CHAPTER 3 Communications Network Architecture
CHAPTER 3 Communications Network Architecture
CHAPTER 3 Communications Network Architecture
CHAPTER THREE
Communications network
architecture
Alebachew D..
2
outline
• Network line configuration
• Network architectures
• Protocol Layering
• Connection-oriented and connectionless
services
3
Point-to-Point Connection
• A point-to-point connection provides a dedicated link
between two devices.
• Provide dedicated link between two devices use actual
length of wire or cable to connect the two end
including microwave & satellite link.
• This topology is considered to be one of the easiest
and most conventional network topologies.
5
Cont…
6
Multipoint Connection
In this connection two or more devices share a single link.
• More than two devices share the link that is the capacity
of the channel is shared now.
• With shared capacity, there can be two possibilities in a
Multipoint Line configuration:
• Spatial Sharing: If several devices can share the link
simultaneously, its called Spatially shared line
configuration.
• Temporal (Time) Sharing: If users must take turns
using the link , then its called Temporally shared or
Time Shared Line configuration.
7
Cont…
8
Network architectures
An Overview of the OSI and TCP/IP Model
• The OSI Model (Open Systems Interconnection
Model) is a conceptual framework used to describe
the functions of a networking system.
• It is a reference tool for understanding data
communications between any two networked systems.
• It divides the communications processes into seven
layers.
• Each layer both performs specific functions to support
the layers above it and offers services to the layers
below it.
9
Cont…
• As data passes from one layer into another, headers are
added and removed from the PDU. This process of
adding or removing PDU information is called
encapsulation/ decapsulation.
• A list of protocols used by a certain system, one protocol
per layer, is called protocol stack.
• Protocols, or rules, can do their work in either hardware
or software or, as with most protocol stacks, in a
combination of the two.
11
Cont…
12
Cont…
• the Application layer along with the header added at
layer 7 is given to layer 6, the Presentation layer.
• This layer adds its header and passed the whole
package to the layer below. This Process is called
Encapsulation.
• The corresponding layers at the receiving side removes
the corresponding header added at that layer and sends
the remaining data to the above layer. This process is
called decapsulation.
13
Why layering?
• Reduces complexity (breaks one big problem to smaller
ones)
different modules)
• Defines how each layer communicates and works with the layers
immediately above and below it
16
Cont…
• This provides a logical, or virtual, communication between
peer layers
• The lower 4 layers (transport, network, data link and
physical —Layers 4, 3, 2, and 1) are concerned with the
flow of data from end to end through the network.
• The upper three layers of the OSI model (application,
presentation and session—Layers 7, 6 and 5) are
orientated more toward services to the applications.
• Before data is passed from one layer to another, it is
broken down into packets.
17
OSI PDU
18
• The application layer is the OSI layer that is closest to the user.
• It provides network services to the user’s applications.
• Contains all the higher level protocols that are commonly needed by
users.
19
• The Transport layer is responsible for segmentation and reassembly of the message into
segments which bear sequence numbers. This numbering enables the receiving
transport layer to rearrange the segments in proper order.
• Protocols:
• TCP (Transport control protocol)
• Connection-oriented protocol that first establishes a logical connection
• Have feedback( lost frames can be retransmitted)
• Example: www, FTP, e-mail
• UDP (User datagram protocol)
• Have no feedback . Example: video, audio
26
Cont…
• At the sending side, the transport layer receives data from the
session layer, divides it into units called segments and sends it
to the network layer.
• At the receiving side, the transport layer receives packets from
the network layer, converts and arranges into proper sequence
of segments and sends it to the session layer.
• To ensure process to process delivery the transport layer makes
use of port address to identify the data from the sending and
receiving process.
• It is a 16 bit address. Ex. TELNET uses port address 23,
HTTP uses port address 80.
27
together.
Cont…
• On the sender side, the physical layer receives the data from
Data Link Layer and encodes it into signals to be transmitted
onto the medium.
• On the receiver side, the physical layer receives the signals
from the transmission medium decodes it back into data and
sends it to the Data Link Layer.
39
summary
41
42
TCP/IP
• Used in the grandparent of all wide area computer
networks, the ARPANET and its successor, the worldwide
Internet
• Developed by Department of Defense (DoD) to ensure
and preserve data integrity as well as maintain
communication in the even of catastrophic war.
