[go: up one dir, main page]

0% found this document useful (0 votes)
12 views36 pages

chapter2

Download as ppt, pdf, or txt
Download as ppt, pdf, or txt
Download as ppt, pdf, or txt
You are on page 1/ 36

Chapter 2:

Network Communications
CHAPTER OBJECTIVES-

At the end of this Chapter you will be able to:


Use the OSI and TCP/IP models and their associated protocols to
explain how data flows in a network .

describe the purpose and basic operation of the protocols in the


OSI and TCP/IP models.

Explain the various types of devices & Addresses that work on


each layer of the OSI or TCP/IP model.
Network Models & Protocols

Overview

Network models define a set of network layers and how they interact.
There are several different network models depending on what
organization or company started them. The most important two are:

OSI Network Model (Reference Model)


The TCP/IP Model (DOD model)
Advantages of Layering
The layered concept of networking has the following advantages:

 Reduces complexity: By dividing the processes into groups, or


layers, implementation of network architecture becomes less
complex .

Provides compatibility: Standardized interfaces allow for "plug-


and-play" compatibility and multi-vendor integration .

Accelerates evolution of technology: Since developers can focus


on technology at one layer while preventing the changes from
affecting another layer, this accelerates the evolution process.

Simplifies learning: Processes broken up into groups divides the


complexities into smaller.
Introduction to Protocols

The general functions (Properties) of protocols are:


Detection of the underlying physical connection (wired or
wireless), or the existence of the other endpoint or node.
Handshaking .
How to start and end a message .
How to format a message .
What to do with corrupted or improperly formatted messages
(error Correction) .
How to detect unexpected loss of the connection, and what to
do next.
Termination of the Chapter or connection.
The Open System Interconnection (OSI) Reference
Model
Introduction

In 1983, the International Standards Organization (ISO) developed a model


called Open Systems Interconnection (OSI) which is a standard reference
model for communication between two end users in a network.

Layer 7: The Application Layer...


The functions of Application Layer are:

Resource sharing and device redirection.


Remote file access.
Remote printer access.
Network management.
Directory services.
Electronic messaging (such as mail) etc.
Layer 6: The Presentation Layer...
The Presentation Layer is responsible for the following services:

Data representation: The presentation layer of the OSI model at the


receiving computer is also responsible for the conversion of “the external
format” with which data is received from the sending computer to one
accepted by the other layers in the host computer. Data formats include
postscript, ASCII, or BINARY such as EBCDIC (fully Extended Binary Coded
Decimal Interchange Code).

Data security: Some types of encryption (and decryption) are performed


at the presentation layer. This ensures the security of the data as it travels
down the protocol stack. For example, one of the most popular encryption
schemes that is usually associated with the presentation layer is the Secure
Sockets Layer (SSL) protocol.
Data compression: Compression (and decompression) may be done at
the presentation layer to improve the throughput of data.

Presentation layer presents data to application in appropriate format


Layer 5: The Session Layer...
The Session Layer establishes, manages, and terminates Chapters
(different from connections) between applications as they interact on
different hosts on a network. Its main job is to coordinate the service
requests and responses between different hosts for applications.

The Chapters established between hosts can be:

1. Simplex
2. Half Duplex
3. Full duplex
Simplex: Simplex transmission is like a one-way street where traffic moves
in only one direction. Simplex mode is a one-way-only transmission, which
means that data can flow only in one direction from the sending device to
the receiving device.

Simplex Transmission (One-Way Street)


Half Duplex: Half Duplex is like the center lane on some three-lane roads.
It is a single lane in which traffic can move in one direction or the other, but
not in both directions at the same time. Half-duplex mode limits data
transmission because each device must take turns using the line. Therefore,
data can flow from A to B and from B to A, but not at the same time.

Half Duplex (Center Turn Lane)


Full Duplex: is like a major highway with two lanes of traffic, each lane
accommodating traffic going in opposite directions. Full-duplex mode
accommodates two-way simultaneous transmission, which means that both
sides can send and receive at the same time. In full-duplex mode, data can
flow from A to B and B to A at the same time.

Full Duplex (Interstate Highway)


Layer 4: The Transport Layer...
This layer manages the end-to-end control (for example, determining whether
all packets have arrived) and error-checking. It ensures complete data transfer.
The Basic Transport Layer Services are:
 Resource Utilization (multiplexing): Multiple applications run on
the same machine but use different ports.

Connection Management (establishing & terminating): The


second major task of Transport Layer is establishing connection
between sender & the receiver before data transmission starts &
terminating the connection once the data transmission is finished.

