0% found this document useful (0 votes)
57 views

INTNETWORKING

The document discusses the layers of the OSI model and how they enable internetworking. It describes each layer from the physical layer up to the application layer, explaining their functions and providing examples of protocols used at each layer. The purpose of layering the model is to simplify networking, allow for specialization, provide modularity, encourage interoperability, and enable standardized interfaces.

Uploaded by

Abdourahmane Ba
Copyright
© © All Rights Reserved
Available Formats
Download as PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
57 views

INTNETWORKING

The document discusses the layers of the OSI model and how they enable internetworking. It describes each layer from the physical layer up to the application layer, explaining their functions and providing examples of protocols used at each layer. The purpose of layering the model is to simplify networking, allow for specialization, provide modularity, encourage interoperability, and enable standardized interfaces.

Uploaded by

Abdourahmane Ba
Copyright
© © All Rights Reserved
Available Formats
Download as PDF, TXT or read online on Scribd
You are on page 1/ 26

IST 228\Ch1\Internetworking 1

Chapter 1: Internetworking
• Internetworking Basics
• Network segmentation
• How bridges, switches, and routers are
used to physically segment a network
• How routers are used to create
internetwork
• OSI model
IST 228\Ch1\Internetworking 2

Internetworking Models
• Most networks are designed as a stack of
layers, each one built upon the one below
it. Why?
Host 1 Host 2
Layer 3 protocol
Layer 3 Layer 3
Layer 2/3 interface
Layer 2 protocol
Layer 2 Layer 2
Layer 1/2 interface
Layer 1 protocol
Layer 1 Layer 1

Physical Medium
IST 228\Ch1\Internetworking 3

• Each layer provides services to the higher


levels.
• Each layer behaves as a black box.
• Layer n on one machine talks to layer n on
another machines.
• The corresponding layer in the layered
structure are called peers.
• The communication between peers must
follow certain rules, known as protocol.
• No data are directly transferred between
layers. Actual communication is through a
physical medium below layer 1.
IST 228\Ch1\Internetworking 4

An Analogy
Professor A Professor B
J’aime
I like Message bien les
rabbits
lapins
Urdu & English Information Chinese & French
for the
Translator remote Translator
L: Dutch L: Ducth
translator
Ik vind Ik vind
konijnen use Dutch konijnen
leuk leuk

Secretary Information Secretary


Fax:# Fax:#
for the
L: Ducth L: Ducth
remote
Ik vind secretary Ik vind
konijnen konijnen
leuk use fax leuk
IST 228\Ch1\Internetworking 5

Open Systems Interconnection (OSI)


Reference Model
• Provides user interface
The upper levels

Application
• Initiates services
• Transfer data into standard format
Presentation before transmission
• Keeps data different applications’ data
Session separate
• Control the data exchange
• End-to-end data error free data
Transport
transmission
The lower levels

• Logical addressing for data packets


Network
Routing and error handling
• NIC software function
Data Link • How data in packaged
• Error detection

• Moves bits between devices


Physical
• Specifies voltages, cables, and cables
IST 228\Ch1\Internetworking 6

Reasons for Layering


• Simplifies the network model
• Enables programmers to specialize in a
particular level or layer of the networking
model
• Provides design modularity
• Encourages interoperability
• Allows for standardized interfaces to be
produced by networking vendors
IST 228\Ch1\Internetworking 7

The Application Layer (Layer 7)


• The layer where users communicate to the computer
• Contains protocols and utilities that provides services to
network applications
– (True/False) MsWord, Eudora Mail, Netscape are in the
application layer.
– Eudora (application) uses SMTP (Simple Mail Transfer Protocol)
(protocol).
• E-mail:
– Message formats such as RFC 822
– SMTP, POP3 (Post Office Protocol Version 3), IMAP (Internet
Message Access Protocol)
• WWW:
– HTML (The HyperText Markup Language), XML (eXtensible
Markup Language), XSL (eXtensible Style Language)
– HTTP (The HyperText Transfer Protocol)
IST 228\Ch1\Internetworking 8

The Presentation Layer (Layer 6)


• The presentation layer prepares the data from
the application layer for transmission over the
network or from the network to the application
layer.
• Include protocols specifying how to represent
data (MPEG, JPEG, PIC, WAV)
• Responsible for data translation, formatting,
encryption, compression.
• We need these services because different
computers use different internal representation
for data (integers and characters)
IST 228\Ch1\Internetworking 9

The Session Layer (Layer 5)


• Enables two applications on the network to have
an ongoing conversation
• Provide following services
– Communication setup and teardown
– Control for data exchange
– Data synchronization definition
– Failure recovery
• Examples:
– Structured Query Language (SQL)
– X Windows
– AppleTalk Session Protocol (ASP)
IST 228\Ch1\Internetworking 10

The Transport Layer (Layer 4)


• Provides
– end-to-end error free data transport services
– establish a logical connection
– data segmentation into maximum transmission unit
size
– messaging service for session layer
• Protocols in this layer can be
– connection-oriented : require an acknowledgment of
the receipt of data packets.
– connectionless : do not require an acknowledgment of
the receipt of data packets.
IST 228\Ch1\Internetworking 11

