Documenti di Didattica
Documenti di Professioni
Documenti di Cultura
COMMUNICATION
AND NETWORKING
CEN-222
2.2
Chapter 2
Network Models
Copyright The McGraw-Hill Companies, Inc. Permission required for reproduction or display.
A Network
2.3
21LAYEREDTASKS
We use the concept of layers in our daily life. As an
example, let us consider two friends who communicate
through postal mail. The process of sending a letter to a
friend would be complex if there were no services
available from the post office.
2.4
Figure 2.1
2.5
Services
2.6
22THEOSIMODEL
Established in 1947, the International Standards
Organization (ISO) is a multinational body dedicated to
worldwide agreement on international standards. An ISO
standard that covers all aspects of network
communications is the Open Systems Interconnection
(OSI) model. It was first introduced in the late 1970s.
Note
ISO is the organization.
OSI is the model.
2.8
THEOSIMODEL
2.9
2.10
2.11
OSI Layers
2.12
2.13
THEOSIMODEL
2.14
THEOSIMODEL
2.15
THEOSIMODEL
THEOSIMODEL
2.17
2.18
THEOSIMODEL
2.19
Introduction
2.20
2.21
OSI Model
2.22
OSI Model
2.23
23LAYERSINTHEOSIMODEL
In this section we briefly describe the functions of each
layer in the OSI model.
2.25
2.26
2.27
2.28
2.29
Data rate.
The transmission rate-the number of bits sent each second-is
also defined by the physical layer. In other words, the physical
layer defines the duration of a bit, which is how long it lasts.
Synchronization of bits.
The sender and receiver not only must use the same bit rate
but also must be synchronized at the bit level. In other words,
the sender and the receiver clocks must be synchronized.
Line configuration.
The physical layer is concerned with the connection of devices
to the media. In a point-to-point configuration, two devices
are connected through a dedicated link. In a multipoint
configuration, a link is shared among several devices.
2.30
Physical topology.
The physical topology defines how devices are connected
to make a network.
Transmission mode.
The physical layer also defines the direction of
transmission between two devices: simplex, half-duplex, or
full-duplex.
2.31
Note
The physical layer is responsible for movements of
individual bits from one hop (node) to the next.
2.32
2.33
2.34
2.35
2.36
2.37
2.38
Error control.
The data link layer adds reliability to the physical layer by
adding mechanisms to detect and retransmit damaged or
lost frames. It also uses a mechanism to recognize
duplicate frames. Error control is normally achieved through
a trailer added to the end of the frame.
Access control.
When two or more devices are connected to the same link,
data link layer protocols are necessary to determine which
device has control over the link at any given time.
2.39
Note
The data link layer is responsible for moving
frames from one hop (node) to the next.
2.40
2.41
2.42
2.43
2.44
2.45
The network layer is responsible for the source-todestination delivery of a packet, possibly across multiple
networks (links). Whereas the data link layer oversees the
delivery of the packet between two systems on the same
network (links), the network layer ensures that each packet
gets from its point of origin to its final destination.
If two systems are connected to the same link, there is
usually no need for a network layer. However, if the two
systems are attached to different networks (links) with
connecting devices between the networks (links), there is
often a need for the network layer to accomplish source-todestination delivery. Figure 2.8 shows the relationship of the
network layer to the data link and transport layers
Note
The network layer is responsible for the
delivery of individual packets from
the source host to the destination host.
2.46
2.47
2.48
As the figure shows, now we need a source-todestination delivery. The network layer at A sends
the packet to the network layer at B. When the
packet arrives at router B, the router makes a
decision based on the final destination (F) of the
packet.
2.49
Note
The transport layer is responsible for the delivery
of a message from one process to another.
2.50
Transport layer
2.51
2.52
2.53
Transport layer
2.54
Transport layer
2.55
Note
The session layer is responsible for dialog
control and synchronization.
2.56
Session Layer
2.57
2.58
Session Layer
2.59
Note
The presentation layer is responsible for translation,
compression, and encryption.
2.60
Presentation Layer
2.61
Presentation Layer
2.62
2.63
Note
The application layer is responsible for
providing services to the user.
2.64
2.65
Application layer
2.66
2.67
SummaryApplication Layer
2.68
Application layer provides platform to send and receive data over the network.
