Professional Documents
Culture Documents
Networks (IT-213)
Lecture 1.0
Spring 2021
Agenda
• Protocol Layering
• TCI/IP Protocol Suite
• OSI Model
3
Layered Tasks
An example from the everyday life
Hierarchy?
Services
4
Why layered communication?
• To reduce complexity of communication task by splitting it into several layered small tasks
• One of the advantages of protocol layering is that it allows us to separate the services from
the implementation
• Functionality of the layers can be changed as long as the service provided to the layer
above stays unchanged
makes easier maintenance & updating
5
File Transfer Example
• Consider, for example, the transfer of a file between two computers.
• There must be a data path between the two computers, either directly or via a
communication network. But more is needed. Typical tasks to be performed are as
follow :
1. The source system must either activate the direct data communication path or inform the
communication network of the identity of the desired destination system.
2. The source system must ascertain that the destination system is prepared to receive data.
3. The file transfer application on the source system must ascertain that the file management
program on the destination system is prepared to accept and store the file for this particular
user.
4. If the file formats used on the two systems are different, one or the other system must perform a
format translation function.
6
File Transfer Example
• It is clear that there must be a high degree of cooperation between the two computer
systems.
• Instead of implementing the logic for this as a single module, the task is broken up into
subtasks, each of which is implemented separately.
• In a protocol architecture/model, the modules are arranged in a vertical stack.
• Each layer in the stack performs a related subset of the functions required to
communicate with another system. It relies on the next lower layer to perform more
primitive functions and to conceal the details of those functions. It provides services to
the next higher layer.
7
Protocol Layering
• Communication is achieved by having the corresponding, or peer, layers in two
systems to communicate
• The peer layers communicate by means of formatted blocks of data that obey a set of
rules or conventions known as a protocol
8
Principles of Protocol Layering
1. The first principle dictates that if we want bidirectional communication, we need to
make each layer so that it is able to perform two opposite tasks, one in each direction.
For example, the third layer task is to listen (in one direction) and talk (in the other direction).
The second layer needs to be able to encrypt and decrypt. The first layer needs to send and
receive mail.
2. The second principle that we need to follow in protocol layering is that the two
objects under each layer at both sites should be identical.
For example, the object under layer 3 at both sites should be a plaintext letter. The object under
layer 2 at both sites should be a ciphertext letter. The object under layer 1 at both sites should
be a piece of mail.
9
Logical Connection
• After following the above two principles, we can think about logical connection
between each layer as shown
10
Categories of Protocols
• Proprietary system– designed and developed for supporting the communications of
machines manufactured by a specific vender
• System Network Architecture (SNA) was designed and developed for connecting IBM
main frame computers and peripherals (workstations, printers, tape drives, etc.)
• NetBEUI – Microsoft’s protocol for simple Windows networks
• IPX/SPX (Internetwork Packet Exchange and Sequenced Packet exchange) – support
Novell NetWare products
11
Categories of Protocols
• Open systems– publicly proposed and evaluated protocols for supporting the
internetworking of heterogeneous machine
• Open System Interconnect (OSI) was developed by ISO
• TCP/IP was designed by IETF (Internet Engineering Task Force), another volunteer
organization for the engineering issues of the Internet.
12
Communication Reference Models
• The purpose of layering the protocol is to separate specific functions and to make their
implementation transparent to other components.
13
Examples
14
Protocol Data Units (PDU)
• At each layer, protocols are used to communicate
• Control information is added to user data at each layer
• Transport layer may fragment user data
• Each fragment has a transport header added
Destination SAP
Sequence number
Error detection code
15
Reference Models
• Two most popular protocol architecture models are:
1. OSI Reference Model
2. TCP/IP Protocol Suite
16
OSI Reference model
• Established in 1947, the International Standards Organization (ISO) is a multinational ISO is the
body dedicated to worldwide agreement on international standards. organization.
OSI is the
• An ISO standard that covers all aspects of network communications is the Open
model.
Systems Interconnection (OSI) model. It was first introduced in the late 1970s
• Consists of 7 layers
ISO is not an
• Create a layer when different abstraction is needed acronym (in
which case it
• Each layer performs a well define function would be
IOS), but a
• Functions of the layers chosen taking internationally standardized protocols
word, derived
• Number of layers – large enough to avoid complexity from the
Greek isos,
meaning
equal.
17
Seven layers of the OSI model
• An open system is a set of protocols that allows any two
different systems to communicate regardless of their
underlying architecture.
18
Exchange using OSI Model
19
Issues, to be resolved by the layers
• Larger bandwidth at lower cost
• Error correction
• Flow control
• Addressing
• Multiplexing
• Naming
• Congestion control
• Mobility
• Routing
• Fragmentation
• Security
• ....
20
Physical Layer
21
Physical Layer
• The physical layer coordinates the functions required to transmit a bit stream over a
physical medium. It deals with mechanical and electrical specifications of the interface
and transmission medium.
• Topics include transmission media, data encoding, modulation/demodulation,
multiplexing, switching(layer 1)-- circuit switching
• Functions of this layer:
type of the transmission media (twisted-pair, coax, optical fiber, air)
bit representation (voltage levels of logical values)
data rate (speed)
synchronization of bits (time synchronization)
22
Data Link layer
23
Data Link Layer
• Specifies how to organize data into frames and how to transmit frames over a network
• The data link layer transforms the physical layer, a raw transmission facility, to a
reliable link and is responsible for node-to-node delivery. It makes the physical layer
appear error free to the upper layer (network layer).
