Network Architecture Protocol hierarchies Design Issues for the layers

Slides:



Advertisements
Similar presentations
Intermediate TCP/IP TCP Operation.
Advertisements

TELE202 Lecture 13 TCP/UDP (1) 1 Lecturer Dr Z. Huang Overview ¥This Lecture »Internet Protocols (4) »Source: chapter 15 ¥This Lecture »TCP/UDP (1) »Source:
Data Communications System By Ajarn Preecha Pangsuban.
Answers of Exercise 7 1. Explain what are the connection-oriented communication and the connectionless communication. Give some examples for each of the.
Microcomputer Networking II St. Cloud State University MCS 426, Fall 1999 Instructor: Adomas Svirskas Introduction Instructor: Visiting Instructor Adomas.
Network Layer and Transport Layer.
28.2 Functionality Application Software Provides Applications supply the high-level services that user access, and determine how users perceive the capabilities.
© 2007 Cisco Systems, Inc. All rights reserved.Cisco Public 1 Version 4.0 OSI Transport Layer Network Fundamentals – Chapter 4.
EEC-484/584 Computer Networks Lecture 2 Wenbing Zhao
TCP/IP Protocol Suite 1 Copyright © The McGraw-Hill Companies, Inc. Permission required for reproduction or display. Chapter 2 The OSI Model and the TCP/IP.
EEC-484/584 Computer Networks Lecture 2 Wenbing Zhao
EEC-484/584 Computer Networks Lecture 2 Wenbing Zhao
Internetworking Fundamentals (Lecture #2) Andres Rengifo Copyright 2008.
TCP: Software for Reliable Communication. Spring 2002Computer Networks Applications Internet: a Collection of Disparate Networks Different goals: Speed,
Chapter 2 Network Models.
The OSI Model A layered framework for the design of network systems that allows communication across all types of computer systems regardless of their.
 The Open Systems Interconnection model (OSI model) is a product of the Open Systems Interconnection effort at the International Organization for Standardization.
Network Software.
Process-to-Process Delivery:
TRANSPORT LAYER T.Najah Al-Subaie Kingdom of Saudi Arabia Prince Norah bint Abdul Rahman University College of Computer Since and Information System NET331.
Network Architecture Dr. Sanjay P. Ahuja, Ph.D FIS Distinguished Professor of Computer Science School of Computing, UNF.
Presentation on Osi & TCP/IP MODEL
What is a Protocol A set of definitions and rules defining the method by which data is transferred between two or more entities or systems. The key elements.
Network Software. 2 Overview Protocol Hierarchies Design Issues for the Layers Interfaces and Services Connection-Oriented and Connectionless Services.
Definitions Protocol (1) An agreement between the communicating parties on how communication is to proceed. (2) A set of rules that governs how two or.
NETWORK SOFTWARE Software structuring technique. Network Software Protocol Hierarchies Design Issues for the Layers Connection-Oriented and Connectionless.
Internet Addresses. Universal Identifiers Universal Communication Service - Communication system which allows any host to communicate with any other host.
Networks – Network Architecture Network architecture is specification of design principles (including data formats and procedures) for creating a network.
