO’s Open Systems Interconnection (OSI model)) the 7 layers.
Protocols and the TCP/IP Suite Chapter 4. Multilayer communication. A series of layers, each built upon the one below it. The purpose of each layer is.
70-291: MCSE Guide to Managing a Microsoft Windows Server 2003 Network Chapter 3: TCP/IP Architecture.
NetworkProtocols. Objectives Identify characteristics of TCP/IP, IPX/SPX, NetBIOS, and AppleTalk Understand position of network protocols in OSI Model.
Presentation on Osi & TCP/IP MODEL
Lecture 2 TCP/IP Protocol Suite Reference: TCP/IP Protocol Suite, 4 th Edition (chapter 2) 1.
What is a Protocol A set of definitions and rules defining the method by which data is transferred between two or more entities or systems. The key elements.
1 Semester 2 Module 10 Intermediate TCP/IP Yuda college of business James Chen
© 2007 Cisco Systems, Inc. All rights reserved.Cisco Public ITE PC v4.0 Chapter 1 1 Network Services Networking for Home and Small Businesses – Chapter.
Networks – Network Architecture Network architecture is specification of design principles (including data formats and procedures) for creating a network.
© 2007 Cisco Systems, Inc. All rights reserved.Cisco Public 1 Version 4.0 Network Services Networking for Home and Small Businesses – Chapter 6.
Component 9 – Networking and Health Information Exchange Unit 1-1 ISO Open Systems Interconnection (OSI) This material was developed by Duke University,
TCP/IP TCP/IP LAYERED PROTOCOL TCP/IP'S APPLICATION LAYER TRANSPORT LAYER NETWORK LAYER NETWORK ACCESS LAYER (DATA LINK LAYER)
Chapter 15 – Part 2 Networks The Internal Operating System The Architecture of Computer Hardware and Systems Software: An Information Technology Approach.
TCP/IP Honolulu Community College Cisco Academy Training Center Semester 2 Version 2.1.
Networking Basics CCNA 1 Chapter 11.
S305 – Network Infrastructure Chapter 5 Network and Transport Layers.
Individual Project 1 Sarah Pritchard. Fran, a customer of your company, would like to visit your company’s website from her home computer… How does your.
1. Layered Architecture of Communication Networks: TCP/IP Model
Net 221D:Computer Networks Fundamentals
Transmission Control Protocol (TCP) Internet Protocol (IP)
Enterprise Network Systems TCP Mark Clements. 3 March 2008ENS 2 Last Week – Client/ Server Cost effective way of providing more computing power High specs.
Computer Network Architecture Lecture 6: OSI Model Layers Examples 1 20/12/2012.
Network Models. The OSI Model Open Systems Interconnection (OSI). Developed by the International Organization for Standardization (ISO). Model for understanding.
The OSI Model. Understanding the OSI Model In early 1980s, manufacturers began to standardize networking so that networks from different manufacturers.
Communication Networks NETW 501 Tutorial 2
Roadmap  Introduction to Basics  Computer Network – Components | Classification  Internet  Clients and Servers  Network Models  Protocol Layers.
OSI Model OSI MODEL. Communication Architecture Strategy for connecting host computers and other communicating equipment. Defines necessary elements for.
OSI Model OSI MODEL.
What is a Protocol A set of definitions and rules defining the method by which data is transferred between two or more entities or systems. The key elements.
Chapter 5 Network and Transport Layers
Lecture (2).
Computer Networks.
Lecturer, Department of Computer Application
Understand the OSI Model Part 2
Networking for Home and Small Businesses – Chapter 6
DEPARTMENT OF COMPUTER SCIENCE
Data Networking Fundamentals
Network Architecture Introductory material
Networking for Home and Small Businesses – Chapter 6
Review of Important Networking Concepts
Process-to-Process Delivery:
TCP/IP Protocol Suite: Review
Communication Networks NETW 501
Chapter 15 – Part 2 Networks The Internal Operating System
TCP/IP Protocol Suite: Review
Networking Theory (part 2)
1 TRANSMISSION CONTROL PROTOCOL / INTERNET PROTOCOL (TCP/IP) K. PALANIVEL Systems Analyst, Computer Centre Pondicherry University, Puducherry –
OSI Model OSI MODEL.
Chapter 2 Network Models
Computer Networking A Top-Down Approach Featuring the Internet
Networking for Home and Small Businesses – Chapter 6
OSI Reference Model Unit II
Kyle Broussard, Alexandra Mikolai,
Process-to-Process Delivery: UDP, TCP
OSI Model 7 Layers 7. Application Layer 6. Presentation Layer
Networking Theory (part 2)
Networking Theory (part 2)
Presentation transcript:

