Professional Documents
Culture Documents
NETWORK STANDARDS
Module I
2
MODULE III
NETWORK STANDARDS
INTRODUCTION
OBJECTIVES
Module III
3
Lesson 1
Module III
4
Module III
5
Module III
6
Module III
7
1.3Communication Protocols
Finally, network protocols are the various upper-layer protocols that exist in
a given protocol suite.
Module III
8
information from the physical medium, and then its physical layer passes
the information up to the Layer 2, which passes it to the Layer 3, and so on
until it reaches the application layer (Layer n) of System B. Finally, the
application layer of System B passes the information to the recipient
application program to complete the communication process.
One model layer communicates with another layer to make use of the
services provided by this layer. The services provided by adjacent layers
help a given layer communicate with its peer layer in other computer
systems. Three basic elements are involved in layer services: the service
user, the service provider, and the service access point (SAP)
The exact format for the header attached by layer (n) protocol is defined by
its protocol specification. The rest of the message-that is, the data being
transmitted on behalf of the application-is called the message’s body or
Module III
9
Module III
10
Module III
11
1.6Reference Models
Module III
12
1.
EXERCISE
What is the role of standard?
2. What are the three general parts of data unit?
3. What is the purpose of the data field?
4. How is the header defined?
5. Is there always a data field in a message?
6. Are trailers common?
Module III
13
Lesson 2
Perhaps no other standard has affected networking more than the OSI
model. Presented by the ISO in the late 1970s, this model was to serve as a
framework for worldwide communications. It has been adhered to in one
respect or another by all network vendors. However, few have based their
own implementation completely on the model with its seven layers of
functions. Most believe that having individual functions broken into so many
layers is impractical for their protocols (packet types) because of the
overhead each layer adds. This will become clearer to us as we examine the
functions of each layer and what is involved in using those functions.
The lower layers 1, 2, and 3 are network dependent. These layers are
highly involved with the exact network protocol with which the system is
directly interfacing. Layers 5 through 7 are application oriented, while layer
4 is a transition layer between the network and the application.
Module III
14
The data link layer provides reliable transit of data across a physical
network link. Different data link layer specifications define different
network and protocol characteristics, including physical addressing, network
topology, error notification, sequencing of frames, and flow control.
Physical addressing (as opposed to network addressing) defines how devices
are addressed at the data link layer. Network topology consists of the data-
link layer specifications that often define how devices are to be physically
connected, such as in a bus or a ring topology. Error notification alerts
upper layer protocols that a transmission error has occurred, and the
sequencing of data frames reorders frames that are transmitted out of
sequence. Finally, flow control moderates the transmission of data so that
the receiving device is not overwhelmed with more traffic than it can
handle at one time.
Module III
15
The network layer provides routing and related functions that enable
multiple data links to be combined into an internetwork. This is
accomplished by the logical addressing (as opposed to the physical
addressing) of devices. The network layer supports both connection-oriented
and connectionless service from higher-layer protocols. Network-layer
protocols typically are routing protocols, but other types of protocols are
implemented at the network layer as well. Some common routing protocols
include Border Gateway Protocol (BGP), an Internet interdomain routing
protocol; Open Shortest Path First (OSPF), a link-state, interior gateway
protocol developed for use in TCP/IP networks; and Routing Information
Protocol (RIP), an Internet routing protocol that uses hop count as its
metric.
Module III
16
Module III
17
The application layer is the OSI layer closest to the end user, which means
that both the OSI application layer and the user interact directly with the
software application.
Module III
18
1985 with specific LAN-oriented standards titled 802.2- 802.5. Since that
time there have been other references set up as well.
Module III
19
Module III EXERCISE
20
Module III
21
Lesson 3
3.1TCP/IP Layers
The TCP/IP model does not exactly match the OSI model. There is no
universal agreement regarding how to describe TCP/IP with a layered model
but it is generally agreed that there are fewer levels than the seven layers
of the OSI model. Most descriptions present from three to five layers. In this
book we will consider TCP/IP protocols map to a four-layer conceptual
model. Each layer in this model corresponds to one or more layers of the
seven-layer Open Systems Interconnection (OSI) model as shown in Figure
2.5.
In TCP/IP the Data Link Layer and Physical Layer are normally
grouped together to make the Network Access layer (also called the
Network Interface layer). This layer is responsible for placing TCP/IP
packets on the network medium and receiving TCP/IP packets off the
network medium. TCP/IP was designed to be independent of the network
access method, frame format, and medium. In this way, TCP/IP can be used
to connect differing network types including LAN technologies such as
Ethernet and Token Ring and WAN technologies such as X.25 and Frame
Relay. Independence from any specific network technology gives TCP/IP the
ability to be adapted to new technologies such as Asynchronous Transfer
Mode (ATM).
Module III
22
The core protocols of the Internet layer are IP, ARP, ICMP, and IGMP.
Internet Protocol (IP)
Address Resolution Protocol (ARP)
Internet Control Message Protocol (ICMP)
Internet Group Management Protocol (IGMP)
There are many Application layer protocols and new protocols are
always being developed. The most widely-known Application layer protocols
are those used for the exchange of user information:
Module III
23
Module III
24
1.
EXERCISE
What are the two dominant network standards architectures?
2. Do LAN standards come from OSI or TCP/IP?
3. Do WAN standards come from OSI or TCP/IP?
4. What is the benefit of reliable protocols?
5. Which layers govern transmission in LANs and WANs?
6. Which layers govern internetworking?
7. At Which layer are messages called frames?
8. At Which layer are they called packets?
9. If a source host and a destination host are separated by 23 networks,
how many packets will there be?
10.Which device encapsulates—the sending or the receiving device?
Module III
25
Lesson 4
4.1 Similarities
4.2Differences
Module III
26
ATM Layer is the core of the ATM standard. It defines the structure of the
ATM cell and provides services which include:
cell multiplexing and demultiplexing
generic flow control
header cell check generation and extraction
remapping of virtual circuits an paths
This layer is analogous to the transport layer in the Internet protocol stack.
maps higher-layer service data units, which are fragmented into
fixed-size cells to be delivered over the ATM interface
collects and reassembles ATM cells into service data units for
transporting to higher layers.
Module III
27
The user plane involves the transfer of user information, such as the
flow-control and error-control mechanisms.
Module III
28
Module III
29
EXERCISE
Module III