 Flow Control (Buffering / Windowing): Once the connection has


occurred and transfer is in progress, congestion of the data flow
can occur at a destination for a variety of reasons.
Possible options include:
The destination can become overwhelmed if multiple devices are
trying to send it data at the same time.
The destination can become overwhelmed if the source is
sending faster than it can physically receive.

Congestion Prevention

The Transport Layer is responsible for providing flow control to alleviate the
issue of congestion in the data transfer. Two main methods for flow control
include:

Buffering: Buffering is a form of data flow control regulated by the


Transport Layer. It is responsible for ensuring that sufficient
buffers (Temporary Memory) are available at the destination for
the processing of data and that the data is transmitted at a rate
that does not exceed what the buffer can handle.
Buffering

Buffering at Work
Windowing: Windowing is a flow control scheme in which the
source computer will monitor and make adjustments to the
amount of information sent based on successful, reliable receipt
of data segments by the destination computer. The size of the
data transmission, called the "window size", is negotiated at the
time of connection establishment, which is determined by the
amount of memory or buffer that is available

Flow Control & Reliability through Windowing


Reliable Transport (positive acknowledgment): Transport
layer provides reliable transport of data by sending positive
acknowledgements back to the sender once the data has
reached the receiving side, if the data is lost or is corrupted,
a negative acknowledgement is sent.

Layer 3: The Network Layer...

The Network Layer is responsible for identifying computers on a network.

This layer is concerned with 2 functions:

1. Routing:
2. Fragmentation / Reassembly:
1. Routing: It is the process of selecting the best paths in a
network along which to send data on physical traffic.

Routing at Network Layer


2.Fragmentation / Reassembly: if the network layer determines that
a next router's maximum transmission unit (MTU) size is less
than the current frame size, a router can fragment a frame for
transmission and re-assembly at the destination station.
Layer 2: The data-link layer...

The data link layer provides error-free transfer of data frames from one node
to another over the physical layer, data link layer provides:

 Frame Traffic Control: tells the transmitting node to "stop”


when no frame buffers are available.

 Frame Sequencing: transmits/receives frames sequentially.

 Frame Acknowledgment: provides/expects frame


acknowledgments. Detects and recovers from errors that occur in
the physical layer by retransmitting non-acknowledged frames
and handling duplicate frame receipt.
Link Establishment and Termination: establishes and terminates
the logical link between two nodes.
Frame Error Checking: checks received frames for integrity.
Media access management: determines when the node "has
the right" to use the physical medium.

Data Link Sub layers :


Logical Link Control (LLC): The LLC is concerned with
managing traffic (flow and error control) over the physical
medium and may also assign sequence numbers to frames and
track acknowledgements.
Media Access Control (MAC): The MAC sub layer controls
how a computer on the network gains access to the data and
permission to transmit it.

Data Link Sub-Layers


Layer 1: The Physical Layer…

The physical layer, the lowest layer of the OSI model, is concerned with the
transmission and reception of the unstructured raw bit stream over a
physical medium.

It describes the electrical/optical, mechanical, and functional interfaces to


the physical medium, and carries the signals for all of the higher layers. It
provides:

1. Data encoding
2. Physical medium attachment, accommodating various
possibilities in the medium
3.Transmission technique:
4.Physical medium transmission:
Devices Used At Each Layer of OSI Model

OSI Layers Devices Used


Application Layer Gateways
Presentation Layer -----------
Session Layer -----------
Transport Layer Gateways
Network Layer Router, Layer 3 switches
Data link Layer NIC, Switch, Bridge
Physical Layer Hubs, Repeaters, Network cables &
connectors
Transmission Control Protocol/Internet Protocol
(TCP/IP) Model Or DOD Model

A Brief Introduction

The TCP/IP Model is a specification for computer network protocols created in


the 1970s by DARPA, an agency of the United States department of Defense. It
laid the foundation for ARPANET, which was the world's first wide area
network and a predecessor of the Internet.
Layers in the TCP/IP Model

The TCP/IP Application Layer

TCP/IP application layer protocols provide services to the


application software running on a computer. The application
Layer identifies the application running on the computer through
Port Numbers.

