SlideShare uma empresa Scribd logo
1 de 49
IE 20303
What is a Protocol? Allows entities (i.e. application programs)  from different systems to communicate Shared conventions for communicating information are called protocols Defines a set of rules that govern the exchange of data Includes syntax, semantics, and timing
Why Use Protocol Architecture? Data communications requires complex procedures Sender identifies data path/receiver Systems negotiate preparedness Applications negotiate preparedness Translation of file formats For all tasks to occur, high level of cooperation is required
Modular Approach Breaks complex tasks into subtasks Each module handles specific subset of tasks Communication occurs between different modules on the same system between similar modules on different systems
Advantages of Modularity Easier application development Network can change without all programs being modified
Three-Layer Model Distributed data communications involves three primary components: Networks Computers Applications Three corresponding layers Network access layer Transport layer Application layer
Network Access Layer Concerned with exchange of data between computer and network Includes addressing, routing, prioritizing, etc Different networks require different software at this layer Example: X.25 standard for network access procedures on packet-switching networks
Transport Layer Concerned with reliable transfer of information between applications Independent of the nature of the application Includes aspects like flow control and error checking
Application Layer Logic needed to support various applications Each type of application (file transfer, remote access) requires different software on this layer
Addressing Each computer on a network requires a unique address on that network Each application requires a unique address within the computer to allow support for multiple applications (service access points, or SAP)
Data Transmission Application layer creates data block Transport layer appends header to create PDU (protocol data unit) Destination SAP, Sequence #, Error-Detection Code Network layer appends another header Destination computer, facilities (e.g. “priority”)
Protocol Architectures
Protocols in a Simplified Architecture
Transport PDU Headers Source port: indicates the application that sent the data Destination port: the appplication that the data is to be delivered to Sequence number: provides sequential ordering of segments  Error-detection code: code that is a function of the contents of a segment (e.g., checksum or frame check sequence)
Network Access PDU (Packet Header) Source computer address: indicates the source of the packet Destination computer address: indicates the computer that the data is to be delivered to Facilities requests: indicates if the network is to make use of certain facilities such as priority
Standardized Protocol Architectures Vendors like standards because they make their products more marketable Customers like standards because they enable products from different vendors to interoperate Two protocol standards are well-known: TCP/IP: widely implemented OSI: less used, but widely known and still useful for modeling/conceptualizing
TCP/IP Transmission Control Protocol/Internet Protocol Developed by DARPA No official protocol standard Identifies 5 Layers Application Host-to-Host (transport) Internet Network Access Physical
TCP/IP Physical Layer Physical interface between a DTE (e.g. computer or terminal) and a transmission medium  Specifies: Characteristics of medium Nature of signals Data rate
TCP/IP Network Access Layer Exchange of data between systems on a shared network Utilizes address of host and destination Can also prioritize  transmission Software at this layer depends on network (e.g. X.25 vs. Ethernet) Segregation means that no other software needs to be concerned about net specifics
TCP/IP Internet Layer An Internet is an interconnection of two or more networks Internet layer handles tasks similar to network access layer, but between networks rather than between nodes on a network Uses IP for addressing and routing across networks Implemented in workstations and routers
TCP/IP Transport Layer Also called host-to-host layer Reliable exchange of data between applications Uses TCP protocols for transmission
TCP/IP Application Layer Logic needed to support variety of applications Separate module supports each type of application (e.g. file transfer)
Operation of TCP/IP
TCP & UDP Most TCP/IP applications use TCP for transport layer TCP provides a connection (logical association) between two entities to regulate flow check errors UDP (User Datagram Protocol) does not maintain a connection, and therefore does not guarantee delivery, preserve sequences, or protect against duplication
TCP & UDP
IP and IPv6 IP provides for 32-bit source and destination addresses IPv6 (1996 standard) provides for 128-bit addresses Migraqtion to IPv6 will be a very slow process
IP Headers
TCP/IP Applications SMTP (Simple Mail Transfer Protocol) Basic e-mail facility, transferring messages among hosts FTP (File Transfer Protocol) Sends files from one system to another on user command SSH (Secure Shell) Secure remote login capability, allowing a user to remotely logon to a computer
Internetworking Interconnected networks, usually implies TCP/IP Can appear to users as a single large network The global Internet is the largest example, but intranets and extranets are also examples
Routers Equipment used to interconnect independent networks Several essential functions Provide a link between networks Provide routing and delivery of data between processes on systems from different networks Provide these functions without requiring modification of networking architecture
Router Issues Addressing schemes Maximum packet size Interfaces Reliability
Operation of TCP/IP: Action at the Sender
Operation of TCP/IP: Action at the Router
Operation of TCP/IP: Action at the Receiver
Why Study OSI? Still an excellent model for conceptualizing and understanding protocol architectures Key points: Modular Hierarchical Boundaries between layers=interfaces
OSI Open Systems Interconnection Developed by ISO Contains seven layers
OSI Lower Layers Physical Data Link Network
OSI Physical Layer Responsible for transmission of bits Always implemented through hardware Encompasses mechanical, electrical, and functional interfaces e.g. RS-232
OSI Data Link Layer Responsible for error-free, reliable transmission of data Flow control, error correction e.g. HDLC
OSI Network Layer Responsible for routing of messages through network Concerned with type of switching used (circuit v. packet) Handles routing between networks, as well as through packet-switching networks
OSI Upper Layers Transport Session Presentation Application
OSI Transport Layer Isolates messages from lower and upper layers Breaks down message size Monitors quality of communications channel Selects most efficient communication service necessary for a given transmission
OSI Session Layer Establishes logical connections between systems Manages log-ons, password exchange, log-offs Terminates connection at end of session
OSI Presentation Layer Provides format and code conversion services Examples  File conversion from ASCII to EBDIC Invoking character sequences to generate bold, italics, etc on a printer
OSI Application Layer Provides access to network for end-user User’s capabilities are determined by what items are available on this layer
The OSI Environment
TCP/IP - OSI Comparison
IPSec Developed by the Internet Architecture Board in 1994 (RFC 1636) Examples of Applications include:-Secure branch office connectivity over the Internet-Secure remote access over the Internet-Establishing extranet and intranet connectivity with partners-Enhancing electronic security
Benefits of IPSec Provides stronger secuirty to routers and firewalls Is resistant to bypass within a firewall Is transparent to applications  Is transparent to end users Can provide security to end-users

