Chapter - Two of Networking212
Chapter - Two of Networking212
Chapter - Two of Networking212
1
Chapter Outline
Architectures
Protocol standards
open standards
Open standard
4
Network Design Models
Flat model:- it is single collision domain and not
hierarchical divided.
7
Network Protocols and
a protocol is a set of Standards
rules that governs data communications
a protocol defines what is communicated, how it is
communicated, and when it is communicated.
E.g. When one computer sends a message to another
computer, the sender must perform the following general steps
break the data into small sections called packets
add addressing information to the packets identifying the
destination computer
deliver the data to the network card for transmission over the
network
the receiving computer must perform the same steps, but in
reverse order
accept the data from the NIC 8
Cntd…
the key elements of a protocol are:
syntax: refers to the structure or format of the data or signal
level
semantics: refers to the meaning of each section of bits
timing: refers to when data should be sent and how fast they
can be sent
Some important characteristics of a protocol are:
Direct /indirect:
• If two systems share a point-to-point link - direct
• systems connect through a switched communication network –
indirect
Monolithic/structured
9
•
Standard /nonstandard
Standard are the set of rules for data communication that
are needed for exchange of information among devices.
Standards which are created by various Standard
Organization like IEEE , ISO , ANSI etc.
Types of Standards :
1. De Facto Standard - by Fact or Convention which have
not been approved by organization e.g. Apple and
Google
2. De Jure Standard – by Law or Regulations which have
been approved by officially recognized body like ANSI ,
5
ISO , IEEE etc.
Standard /nonstandard …
5
Motivations for standards
Promote and maintain an open and competitive
market for network hardware and software.
The overwhelming need for interoperability both
nationally and internationally,
Increased the set of choices in terms of vendor and
capability for each aspect of data communications
buy hardware and software from any vendor whose
equipment meets the standard
help to promote more competition and hold down
prices.
5
Layered architecture
It is to divide the design into small pieces
Each layer in the model has specific sets of procedures,
functions, and protocols.
One layer can communicate with an adjacent layer by
using its interface.
It provides modularity and clear interfaces
16
Open Systems Interconnection (OSI) Reference
Model …
OSI Model has seven layers
17
Open Systems Interconnection (OSI)
Reference Model …
19
Open Systems Interconnection (OSI)
Reference Model …
19
Cntd…
Encapsulation :- is a process in which protocol
information is added to the data.
7
Functions of the seven layer of
Layer 7: Application
OSI model
It closest to the user(User Interface) e.g. web browser, email
provides network services to the user’s applications
e.g. file transfer, email, and remote login.
contains all higher level protocols e.g. HTTP, FTP, and DNS for
communication.
Layer 6: Presentation
Data Translation (e.g. ASCII to Unicode, EBCDIC, JPEG, MPEG, HTML)
Encryption/Decryption
Compression/decompression
21
Layer 5: Session Cntd…
manages communication sessions(opening, closing, and re-establishing)
handles authentication (apps and servers),
synchronizes data streams(half ,full duplex)
prevents operation conflicts, and provides check pointing for data recovery.
SQL, ASP(AppleTalk Session Protocol), RPC
Layer 4: Transport
Service point addressing (Port number)
Segmentation /reassembly
Connection control (Connectionless or connection oriented )
Flow control (stop-and-wait) Transmission services
quality of services
error control
Security
Multiplexing e.g. restricting access22
Layer 3: Network Cntd…
provides a logical connection b/n different devices.
end-to-end delivery of packets
logical addressing
Routing
Fragmenting of packets
E.g. IP, IPX, AppleTalk.
Layer 2: Data Link
Framing
Media Access Control (MAC)
Logical Link Control (LLC manage access
Use MAC address
Error Detection (e.g. checksums or CRC)
E.g. Ethernet, Frame Relay, FDDI.
Flow Control(prevent congestion)
23
Layer 1: Physical Cntd…
interacts with transmission media
Define the physical characteristics of transmission medium.
mechanical: type of connector, no of pins
electrical: volts represent 1and 0
Data transmission performance, Bit Rate and Bit Synchronization
Communication modes ( Simplex, Half Duplex, and Full Duplex)
characteristics are voltage levels, timing voltage changes, physical data
rate, maximum transmission distances, physical connectors
E.g. EIA/TIA-232, RJ45, BNC
24
TCP/IP Reference Model
25
Functions of layer
Process/Application Layer
manages node-to-node application communication and user-interface specifications .
Host-to-Host Layer
defines protocols for setting up transmission services for applications.
