You are on page 1of 57

Lec # 01, Ch # 01, RECAP

◼ Five components of data communication.


◼ Information today comes in different forms such as text,
numbers, images, audio, and video.
◼ Data flow (simplex, half-duplex, and full-duplex)
◼ Network Criteria.
◼ Topology of a network.
◼ Categories of Networks.
◼ History of Internet.
◼ Hierarchical organization of the Internet.
◼ Protocols & Standards.
◼ Organizations & Agencies.
Chapter 2
Network Models

2.2
2-1 LAYERED TASKS

We use the concept of layers in our daily life. As an


example, let us consider two friends who communicate
through postal mail. The process of sending a letter to a
friend would be complex if there were no services
available from the post office.

Topics discussed in this section:


Sender, Receiver, and Carrier
Hierarchy

2.3
Figure 2.1 Tasks involved in sending a letter

2.4
2-2 THE OSI MODEL
Established in 1947, the International Standards
Organization (ISO) is a multinational body dedicated to
worldwide agreement on international standards. An ISO
standard that covers all aspects of network
communications is the Open Systems Interconnection
(OSI) model. It was first introduced in the late 1970s.

Topics discussed in this section:


Layered Architecture
Peer-to-Peer Processes
Encapsulation

2.5
Note

ISO is the organization.


OSI is the model.

2.6
Figure 2.2 Seven layers of the OSI model

2.7
Figure 2.4 An exchange using the OSI model

2.8
Figure 2.3 The interaction between layers in the OSI model

2.9
2-3 LAYERS IN THE OSI MODEL

In this section we briefly describe the functions of each


layer in the OSI model.

Topics discussed in this section:


Physical Layer
Data Link Layer
Network Layer
Transport Layer
Session Layer
Presentation Layer
Application Layer

2.10
Figure 2.5 Physical layer

2.11
Note

The physical layer is responsible for movements of


individual bits from one hop (node) to the next.

2.12
The Major duties of the Physical layer
are as follows.

◼ Physical characteristics of interfaces and


medium.
◼ Representation of bits.
◼ Data Rate (number of bits sent each second).
◼ Synchronization of bits.
◼ Line configuration (P-P, multipoint)
◼ Physical topology
◼ Transmission mode (Simplex, HD,FD)

2.13
Figure 2.6 Data link layer

2.14
Note

The data link layer is responsible for moving


frames from one hop (node) to the next.

2.15
The Major duties of the Data Link layer
are as follows.

◼ Framing (manageable data units).


◼ Physical addressing.
◼ Flow Control.
◼ Error Control.
◼ Access Control.

2.16
Figure 2.7 Hop-to-hop delivery

2.17
Figure 2.8 Network layer

2.18
Note

The network layer is responsible for the


delivery of individual packets from
the source host to the destination host.

2.19
The Major duties of the Network layer
are as follows.

◼ Logical Addressing.
◼ Routing.

2.20
Figure 2.9 Source-to-destination delivery

2.21
Example 1
In Figure 2.11 we want to send data from a node with
network address A and physical address 10, located on
one LAN, to a node with a network address P and
physical address 95, located on another LAN. Because
the two devices are located on different networks, we
cannot use physical addresses only; the physical
addresses only have local jurisdiction. What we need here
are universal addresses that can pass through the LAN
boundaries. The network (logical) addresses have this
characteristic.

2.22
Figure 2.11 Example 2

2.23
Figure 2.10 Transport layer

2.24
Note

The transport layer is responsible for the delivery


of a message from one process to another.

2.25
The Major duties of the Transport layer
are as follows.

◼ Port addressing/Service point addressing .


◼ Segmentation and reassembly.
◼ Connection Control.
◼ Flow Control.
◼ Error Control.

2.26
Example 2
Figure 2.14 shows an example of transport layer
communication. Data coming from the upper layers have
port addresses j and k (j is the address of the sending
process, and k is the address of the receiving process).
Since the data size is larger than the network layer can
handle, the data are split into two packets, each packet
retaining the port addresses (j and k). Then in the network
layer, network addresses (A and P) are added to each
packet.

2.27
Figure 2.14 Example 3

2.28
Figure 2.11 Reliable process-to-process delivery of a message

2.29
Figure 2.12 Session layer

2.30
Note

The session layer is responsible for dialog


control and synchronization.

2.31
The Major duties of the Session layer
are as follows.

◼ Dialog Control: The session layer allows two systems to


enter into a dialog. It allows the communication between
two processes to take place in either half-duplex (one
way at a time) or full-duplex (two ways at a time) mode.

◼ Synchronization: The session layer allows a process to


add checkpoints, or synchronization points, to a stream
of data.

