0% found this document useful (0 votes)
82 views27 pages

Lecture 2 (Layered Architecture)

The document discusses computer networks and layered architectures. It covers connection-oriented and connectionless network types, as well as local and wide area networks. It then describes the OSI 7-layer model and compares it to the TCP/IP 4-layer model. It discusses how each layer in these models encapsulates data from the higher layers. Finally, it provides details on protocols in the application layer of the TCP/IP model, grouping them into categories for remote login, file transfer, email, and support services.

Uploaded by

abhishek reddy
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PPTX, PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
82 views27 pages

Lecture 2 (Layered Architecture)

The document discusses computer networks and layered architectures. It covers connection-oriented and connectionless network types, as well as local and wide area networks. It then describes the OSI 7-layer model and compares it to the TCP/IP 4-layer model. It discusses how each layer in these models encapsulates data from the higher layers. Finally, it provides details on protocols in the application layer of the TCP/IP model, grouping them into categories for remote login, file transfer, email, and support services.

Uploaded by

abhishek reddy
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PPTX, PDF, TXT or read online on Scribd
You are on page 1/ 27

CS F303

(Computer Networks)
Vishal Gupta
Department of Computer Science and Information Systems
BITS Pilani Birla Institute of Technology and Science
Pilani | Dubai | Goa | Hyderabad
Pilani Campus, Pilani
BITS Pilani
Pilani | Dubai | Goa | Hyderabad

Agenda: Layered Architecture


Network Types
• Two basic categories of network hardware:
– Connection Oriented
– Connection Less
Connection Oriented (Circuit Switched Technology)
• Paradigm
– Form a ‘‘connection’’ through the network
– Send / receive data over the connection
– Terminate the connection
▪ Can guarantee bandwidth
▪ Proponents argue that it works well with real-time
applications
▪ Example: ATM network

BITS Pilani, Deemed to be University under Section 3 of UGC Act, 1956


Network Types
Connectionless (Packet Switched Technology)
• Paradigm
❖ Form ‘‘packet’’ of data
❖ Pass to network
❖ Each packet travels independently
❖ Packet includes identification of the destination
❖ Each packet can be a different size
❖ The maximum packet size is fixed (some technologies limit
packet sizes to 1,500 octets or less)

BITS Pilani, Deemed to be University under Section 3 of UGC Act, 1956


Network Types
Broad Characterizations Of Packet Switching Networks
• Local Area Network (LAN)
• Wide Area Network (WAN)
• Categories are informal and qualitative

Local Area Networks Engineered for


– Low cost
– High capacity
-- Direct connection among computers
-- Limited distance

BITS Pilani, Deemed to be University under Section 3 of UGC Act, 1956


• In the coming lectures, unless otherwise
stated, we are going to deal with:

– Connection less services


– Packet switched network
– TCP/IP protocol suite for internetworking

BITS Pilani, Deemed to be University under Section 3 of UGC Act, 1956


Layered Network Architecture
Following two types of Layered Network architectures exist in the Literature:

1. OSI Model
2. TCP/IP Model

BITS Pilani, Deemed to be University under Section 3 of UGC Act, 1956


Layered Architecture
• The OSI model is composed of seven layers ;
• Physical (layer1), Data link (layer2), Network (layer3)
• Transport (layer4), Session (layer5), Presentation (layer6)
• Application (layer7)

• Layer
❖ Designer identified which networking functions had related uses and
collected those functions into discrete groups that became the layers.
❖ The OSI model allows complete interoperability between otherwise
incompatible systems.
❖ The Each layer uses the services of the layer immediately below it.

BITS Pilani, Deemed to be University under Section 3 of UGC Act, 1956


OSI Model

BITS Pilani, Deemed to be University under Section 3 of UGC Act, 1956


Peer-to-peer Processes
• Layer x on one machine communicates with layer x on
another machine - called Peer-to-Peer Processes.
• Interfaces between Layers
• Each interface defines what information and services a layer must
provide for the layer above it.
• Well defined interfaces and layer functions provide modularity to a
network
• Organizations of the layers
❖ Network support layers : Layers 1, 2, 3
❖ User support layer : Layer 5, 6, 7
• It allows interoperability among unrelated software systems
❖ Transport layer (Layer 4) : links the two subgroups

