Sei sulla pagina 1di 4

NETWORK ARCHITECTURE For example, a request/reply protocol would support

operations by which an application can send and


To design a network, network designer have to develop a general receive messages.
blueprintsusually called network architecturesthat guide the
2.1.4.2 PEER INTERFACE
design and implementation of networks.
The peer interface defines the form and meaning of
TYPES messages exchanged between protocol peers to
implement the communication service.
Two widely reference architecture is It determines the way in which a request/reply protocol
on one machine communicates with its peer on another
1. OSI Architecture machine.
2. Internet Architecture To summarize, a protocol defines a communication service
that it exports locally (the service interface), along with a set of
rules governing the messages that the protocol exchanges with its
2.1 LAYERING AND PROTOCOLS
peer(s) to implement this service (the peer interface). This situation
is illustrated in Figure 2.2.
2.1.1LAYERING

When a system gets complex, the system designer


introduces another level of abstraction (hide the details
of how the object is implemented from the users of the
object).
Abstraction naturally leads to layering, especially in
network system.
The general idea is that you start with the services
offered by the underlying hardware, and then add a
sequence of layers, each providing a higher (more
abstract) level of service.
A simple network as having two layers of abstraction
sandwiched between the application program and the Fig 2.2 Service and Peer interface
underlying hardware, as illustrated in Figure 2.1. There are potentially multiple protocols at any given
level, each providing a different communication
service.
We therefore represent the suite of protocols that make
up a network system with a protocol graph.

Fig 2.1 Example of a layered network system

2.1.2 FEATURES OF LAYERING

1. It decomposes the problem of building a network into Fig 2.3


more manageable components. Example of Protocol graph
2. It provides a more modular design. If you decide that
you want to add some new service, you may only need The nodes of the graph correspond to protocols, and the
to modify the functionality at one layer. edges represent a depends on relation.

2.1.3 PROTOCOLS For example, Figure 2.3 illustrates a protocol graph for the
layered system we have been discussingthe protocols
The abstract objects that make up the layers of a Request/Reply Protocol (RRP) and Message Stream Protocol
network system are called protocols. (MSP) implement two different types of process-to-process
A protocol provides a communication service that channels, and both depend on Host-to-Host Protocol (HHP), which
higher-level objects use to exchange messages. provides a host-to-host connectivity service.

2.1.4 PROTOCOL INTERFACE


2.1.5 PROTOCOL SPECIFICATION
Each protocol defines two different interfaces
1. Service Interface Specifications are generally expressed using a
2. Peer Interface combination of pseudo code, state transition diagrams,
pictures of packet formats, and other abstract notations.
2.1.4.1 SERVICE INTERFACE
2.1.6 ENCAPSULATION
The service interface defines the operations that local
objects can perform on the protocol.
Consider what happens in Figure 2.3 when one of the
application programs sends a message to its peer by
passing the message to protocol RRP.
From RRPs perspective, the message it is given by the
application is an uninterpreted string of bytes.
RRP does not care that these bytes represent an array of
integers, an email message, a digital image, or
whatever; it is simply charged with sending them to its
Fig 2.5 OSI Network Architecture
peer.
LAYERS
However, RRP must communicate control information The OSI model has seven layers. They are
to its peer, instructing it how to handle the message Physical Layer, Data link Layer, Network Layer, Transport Layer,
when it is received. Session Layer, Presentation Layer & Application Layer
RRP does this by attaching a header to the message. A
header is a small data structurefrom a few bytes to a 2.2.1 PHYSICAL LAYER
few dozen bytesthat is used among peers to
communicate with each other. The physical layer is responsible for transmitting
As the name suggests, headers are usually attached to individual bits from one node to the next.
the front of a message. In some cases, control
information is sent at the end of the message, in which
case it is called a trailer.