The various protocols that are used at the Application Layer are:
Telnet: Terminal Emulation, Telnet is a program that runs on your
computer and connects your PC to a server on the network. You
can then enter commands through the Telnet program and they
will be executed as if you were entering them directly on the
server console.
Port Number :23
FTP: File Transfer Protocol, the protocol used for exchanging files
over the Internet. FTP is most commonly used to download a file
from a server using the Internet or to upload a file to a server.
Port Number : 20(data port) ,21(control port)

HTTP: Hyper Text Transfer Protocol is the underlying protocol


used by the world wide web. HTTP defines how messages are
formatted and transmitted, and what actions web servers and
browsers should take in response to various commands. For
example, when we enter a URL in the browser, this actually sends
an HTTP command to the web server directing it to fetch and
transmit the requested web page.
Port Number :80
NFS: Network File System, a client server application that allows all
network users to access shared files stored on computers of
different types. Users can manipulate shared files as if they were
stored locally on the user's own hard disk.
Port Number :2049

SMTP: Simple Mail Transfer Protocol, a protocol for sending e-mail


messages between servers. In addition, SMTP is generally used to
send messages from a mail client to a mail server.
Port Number :25

POP3: Post Office Protocol, a protocol used to retrieve e-mail from a


mail server. Most e-mail applications (sometimes called an e-mail
client) use the POP, although some can use the newer IMAP (Internet
Message Access Protocol)as a replacement for POP3
Port Number :110
TFTP: Trivial File Transfer Protocol, a simple form of the file transfer
protocol(FTP). TFTP provides no security features. It is often used
by servers to boot diskless workstations, X-terminals, and routers.
Port Number :69

DNS: Domain Name System (or Service or Server), an service that


translates domain names into IP addresses. Because domain names
are alphabetic, they're easier to remember. The Internet however, is
really based on IP addresses. Every time you use a domain name, a
DNS service must translate the name into the corresponding IP
address. For example, the domain name www.example.com might
translate to 198.105.232.4.
Port Number :53
DHCP: Dynamic Host Configuration Protocol, a protocol for assigning
dynamic IP addresses to devices on a network. With dynamic addressing, a
device can have a different IP address every time it connects to the network.
Dynamic addressing simplifies network administration because the software
keeps track of IP addresses rather than requiring an administrator to
manage the task. Port Number : 67(Server),68(Client)

BOOTP: Bootstrap Protocol (BOOTP) is utilized by diskless workstations to


gather configuration information from a network server. This enables the
workstation to boot without requiring a hard or floppy disk drive. Port
Number : 67(Server),68(Client)

SNMP: Simple Network Management Protocol, a set of protocols for


managing complex networks. SNMP works by sending messages, called
protocol data units (PDUs), to different parts of a network. Port
Number :161
The TCP/IP Transport Layer
The protocol layer just below the Application layer is the host-to-host layer
(Transport layer). It is responsible for end-to-end data integrity. Transport Layer
identifies the segments through Socket address (Combination of Port Number &
I.P. address).

The two most important protocols employed at this layer are the

Transmission Control Protocol (TCP): TCP provides reliable, full-duplex


connections and reliable service by ensuring that data is retransmitted when
transmission results in an error (end-to-end error detection and correction).
Also, TCP enables hosts to maintain multiple, simultaneous connections.

User Datagram Protocol (UDP): When error correction is not required, UDP
provides unreliable datagram service (connectionless) that enhances network
throughput at the host-to-host transport layer. It's used primarily for
broadcasting messages over a network.
The TCP/IP Internet Layer

The best known TCP/IP protocol at the internetwork layer is the Internet
Protocol (IP), which provides the basic packet delivery service for all TCP/IP
networks node addresses
The basic protocols used at the Internet Layer are:

I.P. (Internet Protocol): It is a protocol used at the internet layer of


TCP/IP model by which data is encapsulated and is sent from one
computer to another on the internet.

ARP (Address Resolution Protocol): It is used to map the known


I.P. addresses into Physical address.

RARP(Reverse Address Resolution Protocol): It is used to map


Physical address into I.P. address.
 I.C.M.P.( Internet Control Message Protocol): It is used to send
error & control Messages in the network.

 I.G.M.P. (Internet Group Management Protocol): It is a protocol


which is used to form multicast groups in a network to receive
multicast messages.
The TCP/IP Network Access Layer

The network access layer is the lowest layer in the TCP/IP model. The
protocols at this layer perform three distinct functions:

They define how to use the network to transmit a frame, which


is the data unit passed across the physical connection.

They exchange data between the computer and the physical


network.

They deliver data between two devices on the same network


using the physical address.

This layer includes the popular WAN standards, such as the


Point-to-Point Protocol (PPP) and Frame Relay.
THANK YOU

You might also like