Mais conteúdo relacionado

Mais procurados

Network Analysis & Designing
Network Analysis & DesigningNetwork Analysis & Designing
Network Analysis & DesigningPawan Sharma
 
Chapter 1 - Data Communications, Data Networks, and the Internet
Chapter 1 - Data Communications, Data Networks, and the InternetChapter 1 - Data Communications, Data Networks, and the Internet
Chapter 1 - Data Communications, Data Networks, and the Internetadpeer
 
NETWORK STANDARD
NETWORK STANDARDNETWORK STANDARD
NETWORK STANDARDKak Yong
 
Network standards
Network standardsNetwork standards
Network standardshspatalia
 
Networking peer-to-peer-powerpoint-presentation4410 (1)
Networking peer-to-peer-powerpoint-presentation4410 (1)Networking peer-to-peer-powerpoint-presentation4410 (1)
Networking peer-to-peer-powerpoint-presentation4410 (1)sarmad ali
 
Network Trends
Network TrendsNetwork Trends
Network TrendsArun ACE
 
What is network architecture
What is network architecture What is network architecture
What is network architecture Sorcia D'Arceuil
 
Network architecture
Network architectureNetwork architecture
Network architectureOnline
 
Modern computer network technologies
Modern computer network technologies Modern computer network technologies
Modern computer network technologies Shamima Akther
 
Introduction to computer networks
Introduction to computer networksIntroduction to computer networks
Introduction to computer networksNicholas Riungu
 
Computer Networks By NADEEM AHMED
Computer Networks By NADEEM AHMED Computer Networks By NADEEM AHMED
Computer Networks By NADEEM AHMED NA000000
 