Fig 2.6 Physical Layer

DUTIES OF PHYSICAL LAYER

1. Physical Characteristics of interface and media:


It defines the characteristics of the interface
between the device and the transmission
medium.
It also defines the type of transmission
medium.
2. Representation of bits:
It represents data in the form of a stream of
Fig 2.4 High-level messages are encapsulated inside of low-level bits (sequence of 0s or 1s) without any
messages. interpretation.
The exact format for the header attached by RRP is 3. Data Rate:
defined by its protocol specification. It defines the number bits send each second.
The rest of the messagethat is, the data being 4. Synchronization of bits:
transmitted on behalf of the applicationis called the It synchronizes both the send and the
messages body or payload. We say that the receiver side clocks
applications data is encapsulated in the new message 5. Line Configuration:
created by protocol RRP. It is concerned with the connection of
devices to the media. In a point-to-point
2.1.7 MULTIPLEXING AND DEMULTIPLEXING configuration, two devices are connected
through a dedicated link. In a multipoint
RRP as implementing a logical communication configuration, a link is shared among several
channel, with messages from two different applications devices.
multiplexed over this channel at the source host and 6. Physical topology:
then demultiplexed back to the appropriate application It defines how devices are connected to
at the destination host. make a network. Devices can be connected
by using a mesh topology, a star topology, a
ring topology, a bus topology, or a hybrid
2.2 OSI ARCHITECTURE topology.
The ISO (International Standard Organization) was one
of the first organizations to formally define a common 2.2.2 DATA LINK LAYER:
way to connect computers.
Their architecture, called the Open Systems The Data link layer is responsible for transmitting
Interconnection (OSI) architecture and illustrated in frames from one node to the next.
Figure 2.5, defines a partitioning of network
functionality into seven layers.
switches) route or switch the packets to their
final destination.

2.2.4 TRANSPORT LAYER:

The transport layer is responsible for the delivery of a


Fig 2.7 Data link Layer message from one process to another.

DUTIES OF DATA LINK LAYER:

1. Framing:
The data link layer divides the stream of bits
received from the network layer into
manageable data units called frames.
2. Physical addressing: Fig 2.9 Transport Layer
If frames are to be distributed to different
DUTIES OF TRANSPORT LAYER:
systems on the network, the data link layer
1. Service-point addressing:
adds a header to the frame to define the
sender and/or receiver of the frame. The transport layer header includes a type of
3. Flow control: address called a service-point address (or
port address).
If the rate at which the data are absorbed by
the receiver is less than the rate at which The network layer gets each packet to the
data are produced in the sender, the data link correct computer; the transport layer gets the
layer imposes a flow control mechanism to entire message to the correct process on that
avoid overwhelming the receiver. computer.
4. Error control: 2. Segmentation and reassembly:
The data link layer adds reliability to the A message is divided into transmittable
physical layer by adding mechanisms to segments, with each segment containing a
detect and retransmit damaged or lost sequence number.
frames. These numbers enable the transport layer to
It also uses a mechanism to recognize reassemble the message correctly upon
duplicate frames. arriving at the destination.
5. Access control: 3. Connection control:
When two or more devices are connected to The transport layer can be either
the same link, data link layer protocols are connectionless or connection oriented.
necessary to determine which device has A connectionless transport layer treats each
control over the link at any given time. segment as an independent packet and
delivers it to the transport layer at the
2.2.3 NETWORK LAYER destination machine.
A connection oriented transport layer makes
The network layer is responsible for the delivery of a connection with the transport layer at the
packets from the original source to the final destination. destination machine first before delivering
the packets. After all the data are
transferred, the connection is terminated.
4. Flow control:
Like the data link layer, the transport layer is
responsible for flow control.
5. Error control:
Like the data link layer, the transport layer is
Fig 2.8 Network Layer responsible for error control.
DUTIES OF NETWORK LAYER: 2.2.5 SESSION LAYER
1. Logical addressing: The Session layer is responsible for establishing,
The physical addressing implemented by the maintaining, and synchronization of the interaction among
data link layer handles the addressing communicating systems.
problem locally.
If a packet passes the network boundary, we DUTIES OF SESSION LAYER
need another addressing system to help
distinguish the source and destination 1. Dialog control:
systems. The session layer allows two systems to
The network layer adds a header to the enter into a dialog.
packet coming from the upper layer that It allows the communication between two
includes the logical addresses of the sender processes to take place in either halfduplex
and receiver. (one way at a time) or full-duplex (two ways
2. Routing: at a time) mode.
When independent networks or links are 2. Synchronization:
connected to create intemetworks (network
of networks) or a large network, the
connecting devices (called routers or
The session layer allows a process to add This application provides the basis for e-
checkpoints, or synchronization points, to a mail forwarding and storage.
stream of data. 3. Directory services:
For example, if a system is sending a file of This application provides distributed
2000 pages, it is advisable to insert database sources and access for global
checkpoints after every 100 pages to ensure information about various objects and
that each 100-page unit is received and services.
acknowledged independently. In this case, if 2.3 INTERNET ARCHITECTURE
a crash happens during the transmission of The Internet architecture, which is also
page 523, the only pages that need to be sometimes called the TCP/IP architecture.
resent after system recovery are pages 501 The Internet architecture evolved out of
to 523. Pages previous to 501 need not be experiences with an earlier Packet-switched
resent. network called the ARPANET.