All applications and utilities that communicate with network fall in this layer.
For examples
Browsers :- Mozilla Firefox, Internet Explorer, Google Chrome etc
Email clients: - Outlook Express, Mozilla Thunderbird etc.
FTP clients :- Filezilla, sFTP, vsFTP
Application layer protocols that we should know for exam are following:
SNMP (Simple Network Management Protocol) Used to control the
connected networking devices.
FTP (File Transfer Protocol) Used to transfer the files rapidly.
DNS (Domain Naming System) Used to translate the name with IP
address and vice versa.
DHCP (Dynamic Host Configuration Protocol) Used to assign IP address
and DNS information automatically to hosts.
Telnet used to connect remote devices.
HTTP (Hypertext Transfer Protocol) Used to browse web pages.
FTP (File Transfer Protocol) Used to reliably sends/retrieves files.
SMTP (Simple Mail Transfer Protocol) Used to sends email.
POP3 (Post Office Protocol v.3) Used to retrieves email.
NTP (Network Time Protocol) Used to synchronizes clocks.
Presentation layer
2.69
2.70
Transport Layer
2.71
Transport Layer
2.72
Segmentation
Connection management
Reliable and unreliable data delivery
Flow control
Connection multiplexing
Transport Layer
2.73
Segmentation
Segmentation is the process of breaking large data file into smaller files
that can be accommodated by network. To understand this process thinks
about a 700 MB movie that you want to download from internet. You have
2MBPS internet connection. How will you download a 700MB movie on
2MBPS internet connection?
In this case segmentation process is used. On server transport layer breaks
700MB movie in smaller size of segments (less than your internet
connection speed). Assume that 700Mb movie is divided in 700 segments.
Each segment has file size of 1Mb that your PC can easily download at
current connection speed. Now your PC will download 700 small files
instead of one large file. So next time when you see download progress bar
in browser, think it about segment receiver progress bar. Once your
browser receives all segments from server, it will pop up a message
indicating download is completed. Transport layer at your PC will merge all
segments back in a single 700Mb movie file. End user will never know how
a 700Mb movie makes its way through the 2Mbps connection line.
Transport Layer
2.74
Connection management
Transport layer setup, maintain and tear down connections for session layer. Actual
mechanic of connection is controlled by transport layer. Transport layer use two
protocols for connection management UDP and TCP.
UDP
UDP is a connection less protocol. Connection-less transmission is said to be
unreliable. Now, don't get worried about the term "unreliable" this doesn't mean
that the data isn't going to get its destination; its only means that it isn't
guaranteed to get its destination. Think of your options when you are sending a
postcard, put it in the mailbox, and chances are good that it will get where it's
supposed to go but there is no guarantee. There is always a chance of missing in
the way. On the other hand, it's cheap.
TCP
TCP is a connection oriented protocol. Connection-oriented transmission is said to
be reliable. Think TCP as registry AD facility available in Pakistan post office. For this
level of service, you have to buy extra ticket and put a bunch of extra labels on it to
track where it is going and where it has been. You get a receipt when it is delivered.
In this method you have a guaranteed delivery. All of this costs you morebut it is
reliable!
Network Layer
2.75
2.76
2.77
Frame
Data link layer receive packet from network layer and wrap it with
layer two Header that is known as frame. There are two
specifications of Ethernet frame.
Ethernet II
802
Physical Layer
2.78
2.79
On sending computer
Sending application access the application layer.
Application provides data to the presentation layer.
Presentation layer format the data as per network requirement and forward it's
to session layer.
Session layer initiate the connection and forward the data to the transport layer.
Transport layer broke down the large data file in smaller segments and add a
header with control information, which are bits designated to describe how to
determine whether the data is complete, uncorrupted, in the correct sequence,
and so forth.
Segments are forwarded to the network layer. Network layer add its header, with
logical address and convert it in packet. Network layer forwards packet to data
link layer.
Data link layer attach its header and footer to the packet and convert it in frame.
Frames are forwarded to the physical layers that convert them in signals. These
signals are loaded in media.
2.80
On receiving computer
Physical layer receive signals from media and convert them in frames.
Frames are forwarded to the data link layer.
