Download presentation
Presentation is loading. Please wait.
Published byDerek Atkins Modified over 9 years ago
1
Chi-Cheng Lin, Winona State University CS 313 Introduction to Computer Networking & Telecommunication Introduction
2
2 Topics l Introduction l Metric Units l Network Hardware l Network Software l Reference Models l Example Networks l Standards and Standards Organizations
3
3 Network Software l Old computer networks: HW main concern SW afterthought Not working now! l Network SW is now highly structured Approach: Protocol Hierarchies
4
4 Protocol Hierarchies l What is protocol? Agreement between communication parties on HOW communication is processed l Layered architecture Reduce design complexity: Lower layer offers service to higher layer Hiding implementation details Layer n on one machine talks to layer n on another Rules and conventions used in layer n’s talk: Layer n protocol
5
5 Protocol Hierarchies l Peers Entities comprising corresponding layers on different machines Virtual communication using protocol Peer process abstraction make network design becomes that of individual layers l Physical communication Sender: Data and control passed to layer below Data transmitted via physical media Receiver: Data and control passed to layer above
6
6 Layers, Protocols, and Interfaces Virtual Communication Physical Communication
7
7 Protocol Hierarchies l Interface between two adjacent layers Defines primitive operations and services a lower layer offers to the upper one Minimizes amount of information passed between two layers Simplifies replacement of implementation E.g., telephone lines satellite channels
8
8 Protocol Hierarchies l Network architecture Set of layers and protocols Implementation and interface specification not included l Protocol stack A list of protocols used by a certain system, one protocol per layer
9
9 Multilayer Communication - Example l Philosopher-translator-secretary architecture It is ok if Dutch is replaced by Finnish fax is replaced by email
10
10 Information Flow - Example l Virtual communication for layer 5 Header: control information Layer 1 protocol 00011100011100001110 …
11
11 Key Design Issues for the Layers l Reliability Error control Error-detecting Error-correcting Routing Selecting the best path for sending a packet from one point to another
12
12 Key Design Issues for the Layers l Sender/receiver identification mechanism Addressing/naming l Sequencing l Message disassembling, transmitting, reassembling
13
13 Key Design Issues for the Layers l Resource allocation Multiplexing The process of combining signals from multiple sources for transmission across a single data link Multiple connections can share the link l Flow control Needed for fast sender, slow receiver l Congestion control l Quality of service l Security
14
14 Connection-Oriented and Connectionless Services l Two basic types of services Connection-oriented Connectionless l Consider reliability … ReliableConnection-oriented UnreliableConnectionless l Note that: Connection Reliability
15
15 Connection-Oriented Service l A connection is established first, then used, and then released when done. l Works like a pipe: Sender pushes data in at one end Receiver takes them out, often in the same order, at the other end l Analogy Telephone system
16
16 Connectionless Service l No need to set up a connection first l Each message carrying full destination address is routed independently of others No guarantees on the order l Analogy Postal system
17
17 Service Primitives l Service is formally specified by a set of primitives (e.g., OS’s system calls) available to users or entities l Five service primitives for implementing a simple connection-oriented service.
18
18 Service Primitives l Packets sent in a simple client-server interaction on a connection-oriented network.
19
19 Relationship of Services to Protocols l Service Set of primitives a layer provides to the layer above it Define WHAT operations not HOW implemented l Protocol Set of rules governing format and meaning of message exchanged by peer entities within a layer Used by entities to implement service definitions
20
20 Services to Protocols Relationship l The relationship between a service and a protocol.
21
21 Relationship of Services to Protocols l Analogy: object-oriented languages Service :: ADT or Object Users do not know the implementation of a service Protocol :: Implementation The protocol of the service is invisible to users Do you have to understand http (hypertext transport protocol) before you can surf the Internet?
22
22 Reference Models l Two reference models will be discussed OSI reference model TCP/IP model
23
23 OSI Reference Model l ISO/OSI (Open Systems Interconnection) Reference Model l NOT a network architecture itself Exact services and protocols are not specified Just "what should be done" in each layer However, standards are produced for all layers
24
24 OSI Reference Model l Seven layers Layer 7: application layer Layer 6: presentation layer Layer 5: session layer Layer 4: transport layer Layer 3: network layer Layer 2: data link layer Layer 1: physical layer (lowest) l Diagram of OSI reference model Note: this is one of the most important figures in the whole book!!
