NETWORKING CONCEPTS. PROTOCOLS In a n/w communication occurs b/w 2 entities Entity means anything that is capable of sending and receiving information.

Slides:



Advertisements
Similar presentations
OSI MODEL Maninder Kaur
Advertisements

2.1 Chapter 2 Network Models Copyright © The McGraw-Hill Companies, Inc. Permission required for reproduction or display.
Data and Computer Communications Eighth Edition by William Stallings Lecture slides by Lawrie Brown Chapter 2 – Protocol Architecture, TCP/IP, and Internet-Based.
Chapter 2 Network Models.
Data and Computer Communications Eighth Edition by William Stallings Lecture slides by Lawrie Brown Chapter 2 – Protocol Architecture, TCP/IP, and Internet-Based.
2.1 Chapter 2 Network Models Copyright © The McGraw-Hill Companies, Inc. Permission required for reproduction or display.
PROTOCOLS AND ARCHITECTURE Lesson 2 NETS2150/2850.
2.1 Background Information Network Models LAYERED TASKS We use the concept of layers in our daily life. As an example, let us consider two friends.
TCP/IP Protocol Suite 1 Copyright © The McGraw-Hill Companies, Inc. Permission required for reproduction or display. Chapter 2 The OSI Model and the TCP/IP.
William Stallings Data and Computer Communications 7 th Edition Chapter 2 Protocols and Architecture.
Introduction© Dr. Ayman Abdel-Hamid, CS4254 Spring CS4254 Computer Network Architecture and Programming Dr. Ayman A. Abdel-Hamid Computer Science.
COE 342: Data & Computer Communications (T042) Dr. Marwan Abu-Amara Chapter 2: Protocols and Architecture.
Chapter 2 Network Models.
NETWORK MODELS T.Najah Al_Subaie Kingdom of Saudi Arabia Prince Norah bint Abdul Rahman University College of Computer Since and Information System NET331.
Chapter 2 Network Models
NETWORKING CONCEPTS. OSI MODEL Established in 1947, the International Standards Organization (ISO) is a multinational body dedicated to worldwide agreement.
Data Communications Taught by Mr. Kim No, M.Sc. In Telecommunications Engineering Chapter 2: Network Model 1.
Data and Computer Communications Eighth Edition by William Stallings Lecture slides by Lawrie Brown Chapter 2 – Protocol Architecture, TCP/IP, and Internet-Based.
Review: – computer networks – topology: pair-wise connection, point-to-point networks and broadcast networks – switching techniques packet switching and.
Network Architecture Dr. Sanjay P. Ahuja, Ph.D FIS Distinguished Professor of Computer Science School of Computing, UNF.
Introducing Network Standards
Networks – Network Architecture Network architecture is specification of design principles (including data formats and procedures) for creating a network.
CIT-Dept-IFM 2006/7 Institute of Finance Management 2006 CIT232- Computer Networks 1/30 Protocols and Standards Protocols and Standards Protocols Standards.
McGraw-Hill©The McGraw-Hill Companies, Inc., 2000 Powerpoint Templates Computer Communication and Networks Lecture # 04 Muhammad Waseem Iqbal.
Data and Computer Communications Chapter 2 – Protocol Architecture, TCP/IP, and Internet-Based Applications 1.
Department of Electronic Engineering City University of Hong Kong EE3900 Computer Networks Introduction Slide 1 A Communications Model Source: generates.
 An ISO is a multi national body dedicated to worldwide agreement on international standards.  An ISO standard that covers all aspects of network communications.
Data and Computer Communications Chapter 2 – Protocol Architecture, TCP/IP, and Internet-Based Applications.
 Communication Tasks  Protocols  Protocol Architecture  Characteristics of a Protocol.
NET 221D:Computer Networks Fundamentals
Network Protocol Hierarchies
Spring 2006Computer Networks1 Chapter 2 Network Models.
NETWORKING CONCEPTS. NETWORK MODEL n/w is a combination of h/w,s/w that sends data from one location to other h/w consist of any physical equipment that.
INTRODUCTION. A Communications Model Source –generates data to be transmitted Transmitter –Converts data into transmittable signals Transmission System.
2.1 Chapter 2 Network Models Copyright © The McGraw-Hill Companies, Inc. Permission required for reproduction or display.
McGraw-Hill©The McGraw-Hill Companies, Inc., 2004 Chapter 2 Network Models.
MODULE I NETWORKING CONCEPTS.
1 Kyung Hee University Chapter 2 Network Models. 2 Kyung Hee University 2.1 LAYERED TASKS We use the concept of layers in our daily life. As an example,
Introduction to Information Technologies Chapter 1 - Introduction
Prepared by Engr.Jawad Ali BSc(Hons)Computer Systems Engineering University of Engineering and Technology Peshawar.
BZUPAGES.COM 2.1 Chapter 2 Network Models Copyright © The McGraw-Hill Companies, Inc. Permission required for reproduction or display.
Chapter 2 Network Models
Introduction. Data Communication Communication Communication Sharing information: Local & Remote Sharing information: Local & Remote Local Local Face.
Network Models.
CSCD 218 : DATA COMMUNICATIONS AND NETWORKING 1
When we communicate, we are sharing information. This sharing can be local or remote. Between individuals, local communication usually occurs face to face,
Network Architecture Protocol hierarchies Design Issues for the layers
2.1 Chapter 2 Network Models Copyright © The McGraw-Hill Companies, Inc. Permission required for reproduction or display.
OSI Model. Open Systems Interconnection (OSI) is a set of internationally recognized, non proprietary standards for networking and for operating system.
Lecturer: Mrs. Rohani bt Hassan
Powerpoint Templates Data Communication Muhammad Waseem Iqbal Lecture # 07 Spring-2016.
Chapter 4 : Network models. Lecture 8. Layered Tasks - We use the concept of layers in our daily life. As an example, let us consider 2 friends who communicate.
Computer Networking A Top-Down Approach Featuring the Internet Introduction Jaypee Institute of Information Technology.
McGraw-Hill©The McGraw-Hill Companies, Inc., 2000 Lecture 3 : Network Architectures 1.
Network Models.
Chapter 2 Network Models.
Overview of Data Communications and Networking
PROTOCOLS PROTOCOLS.
The ISO OSI Reference Model
Chap. 2 Network Models.
Understanding the OSI Reference Model
Data and Computer Communications by William Stallings Eighth Edition
Layered Task, OSI Model, TCP/IP Model
Topics discussed in this section:
2.1 Chapter 2 Network Models Copyright © The McGraw-Hill Companies, Inc. Permission required for reproduction or display.
Computer Networking A Top-Down Approach Featuring the Internet
Layered Tasks.
Chapter Five: Network Software Protocol Hierarchies
Lec 4 Network Models Computer Networks Al-Mustansiryah University
2.1 Chapter 2 Network Models Copyright © The McGraw-Hill Companies, Inc. Permission required for reproduction or display.
Presentation transcript:

