This document provides an overview of network software and protocol hierarchies. It discusses:
1. Protocol hierarchies are organized in layers, with each layer offering services to higher layers. Protocols define communication rules between peers at corresponding layers on different machines.
2. Key issues addressed by layers include error control, flow control, and routing. Error control detects and corrects errors, flow control manages data flow, and routing selects network paths.
3. Connection-oriented services establish connections, while connectionless services transmit each message independently without acknowledgment.
4. The OSI reference model organizes networking functions into 7 layers, with each layer providing services to higher layers through defined primitives. The TCP/IP model has
Download as DOC, PDF, TXT or read online on Scribd
0 ratings0% found this document useful (0 votes)
789 views
Computer Networks Notes
This document provides an overview of network software and protocol hierarchies. It discusses:
1. Protocol hierarchies are organized in layers, with each layer offering services to higher layers. Protocols define communication rules between peers at corresponding layers on different machines.
2. Key issues addressed by layers include error control, flow control, and routing. Error control detects and corrects errors, flow control manages data flow, and routing selects network paths.
3. Connection-oriented services establish connections, while connectionless services transmit each message independently without acknowledgment.
4. The OSI reference model organizes networking functions into 7 layers, with each layer providing services to higher layers through defined primitives. The TCP/IP model has
Download as DOC, PDF, TXT or read online on Scribd
You are on page 1/ 6
1
Computer Networks Notes
2. Network Software: 2.1 Protocol Hierarchies: To reduce design complexity, most networks are organized as a stack of Layers or Levels. The purpose of each layer is to offer certain services to the higher layers. Protocol- Protocol is an agreement between the communicating parties on how communication is to proceed. Peers- The entities comprising the corresponding layers on different machines are called peers. Physical Medium- Through which actual communication occurs. Iterface-The interface defines which primitive operations and services the lower layer makes available to the upper one. Network !rchitecture- A set of layers and protocols. Protocol stack - A list of protocol used by a system, one protocol per layer. 2.2. "esi# Issues for the $ayers: %rror cotrol- etection and correction of errors Possibility of two types of errors! Lost frames " frame fails to arrive at the other side amaged frames " a frame does arrive, but some of the bits are in error #ommon techni$ues for error control %rror detection Positive acknowledgement " successfully received error free frames &etransmission after timeout 'egative acknowledgment ('A)* and retransmission &low cotrol- +low control is the management of data flow between computers or devices or between nodes in a network so that the data can be handled at an efficient pace. Too much data arriving before a device can handle it causes data overflow, meaning the data is either lost or must be retransmitted. 'outi#- is the process of selecting best paths in a network. ,n the past, the term routing was also used to mean forwarding network traffic among networks. ,n internetworking, the process of moving a packet of data from source to destination. &outing is usually performed by a dedicated device called a router. &outing is a key feature of the ,nternet because it enables messages to pass from one computer to another and eventually reach the target machine. %ach intermediary computer performs routing by passing along the message to the next computer. Part of this process involves analyzing a routing table to determine the best path. 2.(. Coectio )rieted ad Coectioless Ser*ices: 2 Coectio )rieted- There is a connection established in between the source and destination. Three steps are followed in connection oriented. They are, -. %stablish a connection. .. /end data. 0. Terminate the connection. Coectioless- There is no establishment of connection between the source and destination. %ach message carries full address of the destination /ystem and each one is routed through the system independent of all the others. "ata#ram ser*ice 1 #onnectionless service often called datagram service . ,ts an unreliable service which doesn2t have the acknowledgement to the sender. !ckowled#ed "ata#ram Ser*ice 1 ,n connectionless service the sender can receive the acknowledgment from the receiver. 'e+uest-'eply- ,n this service the sender transmits a datagram containing a re$uest3 the reply contains the answer. 2.(. Ser*ice Primiti*es: A /ervice is formally specified by a set of primitives (operation* available to a user process to access the service. These primitives tell the service to perform some action or report on an action taken by a peer entity. Primiti*es Meai# L,/T%' 4lock waiting for an incoming connection #5''%#T %stablish a connection with a waiting peer &%#%,6% 4lock waiting for an incoming message /%' /end a message to the peer ,/#5''%#T Terminate a connection 2., -he 'elatioship of the Protocol ad Ser*ices: A Ser*ice is a set of primitives (operation* that a layer provides to the layer above it. /ervice related to interface between layers. A /ervice is a abstract data type or an ob7ect in the 5b7ect 5riented Programming. ,t defines the operation that can be performed on the ob7ect but does not specify how these operations are implemented. A Protocol is a set of rules governing the format and meaning of the pocket. 5r messages are exchanged by the peer entities within the layer. (. '%&%'%NC% M)"%$ (.1. -H% )SI 'eferece Model: IS) )SI- ,nternational /tandard 5rganization 5pen /ystem ,nterconnection. Principles that were applied to arrive at the seven Layers can be summarized here, A Layer should be created where a different abstraction is needed. %ach layer should perform a well1defined function. The function of each layer should be chosen with an eye toward defining internationally standardized protocols. The layer boundaries should be chosen to minimize the information flow across the interface. 