Lecture 4 Communication Network Protocols

Outline Protocols and Layering TCP/IP Protocols Connections in TCP Interlayer Communication

Protocols and Layering The concept of Layered Architecture

Transferring a Text File (Cont.)

Transferring a Text File (Cont.)

The OSI Reference Model The International Organization for Standardization (ISO) has published a reference model for open systems interconnection called OSI reference model. It has seven layers as shown below.

The OSI Reference Model (Cont.)

The OSI Reference Model (Cont.) As shown, the top layer is concerned with application programs running in host computers The bottom layer is concerned with accessing various physical communication media.

Layered Structures (Cont.)

Abstraction Abstraction is a way to hide details of a system. The layers of the OSI model might be regarded as levels of abstraction.

TCP/IP Family TCP/IP (transmission control protocol/internet protocol) derives from the central two members of a whole family of protocols. TCP and IP layers form the core of the family as shown below.

TCP/IP Family (Cont.)

TCP/IP Family (Cont.) In OSI terms, IP is a network layer protocol, so it is concerned with finding a route and getting messages across the network. IP provides no guarantee, the service is often described as a best-effort delivery service. The main aim of IP is to have a system that is Flexible (usable with many different types of networks) Robust (should work as best it can even in the face of breakdown and damage),

TCP/IP Family (Cont.) TCP is the transport layer protocol which sits on top of IP and is concerned with end-to- end issues. TCP provides a reliable service, i.e., it guarantees error-free transportation of messages between source and destination application layers. TCP is flexible, i.e., it can offer service to a wide variety of applications.

TCP/IP Family (Cont.) Application layer protocols that run on top of TCP are Electronic mail (e-mail) using simple mail transfer protocol (SMTP) Accessing world-wide web pages using hypertext transfer protocol (HTTP)

TCP/IP Family (Cont.) The protocol for the exchange of e-mail messages between hosts is SMTP. A small set of commands and responses are used between a mail client and a mail server

Packets: Data format Many factors influence the choice of packet size: Performance Efficiency If packages are too small, communication channel will not be efficiently used because of the overheads incurred by each packet. If packets are too large, interactive performance may suffer because of long delays and re- transmission in case of failures. The application layer of TCP/IP  files, email message, etc The transport layer  TCP segment

TCP Segment Structure

Connections in TCP Internetwork

Internetwork (Cont.) Figure above shows a computer A on a LAN sending a message to another computer B. Every IP packet will contain the destination address of B. Because the data has to cross the LAN to reach the edge of the internet at router X, the IP packet has to be encapsulated within an Ethernet frame. Routers decide which port to send packets out on after reading the IP address. The router at X may not know exactly where B can be found, it will at least know which region it is in, so can send packets off in the direction of router Z.

Connection-Oriented and Connectionless Services During a file transfer between two computers using FTP protocol, the first thing to do is to open a connection to the FTP host computer. When finished with the transfer, the connection is closed. Both the telephone and FTP are connection- oriented services. In contrast, the idea of a connectionless service is illustrated by the postal service. In the internet layer, IP is the only protocol available and it provides no connections.