Data link layer check the frame. All tampered frame are dropped here. If
frame is correct, data link layer strip down its header and footer from
frame and hand over packet to network layer.
Network layer check the packet with its own implementations. If it's found
everything fine with packet, it strips down its header from packet and hand
over segment to transport layer.
Transport layer again do the same job. It verifies the segments with its own
protocol rules. Only the verified segments are processed. Transport layer
remove its header from verified segments and reassemble the segments in
data. Data is handed over the session layer.
Session layer keep track of open connection and forwarded the receiving
data to presentation layer.
Presentation form the data in such a way that application layer use it.
Application layer on receiving computer find the appropriate application
from the computer and open data within particular application.
Information Formats
2.81
24TCP/IPPROTOCOLSUITE
The layers in the TCP/IP protocol suite do not exactly
match those in the OSI model. The original TCP/IP
protocol suite was defined as having four layers: host-tonetwork, internet, transport, and application. However,
when TCP/IP is compared to OSI, we can say that the
TCP/IP protocol suite is made of five layers: physical,
data link, network, transport, and application.
Topics discussed in this section:
Physical and Data Link Layers
Network Layer
Transport Layer
Application Layer
2.82
2.83
25ADDRESSING
Four levels of addresses are used in an internet employing
the TCP/IP protocols: physical, logical, port, and specific.
2.84
2.85
Addresses in TCP/IP
2.86
Physical Addresses
The physical address, also known as the link address, is the
address of a node as defined by its LAN or WAN. It is
included in the frame used by the data link layer. It is the
lowest-level address.
Logical Addresses
Logical addresses are necessary for universal
communications that are independent of underlying
physical networks. The logical addresses are designed for
this purpose. A logical address in the Internet is currently a
32-bit address that can uniquely define a host connected to
the Internet. No two publicly addressed and visible hosts on
the Internet can have the same IP address.
Addresses in TCP/IP
2.87
Port Addresses
Computers are devices that can run multiple processes at the same
time. The end objective of Internet communication is a process
communicating with another process. For example, computer A can
communicate with computer C by using TELNET. At the same time,
computer A communicates with computer B by using the File
Transfer Protocol (FTP). For these processes to receive data
simultaneously, we need a method to label the different processes.
In other words, they need addresses. In the TCP/IP architecture, the
label assigned to a process is called a port address.
Specific Addresses
Some applications have user-friendly addresses that are designed
for that specific address. Examples include the e-mail address (for
example, faisal.siddiqui@bimcs.edu.pk) and the Universal Resource
Locator (URL) (for example, www.bahria.edu).
2.88
Example 2.1
In Figure 2.19 a node with physical address 10 sends a
frame to a node with physical address 87. The two nodes
are connected by a link (bus topology LAN). As the
figure shows, the computer with physical address 10 is
the sender, and the computer with physical address 87 is
the receiver.
2.89
2.90
Example 2.2
Most local-area networks use a 48-bit (6-byte) physical
address written as 12 hexadecimal digits; every byte (2
hexadecimal digits) is separated by a colon, as shown
below:
07:01:02:01:2C:4B
A 6-byte (12 hexadecimal digits) physical address.
2.91
Example 2.3
Figure 2.20 shows a part of an internet with two routers
connecting three LANs. Each device (computer or
router) has a pair of addresses (logical and physical) for
each connection. In this case, each computer is
connected to only one link and therefore has only one
pair of addresses. Each router, however, is connected to
three networks (only two are shown in the figure). So
each router has three pairs of addresses, one for each
connection.
2.92
2.93
2.94
2.95
2.96
Example 2.4
Figure 2.21 shows two computers communicating via
the Internet. The sending computer is running three
processes at this time with port addresses a, b, and c. The
receiving computer is running two processes at this time
with port addresses j and k. Process a in the sending
computer needs to communicate with process j in the
receiving computer. Note that although physical
addresses change from hop to hop, logical and port
addresses remain the same from the source to
destination.
2.97
2.98
Note
The physical addresses will change from hop to hop,
but the logical addresses usually remain the same.
2.99
Example 2.5
A port address is a 16-bit address represented by one
decimal number as shown.
753
A 16-bit port address represented
as one single number.
2.100