Chapter 02 Network Models
Chapter 02 Network Models
Network Models
Decapsulation
and
Encapsulation at
Encapsulation at the Source Host the Router Decapsulation at the Destination Host
Addressing
• Any communication that involves two parties needs two addresses: source address and
destination address.
• Although it looks as if we need five pairs of addresses, one pair per layer, we normally have only
four because the physical layer does not need addresses; the unit of data exchange at the physical
layer is a bit, which definitely cannot have an address.
• At the application layer, we normally use names such as someorg.com, or [email protected].
• At the transport layer, addresses are called port numbers, and these define the application-layer
programs at the source and destination.
• At the network-layer, IP address - the addresses are global, with the whole Internet as the scope.
• The link-layer addresses, sometimes called MAC addresses, are locally defined addresses, each
of which defines a specific host or router in a network (LAN or WAN).
Multiplexing and Demultiplexing
• Since the TCP/IP protocol suite uses several protocols at some layers, we can say that we have
multiplexing at the source and demultiplexing at the destination.
• Multiplexing in this case means that a protocol at a layer can encapsulate a packet from several
next-higher layer protocols (one at a time)
• Demultiplexing means that a protocol can decapsulate and deliver a packet to several next-higher
layer protocols (one at a time).
• To be able to multiplex and demultiplex, a protocol needs to have a field in its header to identify
to which protocol the encapsulated packets belong.
• At the transport layer, either UDP or TCP can accept a message from several application-layer
protocols. At the network layer, IP can accept a segment from TCP or a user datagram from UDP.
IP can also accept a packet from other protocols such as ICMP, IGMP, and so on.
• At the data-link layer, a frame may carry the payload coming from IP or other protocols such as
ARP
The OSI Model
• OSI was completed when TCP/IP was fully in place and a lot of time and
money had been spent on the suite; changing it would cost a lot.
• Some layers in the OSI model were never fully defined. For example,
although the services provided by the presentation and the session layers
were listed in the document, actual protocols for these two layers were not
fully defined, nor were they fully described, and the corresponding
software was not fully developed.
• When OSI was implemented by an organization in a different application,
it did not show a high enough level of performance to entice the Internet
authority to switch from the TCP/IP protocol suite to the OSI model