0% found this document useful (0 votes)
5 views41 pages

DC - Lecture 5

The document discusses data communication protocols, focusing on the OSI and TCP/IP models, which structure communication tasks into layers for efficient data exchange. Each layer provides specific services to the layer above and relies on the layer below, allowing for abstraction and independent evolution of network functions. Key elements of protocols include syntax, semantics, and timing, which facilitate communication between peer layers in different systems.

Uploaded by

MASTER JII
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PPTX, PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
5 views41 pages

DC - Lecture 5

The document discusses data communication protocols, focusing on the OSI and TCP/IP models, which structure communication tasks into layers for efficient data exchange. Each layer provides specific services to the layer above and relies on the layer below, allowing for abstraction and independent evolution of network functions. Key elements of protocols include syntax, semantics, and timing, which facilitate communication between peer layers in different systems.

Uploaded by

MASTER JII
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PPTX, PDF, TXT or read online on Scribd
You are on page 1/ 41

DATA COMMUNICATION

(LECTURE 05)
DATA COMMUNICATIONS
(COMMON MODELS)
When computers, terminals, and/or other data processing devices exchange data, the
procedures involved can be quite complex. eg. file transfer. There must be a data path
between the two computers. But also need:

•Source to activate communications Path or inform network of destination


•Source must check destination is prepared to receive
•File transfer application on source must check destination file management system will
accept and store file for his user
•May need file format translation

• Instead of implementing the complex logic for this as a single module, the task is
broken up into subtasks, implemented separately.
• In a protocol architecture, the modules are arranged in a vertical stack, each layer in
the stack performs a related subset of the functions.
• It relies on the next lower layer to perform more primitive functions. It provides services
to the next higher layer. The peer layers communicate using a set of rules or
conventions known as a protocol.
COMMON MODELS
 Thereare several models along which
computer networks are organized.

The two most common ones are the


1.Open Systems Interconnection
(OSI) model
2.Transmission Control Protocol/Internet
Protocol (TCP/IP) model.
The Open System Interconnection (OSI) Model
end-user
applications

datagrams or segments

transportation of packets

flow control

Transmits bits.
TCP/IP PROTOCOL
ARCHITECTURE
 developed by US Defense Advanced Research Project Agency (DARPA)
 for ARPANET packet switched network
 used by the global Internet
 protocol suite comprises a large collection of standardized protocols
TCP/IP MODEL
 The TCP/IP Model, also known as the Internet
protocol suite, was developed in 1989.
 This model is primarily based upon the most
protocols of the Internet, namely the Internet
Protocol (IP) and the Transmission Control
Protocol (TCP).
 The TCP/IP model splits up a communication system
into 5 abstract layers, stacked upon each other.
TCP/IP Protocol Suite – Layer Description

• Two Layers of OSI missing from TCP/IP

• Application (TCP/IP) = Application +


Presentation + Session (OSI)
OSI Model vs TCP/IP Protocol suite
BASICS
LAYERED ARCHITECTURES & PROTOCOL STACKS

 Layered architectures are a way to organize computer


networks.

 WHY LAYERS?
LAYERS AS SERVICES TO
EACH OTHER: LAYERS ARE
VERTICAL

 Each layer provides some services to the layer above it.


 Furthermore, the layer above is not concerned with the details
of how the layer below performs its services. This is
called abstraction.
 So in this way, the layers communicate with each other in
a vertical fashion.

sender

Post man
Post
office
VERTICAL LAYERS IN NETWORKS
 Computer networks are conceptually divided into layers that each
serves the layer above and below it

 The top layer in most layered models is called the application


layer.
 End-user applications live in the application layer, which includes
the web and email and are almost always implemented in software.
 The application layer is also where an outgoing message starts its
journey.
 The application needs an underlying service that can get application
messages delivered from source to destination
LAYERS COMMUNICATE WITH THEIR
PARALLELS
LAYERS ARE HORIZONTAL
 Each layer at the sending end has a parallel in the receiving end.
 Sometimes there are multiple entities horizontally, but we only see
the sender and the receiver.

 Horizontal Layers in Post

Sender Details
of Receiver
Info
Post office about
other
Post office
HORIZONTAL LAYERS IN
NETWORKS
Applications in the application layer send and receive data from the
network.
The application layer on one end system has a parallel on another end
system, i.e., a chat app on one end system could be communicating with a
chat app on another.

These applications in the application layer are seemingly


communicating with each other directly or horizontally. They are
not aware of the layer below.
LAYERS EVOLVE
INDEPENDENTLY
 Any lower layer in this model provides certain services that the upper layer can build
other services upon.

Independent Evolution in Post


 For instance, the item being sent does not necessarily have to be a letter – It can also
be a package.
 It can be put in an envelope or a box.
 It can be taken to the post office, dropped off into a post box, or picked up.
 The receiver’s end can be a P.O. box, a home or an office.

Independent Evolution in Networks


 The applications in the application layer can send and receive almost any form of data,
be it an mp3 file or a word document.
KEY ELEMENTS OF A
PROTOCOL

Communication is achieved by having the corresponding, or peer, layers in two systems


communicate. The peer layers communicate by means of formatted blocks of data that obey a
set of rules or conventions known as a protocol. The key features of a protocol are:
 • Syntax: Concerns the format of the data blocks
 • Semantics: Includes control information for coordination and error handling
 • Timing: Includes speed matching and sequencing
OPERATION OF
TCP/IP
APPLICATION LAYER
 provide support for user applications
 need a separate module for each type of application
TRANSPORT LAYER (TCP)
 common layer shared by all applications
 provides reliable delivery of data
 in same order as sent
 commonly uses TCP

From application layer To application layer


PROCESS TO PROCESS DELIVERY OF A
MESSAGE
INTERNET LAYER (IP)

 routing functions across multiple networks


 implemented in end systems and routers
 It translates logical network address into physical address.
 Concerned with circuit, message or packet switching.
 Routers and gateways operate in the network layer
 Connection services are provided including network layer flow control,
network layer error control and packet sequence control.
 Breaks larger packets into small packets.
Source to Destination delivery
DATA LINK/NETWORK ACCESS LAYER
 exchange of data between an end system and attached
network
 concerned with issues like :
 destination address provision
 invoking specific services like priority
 access to & routing data across a network link between two
attached systems
 allows layers above to ignore link specifics
 MAC addresses
Hop to hop delivery (next connected device)
PHYSICAL LAYER
 concerned with physical interface between computer and
network
 concerned with issues like:
 characteristics of transmission medium
 signal levels
 data rates
 other related matters
KEY RESPONSIBILITIES OF PHYSICAL LAYER
OPERATION OF TCP/IP
OPERATION OF TCP AND IP
ADDRESSING
REQUIREMENTS
 two levels of addressing required
 each host on a subnet needs a unique global network address
 its IP address

 each application on a (multi-tasking) host needs a unique address within


the host
 known as a port
Addressing in TCP/IP Protocol Suite
Encapsulation & De-capsulation
ACTIVITY – 04
WRITE THE NAMES OF THE LAYERS
REVISION

You might also like