6.1. Transport Control Protocol (TCP) It is the most widely used transport protocol in the world. Provides reliable end to end connection between two hosts.
© 2007 Cisco Systems, Inc. All rights reserved.Cisco Public 1 Version 4.0 Network Services Networking for Home and Small Businesses – Chapter 6.
Mukesh N. Tekwani Elphinstone College Mumbai
جلسه دوم شبکه های کامپیوتری به نــــــــــــام خدا.
The OSI Model An ISO (International standard Organization) that covers all aspects of network communications is the Open System Interconnection (OSI) model.
The OSI Model and the TCP/IP Protocol Suite Outline: 1.Protocol Layers 2.OSI Model 3.TCP/IP Model 4.Addressing 1.
COMPUTER NETWORKS Ms. Mrinmoyee Mukherjee Assistant Professor
The OSI Model.
Computer Networks Chapter 2 – Network Models. Summer 2006Computer Networks2 Communication Tasks  The tasks given below need to be taken care of in any.
TCP/IP TCP/IP LAYERED PROTOCOL TCP/IP'S APPLICATION LAYER TRANSPORT LAYER NETWORK LAYER NETWORK ACCESS LAYER (DATA LINK LAYER)
TCP1 Transmission Control Protocol (TCP). TCP2 Outline Transmission Control Protocol.
Lecture 3 Overview. Protocol An agreed upon convention for communication both endpoints need to understand the protocol. Protocols must be formally defined.
Spring 2006Computer Networks1 Chapter 2 Network Models.
NETWORKING CONCEPTS. PROTOCOLS In a n/w communication occurs b/w 2 entities Entity means anything that is capable of sending and receiving information.
Chapter 2 Applications and Layered Architectures Sockets.
Types of Service. Types of service (1) A network architecture may have multiple protocols at the same layer in order to provide different types of service.
Institute of Technology Sligo - Dept of Computing Chapter 12 The Transport Layer.
Individual Project 1 Sarah Pritchard. Fran, a customer of your company, would like to visit your company’s website from her home computer… How does your.
Advanced UNIX programming Fall 2002, lecture 16 Instructor: Ashok Srinivasan Acknowledgements: The syllabus and power point presentations are modified.
Protocol Layering Chapter 11.
4343 X2 – The Transport Layer Tanenbaum Ch.6.
Data Communications and Networks Chapter 6 – IP, UDP and TCP ICT-BVF8.1- Data Communications and Network Trainer: Dr. Abbes Sebihi.
Network Layer Lecture Network Layer Design Issues.
TCP/IP Protocol Suite Suresh Kr Sharma 1 The OSI Model and the TCP/IP Protocol Suite Established in 1947, the International Standards Organization (ISO)
1 Network Communications A Brief Introduction. 2 Network Communications.
Process-to-Process Delivery:
The OSI Model Prof. Choong Seon HONG.
Network Architecture Layered Architectures Network Protocols
Packet Switching Datagram Approach Virtual Circuit Approach
Telemedicine.
Understanding the OSI Reference Model
NET323 D: Network Protocols
Chapter 3: Open Systems Interconnection (OSI) Model
EEC-484/584 Computer Networks
NET323 D: Network Protocols
Process-to-Process Delivery:
CPEG514 Advanced Computer Networkst
Process-to-Process Delivery: UDP, TCP
Chapter Five: Network Software Protocol Hierarchies
Transport Layer 9/22/2019.
Presentation transcript:

Network Architecture Protocol hierarchies Design Issues for the layers Connection-oriented and connectionless services Service Primitives

Protocol hierarchies To reduce their design complexity, most networks are organized as a stack of layers or levels, each one built upon the one below it. A protocol is an agreement between the communicating parties on how communication is to proceed. A five-layer network is illustrated in Figure 5.1. The entities comprising the corresponding layers on different machines are called peers.

Layers, Protocols and Interfaces

Layers, Protocols and Interfaces(2) Each layer passes data and control information to the layer immediately below it, until the lowest layer is reached. Between each pair of adjacent layers is an interface. The interface defines which primitive operations and services the lower layer makes available to the upper one. A set of layers and protocols is called a network architecture. The specification of an architecture must contain enough information to allow an implementer to write the program or build the hardware for each layer so that it will correctly obey the appropriate protocol. A list of protocols used by a certain system, one protocol per layer, is called a protocol stack.

Multilayer communication analogy Imagine two philosophers, one of whom speaks Urdu and English and one of whom speaks Chinese and French. Since they have no common language, they each engage a translator each of whom in turn contacts a secretary. Philosopher 1 wishes to convey his affection for oryctolagus cuniculus to his peer. To do so, he passes a message (in English) across the 2/3 interface to his translator, saying ''I like rabbits,'' as illustrated in Figure 5.2. The translators have agreed on a neutral language known to both of them, Dutch, so the message is converted to ''Ik vind konijnen leuk.'' The choice of language is the layer 2 protocol and is up to the layer 2 peer processes. The translator then gives the message to a secretary for transmission, by, for example, fax (the layer 1 protocol). When the message arrives, it is translated into French and passed across the 2/3 interface to philosopher 2.

The philosopher-translator-secretary architecture

Layers virtual communication A message, M, is produced by an application process running in layer 5 and given to layer 4 for transmission. Layer 4 puts a header in front of the message to identify the message and passes the result to layer 3. Layer 3 must break up the incoming messages into smaller units, packets, prepending a layer 3 header to each packet. Layer 3 decides which of the outgoing lines to use and passes the packets to layer 2. Layer 2 adds not only a header to each piece, but also a trailer, and gives the resulting unit to layer 1 for physical transmission. At the receiving machine the message moves upward, from layer to layer, with headers being stripped off as it progresses.

Layers virtual communication(2)

Design issues for the layers Some form of addressing is needed in order to specify a specific destination Rules for data transfer. Half-duplex and duplex transmission Error control. Both ends of the connection must agree on error detecting and error correcting codes Sequencing and reassembly. Messages may arrive out of order and hence need for provision for proper reassembly. Flow control. Need to regulate flow of data to avoid swamping receiver. Could require receiver feedback or limit transmission rate Inability of all processes to accept arbitrarily long messages. This property leads to mechanisms for disassembling, transmitting, and then reassembling messages. Routing:- Choosing a path when there are multiple path between source and destination

Connection-oriented and connectionless services Connection-oriented service is modeled after the telephone system To talk to someone, you pick up the phone, dial the number, talk, and then hang up To use a connection-oriented network service, the service user first establishes a connection, uses the connection, and then releases the connection. Connectionless service is modeled after the postal system Each message (letter) carries the full destination address, and each one is routed through the system independent of all the others.

Service primitives A service is formally specified by a set of primitives (operations) available to a user process to access the service. These primitives tell the service to perform some action or report on an action taken by a peer entity. The set of primitives available depends on the nature of the service being provided. The primitives for connection-oriented service are different from those of connectionless service. As a minimal example of the service primitives that might be provided to implement a reliable byte stream in a client-server environment, consider the primitives listed below

Service primitives

Use of service primitives(1) The server executes LISTEN to indicate that it is prepared to accept incoming connections. The client process executes CONNECT to establish a connection with the server. The CONNECT call needs to specify who to connect to, so it might have a parameter giving the server's address. The operating system then typically sends a packet to the peer asking it to connect, as shown by (1) When the system sees that the packet is requesting a connection, it checks to see if there is a listener. If so, it does two things: unblocks the listener and sends back an acknowledgement (2).

Use of service primitives(2) The next step is for the server to execute RECEIVE to prepare to accept the first request. Then the client executes SEND to transmit its request (3) followed by the execution of RECEIVE to get the reply. The arrival of the request packet at the server machine unblocks the server process so it can process the request. After it has done the work, it uses SEND to return the answer to the client (4). Usually, an initial DISCONNECT is a blocking call, suspending the client and sending a packet to the server saying that the connection is no longer needed (5). When the server's packet (6) gets back to the client machine, the client process is released and the connection is broken.

Client server connection-oriented network

Relationship between service and protocol A service is a set of primitives (operations) that a layer provides to the layer above it. The service defines what operations the layer is prepared to perform on behalf of its users, but it says nothing at all about how these operations are implemented. A protocol, in contrast, is a set of rules governing the format and meaning of the packets, or messages that are exchanged by the peer entities within a layer. In other words, services relate to the interfaces between layers, as illustrated below. In contrast, protocols relate to the packets sent between peer entities on different machines.

Relationship between service and protocol