25
25 Physical medium
26
26
27
27 Host A Host B Subnet Physical medium End-to-End Point-to-Point
28
28 Physical Layer l Transmitting raw bits (0s and 1s) over communication channel l Design issues Representation of bits How is 0/1 represented? Data rate: number of bits sent per second How long does a bit last? Transmission mode (bi-directional?) Mechanical, electrical, timing interfaces Underlying physical transmission medium
29
29 Data Link Layer l Takes a raw transmission facility and transforms it into a line (link) that appears free of undetected transmission errors to network layer l Basic function Breaks up input data to data frames Transmits data frames sequentially Processes acknowledgement frames sent back from receiver for reliable transmission
30
30 Data Link Layer l Responsibilities Physical addressing (e.g. MAC address) Framing Creating and recognizing frame boundaries Error control (adjacent nodes, node-to-node) Errors: damaged, lost, duplicate Flow control (adjacent nodes, node-to-node) Traffic regulation between fast sender and slow receiver Medium access control Shared channel access control in broadcast networks
31
31 Network Layer l Subnet operation control l Responsibilities Logical addressing (e.g., IP address) Routing Static tables Determined at the start of conversation Dynamic Congestion control Quality of service Accounting Heterogeneous network interconnection
32
32 Transport Layer l End-to-end layer Talk to destination machine directly (virtually) Layers 4 through 7 are end-to-end Layers 1 through 3 are node-to-node (chained) l Basic function Split data from session layer into smaller units Pass units to network layer Ensure units arrive correctly at the other end
33
33 Transport Layer l Determine services provided to session layer (and ultimately to users) Error-free point-to-point channel that delivers messages in the order in which they were sent Transport of isolated messages w/o guarantee about order Broadcasting
34
34 Transport Layer l Responsibilities include Service-point addressing (e.g., port number) Which message belong to which connection (application): (End-to-end) Flow control Compare to the (End-to-end) Error control Data Link layer
35
35 Session layer l Session establishment between users on different machines l Responsibilities Dialogue control Deciding who sends, and when Token management Control of same critical operation not to be performed at the same time Synchronization Inserting checkpoints (checkpointing)
36
36 Presentation Layer l Syntax/semantics of information transmitted l Responsibilities Make communication between computers with different internal data representations possible Approach: standard encoding Convert from data representation used in one host to the standard abstract data structure and back
37
37 Application Layer l Provides interface and support for services to users (human, software, robots) l Examples File transfer Email Network news Hypertext transfer
38
38 TCP/IP Reference Model l Goals Internetworking Fault tolerance Flexible architecture l Four layers of TCP/IP Reference Model Host-to-network layer Internet layer Transport layer Application layer
39
39 Internet Layer l Packet-switching, connectionless l Packets injected to network Independent travel Out-of-order arrival l Analogy Mail system l IP (Internet Protocol) Packet routing Congestion control
40
40 Transport Layer l Two end-to-end protocols UDP (User Datagram Protocol) TCP (Transmission Control Protocol) l UDP (User Datagram Protocol) Unreliable, connectionless Widely used for client-server type request-reply queries speech, video
41
41 Transport Layer l TCP Reliable connection-oriented Incoming byte stream (form application layer) is fragmented into discrete messages and passed onto internet layer Message is reassembled at destination Flow control Analogy A B Pipe
42
42 Applications and Host-to-Network Layers l Application layer No session and presentation layers TELNET, FTP, SMTP, DNS, NNTP, HTTP l Link layer Defines what links must do to meet the need of connectionless internet layer
43
43 TCP/IP Protocols
44
44 OSI and TCP/IP Models l Correspondence
45
45 OSI and TCP/IP Models l Similarities Stack of independent protocols Layer functionality Transport layer Application layer
46
46 Differences between OSI and TCP/IP Models l OSI Distinction between services, interfaces, and protocols (perhaps the biggest contribution) Better Protocol-Hidden Model first, then protocols Pro: No bias, more general Con: Designers did not have much experience with the subject a good idea of which functionality to put in which layer No thought given to internetworking 7 layers Communication Connection-Oriented and connectionless in network layer Only connection-oriented in transport layer
47
47 Differences between OSI and TCP/IP Models l TCP/IP: No clear distinction between services, interfaces, and protocols Worse protocol-hidden Protocol first, then model Pro: Protocols fit model perfectly Con: Model does not fit any other protocol stacks (not general) 4 layers Communication Connectionless in network layer Both in transport layer (good for request-response protocols)
48
48 Summary of Reference Models l OSI OSI model exceptionally useful for discussing computer networks OSI protocols not popular l TCP/IP TCP/IP model practically nonexistent TCP/IP protocols widely used l Modified framework is used in the text
49
49 Summary of Reference Models l Modified framework is used in the text
50
50 Example Networks l The Internet Overview of the Internet architecture
51
51 Example Networks l 3G mobile networks l Wireless LANs: 802.11 l RFID and sensor networks
52
52 Standards and Standards Organizations l Why standards? l Categories de facto de jure l Organizations ITU-T (formerly CCITT) ISO ANSI IEEE IETF ATM Forum
Similar presentations
© 2025 SlidePlayer.com. Inc.
All rights reserved.