CIM6400 CTNW Lesson 9 – LAN Architectures & Networking Protocols and the OSI Model.

Slides:



Advertisements
Similar presentations
CCNA – Network Fundamentals
Advertisements

Data Communications System By Ajarn Preecha Pangsuban.
© 2007 Cisco Systems, Inc. All rights reserved.Cisco Public 1 Version 4.0 Communicating over the Network Network Fundamentals – Chapter 2.
1 Chapter 9 Computer Networks. 2 Chapter Topics OSI network layers Network Topology Media access control Addressing and routing Network hardware Network.
Protocols and the TCP/IP Suite Chapter 4 (Stallings Book)
Lesson 7 – THE BUSINESS OF NETWORKING. TCP/IP and UDP Other Internet protocols Important Internet protocols OVERVIEW.
Introduction to Management Information Systems Chapter 5 Data Communications and Internet Technology HTM 304 Fall 07.
OSI Model 7 Layers 7. Application Layer 6. Presentation Layer
Defining Network Protocols Application Protocols –Application Layer –Presentation Layer –Session Layer Transport Protocols –Transport Layer Network Protocols.
COMPUTER NETWORKS.
Networking Protocols and the OSI Model. OSI Model Overview The Open Systems Interconnection (OSI) reference model is an industry standard framework that.
 The Open Systems Interconnection model (OSI model) is a product of the Open Systems Interconnection effort at the International Organization for Standardization.
OIS Model TCP/IP Model.
©Brooks/Cole, 2003 Chapter 6 Computer Networks. ©Brooks/Cole, 2003 Understand the rationale for the existence of networks. Distinguish between the three.
Lecturer: Tamanna Haque Nipa
Lecture slides prepared for “Business Data Communications”, 7/e, by William Stallings and Tom Case, Chapter 8 “TCP/IP”.
1 Protocol Interaction (ISO’s Open Systems Interconnection (OSI model)) the 7 layers.
1.  A protocol is a set of rules that governs the communications between computers on a network.  Functions of protocols:  Addressing  Data Packet.
Chapter 6 Networking Protocols. Introduction Look at: –Protocol Basics(6.1) –A Brief Protocol Prospectus(6.2) –Transmission Control Protocol/Internet.
TC 361 Data Networking Test Review
Hands-On Microsoft Windows Server 2003 Networking Chapter Three TCP/IP Architecture.
Lesson 24. Protocols and the OSI Model. Objectives At the end of this Presentation, you will be able to:
70-291: MCSE Guide to Managing a Microsoft Windows Server 2003 Network Chapter 3: TCP/IP Architecture.
NetworkProtocols. Objectives Identify characteristics of TCP/IP, IPX/SPX, NetBIOS, and AppleTalk Understand position of network protocols in OSI Model.
Chapter 2 Network Models
Presentation on Osi & TCP/IP MODEL
Section 5.1 Explain why standards are necessary for networking
Jaringan Komputer Dasar OSI Transport Layer Aurelio Rahmadian.
ACM 511 Chapter 2. Communication Communicating the Messages The best approach is to divide the data into smaller, more manageable pieces to send over.
© 2007 Cisco Systems, Inc. All rights reserved.Cisco Public 1 Version 4.0 Network Services Networking for Home and Small Businesses – Chapter 6.
Computer Communication & Networks Lecture # 02 Nadeem Majeed Choudhary
© McLean HIGHER COMPUTER NETWORKING Lesson 1 – Protocols and OSI What is a network protocol Description of the OSI model.
Chapter Three Network Protocols By JD McGuire ARP Address Resolution Protocol Address Resolution Protocol The core protocol in the TCP/IP suite that.
Chap 9 TCP/IP Andres, Wen-Yuan Liao Department of Computer Science and Engineering De Lin Institute of Technology
TCP/IP TCP/IP LAYERED PROTOCOL TCP/IP'S APPLICATION LAYER TRANSPORT LAYER NETWORK LAYER NETWORK ACCESS LAYER (DATA LINK LAYER)
Protocols. Protocol Set of rules that govern: Connection Communication data transfer Protocols regulate: access method allowed physical topologies types.
11 TRANSPORT LAYER PROTOCOLS Chapter 6 TCP and UDP SPX and NCP.
Addressing Through the Layers  Data Link Layer Address  Network Layer Address.
NSH0503/01/11041 Overview Computer Network Technology By Diyurman Gea.
Networking Network Classification, by there: 3 The Rules they use to exchange data: Protocols.
Application Layer Khondaker Abdullah-Al-Mamun Lecturer, CSE Instructor, CNAP AUST.
Data Communications and Networks
William Stallings Data and Computer Communications
TCP/IP MODEL   Short overview for OSI model;  What is TCP/IP model?;  How is divided;  The TCP/IP structure;  The Application Layer;  The Transport.
1 Chapter Overview Network Communications The OSI Reference Model.
1 Chapter Overview Network Communications The OSI Reference Model.
70-291: MCSE Guide to Managing a Microsoft Windows Server 2003 Network, Enhanced Chapter 3: TCP/IP Architecture.
BASIC NETWORK PROTOCOLS AND THEIR FUNCTIONS Created by: Ghadeer H. Abosaeed June 23,2012.
Open System Interconnection Describe how information from a software application in one computer moves through a network medium to a software application.
Advanced Higher Computing Computer Networking Topic 1: Network Protocols and Standards.
LAN Protocols Chapter 5. Learning Objectives Explain the following LAN protocols and how they work with network operating systems: IPX/SPX, NetBEUI, AppleTalk,
Network Models. The OSI Model Open Systems Interconnection (OSI). Developed by the International Organization for Standardization (ISO). Model for understanding.
The OSI Model. Understanding the OSI Model In early 1980s, manufacturers began to standardize networking so that networks from different manufacturers.
Welcome Back Cisco Semester 1 & 2 Review. Why are Networks Complex Environments?? They involve: They involve: –Interconnections to networks outside an.
CIS 173 Networking Week #9 OBJECTIVES Chapter #6 Network Communications Protocols.
© 2007 Cisco Systems, Inc. All rights reserved.Cisco Public 1 Version 4.0 Network Services Networking for Home and Small Businesses – Chapter 6.
Chapter Objectives In this chapter, you will learn:
Computer Networks.
Protocols.
Lec 2: Protocols.
Understand the OSI Model Part 2
Networking for Home and Small Businesses – Chapter 6
Networking for Home and Small Businesses – Chapter 6
Computing Over Distance
1 TRANSMISSION CONTROL PROTOCOL / INTERNET PROTOCOL (TCP/IP) K. PALANIVEL Systems Analyst, Computer Centre Pondicherry University, Puducherry –
Networking for Home and Small Businesses – Chapter 6
OSI Reference Model Unit II
OSI Model 7 Layers 7. Application Layer 6. Presentation Layer
Objectives: 1.Identify different internet protocol (IP) 2.Configure sample of IP address 3.Appreciate and relate protocol in our life.
Presentation transcript:

                                       CIM6400 CTNW Lesson 9 – LAN Architectures & Networking Protocols and the OSI Model

LAN Architectures

Ethernet Architecture refers to the overall structure of a computer or communication system. It determines the capabilities and limitations of the system. The Ethernet architecture is based on the IEEE 802.3 standard. The IEEE 802.3 standard specifies that a network implements the Carrier Sense Multiple Access with Collision Detection (CSMA/CD) access control method. Standard transfer rates are 10 Mbps or 100 Mbps, but new standards provide for gigabit Ethernet, which are capable of attaining speeds up to 1 Gbps over fiber-optic cable or other high-speed media.

Ethernet 10BASE-T uses a star topology. The 10 stands for the common transmission speed of 10 Mbps, the "BASE" stands for baseband mode, and the "T" stands for twisted pair cabling. Ethernet cable generally describes the UTP cabling, but STP cable can also be used.

Ethernet 100BASE-X (also called Fast Ethernet) comes in several different varieties. It can be implemented over 4-pair Category 3, 4, or 5 UTP (100BASE-T). It can also be implemented over 4-pair Category 5 UTP or Shielded Twisted Pair (STP) (100BASE-TX), or as Ethernet over 2-strand fiber-optic cable (100BASE-FX).

Ethernet 1000BASE-T is Gigabit Ethernet. This architecture supports data transfer rates of 1 Gbps. Its implementation over fiber-optic cable makes it suitable for metropolitan-area networks (MANs).

Token Ring The Token Ring standards are defined in IEEE 802.5. It is often integrated with IBM mainframe systems such as AS400. Token Ring is so named of its logical topology and its MAC method of token passing. The transfer rate for Token Ring can be either 4Mbps or 16Mbps. A Token Ring network uses a token (that is, a special signal) to control access to the cable. A token is initially generated when the first computer on the network comes online. When a computer wants to transmit, it waits for and then takes control of the token when it comes its way. The token can travel in either direction around the ring, but only in one direction at a time.

