Presentation is loading. Please wait.

Presentation is loading. Please wait.

Chapter 2 Network Models

Similar presentations


Presentation on theme: "Chapter 2 Network Models"— Presentation transcript:

1 Chapter 2 Network Models
Copyright © The McGraw-Hill Companies, Inc. Permission required for reproduction or display.

2 2-1 LAYERED TASKS We use the concept of layers in our daily life. As an example, let us consider two friends who communicate through postal mail. The process of sending a letter to a friend would be complex if there were no services available from the post office.

3 Figure 2.1 Tasks involved in sending a letter

4 Network models OSI model TCP \ IP model

5 2-2 THE OSI MODEL Established in 1947, the International Standards Organization (ISO) is a multinational body dedicated to worldwide agreement on international standards. An ISO standard that covers all aspects of network communications is the Open Systems Interconnection (OSI) model. It was first introduced in the late 1970s.

6 ISO is the organization. OSI is the model.
Note ISO is the organization. OSI is the model. The purpose of OSI model is to show how to facilitate communication between two different systems without requiring change to the logic of the underling H/W and S/W. The OSI model ( not a protocol ) that is: flexible, robust, and interoperable. It consists of seven separate but related layers, each of which defines a part of the process of moving information across a network.

7 Figure 2.2 Seven layers of the OSI model

8 Layered Architecture OSI model consists of 7 layers.
Each layer defines a family of functions distinct from those of the other layers. Within a single machine, each layer calls upon the services of the layer just below it. e.g. layer 3 uses the services provided by layer 2 and provides services for layer 4. Between machines, layer x on one machine communicate with layer x on another machine. This communication is govern by an agreed-upon series of rules and convention called protocols. Communication between machines is a peer-to-peer process using the protocols appropriate to a given layer.

9 Figure 2.3 The Interaction between layers in the OSI model

10 Organization of the Layers
The seven layers can be thought of as belonging to three subgroups: Layers 1,2, and 3 – physical, data link, and network – are the network support layers. Layers 5,6, and 7 – session, presentation, and application – are user support layers; they allow interoperability among unrelated software systems. Layer 4, the transport layer, links the two groups and ensures that what the lower layers have transmitted is in a form that the upper layers can use. The upper OSI layers almost implemented in S/W; lowers layers are combination of S/W and H/W except for the physical layer which is mostly H/W.

11 Encapsulation There is another aspect of data communications in the OSI model: Encapsulation. The data portion of a packet at level N-1 carries the whole packet ( data and header and maybe trailer) from level N. The concept is called encapsulation; where level N-1 is not aware of which part of the encapsulated packet is data and which part is the header or trailer.

12 Figure 2.4 An exchange using the OSI model
Organization of the Layers

13 Topics discussed in this section:
2-3 LAYERS IN THE OSI MODEL In this section we briefly describe the functions of each layer in the OSI model. Topics discussed in this section: Physical Layer Data Link Layer Network Layer Transport Layer Session Layer Presentation Layer Application Layer

14 1. Physical layer The physical layer coordinate the functions required to carry a bit stream over a physical medium including: Dealing with the mathematical and electrical specifications of the interfaces and transmission medium. It defines the procedures and functions that physical devices and interfaces have to perform for transmission to occur. The physical layer is also concerned with: Physical characteristics of interfaces and medium. Representation of bits Data rate Synchronization of bits Line configuration Physical topology Transmission mode

15 Figure 2.5 Physical layer

16 2. Data Link layer The data link layer transforms the physical layer to reliable link. It makes the physical layer appear error-free to the upper layer (network layer). There are other responsibilities of data link layer include: Framing Physical addressing Flow control Error control Access control

17 Figure 2.6 Data link layer

18 Figure 2.7 Hop-to-hop delivery

19 3. Network layer The network layer is responsible for the delivery of individual packets from the source host to the destination host. If two systems are connected to the same link, there is usually no need for a network layer. If the two systems are attached to different networks with connecting devices between the networks, there is often a need for the network layer to accomplish source-to-destination delivery. Other responsibilities of network layer include: Logical addressing Routing

