Postacademic Interuniversity Course in Information Technology – Module C1p1 Chapter 2 Communications Systems Modeling.

Slides:



Advertisements
Similar presentations
Introduction 1-1 Chapter 3 Transport Layer Intro and Multiplexing Computer Networking: A Top Down Approach 6 th edition Jim Kurose, Keith Ross Addison-Wesley.
Advertisements

1 IK1500 Communication Systems IK1330 Lecture 3: Networking Anders Västberg
1 William Stallings Data and Computer Communications 7 th Edition Chapter 2 Protocols and Architecture.
Chapter 2 Network Models.
EEC-484/584 Computer Networks Lecture 3 Wenbing Zhao
EEC-484/584 Computer Networks Lecture 3 Wenbing Zhao
Networking Theory (Part 1). Introduction Overview of the basic concepts of networking Also discusses essential topics of networking theory.
OSI Model MIS 416 – Module II Spring 2002 Networking and Computer Security.
Semester Copyright USM EEE442 Computer Networks Introduction: Protocols En. Mohd Nazri Mahmud MPhil (Cambridge, UK) BEng (Essex, UK)
EE 4272Spring, 2003 Protocols & Architecture A Protocol Architecture is the layered structure of hardware & software that supports the exchange of data.
William Stallings Data and Computer Communications 7 th Edition Chapter 2 Protocols and Architecture.
Internetworking Fundamentals (Lecture #2) Andres Rengifo Copyright 2008.
TCP: Software for Reliable Communication. Spring 2002Computer Networks Applications Internet: a Collection of Disparate Networks Different goals: Speed,
EEC-484/584 Computer Networks Lecture 6 Wenbing Zhao (Part of the slides are based on Drs. Kurose & Ross ’ s slides for their Computer.
COE 342: Data & Computer Communications (T042) Dr. Marwan Abu-Amara Chapter 2: Protocols and Architecture.
1 K. Salah Module 1.0: Introduction Definition Communication Model Type of networks –WAN –MAN –LAN, WLAN –PAN, WPAN Networking Technologies Network Switching.
Data Communications Network Models.
Lecturer: Tamanna Haque Nipa
1 Review of Important Networking Concepts Introductory material. This slide uses the example from the previous module to review important networking concepts:
Process-to-Process Delivery:
Chapter 17 Networking Dave Bremer Otago Polytechnic, N.Z. ©2008, Prentice Hall Operating Systems: Internals and Design Principles, 6/E William Stallings.
Postacademic Interuniversity Course in Information Technology – Module C1p1 Chapter 3 Applications of Data Communications.
Review: – computer networks – topology: pair-wise connection, point-to-point networks and broadcast networks – switching techniques packet switching and.
OSI Model Honolulu Community College Cisco Academy Training Center
Postacademic Interuniversity Course in Information Technology – Module C1p1 Contents Link multiplexing –Circuit switching Synchronous Time-domain Multiplexing.
Protocol Architectures. Simple Protocol Architecture Not an actual architecture, but a model for how they work Similar to “pseudocode,” used for teaching.
Networks – Network Architecture Network architecture is specification of design principles (including data formats and procedures) for creating a network.
09-07-K.Steenhaut & J.Tiberghien - VUB 1 Telecommunications Concepts Chapter 1.2 Communications Systems Modeling.
1 Review - OSI Model n OSI Reference Model u represents the communications process. u 7 layers: physical, data link, network, transport, session, presentation.
Department of Electronic Engineering City University of Hong Kong EE3900 Computer Networks Introduction Slide 1 A Communications Model Source: generates.
COMPUTER NETWORKS Ms. Mrinmoyee Mukherjee Assistant Professor
NET 221D:Computer Networks Fundamentals
Network Protocol Hierarchies
University of the Western Cape Chapter 12: The Transport Layer.
Postacademic Interuniversity Course in Information Technology – Module C1p1 Chapter 5 Multiplexing.
TELE202 Lecture 5 Packet switching in WAN 1 Lecturer Dr Z. Huang Overview ¥Last Lectures »C programming »Source: ¥This Lecture »Packet switching in Wide.
Internet Protocol B Bhupendra Ratha, Lecturer School of Library and Information Science Devi Ahilya University, Indore
2.1 Chapter 2 Network Models Copyright © The McGraw-Hill Companies, Inc. Permission required for reproduction or display.
CS 453 Computer Networks Lecture 18 Introduction to Layer 3 Network Layer.
Communication Fundamentals Yi Liang 9/9/2015. Fundamentals  Layered protocols Build Message System call Send over network d Process A Process B.
Computer Security Workshops Networking 101. Reasons To Know Networking In Regard to Computer Security To understand the flow of information on the Internet.
Packet switching network Data is divided into packets. Transfer of information as payload in data packets Packets undergo random delays & possible loss.
William Stallings Data and Computer Communications
Communication Networks - Overview CSE 3213 – Fall November 2015.
BZUPAGES.COM Presentation on TCP/IP Presented to: Sir Taimoor Presented by: Jamila BB Roll no Nudrat Rehman Roll no
Institute of Technology Sligo - Dept of Computing Chapter 12 The Transport Layer.
Postacademic Interuniversity Course in Information Technology – Module C1p1 Chapter 4 Communications, Theory and Media.
2.1 Chapter 2 Network Models Copyright © The McGraw-Hill Companies, Inc. Permission required for reproduction or display.
Postacademic Interuniversity Course in Information Technology – Module C1p1 Chapter 5 Multiplexing.
Postacademic Interuniversity Course in Information Technology – Module C1p1 Chapter 2 Communications Systems Modeling.
McGraw-Hill Chapter 23 Process-to-Process Delivery: UDP, TCP Copyright © The McGraw-Hill Companies, Inc. Permission required for reproduction or display.
Network Models. The OSI Model Open Systems Interconnection (OSI). Developed by the International Organization for Standardization (ISO). Model for understanding.
Mr. Sathish Kumar. M Department of Electronics and Communication Engineering I’ve learned that people will forget what you said, people will forget what.
1. Introduction and Background Network Performance and Quality of Service.
1 Network Communications A Brief Introduction. 2 Network Communications.
Postacademic Interuniversity Course in Information Technology – Module C1p1 Contents Introduction Example: a diplomatic negotiation Principles of a layered.
Networking Mehdi Einali Advanced Programming in Java 1.
Introduction to Networks
CS408/533 Computer Networks Text: William Stallings Data and Computer Communications, 6th edition Chapter 1 - Introduction.
Chapter 3 Transport Layer
Introduction to Protocol and Layer
Introduction to Networks
Chapter 1 Data Communications and NM Overview 1-1 Chapter 1
Process-to-Process Delivery:
ECE453 – Introduction to Computer Networks
COMPUTER NETWORKS CS610 Lecture-35 Hammad Khalid Khan.
Chapter 2. Protocols and Architecture
Chapter 1 Data Communications and NM Overview 1-1 Chapter 1
Data Transmission And Digital Communication
Chapter Five: Network Software Protocol Hierarchies
Presentation transcript:

Postacademic Interuniversity Course in Information Technology – Module C1p1 Chapter 2 Communications Systems Modeling

Postacademic Interuniversity Course in Information Technology – Module C1p2 Contents Introduction Example: a diplomatic negotiation Principles of a layered model Connection oriented and connectionless communications Communication networks according to a layered model

Postacademic Interuniversity Course in Information Technology – Module C1p3 Contents Introduction Example: a diplomatic negotiation Principles of a layered model Connection oriented and connectionless communications Communication networks according to a layered model

Postacademic Interuniversity Course in Information Technology – Module C1p4 Layered Network Models The problem: Complexity of networked systems The solution: Decomposition into independent subsystems Layered network model –Introduced by IBM (SNA, 1971) –Standardized by ITU (X200) and ISO (7498) –Method universally adopted –Standards not really obeyed in practice

Postacademic Interuniversity Course in Information Technology – Module C1p5 Contents Introduction Example: a diplomatic negotiation Principles of a layered model Connection oriented and connectionless communications Communication networks according to a layered model

Postacademic Interuniversity Course in Information Technology – Module C1p6 A diplomatic negotiation Translation Cryptography Transmission Service Access Points Political arguments

Postacademic Interuniversity Course in Information Technology – Module C1p7 A diplomatic negotiation Cryptography Transmission Service Access Points Political arguments Single language messages

Postacademic Interuniversity Course in Information Technology – Module C1p8 A diplomatic negotiation Political arguments Transmission Service Access Points Single language messages Encrypted messages

Postacademic Interuniversity Course in Information Technology – Module C1p9 A diplomatic negotiation Political arguments Service Access Points Encrypted messages Single language messages Electromagnetic waves