BITS Pilani, Deemed to be University under Section 3 of UGC Act, 1956


Peer-to-peer Processes (cont’d)
Figure 2.3 The interaction between layers in the OSI model
Peer-to-peer Processes (cont’d)
Figure 2.4 An exchange using the OSI model
❑ The data portion of a packet at level N-1 carries the whole packet
from level N. – The concept is called encapsulation.
Introduction to TCP/IP
OSI vs TCP/IP Protocol Stack

Link Layer : includes device driver and network interface card


Network Layer : handles the movement of packets, i.e. Routing
Transport Layer : provides a reliable flow of data between two hosts
Application Layer : handles the details of the particular application
BITS Pilani, Deemed to be University under Section 3 of UGC Act, 1956
Packet Encapsulation
■ According to RFC 1122, the Internet Protocol Suite organizes the functional
groups of protocols and methods into four layers.
■ The data is sent down the protocol stack
■ Each layer adds to the data by prepending headers

22Bytes 20Bytes 20Bytes 4Bytes

64 to 1500 Bytes
BITS Pilani, Deemed to be University under Section 3 of UGC Act, 1956
Application Layer
• In TCP/IP, the Application Layer contains all protocols and methods that
fall into the realm of process-to-process communications across an
Internet Protocol (IP) network.
• Application Layer methods use the underlying Transport Layer protocols
to establish host-to-host connections.
• RFC 1123 covers the application layer and support protocols of internet
protocol suite.
• This RFC enumerates standard protocols that a host connected to the
Internet must use.
• We will see the protocols explicitly mentioned in RFC 1123. This does not
mean that these are the only protocols at this layer. For complete list,
see: http://en.wikipedia.org/wiki/Application_Layer

BITS Pilani, Deemed to be University under Section 3 of UGC Act, 1956


Application Layer
• The four categories and protocols in each are as follows:
Category 1: Remote Login category
– Telnet
Category 2: File Transfer category
– FTP Simple Mail Transfer Protocol (SMTP) is an Internet standard
– TFTP  for electronic mail (e-mail) transmission across 
Internet Protocol (IP) networks.
Category 3: Electronic Mail category
– SMTP
– IMAP Internet message access protocol (IMAP) is one of the two
most prevalent Internet standardprotocols for e-mail retrieval,
– POP
the other being the Post Office Protocol (POP).
Category 4: Support Services category
– DNS
– RARP File Transfer
Telnet is Protocol (FTP)
a network is a standard network
protocol used on the Internet or  protocol
– BOOTP Trivial
 used File
to Transfer
transfer Protocol (TFTP)
files from one ahost istoa file transfer protocol
anotherinteractive
over a TCP-
local area networks to provide bidirectional text-
– SNMP  known
based for its
network, simplicity.It
such as is generally
the Internet. used for
oriented communications facility using a virtual terminal automated
– CMOT transfer of configuration or boot files between machines in a
 connection.
local environment.

BITS Pilani, Deemed to be University under Section 3 of UGC Act, 1956


Application Layer
• The four categories and protocols in each are as follows:
Category 1: Remote Login category
– Telnet
Category 2: File Transfer category
– FTP
– TFTP
Category 3: Electronic Mail category
– SMTP
– IMAP
– POP
Category 4: Support Services category
– DNS The Reverse Address Resolution Protocol (RARP) is an obsolete
– RARP The Domain
The common
Name System (DNS)
computer management
networking protocol is aby
used
information
hierarchical namingtosystem
a host computer
protocol (CMIP)
built
request
is a protocol its 
– BOOTP on a distributed
Simplemanagement.
Internet database for
Network Management
Protocol (IPv4) computers, services,
Protocol (SNMP) or any
is an resource
"Internet-
for network Itaddress
providesfrom an administrative
an implementation forhost,
the when it
connected
hasstandard to the Internet or a private network. Most importantly, it
– SNMP services definedprotocol
available
the Bootstrap its Link
by for
the Common
Protocol, managing
Layer or isdevices
hardware
management
or BOOTP, on
address,
a network IP networks.
such asused
information
protocol Devices
a MACby a that
service
translates Itdomain
typically support names
SNMP meaningful to humans into the numerical
– CMOT  address.
 (CMIS),
networkallowing
client has
to been an IPinclude
rendered
communication
obtain routers,
obsolete
between
address from byaswitches,
network servers,
the Bootstrap
management
configuration Protocol
server.
identifiers associated
workstations,
 (BOOTP)and with
printers,
andmanagement networking
modem
the modern Dynamic equipment
racks, and more.for the purpose of
applications agents.  Host Configuration Protocol (DHCP)
locating and addressing these devices worldwide.
BITS Pilani, Deemed to be University under Section 3 of UGC Act, 1956
Transport Layer
• In computer networking, the Transport Layer provides end-
to-end communication services for applications.
• The transport layer provides convenient services such as 
connection-oriented data stream support, reliability, 
flow control, and multiplexing.
• The most well-known transport protocol is the 
Transmission Control Protocol (TCP). 
• RFC 1122 covers the communications protocol layers: link
layer, IP layer, and transport layer.