Internet Layer:
handling protocols for logical packet transmission across networks.
Network Access Layer:
overseeing hardware addressing and physical data transmission protocols
26
Cntd…
Shortcomings of TCP/IP
No Clear Separation: service, interface, and protocol concepts.
Not Generic: fails to represent protocol stacks other than TCP/IP
(e.g. Bluetooth).
host-to-network layer is not truly a separate layer.
It does not distinguish the physical and data link layers.
27
Cntd…
OSI: Service, Interfaces and protocols
Layer Interface specifies how the layer above accesses it and the expected pa-
rameters/results.
Peer Protocols: Protocols used communication b/n peer devices within a layer.
Layer as an Object: defined methods for interacting with other layers.
29
Application/ process layer protocols
Telnet - allows a user on a remote client machine, called the Telnet
client, to access the resources of another machine, the Telnet server.
Telnet makes client machine appear as though it were a terminal
directly attached to the server.
File Transfer Protocol (FTP) - is the protocol that actually lets us
transfer files, and can accomplish this between any two machines
Usually users are subjected to authentication
Network File System (NFS) – distributed file system protocol allows a
user on a client computer to access files over a network in the same way
as access a local storage file.
it is open standard, anyone can implement the protocol. 30
Cntd…
Simple Mail Transfer Protocol (SMTP): uses send mail
POP3 is used to receive mail.
Simple Network Management Protocol (SNMP): collects and
manipulates valuable network information.
Works as watchdog over network, quickly notifying managers of any
sudden turn off events
Domain Name Service (DNS): mapping of IP address with host names
e.g. www.amu.edu.et to the IP address 10.144.5.30
Dynamic Host Configuration Protocol (DHCP) - gives IP addresses to
hosts automatically
It allows easier administration and works well in small to large network
environments
31
Host-to-Host layer
Transmission Control Protocol (TCP)
Data segments and reassembly
Use sequence number for each segment
Order delivery
Reliable
Works using three way handshaking
User Datagram Protocol (UDP)
No sequence number
No order delivery of segments
UDP sends the segments off and forgets
No acknowledgment
Best effort delivery (faster transfers)
32
Cntd…
TCP and UDP
use port numbers to communicate with the upper layers
b/c they keeps track of different conversations crossing the network
simultaneously.
port numbers identify source and destination application or process in the
TCP segment.
There are 216 = 65536 ports available.
Well-known ports: port numbers range from 0 to 1023.
Registered ports: port numbers range from 1024 to 49151.
used by applications or services that need to have consistent port
assignments.
Dynamic or private ports: port numbers range from 49152 to 65535.
are not assigned to any protocol or service in particular and can be used for
33
any service or application.
Cntd…
If a port is closed/blocked, you cannot communicate with the computer by
the protocol using that port.
Eg. If port 25 is blocked you cannot send mail.
Firewalls by default block all ports.
34
Internet Layer
Internet Protocol (IP): is the Internet layer protocol
other protocols found here merely exist to support it
Internet Control Message Protocol (ICMP) works at the Network layer
and is used by IP for many different services
used for management and messaging purposes in IP networks
provides feedback and error reporting mechanisms
supporting various network diagnostic functions.
Destination host Unreachable: occurs when the packet does not reach the
destination.
Suppose sender sends the message, but the message does not reach the
destination
Buffer Full: If a router’s memory buffer for receiving incoming datagrams is
35
full, it will use ICMP to send out this message until the congestion stops.
Cntd…
Time exceeded: router decreases a datagram with a time-to-live value to zero
the router discards a datagram and sends time exceeded message to source.
executioner router uses ICMP to send a message, informing the sending
machine of the end of its datagram.
Ping (Packet Internet Groper) uses ICMP echo messages to check the physical
and logical connectivity of machines on a network.
Trace route: used to discover the path a packet takes as it traverses an
internetwork.
Address Resolution Protocol (ARP) finds the hardware address of a host from
a known IP address.
• Broadcast the message to ask the MAC address and the machine with the
specified IP address to reply with its hardware address.
36
Cntd…
Reverse Address Resolution Protocol (RARP)
discovers the identity of the IP address for diskless machines by sending out
a packet that includes its MAC address and a request for the IP address
assigned to that MAC address.
A designated machine, called a RARP server, responds with the answer, and
the identity crisis is over.
37
Cntd…
38
Network Access
reading assignment
Wi-Fi(wireless fidelity)
ATM
PPP
Ethernet
Fast Ethernet
FDDI
Token ring
39
End of chapter Two
Any question??
40