Protocols and Protocol Layering

Slides:



Advertisements
Similar presentations
OSI Model OSI MODEL.
Advertisements

Answers of Exercise 7 1. Explain what are the connection-oriented communication and the connectionless communication. Give some examples for each of the.
TCP/IP1 The Underlying Technologies. What is inside the Internet? Or What are the key underlying technologies that make it work so successfully? –Packet.
1 Fall 2005 Protocols and layering Qutaibah Malluhi Computer Science and Engineering Qatar University.
CSCI 4550/8556 Computer Networks
CS335 Networking & Network Administration Tuesday, April 20, 2010.
TCP: Software for Reliable Communication. Spring 2002Computer Networks Applications Internet: a Collection of Disparate Networks Different goals: Speed,
Error Checking continued. Network Layers in Action Each layer in the OSI Model will add header information that pertains to that specific protocol. On.
OIS Model TCP/IP Model.
SEPT, 2005CSI Part 2.2 Protocols and Protocol Layering Robert Probert, SITE, University of Ottawa.
CECS 474 Computer Network Interoperability Notes for Douglas E. Comer, Computer Networks and Internets (5 th Edition) Tracy Bradley Maples, Ph.D. Computer.
1 Chapter Internetworking Part 4 (Transport Protocols, UDP and TCP, Protocol Port Numbers)
1 Transport Layer Computer Networks. 2 Where are we?
ISO Layer Model Lecture 9 October 16, The Need for Protocols Multiple hardware platforms need to have the ability to communicate. Writing communications.
Presentation on Osi & TCP/IP MODEL
Protocol Layering Chapter 10. Looked at: Architectural foundations of internetworking Architectural foundations of internetworking Forwarding of datagrams.
Network Property and ISO Reference Model Network Ownership: Private and Public Connectionless Network and Connect-Oriented Network Network Performance.
1 Chapter 16 Protocols and Protocol Layering. 2 Protocol  Agreement about communication  Specifies  Format of messages (syntax)  Meaning of messages.
COMPUTER NETWORKS Ms. Mrinmoyee Mukherjee Assistant Professor
University of the Western Cape Chapter 12: The Transport Layer.
FALL 2005CSI 4118 – UNIVERSITY OF OTTAWA1 Part 2.5 Internetworking Chapter 25 (Transport Protocols, UDP and TCP, Protocol Port Numbers)
TCP1 Transmission Control Protocol (TCP). TCP2 Outline Transmission Control Protocol.
The Transmission Control Protocol (TCP) Application Services (Telnet, FTP, , WWW) Reliable Stream Transport (TCP) Connectionless Packet Delivery.
Transport Control Protocol (TCP) Features of TCP, packet loss and retransmission, adaptive retransmission, flow control, three way handshake, congestion.
1 TCP: Reliable Transport Service. 2 Transmission Control Protocol (TCP) Major transport protocol used in Internet Heavily used Completely reliable transfer.
COP 4930 Computer Network Projects Summer C 2004 Prof. Roy B. Levow Lecture 3.
Chapter 24 Transport Control Protocol (TCP) Layer 4 protocol Responsible for reliable end-to-end transmission Provides illusion of reliable network to.
Prepared by Engr.Jawad Ali BSc(Hons)Computer Systems Engineering University of Engineering and Technology Peshawar.
Chapter 16 Protocols and Layering. Network Communication Protocol an agreement that specifies the format and meaning of messages computers exchange Network.
Protocol Layering Chapter 11.
The Internet Book. Chapter 16 3 A Packet Switching System Can Be Overrun Packet switching allows multiple computers to communicate without delay. –Requires.
1 Protocols and Protocol Layering. 2 Protocol Agreement about communication Specifies –Format of messages –Meaning of messages –Rules for exchange –Procedures.
TCP/IP1 Address Resolution Protocol Internet uses IP address to recognize a computer. But IP address needs to be translated to physical address (NIC).
TCP/IP Protocol Suite Suresh Kr Sharma 1 The OSI Model and the TCP/IP Protocol Suite Established in 1947, the International Standards Organization (ISO)
Computer Networking A Top-Down Approach Featuring the Internet Introduction Jaypee Institute of Information Technology.
Chapter 3: The Data Link Layer –to achieve reliable, efficient communication between two physically connected machines. –Design issues: services interface.
Protocols and layering Network protocols and software Layered protocol suites The OSI 7 layer model Common network design issues and solutions.
1 Chapter 24 Internetworking Part 4 (Transport Protocols, UDP and TCP, Protocol Port Numbers)
OSI Model OSI MODEL. Communication Architecture Strategy for connecting host computers and other communicating equipment. Defines necessary elements for.
OSI Model OSI MODEL.
Network Models.
What is a Protocol A set of definitions and rules defining the method by which data is transferred between two or more entities or systems. The key elements.
Part III Datalink Layer 10.
Ch 16 Protocols and Layering
(Ownership, Service Paradigm, Measures of Performance)
Net 222: Communications and networks fundamentals (Practical Part)
Click to edit Master subtitle style
5. End-to-end protocols (part 1)
Lecturer, Department of Computer Application
DEPARTMENT OF COMPUTER SCIENCE
Internetworking & Address Resolution
Protocols and Layering
Transport Layer Unit 5.
Process-to-Process Delivery:
Computer Networks and Internets, 5e By Douglas E. Comer
Dr. John P. Abraham Professor UTPA
Dr. John P. Abraham Professor UTPA
CPEG514 Advanced Computer Networkst
OSI Model OSI MODEL.
Computer Networking A Top-Down Approach Featuring the Internet
OSI Reference Model Unit II
Process-to-Process Delivery: UDP, TCP
Computer Networks Protocols
Protocols and Protocol Layering
The TCP/IP Model.
OSI Model 7 Layers 7. Application Layer 6. Presentation Layer
UDP Principles (Chapter 24) (User Datagram Protocol)
Error Checking continued
Unit – III Network Essentials
Presentation transcript:

Protocols and Protocol Layering Part 2.2 Protocols and Protocol Layering Robert Probert, SITE, University of Ottawa SEPT, 2003 CSI 4118

Protocol Agreement about communication Specifies Format of messages Meaning of messages Rules for exchange Procedure for handling problems SEPT, 2003 CSI 4118

Need for Protocols Hardware is low level Many problems can occur Bits corrupted or destroyed Entire packet lost Packet duplicated Packets delivered out of order SEPT, 2003 CSI 4118

Need for Protocols (continued) Need mechanisms to distinguish among Multiple computers on a network Multiple applications on a computer Multiple copies of a single application on a computer SEPT, 2003 CSI 4118

Set of Protocols Work together Each protocol solves part of communication problem Known as Protocol suite Protocol family Designed in layers SEPT, 2003 CSI 4118

Plan for Protocol Design Intended for protocol designers Divides protocols into layers Each layer devoted to one subproblem Example: ISO 7-layer reference model SEPT, 2003 CSI 4118

Illustration of the 7-Layer Model Defined early Now somewhat dated Does not include internet layer! SEPT, 2003 CSI 4118

ISO Layers Layer 1: Physical Layer 2: Data Link (media access) Underlying hardware Layer 2: Data Link (media access) Hardware frame definitions Layer 3: Network Packet forwarding Layer 4: Transport Reliability SEPT, 2003 CSI 4118

ISO Layers (continued) Layer 5: Session Login and passwords Layer 6: Presentation Data representation Layer 7: Application Individual application program SEPT, 2003 CSI 4118

Layers and Protocol Software Protocol software follows layering model One software module per layer Modules cooperate Incoming or outgoing data passes from one module to another Entire set of modules known as stack SEPT, 2003 CSI 4118

Illustration of Stacks SEPT, 2003 CSI 4118

Layers and Packet Headers Each layer Prepends header to outgoing packet Removes header from incoming packet SEPT, 2003 CSI 4118

Scientific Layering Principle Software implementing layer N at the destination receives exactly the message sent by software implementing layer N at the source SEPT, 2003 CSI 4118

Illustration of Layering Principle SEPT, 2003 CSI 4118

Protocol Techniques For bit corruption For out-of-order delivery Parity Checksum CRC For out-of-order delivery Sequence numbers Duplication SEPT, 2003 CSI 4118

Protocol Techniques (continued) For lost packets Positive acknowledgement and retransmission For replay (excessive delay) Unique message ID For data overrun Flow control SEPT, 2003 CSI 4118

Flow Control Needed because Related to buffering Two forms Sending computer system faster than receiving computer Sending application faster than receiving application Related to buffering Two forms Stop-and-go Sliding window SEPT, 2003 CSI 4118

Stop-And-Go Flow Control Sending Side Transmits one packet Waits for signal from receiver Receiving side Receives and consumes packets Transmits signal to sender Inefficient SEPT, 2003 CSI 4118

Sliding Window Flow Control Receiving side Establishes multiple buffers and informs sender Sending side Transmits packets for all available buffers Only waits if no signal arrives before transmission Sends signals as packets arrive SEPT, 2003 CSI 4118

Illustration of Sliding Window on Sending Side Window tells how many packets can be sent Window moves as acknowledgements arrive SEPT, 2003 CSI 4118

Performance Stop-and-go Sliding window Slow Useful only in special cases Sliding window Fast Needed in high-speed network SEPT, 2003 CSI 4118

Comparison of Flow Control SEPT, 2003 CSI 4118

Why Sliding Window? Simultaneously Speedup Tw = min(B, TG  W where Increase throughput Control flow Speedup Tw = min(B, TG  W where B is underlying hardware bandwidth TW is sliding window throughput TG is stop-and-go throughput W is the window size SEPT, 2003 CSI 4118

Congestion Fundamental problem in networks Caused by traffic, not hardware failure Analogous to congestion on a highway Principle cause of delay SEPT, 2003 CSI 4118

Illustration of Architecture That Can Experience Congestion Multiple sources Bottleneck SEPT, 2003 CSI 4118

Congestion and Loss Modern network hardware works well; most packet loss results from congestion, not from hardware failure SEPT, 2003 CSI 4118