• It’s a network model used in current internet architecture
Application Layer
files, and it can accomplish this between any two machines using it.
Application Layer
• Some of the protocols used in Application Layer
• Simple Mail Transfer Protocol (SMTP) - uses a spooled, or queued,
method of mail delivery.
• POP3 is used to receive mail.
• Simple Network Management Protocol (SNMP) - collects and
manipulates valuable network information.
• This protocol stands as a watchdog over the network, quickly notifying
managers of any sudden turn of events.
• Domain Name Service (DNS) – resolves hostnames—specifically,
Internet names, such as www.ethioitaly.edu.et to the IP address 10.6.10.3
• Dynamic Host Configuration Protocol (DHCP) - gives IP addresses to
hosts.
• It allows easier administration and works well in small-to-even-very
large network environments.
46
Transport Layer
• End to end delivery of segments (user datagram)
• Some of the protocols used in Transport Layer
• Transmission Control Protocol (TCP) - takes large blocks of
information from an application and breaks them into segments.
• It numbers and sequences each segment so that the destination’s TCP
protocol can put the segments back into the order the application
intended.
• User Datagram Protocol (UDP) - does not sequence the segments and
does not care in which order the segments arrive at the destination.
• But after that, UDP sends the segments off and forgets about them. It
doesn’t follow through, check up on them, or even allow for an
acknowledgment of safe arrival — complete abandonment.
• TCP for reliability and UDP for faster transfers.
47
Network Layer
• Responsible for creating a connection between the source computer and
destination computer.
• Protocols are:
• IP
• Internet Protocol (IP) essentially is the Internet layer.
• The other protocols found here merely exist to support it.
• It can do this because all the machines on the network have a software,
or logical address called an IP address.
• ICMP
48
Network Layer
• ICMP (Internet Control Message Protocol )
Network Layer
• Each IP datagram is allotted a certain number of routers, called
called frame.
error control
Physical Layer
• Responsible for carrying individual bits
OSI model has been developed by ISO (International Standard It was developed by ARPANET (Advanced Research Project
Organization). Agency Network).
It is an independent standard and generic protocol used It consists of standard protocols that lead to the
as a communication gateway between the network and development of an internet. It is a communication
the end user. protocol that provides the connection among the hosts.
In the OSI model, the transport layer provides a guarantee for The transport layer does not provide the surety for the delivery
the delivery of the packets. of packets. But still, we can say that it is a reliable model.
This model is based on a vertical approach. This model is based on a horizontal approach.
It is also known as a reference model through which various It is an implemented model of an OSI model.
networks are built. For example, the TCP/IP model is built
from the OSI model. It is also referred to as a guidance tool.
Protocols in the OSI model are hidden and can be easily In this model, the protocol cannot be easily replaced.
replaced when the technology changes.
Connection-Oriented Service
• It is a network service that was designed and developed after the
telephone system.
• A connection-oriented service is used to create an end to end
connection between the sender and the receiver before
transmitting the data over the same or different networks.
• It uses a handshake method that creates a connection between
the user and sender for transmitting the data over the network.
• Hence it is also known as a reliable network service.
• There is a sequence of operation to be followed by the users of
connection oriented service. These are:
Connection is established.
Information is sent.
Connection is released.
56
Cont….
• Suppose, a sender wants to send data to the receiver. Then, first,
the sender sends a request packet to a receiver in the form of
an SYN packet.
• After that, the receiver responds to the sender's request with an
(SYN-ACK) signal/packets.
• That represents the confirmation is received by the receiver to start
the communication between the sender and the receiver.
• Now a sender can send the message or data to the receiver.
• Similarly, a receiver can respond or send the data to the sender in
the form of packets.
• After successfully exchanging or transmitting data, a sender can
terminate the connection by sending a signal to the receiver. In this
way, we can say that it is a reliable network service.
58
Connectionless Service
• A connection is similar to a postal system, in which each letter takes
along different route paths from the source to the destination address.
• It is used in the network system to transfer data from one end to
another end without creating any connection.
• So it does not require establishing a connection before sending the
data from the sender to the receiver.
• It is not a reliable network service because it does not guarantee
the transfer of data packets to the receiver, and data packets can be
received in any order to the receiver.
• Therefore we can say that the data packet does not follow a defined
path.
• In connectionless service, the transmitted data packet is not received
by the receiver due to network congestion, and the data may be lost.
59
THANK YOU