BITS Pilani, Deemed to be University under Section 3 of UGC Act, 1956


Transport Layer
• Protocols at this layer are:
– TCP
– UDP The Resource Reservation Protocol (RSVP) is a Transport Layer 
protocol designed to reserve resources across a network for an 
– DCCP integrated services Internet.
Traditionally, TCP/IP networks signal congestion by dropping
– SCTP packets. Explicit Congestion Notification (ECN) is an extension
– RSVP to the Internet Protocol and to the 
The Transmission
Transmission Control
Applications, which Control
do notProtocol (TCP)
Protocol . ECN allows
require is data
one of
end-to-end
reliable the core 
stream service,
– ECN protocols of
notification the Internet Protocol Suite. It provides reliable,
may useof network
the User congestion without
Datagram protocol  dropping
(UDP).  packets.
– ……etc ordered
With UDP, delivery
computerof a applications
stream of bytes
can from
send amessages
programto onother
one
The Datagram
computer Congestion
to another Controlanother
program Protocol (DCCP) isTCP
an is the
hosts on an IP network withouton computer.
requiring prior communications
experimental
protocol message-orientedTransport Layer protocol. DCCP
to set up that major
special Internet applications
transmission channels orsuchdataas the  Common
paths.
implements
World Wide reliable connection setup,
Web, email, remote administration and 
network applications that use UDP include: the 
Explicit
file Congestion
transfer rely on. Notification (ECN), congestion control, and
Stream Control
Domain Transmission
Name Protocol (SCTP) media applications
System (DNS), streaming is a 
feature negotiation. DCCP is useful for applications with timing
Transport
suchLayer protocol, serving
as IPTV, Voice over in a similar role
IP (VoIP), Trivial FiletoTransfer
the Protocol
constraints on the delivery of data that may become useless to
popular protocols Transmission
 (TFTP) and many online games.Control Protocol (TCP) and 
the receiver if reliable in-order delivery combined with 
User Datagram Protocol (UDP). It provides some of the same
network congestion avoidance is used. Such applications
service features of both: it is message-oriented like UDP and
include streaming media, Multiplayer online games and 
ensures reliable, in-sequence transport of messages with 
Internet telephony. 
congestion control like TCP.  
BITS Pilani, Deemed to be University under Section 3 of UGC Act, 1956
Internet layer
•  The Internet Layer derives its name from its function of forming an
internet (uncapitalized), or facilitating internetworking, which is the
concept of connecting multiple networks with each other through 
gateways.
• The Internet Layer has three basic functions:
– For outgoing packets, select the next-hop host (gateway) and transmit the packet to this
host.
– For incoming packets, capture packets and pass the packet payload up to the
appropriate Transport Layer protocol, if appropriate.
– In addition it provides error detection and diagnostic capability.
• In its operation, the Internet Layer is not responsible for reliable
transmission. It provides only anunreliable service, and "best effort"
delivery.
• The primary protocols in the Internet Layer are the Internet protocol (IP).
It is implemented in two versions, IPv4 and IPv6. 