Postacademic Interuniversity Course in Information Technology – Module C1p10 Contents Introduction Example: a diplomatic negotiation Principles of a layered model Connection oriented and connectionless communications Communication networks according to a layered model

Postacademic Interuniversity Course in Information Technology – Module C1p11 Layered Model Definitions Level (n+1) entity Level (n+1) entity Level (n) entity Level (n) entity Level (n-1) Service Provider Level n Service Access Points Level n Addresses Virtual level n+1 communication path using a level n+1 protocol Virtual level n communication path using a level n protocol Physical Communication Path

Postacademic Interuniversity Course in Information Technology – Module C1p12 Layered Model Definitions Example: The Telephone Service Telephone Network Telephone Service Access Points Telephone Numbers Virtual Interpersonal communication path Physical Communication Path

Postacademic Interuniversity Course in Information Technology – Module C1p13 Layered Model Definitions Protocol Data Units Level (n+1) entity Level (n+1) entity Level (n) entity Level (n) entity Level (n-1) Service Provider (n+1)PDU (n)PDU PDU encapsulation

Postacademic Interuniversity Course in Information Technology – Module C1p14 Contents Introduction Example: a diplomatic negotiation Principles of a layered model Connection oriented and connectionless communications Communication networks according to a layered model

Postacademic Interuniversity Course in Information Technology – Module C1p15 Connection Oriented Communications Typical example: A telephone conversation 3 step process: 1. Establish connection using the signaling protocol 2. Use connection using an informal protocol being billed for duration of usage 3. Terminate connection using the signaling protocol

Postacademic Interuniversity Course in Information Technology – Module C1p16 Connection Oriented Communications A temporary communication channel is built through the telephone network

Postacademic Interuniversity Course in Information Technology – Module C1p17 Connection Oriented Communications Network has a state : the list of active connections Network can guarantee Quality of Service –Reservation of transmission capacity at connection establishment –Monitoring of data transfer and correction of transmission errors by retransmission Network is fragile : state can be lost. Application domain : –Very efficient for transferring high volumes of data –Mandatory if stringent Quality of Service requirements –Poor initial response times due to connection setup –Inapplicable if nodes have high failure rate.

Postacademic Interuniversity Course in Information Technology – Module C1p18 Connectionless Communications Typical example: The postal service Letters, with an address and a stamp, are individually carried from a Post office box to a personal mailbox

Postacademic Interuniversity Course in Information Technology – Module C1p19 Connectionless Communications No connections are needed to carry mail

Postacademic Interuniversity Course in Information Technology – Module C1p20 Connectionless Communications The network is stateless. No guaranteed Quality of Service. –No reservation of transmission capacity –No error correction by retransmission Network is robust : –No state stored in any node –Each node operates almost independently from others Application domain : –Whenever single message response times are critical –Whenever nodes are unreliable

Postacademic Interuniversity Course in Information Technology – Module C1p21 Connection Policy Layer independance Level (n+1) entity Level (n+1) entity Level (n) entity Level (n) entity Level (n-1) Service Provider Connection oriented protocol Connectionless protocol

Postacademic Interuniversity Course in Information Technology – Module C1p22 Contents Introduction Example: a diplomatic negotiation Principles of a layered model Connection oriented and connectionless communications Communication networks according to a layered model

Postacademic Interuniversity Course in Information Technology – Module C1p23 A two layers model. Applications Layer Networks Layer Connectivity Interoperability

Postacademic Interuniversity Course in Information Technology – Module C1p24 A three layers model. Applications Layer Internet & Transport Layer Networks Layer Connectivity Interoperability

Postacademic Interuniversity Course in Information Technology – Module C1p25 Internet & Transport Layers Applications Layer Internet Layer Transport Layer Networks Layer

Postacademic Interuniversity Course in Information Technology – Module C1p26 Internet & Transport Layers Example Internet Layer Transport Layer Networks Layer WWW SKYNETUUNET TCP IP

Postacademic Interuniversity Course in Information Technology – Module C1p27 Introduced concepts Layered communications system –protocol = horizontal convention –Service access point & address Connection Oriented vs. Connectionless Communications Applications and networks layers Connectivity : – service offered by lower layers Interoperability : –full communications services Internet & Transport layers

Postacademic Interuniversity Course in Information Technology – Module C1p28 Bibliography To know More about network modeling Fred Halsall Data Communications, Computer Networks and Open Systems Fourth Edition Addison-Wesley ISBN X Recommended for this chapter