Professional Documents
Culture Documents
CT043-3-1
Standard network protocols
Learning Outcomes
At the end of this lecture YOU should be
able to:
Describe the function in each layer in the OSI
model
Application
Presentation
Presentation
Session
Session
Transport
Transport
Network
Network
Data-Link
Data-Link
Physical
Physical
10
Slide 10 of 33
11
Slide 11 of 33
Physical Layer
The function of the physical layer is simply to allow a
stream of bits to be transmitted over a physical medium.
It is concerned with the procedures of the interfaces and
the physical line itself in order to facilitate the transmission
over the link.
It defines the physical characteristics of the network such
as connections, voltage levels and timing.
The data frames are translated into transmittable signals
and put on the wire to travel across the network (or, in the
case of wireless media, sent over the airwaves or by other
means).
The physical layer protocols turn all those 0s and 1s into
electrical impulses or pulses of light
Physical Layer
Network Layer
The network layer is responsible for getting the data packets
to their destinations
It allows for connectivity between source and destination
across multiple networks by using logical address (network
address/IP address). Routers can use this layer to determine
how to forward packets. Because of this, much of the design
and configuration work for internetworks happens at this layer.
Nodes which are connected in one network usually do not use
the functions of the network layer.
This layer also handles prioritization of data types (the basis
of Quality of Service [QoS]), which assures some level of
guarantee for sufficient network resources for high-bandwidth
applications such as live video
Network Layer
Transport Layer
The transport layer ensures that the entire message is
transmitted in order from source to destination.
Where the network layer treats every packet individually,
the transport layer looks at the entire message.
The transport layer is also responsible for virtual
connection creation.
The transport layer accepts data from the session layer
and segments the data for transport across the network.
Generally, the transport layer is responsible for making
sure that the data is delivered error-free and in the
proper sequence.
Transport Layer
End-to-end error control and flow control generally occur at the
transport layer.
Flow control manages data transmission between devices so
that the transmitting device does not send more data than the
receiving device can process.
The transport layer keeps track of such things as validity of data
packets, sequencing, and the handling of duplicate packets
There are two protocol types used by the transport layer:
connection-oriented and connectionless
For connection oriented protocol, the transport layer on the
receiving end can send an acknowledgment back to the
sending computer to let the sender know that the packet arrived
Transport Layer
Session Layer
The session layer establishes, manages,
and terminates communication sessions.
Communication sessions consist of service
requests and service responses that occur
between applications located in different network
devices.
This involves placing markers in the stream of
data. If there is a communication failure, only the
data from the most recent marker, or checkpoint,
need to be resend.
Session Layer
The session layer looks at the entire session and
provides some form of dialog control.
The session layer is responsible for ensuring the
dialog mode(full, half, or simplex) and
synchronization(checkpoints).
Full-duplex allows communication in both directions, and unlike
half-duplex, allows this to happen simultaneously. - e.g. telephone
Half-duplex provides for communication in both directions, but
only one direction at a time (not simultaneously) e.g. walkie
talkie
Simplex communication flow in only one direction
Session Layer
Presentation Layer
The application layer protocol receives the
data from the user application and passes
it down the stack to the presentation layer
As its name suggests, this layer handles
issues that have to do with the packaging
or presentation of the data
These issues include data compression,
data encryption, protocol translation
Presentation Layer
Data compression - This is the reduction of the size of the
data to facilitate faster transmission over the network
Data encryption - This is the conversion of data into an
encoded form that cannot be read by unauthorized persons
Protocol translation - This is the conversion of data from one
protocol to another so that it can be transferred between
dissimilar platforms or operating systems
The presentation layer on the receiving computer is
responsible for uncompressing, decrypting, and otherwise
translating data into a format understandable by the
application
Presentation Layer
Application Layer
The first and most important thing to
understand about the application layer is that
it is not the user application that creates the
message
Rather, this layer provides for interaction
between that application program and the
network
Protocols that function at the application layer
perform functions such as file transfers,
printing access, and messaging services
Application Layer
/etc/services
TCP
UDP
ICMP
IP
ARP
Ethernet
And Others
IETF: Internet
Engineering
Task Force
RFC: Request
For Comments
Design principles
Communication based on the idea of packet switching.
The data being transferred is encapsulated in a sequence of fixed
size chunks, each of which is transmitted together with a header
that contains addressing and other "housekeeping" information.
Design principles
Layering: standard conventions or protocols are needed so that the
information is handled appropriately.
Internet protocols are designed as a series of layers, where the
physical communications medium is at the bottom and the top layer
represents the applications that initiate and receive the messages
that are transferred.