20 Figure 2.8 Network layer

21 Figure 2.9 Source-to-destination delivery

22 4. Transport layer The transport layer is responsible for the delivery of a message from one process to another. Unlike the network layer which is source-to-destination delivery, the transport layer is process-to-process delivery of the entire message. Other responsibilities of transport layer: Service-point addressing Segmentation and reassembly Connection control Flow control Error control

23 Figure 2.10 Transport layer

24 Figure 2.11 Reliable process-to-process delivery of a message

25 5. Session layer Specific responsibilities of the session layer include: Dialog control Synchronization

26 6. Presentation layer The presentation layer is concerned with syntax and semantics of the information exchange between two systems. Specific responsibilities of presentation layer: Translation Encryption Compression

27 7. Application layer The application layer enables user, weather human or software, to access the network. It provides user interfaces and support for services such as , remote file access and transfer, shared database management, and other types of distributed information services. Specific responsibilities of presentation layer: Network virtual terminal File transfer, access, and management Mail services Directory services

28 Figure 2.14 Application layer

29 Figure 2.15 Summary of layers

30 Chapter 2 Network Models – cont.
Copyright © The McGraw-Hill Companies, Inc. Permission required for reproduction or display.

31 2-4 TCP/IP PROTOCOL SUITE
The layers in the TCP/IP protocol suite do not exactly match those in the OSI model. The original TCP/IP protocol suite was defined as having four layers: host-to-network, internet, transport, and application. However, when TCP/IP is compared to OSI, we can say that the TCP/IP protocol suite is made of five layers: physical, data link, network, transport, and application.

32 TCP/IP is a hierarchical protocol made up of interactive modules, each of which provides a specific functionality (the modules are not necessarily interdependent). The term hierarchical means that each upper-level protocol is supported by one or more lower-level protocols. layers of the TCP/IP protocol suite contain relatively independent protocols that can be mixed and matched depending on the needs of the system.

33 Figure 2.16 TCP/IP and OSI model
Layer: A grouping of related tasks involving the transfer of information. Each layer addresses an essential networking tasks

34 Physical and Data Link Layers in TCP/IP model
At the physical and data link layers, TCP/ IP does not define any specific protocol. It supports all the standard and proprietary protocols. A network in a TCP/ IP internetwork can be a local-area network or a wide-area network.

35 2. Network Layer in TCP/IP model
At the network layer supports the Internetworking Protocol. IP uses four supporting protocols: ARP, RARP, ICMP, and IGMP.

36 Internetworking Protocol (IP)
The Internetworking Protocol (IP) is the transmission mechanism used by the TCP/IP protocols. It is an unreliable and connectionless protocol –a best- effort delivery service. The term best effort means that IP provides no error checking or tracking.

37 Internetworking Protocol (IP) – supporting protocols
Address Resolution Protocol The Address Resolution Protocol (ARP) is used to associate a logical address with a physical address. ARP is used to find the physical address of the node when its Internet address is known. Reverse Address Resolution Protocol The Reverse Address Resolution Protocol (RARP) allows a host to discover its Internet address when it knows only its physical address. It is used when a computer is connected to a network for the first time or when a diskless computer is booted. Internet Control Message Protocol The Internet Control Message Protocol (ICMP) is a mechanism used by hosts and gateways to send notification of datagram problems back to the sender. ICMP sends query and error reporting messages. Internet Group Message Protocol The Internet Group Message Protocol (IGMP) is used to facilitate the simultaneous transmission of a message to a group of recipients.