• Specific responsibilities of the data link layer include following:
Framing
Physical address
Flow control
Error control
Access control
24
hop-to-hop delivery
25
Data Link layer- example
26
Network layer
• End-to-End packet delivery
From the original source to a destination
• Main duties:
1. Logical addressing
2. Routing
3. Switching
4. Congestion control and QoS
27
Source to destination delivery
Data Link
Network layer
28
Network layer- example
29
Transport layer
• Process-to-Process delivery of the entire message
From the original source to a destination
30
The functions of the transport layer are:
1) Break messages into packets and reassemble
Transport Layer packets of size suitable to network layer
2) Multiplex sessions with same source/destination nodes
3) Resequence packets at destination
4) recover from residual errors and failures
5) Provide end-to-end flow control
32
Session Layer
33
Session Layer
• The session layer is the network dialog controller.
• It establishes, maintains, and synchronizes the interaction between communicating
systems.
• Specific responsibilities of the session layer include the following:
Dialog control (half-duplex or full-duplex),
Synchronization
34
Presentation Layer
35
Presentation Layer
• Controls the encoding and decoding of data, data compression
• The presentation layer is concerned with the syntax and semantics of the information
exchanged between two systems.
• Specific responsibilities of the presentation layer include the following:
Translation
Encryption
Compression.
36
Application layer
• Enables user to access the network
• Provides services to a user
E-mail
Remote file access and transfer (Telnet, FTP)
Access to WWW (HTTP)
37
Summary of Layers and Protocols
Low-level protocols define the electrical and physical standards to be observed, bit- and byte-ordering and
the transmission and error detection and correction of the bit stream
High-level protocols deal with the data formatting, including the syntax of messages, the terminal to
computer dialogue, character sets, sequencing of messages 38
Link Link
Intermediate
node
Application Application
Router
Application Application
Gateway
Application Application Application Application
42
TCP/IP Protocol Suite
• TCP/IP stands for Transmission Control Protocol/Internet Protocol and is actually a set
of standards that describe how data is to be transferred between computers.
• TCP/IP is the common tongue that all computers must speak to communicate via
Internet.
• There are implementations for UNIX, Windows, Macintosh, and just about any
computer operating systems you can think of.
• TCP/IP is implemented as part of an Operating System
43
TCP/IP Protocol Suite
• The layers in the TCP/IP protocol suite do not exactly match those in the OSI model.
• The original TCP/IP protocol suite was defined as having four layers: host-to-network,
internet, transport, and application.
• However, when TCP/IP is compared to OSI, we can say that the TCP/IP protocol suite
is made of five layers: physical, data link, network, transport, and application
44
TCP/IP vs. OSI Model
45
TCP/IP Protocol Architecture
• Developed by the US Defense Advanced Research Project Agency (DARPA) for its
packet switched network (ARPANET)
• Used by the global Internet
• No official model but a working one.
Application layer
Transport layer: host-to-host (application to application)
Internet layer: network routing and congestion control
Network access layer: access transmission medium
Physical layer
46
Logical connections in the TCP/IP
As the figure shows, the duty of the application, transport, and network layers is
end-to-end. However, the duty of the data-link and physical layers is hop-to-hop, in
which a hop is a host or router
47
Logical connections in the TCP/IP
Another way of thinking of the logical connections is to think about the data unit
created from each layer. In the top three layers, the data unit (packets) should not be
changed by any router or link-layer switch. In the bottom two layers, the packet created by
the host is changed only by the routers, not by the link-layer switches.
48
Identical Objects
49
Encapsulation / Decapsulation
Figure shows the encapsulation in the source host, decapsulation in the destination host,
and encapsulation and decapsulation in the router
50
Four Levels of Addresses
• Four levels of addresses are used in an internet employing the TCP/IP protocols:
physical, logical, port, and specific.
52
Relationship of Layers & Addresses in
TCP/IP
53
Physical addresses
54
Physical Addresses
• Most local-area networks use a 48-bit (6-byte) physical address written as 12
hexadecimal digits; every byte (2 hexadecimal digits) is separated by a colon, as shown
below:
07:01:02:01:2C:4B
55
IP addresses
Figure shows a part of an internet with
two routers connecting three LANs.
56
Port addresses
Figure shows two computers
communicating via the Internet. The
sending computer is running three
processes at this time with port addresses
a, b, and c. The receiving computer is
running two processes at this time with
port addresses j and k. Process a in the
sending computer needs to communicate
with process j in the receiving computer.
Note that although physical addresses
change from hop to hop, logical and port
addresses remain the same from the
source to destination.
57
Port Address
• A port address is a 16-bit address represented by one decimal number as shown.
753
58
Lack of OSI Model’s Success
• The OSI model appeared after the TCP/IP protocol suite.
• Most experts were at first excited and thought that the TCP/IP protocol would be fully
replaced by the OSI model.
• This did not happen for several reasons.
First, OSI was completed when TCP/IP was fully in place and a lot of time and money had been
spent on the suite; changing it would cost a lot.
Second, some layers in the OSI model were never fully defined. For example, although the
services provided by the presentation and the session layers were listed in the document, actual
protocols for these two layers were not fully defined, nor were they fully described, and the
corresponding software was not fully developed.
Third, when OSI was implemented by an organization in a different application, it did not show a
high enough level of performance to entice the Internet authority to switch from the TCP/IP
protocol suite to the OSI model.
59