Each layer builds on the services and capabilities provided by the
lower layers.
Design principles
End-to-end protocols: Each layer of the protocol stack
constitutes a communication channel between two endpoints
that exchange messages.
Between the sender of the data and its ultimate destination,
the only thing that the network needs to examine is the
destination address of the packets it must deliver.
No data in the packets is processed in any way between the
source and the destination.
Design principles
Least Mechanism: To send a packet, a source needs only
know a "neighbour" that is connected to the network.
Intermediate gateways and routers simply send each packet to
a neighbour as the "next-hop" closer to the destination.
Packets may arrive in any order, and delivery is on a best effort
basis. If a packet does not make it to the final destination, the
destination must contact the source with a request that it be
retransmitted.
OSI
TCP/IP
Application
Presentation
Application
Session
Transport
Network
Internet
Data-Link
Network
Access
Physical
Physical
Host B
HTTP
HTTP
TCP
TCP
IP
Identical
Datagram
Ethernet
Proper
Frame
Network
Interface
Wiring
Intermediate
Router (Layer 3)
or Switch (Layer 2)
Network
Interface
Network
Interface
Identical
Datagram
Proper
Frame
Wiring
IP
Ethernet
Network
Interface
Internet
Network
Access
Physical
Encapsulation
A packet is a structured message.
The control information of a given protocol must be
treated strictly as data by the next "lower" protocol.
As a packet moves down the protocol stack, it gets
bigger as information relevant to the layer is added
to the beginning and the end.
Any given layer is allowed to work only with the data
relevant to that layer, and nobody else's.
As a packet moves up the stack it gets smaller, as
the information from the current level is removed.
Data
Complete IP Datagram
Treated as Data
CRC
Packet Size
Computer architecture calls eight bits a byte, Data communications
calls eight bits an octet
Maximum Transfer Unit (MTU) for Ethernet allows 12000 bits
(1500 octets) of data. The actual size of the MTU depends on the
network.
TCP Segment sizes are negotiated by the sending and receiving
systems, within the limit of their local network MTU.
IP Datagrams can be broken into fragments to fit the
recommended minimum Internet MTU of 576 octets. Each
fragment maintains the same header information, followed by as
much data as possible within the limit of the network MTU.
Key Fields
Preamble: Alternating 1's and 0's to
help receiving nodes synchronise
Address: Unique identifier assigned
by the hardware manufacturer
(MAC Address)
Packet Type: identifies this as an
Ethernet frame (allows mutiple
protocols and versions)
CRC: Error detection (Cyclic
Redundancy Check)
Datagram Format
Each row represents 4 octets (32 bits)
Version - Length - QOS - Total Length
Unique ID - Flags - Fragment Offset
Time to Live - Protocol - Checksum
Source IP Address
Destination IP Address
Options - Padding
Data
(up to 4416 bits)
Key Fields
IP is version 4 or 6
QOS requests priority
Second Row controls
Fragmentation (e.g., "2 of 4")
Gateways decrement TTL
and discard the datagram if
zero
Protocol is analogous to
Ethernet Type, Header
Checksum to CRC
Options are included for
network testing (not required)
Key Fields
Port number specifies service
Sequence is position in
sender's byte stream
Acknowledgement of position
in sender's byte stream
Some segments carry only
ACK, others carry data, and
others a request to establish or
close a connection (Code)
Window and Options negotiate
maximum segment size
Routers
connecting
remote sites
primary task is
forwarding
packets
(datagrams)
Key concept:
Encapsulation
encapsulation
Network
Access
MAC address
The Data Link Layer uses a physical address for each
device called a Media Access Control address
MAC addresses are typically burned into the network
interface card (NIC).
LLC
The Data Link Layer uses a Logical Link Control protocol
to determine the type of Network Layer data is traveling
inside the frame.
Ethernet: CSMA/CD
Carrier Sense see if anyone is talking
Multiple Access anyone can talk
Collision Detection did anyone else talk?
CS: If nothing is arriving on the interface, send an outgoing frame
MA: Everyone on the segment uses the same wires to send and
receive
Transport
Internet
Network
Network
Access
Physical
unreliable
delivery & duplication control not guaranteed
Reduced overhead, least common denominator service
Used when one IP packet is sufficient for the whole message
Ports
16 bits
Ports under 1024 restricted to root
/etc/services
TCP
UDP
ICMP
IP
ARP
Ethernet
And Others
IETF: Internet
Engineering
Task Force
RFC: Request
For Comments
Q&A