NETWORKING CONCEPTS

PROTOCOLS In a n/w communication occurs b/w 2 entities Entity means anything that is capable of sending and receiving information For communication to occur the entiety must agree a protocol ie. protocol means a set of rule that govern data communication ie. It defines what is communicated How it is communicated When it is communicated

PROTOCOLS Key Elements of a protocol are Syntax Symantics and Timing Syntax Refers structure or format of data Eg. A simple protocol might expect the first 8 bit of data to be address of sender,2 nd 8 bit to be the address of the receiver and rest of stream to be the message itself

PROTOCOLS Key Elements of a protocol are Semantics Refers to meaning of each section of bits ie.how a particular pattern to be interpreted and what action to be taken based on that interpretation Eg.whether an address identify the route to be taken or the final destination of the message?

PROTOCOLS Key Elements of a protocol are Timing Refers to 2 characteristics When data should sent How fast they can sent Eg. if a sender produces data at 100 Mbps, the transmission will overload the receiver and some data will be lost.

STANDARDS Provides guidelines to manufacturer,vendors,govt agencies and othe rservice providers to ensure the kind of interconnectivity necessary in today’s market place and in international communication 2 categories of standards Defacto Dejure

STANDARDS Defacto Standard that have not been approved by an international body but have standards are often estabilished originally by manufacturers who seek to define the functionality of a new product or technology Dejure Standards that are legislated by an officially recognized body are De Jure standards

FORUMS Standards committees are procedural bodies and slow moving So forums are developed.They are made up of representatives from interested corporations Forums work with universities and users to test,evaluate,and standardise new technologies The forums submit their conclusion to the standard bodies based on the acceptance and use of those technologies in the telecommunication community

Protocol Architecture

The entities comprising the corresponding layers on different machines are called peers. The peers that communicate by using the protocol to talk to each other. Each layer passes data and control information to the layer immediately below it, until the lowest layer is reached. Below layer 1 is the physical medium through which actual communication occurs. Between each pair of adjacent layers is an interface. The interface defines which primitive operations and services the lower layer makes available to the upper one. A list of the protocols used by a certain system, one protocol per layer, is called a protocol stack. A set of layers and protocols is called a network architecture.

NETWORK MODEL n/w is a combination of h/w,s/w that sends data from one location to other h/w consist of any physical equipment that carries signals from one point of n/w to other s/w consist of instruction set that make possible the services that use expect from a n/w

eg. Consider service provided by a network like sending from one point in world to other It can be broken up to several task performed by separate s/w package and each s/w package uses services of other s/w package At lowest layer a signal or a set of signals is sent from source computer to the destination computer

LAYERED TASKS We use the concept of layers in our daily life. As an example, let us consider two friends who communicate through postal mail. The process of sending a letter to a friend would be complex if there were no services available from the post office. Tasks involved in sending a letter

In fig there is sender,receiver, carrier that transports letter Hierarchy of tasks involved are Higher layer. The sender writes the letter inserts the letter in an envelope writes the sender and receiver addresses and drops the letter in a mailbox. Middle layer. The letter is picked up by a letter carrier and delivered to the post office. Lower layer. The letter is sorted at the post office; a carrier transports the letter.

On the Way The letter is then on its way to the recipient. On the way to the recipient's local post office, the letter may actually go through a central office. In addition, it may be transported by truck, train, airplane etc

On the Way The letter is then on its way to the recipient. On the way to the recipient's local post office, the letter may actually go through a central office. In addition, it may be transported by truck, train, airplane etc

At the Receiver Site Lower layer. The carrier transports the letter to the post office. Middle layer. The letter is sorted and delivered to the recipient's mailbox. Higher layer. The receiver picks up the letter, opens the envelope, and reads it.

At the Receiver Site Lower layer. The carrier transports the letter to the post office. Middle layer. The letter is sorted and delivered to the recipient's mailbox. Higher layer. The receiver picks up the letter, opens the envelope, and reads it.

Hierarchy There are three different activities at the sender site and another three activities at the receiver site. The task of transporting the letter between the sender and the receiver is done by the carrier. The tasks must be done in the order given in the hierarchy. At the sender site, the letter must be written and dropped in the mailbox before being picked up by the letter carrier and delivered to the post office. At the receiver site, the letter must be dropped in the recipient mailbox before being picked up and read by the recipient.

Services Each layer at the sending site uses the services of the layer immediately above it Sender at higher layer uses services of middle layer Middle layer uses services of lower layer Lower layer uses services of carrier