Documenti di Didattica
Documenti di Professioni
Documenti di Cultura
Network Models
2.1
2.2
Receiver
The other manager removes envelope and read.
A mailman carries the latter from the post office to the mailbox.
The tasks must be done at the order given in the hierarchy Each layer uses the services of the layer immediately below it. 2.3
Note
ISO is the organization. OSI is the model.
2.5
Translation, compression, and encryption Establishes, maintains, synchronizes the interaction among systems
segments
packets (datagrams)
Delivers message from one process to another Delivers individual packets from the source to the destination. (source-to-dest. delivery) Moves frames from one node to the next. (hop-to-hop delivery) Moves individual bits from one node to the next.
frames bits
2.6
Layered Architecture
With in a machine, each layer calls upon the services of the layer just below it. Between machines, layer x on one machine communicates with layer x on another machine. The communication between machines is governed by an agreed-upon series of rules called protocols
The processes on each machine that communicate at a given layer are called peer-to-peer process. Therefore, the communication between machines is a peer-to-peer process using the protocols appropriate to a given layer.
2.7
Figure 2.3 The layers involve when a message is sent from device A to device B
The intermediate nodes usually involve only the first three OSI layers Layer 1,2,3 are network support layers to move data from one device to another Layer 5,6,7 can be thought of as the user support layers. Layer 4 links the two subgroups and ensures what lower layers have transmitted is in the form that the upper layers can use.
2.8
2.9
The data portion of a packet at level N-1 carries the whole packet (data+header+trailer) from level N. This concept is called encapculation.
2.10
OSI-Physical Layer
PL defines the procedures and functions that physical devices have to perform for transmission to occur. PL is responsible for movements of individual bits from one node to the next. PL also concerns with the following Physical characteristics of interfaces and medium types of medium. Representation of bits how bits are encoded into signal (electrical or optical) Data rate Synchronization of bits the sender and receiver clock must be synchronized. Line configuration connection of devices to the media (point-to-point, multipoint) Physical topology how devices connected to make a network Transmission mode -- simplex, half-duplex, or full-duplex mode
2.12
DL makes PL appear error-free to the upper layer (network layer). DL is responsible for movements of frames from one node to the next. DL also concerns with the following Framing DL divide bit stream from NL into data units called frames. Physical addressing DL adds header to the frame to define the sender & rec. addresses Flow control to avoid overwhelming the receiver. Error control DL adds trailer at the end of the frame to enhance reliability of PL. Access control to allow devices to share the same link.
2.13
DL-A DL-B DL-E DL-F The frames that are exchanged between the three nodes have different headers. The trailers can also be different if error checking includes the header of the frame.
2.14
OSI-Network Layer
NL is responsible for delivery of individual packets from the source to the destination. If two systems are attached to different networks with connecting devices between the networks, there is often a need for NL to accomplish source-to-destination delivery, NL also concerns with the following Logical addressing when a packet passes the network boundary, we need another addressing system to help distinguish the source and the destination Routing when networks connected together, we use routers to route the packets.
2.15
2.16
Transport Layer
TL is responsible for process-to-process delivery of the entire message. Whereas NL oversees the delivery of individual packets, it does not recognize any relationship in them. TL, however, ensures the whole message arrives intact and in order. TL also concerns with the following Service-point addressing computers often run several programs, TL must get the entire message to the correct program, based on port address. Segmentation and reassembly message is divided into segments, each with a sequence no. TL uses these numbers to reassemble the message and to identify and replace lost ones. Connection control connection less best-effort serv., fast (no handshaking) but unreliable connection oriented reliable (segments are ordered) but slow Flow control end -to-end control, rather than a single link control (DL) Error control end -to-end control. Error correction is usually achieved through retrans.
2.17
2.18
OSI-Session Layer
SL is the network dialog controller . It establishes, maintains, synchronizes the interactions among the systems. SL concerns with the following Dialog control SL allows two systems to enter into a dialog. Synchronization SL adds checkpoints or synchronization points to a stream of data.
2.19
OSI-Presentation Layer
PSL is concerned with the syntax and semantics of info. exchanged between two systems. PSL concerns with the following Translation Different computers may use different encoding systems to represent info. In the form of character strings, numbers, etc. PSL is responsible for interoperability between different encoding methods. Encryption to ensure privacy of sensitive information. Compression to reduce the number of bits contained in the info.
2.20
OSI-Application Layer
APL provides user interfaces and support for services such as email, remote file access and transfer, and other types of distributed information services. APL concerns with the following Network virtual terminal is a software version of a physical terminal, which allows users to log on to remote host. File transfer, access, and management Mail services Directory services APL provides distributed database sources and access for global info. about various object and services (WWW, HTTP)
2.21
2.22
2.24
2.25
2.26
2.27
2-5 ADDRESSING
Four levels of addresses are used in an internet employing the TCP/IP protocols: physical, logical, port, and specific.
2.28
2.29
Physical Address
Most local-area networks use a 48-bit (6-byte) physical address imprinted as 12 hexadecimal digits on NIC; every byte (2 hexadecimal digits) is separated by a colon, as shown below: 07:01:02:01:2C:4B A 6-byte (12 hexadecimal digits) physical address.
Note that the physical addresses are fixed. They have been set from the factory.
2.30
A node with physical address 10 sends a frame to a node with physical address 87. The two nodes are connected by a link (bus topology LAN). As the figure shows, the computer with physical address 10 is the sender, and the computer with physical address 87 is the receiver.
2.31
Logical Address
Physical addresses are not adequate in an internetwork environment because it is fixed and does not geographically indicate the host location.
R2 R1 10 50
Internet
R3 10
Logical addressing provides a universal addressing system in which each host can be identified uniquely, regardless of the underlying physical network. No two publicly addressed and visible (can be access without help from mapping devices) hosts on the Internet can have the same addresses.
2.32
A part of an internet with two routers connecting three LANs. Each device has a pair of addresses (logical and physical) for each connection. Each router, however, is connected to three networks (only two are shown in the figure). So each router has three pairs of addresses, one for each connection. 2.33
Port Address
A compute can run multiple processes at the same time. The label that TCP/IP architecture assigned to a process, for identifying purpose, is called port address. In TCP layer, message is delivered from a process on one computer to another process on another computer using the port address. Port address in TCP/IP is a 16-bit address represented by one decimal number as shown
2.34
Two computers communicating via the internet. The sending computer is running three processes at this time with port addresses a, b, and c. The receiving computer is running two processes at this time with port addresses j and k. Process a in the sending computer needs to communicate with process j in the receiving computer. Note that although physical addresses change from hop to hop, logical and port addresses remain the same from the source to destination. 2.35
Note
The physical addresses change from hop to hop, but the logical and port addresses usually remain the same.
2.36