• Connection-oriented protocols:

sender receiver
Synchronize

Negotiate connection

Synchronize

Acknowledge

Virtual Circuit Connection Establish

Data Transfer
IST 228\Ch1\Internetworking 12

• Flow Control
• The segments delivered back to the sender upon their
reception
• Any segment not acknowledged are retransmitted.
• Segments are sequence back into their proper order upon
arrival at their destination
• Manageable data flow is maintained in order to avoid
congestion
sender receiver

Buffer full

GO
IST 228\Ch1\Internetworking 13

• Windowing: The quantity of data segment


(in bytes) is sent without receiving an
acknowledgment (ack) is called a window.

sender receiver sender receiver

Window Window
size of 1 size of 3

send 1 receive 1 send 1


ack. 2 send 2
send 2 receive 2 send 3
ack. 3 ack. 4
send 3 send 4
IST 228\Ch1\Internetworking 14

• Acknowledgments:
sender receiver

Positive Acknowledgment
with retransmission
1 2 3 4 5 6 1 2 3 4 5 6
send 1

send 2
send 3
ack. 4

send 4
send 5 Connection lost!

send 6
ack. 5

send 5
ack. 7
IST 228\Ch1\Internetworking 15

The Network Layer (Layer 3)


• Provides services
– to manage devices addressing
– to tracks the location of devices on the
network
– to determine the best way to move data on
the network
• The network layer must transport traffic
between devices that are not directly
connected.
• Routers are specified at this layer.
IST 228\Ch1\Internetworking 16

The Data Link (Layer 2)


• Services
– Identification of the source and destination nodes via
their physical address (Media Access Control (MAC)
address)
– Definition of how data is packaged for transport as
frames
– Error detection
– Flow control of information sent across the link
• Has two sublayers:
– Media Access Control (MAC) 802.3
– Logical Link Control (LLC) 802.2
IST 228\Ch1\Internetworking 17

The Physical Layer (Layer 1)


• This layer communicates directly with the
various types of actual communication
media
• Services
– definition of the physical characteristics of the
network hardware, including cable and
connector
– Encoding
– Transmission of signals on the wire
IST 228\Ch1\Internetworking 18

Example:
568B twisted pair wiring scheme
IST 228\Ch1\Internetworking 19

Layer 1 Network Devices: Repeaters


• The number of nodes on a network and the length of
cable used influence the quality of communication on the
network
• Attenuation
– Natural degradation of a transmitted signal over distance
• Repeaters work against attenuation by repeating signals
that they receive on a network
• Why are repeaters Layer 1 devices?
IST 228\Ch1\Internetworking 20

Layer 1 Network Devices: Hubs


• Generic connection device used to tie several
networking cables together to create a link
between different stations on a network
IST 228\Ch1\Internetworking 21

• Hubs that are plugged into electric power are


called active hubs
• A hub that merely connects different cables
on a network and provides no signal
regeneration is called a passive hub and is
not a repeater
• “Hub” is a generic term applied to many
different network-connection devices
• If a hub in some way segments or subdivides
the traffic on a network, it is an intelligent, or
switching, hub
IST 228\Ch1\Internetworking 22

Network Segmentation
• Segmentation
– Process of breaking a network into smaller broadcast or
collision domains
• Ethernet network, which are characterized by IEEE
802.3 standard, define the use of a Carrier Sense
Multiple Access with Collision Detection
(CSMA/CD) access method
– Backoff algorithm : Mathematical calculation
performed by computers after a collision occurs on a
CSMA/CD network
– Backoff period : Random time interval used after a
collision has been detected on an Ethernet network
IST 228\Ch1\Internetworking 23

Network Segmentation via Bridges


IST 228\Ch1\Internetworking 24

Layer 2 Devices: Bridges


• Operate at the Data Link layer of the OSI
model
• Filters traffic between network segments
by examining the destination MAC address
– Based on this destination MAC address, the
bridge either forwards or discards the frame
– When a client sends a broadcast frame to
the entire network, the bridge will always
forward the frame
IST 228\Ch1\Internetworking 25

• Transparent Bridges : Also called learning


bridges because they build a table of MAC
addresses as they receive frames
– This means that they “learn” which addresses
are on which segments
– Ethernet networks mainly use transparent
bridges
• Source-routing bridges : Rely on the
source of the frame transmission to
provide the routing information
– Usually employed by Token Ring networks
• Translation bridges : Can connect
networks with different architectures
IST 228\Ch1\Internetworking 26

Layer 2 Devices: Switches


• Increase network performance by reducing the
number of packets transmitted to the rest of the
network
• Like bridges, operate at the Data Link layer of
the OSI model
• In an Ethernet network, computers are usually
connected directly to a switch
• Virtual circuit
– Private connections between two points created by a
switch that allows the two points to use the entire
available bandwidth between those two points without
contention

You might also like