2.32
Figure 2.13 Presentation layer

2.33
Note

The presentation layer is responsible for translation,


compression, and encryption.

2.34
The Major duties of the Presentation
layer are as follows.

◼ Translation
◼ Encryption
◼ Compression

2.35
Figure 2.14 Application layer

2.36
Note

The application layer is responsible for


providing services to the user.

2.37
The Major duties of the Application
layer are as follows.

It provides user interfaces and support for services such as


electronic mail, remote file access and transfer, shared
database management, and other types of distributed
information services.

◼ Network Virtual Terminal: A network virtual terminal is


a software version of a physical terminal, and it allows a
user to log on to a remote host. To do so, the application
creates a software emulation of a terminal at the remote
host.
◼ File Transfer, Access, and Management: This
application allows a user to access files in a remote host
(to make changes or read data), to retrieve files from a
remote computer for use in the local computer, and to
manage or control files in a remote computer locally.
2.38
The Major duties of the Application
layer are as follows.

◼ Mail Services: This application provides the basis for e-


mail forwarding and storage.

◼ Directory Services: This application provides


distributed database sources and access for global
information about various objects and services.

2.39
Figure 2.15 Summary of layers

2.40
2-4 TCP/IP PROTOCOL SUITE

• The layered model that dominated data


communications and networking literature before
1990 was the Open Systems Interconnection (OSI)
model.
• Everyone believed that the OSI model would
become the ultimate standard for data
communications, but this did not happen.
• The TCPIIP protocol suite became the dominant
commercial architecture because it was used and
tested extensively in the Internet;
Note: The OSI model was never fully implemented !
2.41
2-4 TCP/IP PROTOCOL SUITE

The layers in the TCP/IP protocol suite do not exactly


match those in the OSI model. The original TCP/IP
protocol suite was defined as having four layers: host-to-
network, internet, transport, and application. However,
when TCP/IP is compared to OSI, we can say that the
TCP/IP protocol suite is made of five layers: physical,
data link, network, transport, and application.

Topics discussed in this section:


Physical and Data Link Layers
Network Layer
Transport Layer
Application Layer
2.42
Figure 2.16 TCP/IP and OSI model

2.43
2-5 ADDRESSING

Four levels of addresses are used in an internet employing


the TCP/IP protocols: physical, logical, port, and specific.

Topics discussed in this section:


Physical Addresses
Logical Addresses
Port Addresses
Specific Addresses

2.44
Figure 2.17 Addresses in TCP/IP

2.45
Figure 2.18 Relationship of layers and addresses in TCP/IP

2.46
Example 2.3

In Figure 2.19 a node with physical address 10 sends a


frame to a node with physical address 87. The two nodes
are connected by a link (bus topology LAN). As the
figure shows, the computer with physical address 10 is
the sender, and the computer with physical address 87 is
the receiver.

2.47
Figure 2.19 Physical addresses

2.48
Example 2.4

As we will see in Chapter 15, most local-area networks


use a 48-bit (6-byte) physical address written as 12
hexadecimal digits; every byte (2 hexadecimal digits) is
separated by a colon, as shown below:

07:01:02:01:2C:4B

A 6-byte (12 hexadecimal digits) physical address.

2.49
Example 2.5

Figure 2.20 shows a part of an internet with two routers


connecting three LANs. Each device (computer or
router) has a pair of addresses (logical and physical) for
each connection. In this case, each computer is
connected to only one link and therefore has only one
pair of addresses. Each router, however, is connected to
three networks (only two are shown in the figure). So
each router has three pairs of addresses, one for each
connection.

2.50
Figure 2.20 IP addresses

2.51
Example 2.6

Figure 2.21 shows two computers communicating via the


Internet. The sending computer is running three
processes at this time with port addresses a, b, and c. The
receiving computer is running two processes at this time
with port addresses j and k. Process a in the sending
computer needs to communicate with process j in the
receiving computer. Note that although physical
addresses change from hop to hop, logical and port
addresses remain the same from the source to
destination.

2.52
Figure 2.21 Port addresses

2.53
Example 2.5

A port address is a 16-bit address represented by one


decimal number as shown.

753

A 16-bit port address represented


as one single number.

2.54
Note

The physical addresses change from hop to hop,


but the logical and port addresses usually remain the same.

2.55
Note

Some applications have user-friendly addresses that are


designed for that specific address. Examples include the e-
mail address (for example, naveed@pafkiet.edu.pk) and the
Universal Resource Locator (URL) (for example, www.
Taleem.greatnow.com). The first defines the recipient of an
e-mail, the second is used to find a document on the World
Wide Web.

2.56
End Chapter

2.57

You might also like