2.2.6 PRESENTATION LAYER

The presentation layer is responsible for translation,


compression, and encryption.

DUTIES OF PRESENTATION LAYER


Fig 2.11 Internet Architecture
1. Translation: The Internet and ARPANET were around before the
The processes (running programs) in two OSI architecture, and the experience gained from
systems are usually exchanging information building them was a major influence on the OSI
in the form of character strings, numbers, reference model.
and so on.
The computers use different encoding
systems, the presentation layer is responsible
for interoperability between these different
encoding methods.
2. Encryption/Decryption:
To carry sensitive information, a system Fig 2.12 Internet Protocol Graph
must be able to ensure privacy. 2.3.1 NETWORK PROTOCOL
Encryption means that the sender transforms
the original information to another form and The lowest level are a wide variety of network
sends the resulting message out over the protocols, denoted NET1, NET2, and so on.
network. In practice, these protocols are implemented by a
Decryption reverses the original process to combination of hardware (e.g., a network adaptor) and
transform the message back to its original software (e.g., a network device driver).
form.
3. Compression: 2.3.2 INTERNET PROTOCOL
Data compression reduces the number of
bits contained in the information. The second layer consists of a single protocolthe
Data compression becomes particularly Internet Protocol (IP).
important in the transmission of multimedia This is the protocol that supports the interconnection of
such as text, audio, and video. multiple networking technologies into a single, logical
internetwork.
2.2.7 APPLICATION LAYER
2.3.3 TRANSPORT PROTOCOL
The application layer is responsible to enable the user, whether The third layer contains two main protocolsthe
human or software, to access the network. Transmission Control Protocol (TCP) and the User
Datagram Protocol (UDP).
TCP and UDP provide alternative logical channels to
application programs: TCP provides a reliable byte-
stream channel, and UDP provides an unreliable
datagram delivery channel.
TCP and UDP are sometimes called end-to-end
2.10 Application Layer protocols.

DUTIES OF APPLICATION LAYER 2.3.4 APPLICATION PROTOCOL

1. File transfer, access, and management: The transport layer consists of a range of application
This application allows a user to access files protocols, such as FTP, TFTP (Trivial File Transport
in a remote host (to make changes or read Protocol), Telnet (remote login), and SMTP (Simple
data), to retrieve files from a remote Mail Transfer Protocol, or electronic mail), that enable
computer for use in the local computer, and the interoperation of popular applications.
to manage or control files in a remote
computer locally.
2. Mail services:

Potrebbero piacerti anche