Opening Connections in TCP To establish a connection, TCP uses a three- way handshake. For example, if a client attempts to connect with a server, 1. The client sends a SYN to the server. 2. In response, the server replies with a SYN- ACK. 3. Finally the client sends an ACK (usually called SYN-ACK-ACK) back to the server.

Opening Connections in TCP TCP uses sequence numbers to match up acknowledgements with the octets being acknowledged. This is needed because IP is unreliable in the sense that there might be delays, omissions, and duplications of datagrams. Without sequence numbers it would not be clear which octet is being acknowledged.

Opening Connections in TCP (Cont.)

Example: 1. The initiating host (client) sends a synchronization (SYN flag set) packet to initiate a connection. Any SYN packet holds a Sequence Number. The Sequence Number is a 32-bit field in TCP segment header. For example let the Sequence Number value for this session be x. 2. The other host receives the packet, records the Sequence Number of x from the client, and replies with an acknowledgment and synchronization (SYN-ACK). The Acknowledgment Number is a 32-bit field in TCP segment header. It contains the next sequence number that this host is expecting to receive (x + 1). The host also initiates a return session. This includes a TCP segment with its own initial Sequence Number value of y. 3. The initiating host responds with the next Sequence Number (x+1) and a simple Acknowledgment Number value of y + 1, which is the Sequence Number value of the other host + 1

The Sliding Window Algorithm in TCP A technique known as sliding-window algorithm has been developed for alleviating the capacity wastage in the simple octet-by- octet acknowledgement. It permits more than one octets to be sent before stopping and waiting for an acknowledgement and therefore improves channel usage. The number of octets that can be sent before waiting for an ACK is the width of the window as shown below.

The Sliding Window Algorithm in TCP (Cont.)

Interlayer Communication

A Networked PC To connect a PC to a LAN, two major components must be installed. The network interface card NIC, which provides the hardware connection between a PC and a LAN. The interface includes the address of the PC in the LAN. The netBIOS (network BIOS) which is part of the operating system software that allows the Windows operating system to communicate through the NIC to access the LAN. The netBIOS provides an application program interface (API) for application programs to use the TCP/IP protocol.

A Networked PC (Cont.)

A Networked PC (Cont.) The role of the redirector layer is to determine whether a request from the PC’s operating system is for a local or remote resource. If a request is for a local resource, the request is passed (i.e. directed) to the BIOS layer. If a request is for a remote resource, the redirector layer passes the instruction to the server message block (SMB) layer.

A Networked PC (Cont.) The SMB protocol is a peer-to-peer protocol that allows one computer (the client) to request resources such as files from another computer (the server) over a LAN, a WAN or the Internet.

A Networked PC (Cont.)

A Networked PC (Cont.) The SMB peer-to-peer protocol defines four categories of messages which pass requests and acknowledgements: Session control File Printer Message. The SMB session control messages create and close a Redirector connection to a shared resource at a server. The SMB file messages are used by the Redirector to gain access to files at a server. The SMB printer messages are used by the Redirector to send data to a print queue at a server and to get status information about the print queue. The SMB message category allows an application to send messages to or receive messages from a server.

A Networked PC (Cont.) Through an exchange of messages defined by the SMB protocol, a client can read and write files, create and delete files and directories, and search directories on a server. For example, an SMB ‘read file’ request received by a server will be passed up to its operating system layer which will recognize it as a request for a local resource of the server. The green arrow shows the path taken by the data in the SMB request and response messaes.

A Networked PC (Cont.)

Problem: Data is being sent from Computer A to Computer B using a sliding window algorithm and having a window size of 24 octets. Computer A has already sent 26 octets of which 18 have been acknowledged. How many more octets can Computer A send without waiting for an acknowledgement? Answer Total size = 24 octets First message A sent 26 octets 18 octets of them acknowledged, means 26 – 18 = 8 octets Free size left = 24 – 8 = 16 octets 16 octets can be sent without waiting for acknowledgement.