3 The number of layers should be large enough that distinct functions need not be thrown together in a same layer out of necessity. -he Physical $ayer: The physical layer is concerned with raw bits over a communication channel 8ow the initial connection is established and how it is torn down when both sided are finished. The design issue deal with mechanical, electrical and timing interface etc., which lies below the physical layer "ata lik layer This layer provides reliable transmission of a packet by using the services of the physical layer which transmits bits over the medium in an unreliable fashion. This layer is concerned with ! -. +raming ! 4reaking input data into frames (typically a few hundred bytes* and caring about the frame boundaries and the size of each frame. .. Acknowledgment ! /ent by the receiving end to inform the source that the frame was received without any error. 0. /e$uence 'umbering ! To acknowledge which frame was received. 9. %rror etection ! The frames may be damaged, lost or duplicated leading to errors.The error control is on lik to lik basis. :. &etransmission ! The packet is retransmitted if the source fails to receive acknowledgment. ;. +low #ontrol ! 'ecessary for a fast transmitter to keep pace with a slow receiver. Network $ayer ,ts basic functions are routing and congestion control. 'outi#: This deals with determining how packets will be routed (transferred* from source to destination. ,t can be of three types ! /tatic ! &outes are based on static tables that are <wired into< the network and are rarely changed. ynamic ! All packets of one application can follow different routes depending upon the topology of the network, the shortest path and the current network load. /emi1ynamic ! A route is chosen at the start of each conversation and then all the packets of the application follow the same route. -rasport $ayer The basic function of the transport layer is to accept the data from session layer and split it up into smaller units. -ypes of ser*ice : The transport layer also decides the type of service that should be provided to the session layer. The service may be perfectly reliable, or may be reliable within certain 4 tolerances or may not be reliable at all. The message may or may not be received in the order in which it was sent. The decision regarding the type of service to be provided is taken at the time when the connection is established. %rror Cotrol : ,f reliable service is provided then error detection and error recovery operations are also performed. ,t provides error control mechanism on ed to ed basis. Coectio %sta.lishmet / 'elease : The transport layer also establishes and releases the connection across the network. This re$uires some sort of naming mechanism so that a process on one machine can indicate with whom it wants to communicate. Sessio layer /ession layer allows the user on different machine to establish session between them. ,t offers various services including ialog control " keep track whose turn it is to transmit Token management preventing two parties to attempting the same critical operation at the same time /ynchronization " check pointing long transmission to allow them to continue to where they were after a crash Presetatio $ayer This layer is concerned with the syntax and semantics of the information transmitted. ,n order to make it possible for computers with different data representations to communicate data structures to be exchanged can be defined in abstract way alongwith standard encoding. ,t also manages these abstract data structres and allows higher level of data structres to be defined an exchange. !pplicatio $ayer The seventh layer contains the application protocols with which the user gains access to the network. The choice of which specific protocols and their associated functions are to be used at the application level is up to the individual user. +or example commonly used protocols are 8TTP(for web browsing*, +TP(for file transfer* etc. (.2 -CP IP 'eferece model The ability to connect multiple network in a seamless way was one of the ma7or design goal from the very beginning. T#P ,P reference model act as key to achieve it. T#P ,P reference model has two primary protocols. Iteret layer Pocket switching can be held on a internet layer based on connectionless service. The pocket may arrive in different order than they are sent. The internet layer defines an official pocket format and protocol called ,P (,nternet Protocol*. 5 ,nternet layer handles the Pocket &outing system -rasport layer ,t is designed to allow peer entities on the source and the destination host to carry on a conversation Two end to end transport protocol have been defined here. -. T#P "is a reliable connection oriented protocol that allows a byte stream originating on a one machine to deliver without a error on an any other machine in internet. .. =P (=ser atagram Protocol* " it is a unreliable connectionless protocol !pplicatio layer T#P ,P model does not have the session and presentation layers ,t contains all higher level protocols Host to Network layer ,t does not really say much about what happens here, except to point out that the host has to connect to the network using some protocol so it can send ,P pockets. (.( ! compariso of -CP IP ad )SI model Three concepts of 5/, model Similarity "iffereces The functionality of the layers are roughly similar Ser*ices ,t tells what the layer does, not how the layer does. ,t defines the layer semantics 4oth transport layer provide end1to1end transport service Iterface ,t tells the processes above it how to access it >hat the parameters and what the results to expect ,t doesn2t say how layers work inside Protocol Layers can use any protocol it wants ,t provide offered services -CP IP Model There is no clear distinguish between service, interface and protocol 5ffers the services /%' ,P P5#)%T, &%#%,6% ,P P5#)%T
(., ! critic of the )SI Model ad Protocol 4ad timing 4ad technology 4ad implementation 4ad politics (.0 ! critic of the -CP IP referece model There is a problem in the concept of service, interface and protocol This models not much of a guide for designing new network using new technology. This model is poorly suited to describing any protocol stack other than T#P ,P 8ost network layer is not really a layer, it is an interface between the network and data link layer. 6 T#P ,P doesn2t distinguish the physical and data link layer. ,P and T#P protocol were carefully thought out and well implemented