Fiber Distributed Data Interface (FDDI) FDDI is a type of Token Ring network. It runs on fiber-optic cable, and thus combines high-speed performance with the advantages of the token-passing ring topology. It runs at 100 Mbps, and its topology is a dual ring. The outer ring is called the primary ring and the inner ring is called the secondary ring. Normally, traffic flow only on the primary ring. If primary ring fails, the data automatically flows onto the secondary ring in the opposite direction (fault tolerance). Advantages High speed fiber-optic transmission Not susceptible to EMI and noise Send data for greater distances between repeaters

Networking Protocols and the OSI Model

OSI Model Overview The Open Systems Interconnection (OSI) reference model is an industry standard framework that is used to divide the functions of networking into seven distinct layers. Each layer provides specific services to the layers above and below it in order for the network to work effectively.

OSI Model Overview A message begins at the top application layer and moves down the OSI layers to the bottom physical layer. As the message descends, each successive OSI model layer adds a header to it.

OSI Model Overview A header is layer-specific information that basically explains what functions the layer carried out. Conversely, at the receiving end, headers are striped from the message as it travels up the corresponding layers. The process of data being encapsulated on the sending end and data being de-encapsulated on the receiving end is the function of the OSI model.

OSI Model Layer and Their Functions The OSI model was intended to be a reference model for developing networking protocols.

What is a Protocol? Protocol is a controlled sequence of messages that is exchanged between two or more systems to accomplish a given task. Protocol specifications define this sequence together with the format or layout of the messages that are exchanged.

Transmission Control Protocol/Internet Protocol The Transmission Control Protocol/Internet Protocol (TCP/IP) suite of protocols has become the dominant standard for inter-networking. TCP/IP represents a set of public standards that specify how packets of information are exchanged between computers over one or more networks.  Internet

Transmission Control Protocol/Internet Protocol

Transmission Control Protocol/Internet Protocol Application Protocols Hypertext Transfer Protocol (HTTP) Govern how files – such as text, graphics, sounds and video – are exchanged on the Internet. A web server runs an HTTP services or daemon. A daemon is a program that services HTTP requests. Hypertext Markup Language (HTML) A page-description language Web designers use HTML to indicate to web browser software how the page should look. Telnet Enables terminal access to local or remote systems

Transmission Control Protocol/Internet Protocol Application Protocols (Cont.) File Transfer Protocol (FTP) Provides services for file transfer and manipulation. FTP uses the session layer to allow multiple simultaneous connections to remote file system Simple Mail Transport Protocol (SMTP) Provides messaging services over TCP/IP and supports most Internet e-mail programs. Domain Name System (DNS) Provides access to name servers, where network names are translated to the addresses used by Layer 3 network protocols.

Transmission Control Protocol/Internet Protocol Transport Protocols Transmission Control Protocol (TCP) Facilities for end-to-end connection establishment, error detection and recovery, and metering the rate of data flow into the network (i.e. for reliable delivery of data) User Datagram Protocol (UDP) Offers a connectionless service to applications Uses lower overhead than TCP Both TCP & UDP identify applications by port number

Transmission Control Protocol/Internet Protocol Internet Protocols Internet Protocol (IP) address Provides source and destination addressing. In conjunction with routing protocols, the IP address provides packet forwarding from one network to another Internet Control Message Protocol (ICMP) Used for network testing and trouble-shooting, it enables diagnostic and error messages Routing Information Protocol (RIP) Operates between router devices to discover paths between networks Address Resolution Protocol (ARP) Maps an IP address to a physical machine address

Internetwork Packet Exchange/Sequenced Packet Exchange Internetwork Packet Exchange/Sequenced Packet Exchange (IPX/SPX) is the protocol suite employed originally by Novell®, NetWare. It delivers functions similar to those included in TCP/IP. The native – or original – NetWare protocols remained proprietary

NetBEUI NetBIOS Extended User Interface (NetBEUI) is a protocol used primarily on small Windows NT networks. It was used earlier as the default networking protocol in Windows 3.11, Windows for Workgroups, and LAN manager. NetBEUI is a simple protocol that lacks many of the features that enable protocol suites such as TCP/IP to be used on networks of almost any size. NetBEUI cannot be used to build large networks or to connect several networks. However, it is suitable for small peer-to-peer networks. It can be used in conjunction with another routable protocol such as TCP/IP.

AppleTalk AppleTalk is a protocol suite that is used to network Macintoch computers. AppleTalk is comprised of a set of protocols that span the seven layers of the OSI reference model. AppleTalk protocols were designed to run over the major LAN types, notably Ethernet and Token Ring, and also Apple's own LAN physical topology, LocalTalk. Like Novell, Apple Computer also developed its own proprietary protocol suite to network Macintosh computers.