38 3. Transport layer in TCP/IP model
Traditionally the transport layer was represented in TCP/IP by two protocols: TCP and UDP. IP is a host-to-host protocol, meaning that it can deliver a packet from one physical device to another. UDP and TCP are transport level protocols responsible for delivery of a message from a process (running program) to another process using connection control. Connection control The transport layer can be either connection less or connection oriented

39 3. Transport layer in TCP/IP model
1. Connection oriented : Makes a connection with the transport layer at the destination machine first before delivering the packets. When the connection established a sequence of packets from source to the destination can be sent one after another on the same path and in sequential order. When all packets of message have been delivered, the connection is terminated This makes the sending transport layer ensure that the message arrives at the receiving transport layer without error ( damage, loss or duplication ) 2. Connection less : It sends the data, but does not establish and verify a connection between hosts before sending data. Treats each packet independently, the packets in a message may or may not travel the same path to their destination

40 Connection less example

41 4. Application Layer in TCP/IP model
The application layer in TCP/ IP is equivalent to the combined session, presentation, and application layers in the OSI model. Many protocols are defined at this layer.

42 Summary of duties

43 2-5 ADDRESSING Four levels of addresses are used in an internet employing the TCP/IP protocols: physical, logical, port, and specific.

44 Relationship of layers and addresses in TCP/IP

45 A 6-byte (12 hexadecimal digits) physical address.
The Physical address, also known as the MAC or link address Is the address of a node as defined by its LAN or WAN It is included in the frame used by data link layer (Header) Ethernet uses 6-bytes (48-bits) physical address that imprinted on the NIC (Network Internet card) 07:01:02:01:2C:4B A 6-byte (12 hexadecimal digits) physical address.

46 Example 1 A node with physical address 10 sends a frame to a node with physical address 87. The two nodes are connected by a link. At the data link level this frame contains physical addresses in the header. These are the only addresses needed. The rest of the header contains other information needed at this level. The trailer usually contains extra bits needed for error detection

47

48 2. Logical address (IP) IP addresses are necessary for universal communications that are independent of physical network. No two host address on the internet can have the same IP address IP addresses 32-bit address that uniquely define a host connected to the Internet The physical addresses will change from hop to hop, but the logical addresses remain the same.

49 Example 2 Figure 2.20 shows a part of an internet with two routers connecting three LANs. Each device (computer or router) has a pair of addresses (logical and physical) for each connection. In this case, each computer is connected to only one link and therefore has only one pair of addresses. Each router, however, is connected to three networks (only two are shown in the figure). So each router has three pairs of addresses, one for each connection.

50 Figure IP addresses

51 3. Port Addresses The IP address and the physical address are necessary for a quantity of data to travel from a source to the destination host. However, arrival at the destination host is not the final objective of data communications on the Internet. A system that sends nothing but data from one computer to another is not complete. Today, computers are devices that can run multiple processes at the same time. The end objective of Internet communication is a process communicating with another process. For example, computer A can communicate with computer C by using TELNET. At the same time, computer A communicates with computer B by using the File Transfer Protocol (FTP). For these processes to receive data simultaneously, we need a method to label the different processes. In other words, they need addresses. In the TCPIIP architecture, the label assigned to a process is called a port address.

52 A 16-bit port address represented as one single number.
3. Port Addresses In the TCP/ IP architecture, the label assigned to a process is called a port address. A port address in TCP/ IP is 16 bits in length. 753 A 16-bit port address represented as one single number.

53 Example 3 Figure 2.21 shows two computers communicating via the Internet. The sending computer is running three processes at this time with port addresses a, b, and c. The receiving computer is running two processes at this time with port addresses j and k. Process a in the sending computer needs to communicate with process j in the receiving computer. Note that although physical addresses change from hop to hop, logical and port addresses remain the same from the source to destination.

54 Figure Port addresses

55 4. Specific Addresses Some applications have user-friendly addresses that are designed for that specific address. Examples: 1. addresses ( to define the recipient of an 2. URL addresses ( www. Mhhe.com) to find a document on the world wide web The addresses get changed to the corresponding port and logical addresses by the sending computer

56 The END Behrouz A. Forouzan” Data communications and Networking


Download ppt "Chapter 2 Network Models"

Similar presentations


Ads by Google