BITS Pilani, Deemed to be University under Section 3 of UGC Act, 1956


Internet layer
The Internet Protocol (IP) is the principal 
communications protocol used for relaying datagrams(packets)
Protocols in this layer are: The Internet Control Message Protocol (ICMP) is one of the
across an internetwork using the Internet Protocol Suite. It is
core protocols of the Internet Protocol Suite. It is chiefly used
the primary protocol in the Internet Layer of the Internet
by the operating systems of networked computers to send
Protocol Suite and has the task of delivering datagrams from
• IP error messages indicating, for example, that a requested
the source host to the destination host solely based on their 
service is not available or that a host or router could not be
– IPv4 addresses. 
reached. ICMP can also be used to relay query messages.
– IPv6 ICMP differs from transport protocols such as TCP and UDP in
that it is notGroup
typically used to exchange data between
is a  systems,
• ICMP The Internet
nor is it regularly
communications
Management Protocol (IGMP)
employed byby hosts and
protocol used end-user network applications
adjacent routers
• IGMP  on IP networks to establish multicast group memberships. It is
analogous to ICPM for unicast connections. IGMP can be used
• IP Sec for onlinestreaming video and gaming, and allows more
efficient
Internet use of Security (IPsec)
Protocol resources when issupporting
a protocolthese types of
suite for
applications. Protocol (IP) communications by 
securing Internet
authenticating and encryptingeach IP packet of a
communication session. IPsec also includes protocols for
establishing mutual authentication between agents at the
beginning of the session and negotiation of cryptographic keys
 to be used during the session.

BITS Pilani, Deemed to be University under Section 3 of UGC Act, 1956


Link Layer
• It is the group of methods or protocols that only operate on a host's link.
• The link is the physical and logical network component used to
interconnect hosts or nodes in the network and a link protocol is a suite
of methods and standards that operate only between adjacent network
nodes of a Local area network segment or a wide area
network connection.

BITS Pilani, Deemed to be University under Section 3 of UGC Act, 1956


Link Layer
• The core protocols specified by the Internet Engineering Task Force to be
placed into this layer are:

– ARP Address Resolution Protocol (ARP) is


a telecommunications protocol used for resolution of network
– NDP
layer addresses into link layer addresses.
– RARP ARP has been implemented in many combinations of network
– OSPF and overlaying internetwork technologies, such as IPv4, 
– Media Access Control Chaosnet, DECnetand Xerox PARC Universal Packet (PUP) using 
IEEE 802 standards, FDDI, X.25, Frame Relay and 
Asynchronous Transfer Mode (ATM), IPv4 over IEEE 802.3 and 
IEEE 802.11 being the most common cases.
In Internet Protocol Version 6 (IPv6) networks, the functionality
of ARP is provided by the Neighbor Discovery Protocol (NDP).

BITS Pilani, Deemed to be University under Section 3 of UGC Act, 1956


128.143.71.21 is not on my local
network.
Sending a packet from Argon to NeonTherefore, I need to send the
128.143.71.21 is on my local
packet to my
network.
DNS:
DNS: default gateway with address
ARP:What
The is
What IPisthe
address
theIPMAC
address
of Therefore, I can send the packet
“neon.tcpip-lab.edu” is of 128.143.137.1
address
ARP: TheofMAC
128.143.137.1?
address directly.
of128.143.71.21
“neon.tcpip-lab.edu”?
128.143.137.1 is 00:e0:f9:23:a8:20
ARP: What is the MAC
ARP: TheofMAC
address address of
128.143.71.21?
128.143.137.1 is 00:20:af:03:98:28

fram fram
e e

BITS Pilani, Deemed to be University under Section 3 of UGC Act, 1956


Example: Access www.ee.ucla.edu
Client Server
Http request
Appl GET “http://bits-pilani.ac.in”<CR> Appl
Http response
HTTP 200 “” <CR> <html file in MIME format> HTTP

Initiate connection (hdshk)


Transp Package data (add TCP header) Transp
send http request packet
TCP Assemble response TCP
(break into several packets)
Send http response packets
Close connection (hdshk)
send data to next hop
Net Net Net
IP Relay data IP IP
ARP to provide IP/MAC
translation
Link Link Link
ethernet ethernet ethernet
Router(s)
BITS Pilani, Deemed to be University under Section 3 of UGC Act, 1956
BITS Pilani
Pilani | Dubai | Goa | Hyderabad

Thank You

You might also like