Introduction to computer Networks
Introduction to computer NetworksIntroduction to computer Networks
Introduction to computer NetworksShohanaakterKakon
 
Introduction to computer networks ppt download
Introduction to computer networks   ppt downloadIntroduction to computer networks   ppt download
Introduction to computer networks ppt downloadzanetorserwaah
 
Wireless networks & cellular wireless networks
Wireless networks & cellular wireless networksWireless networks & cellular wireless networks
Wireless networks & cellular wireless networksSweta Kumari Barnwal
 
System and network administration network services
System and network administration network servicesSystem and network administration network services
System and network administration network servicesUc Man
 
Network Essentials v2.0
Network Essentials v2.0Network Essentials v2.0
Network Essentials v2.0Hossein Zahed
 

Mais procurados (20)

Network Analysis & Designing
Network Analysis & DesigningNetwork Analysis & Designing
Network Analysis & Designing
 
Chapter 1 - Data Communications, Data Networks, and the Internet
Chapter 1 - Data Communications, Data Networks, and the InternetChapter 1 - Data Communications, Data Networks, and the Internet
Chapter 1 - Data Communications, Data Networks, and the Internet
 
NETWORK STANDARD
NETWORK STANDARDNETWORK STANDARD
NETWORK STANDARD
 
Chapter 3
Chapter 3Chapter 3
Chapter 3
 
Network standards
Network standardsNetwork standards
Network standards
 
Networking peer-to-peer-powerpoint-presentation4410 (1)
Networking peer-to-peer-powerpoint-presentation4410 (1)Networking peer-to-peer-powerpoint-presentation4410 (1)
Networking peer-to-peer-powerpoint-presentation4410 (1)
 
Chapter 4ver2
Chapter 4ver2Chapter 4ver2
Chapter 4ver2
 
Network Trends
Network TrendsNetwork Trends
Network Trends
 
What is network architecture
What is network architecture What is network architecture
What is network architecture
 
Network architecture
Network architectureNetwork architecture
Network architecture
 
Modern computer network technologies
Modern computer network technologies Modern computer network technologies
Modern computer network technologies
 
Introduction to computer networks
Introduction to computer networksIntroduction to computer networks
Introduction to computer networks
 
Computer Networks By NADEEM AHMED
Computer Networks By NADEEM AHMED Computer Networks By NADEEM AHMED
Computer Networks By NADEEM AHMED
 
Introduction to computer Networks
Introduction to computer NetworksIntroduction to computer Networks
Introduction to computer Networks
 
COMPUTER NETWORKING
COMPUTER NETWORKINGCOMPUTER NETWORKING
COMPUTER NETWORKING
 
Chapter 1
Chapter 1Chapter 1
Chapter 1
 
Introduction to computer networks ppt download
Introduction to computer networks   ppt downloadIntroduction to computer networks   ppt download
Introduction to computer networks ppt download
 
Wireless networks & cellular wireless networks
Wireless networks & cellular wireless networksWireless networks & cellular wireless networks
Wireless networks & cellular wireless networks
 
System and network administration network services
System and network administration network servicesSystem and network administration network services
System and network administration network services
 
Network Essentials v2.0
Network Essentials v2.0Network Essentials v2.0
Network Essentials v2.0
 

Destaque

Курсовая работа
Курсовая работаКурсовая работа
Курсовая работаivan_z
 
Theoretical foundation of health campaign messages
Theoretical foundation of health campaign messagesTheoretical foundation of health campaign messages
Theoretical foundation of health campaign messagesRaluca Piteiu Apostol
 
Aplicación práctica de Open Data y Transparencia en el sector alimentario
Aplicación práctica de Open Data y Transparencia en el sector alimentarioAplicación práctica de Open Data y Transparencia en el sector alimentario
Aplicación práctica de Open Data y Transparencia en el sector alimentarioMarc Garriga
 
Week 4 Ie 2033-PLUMS
Week 4 Ie 2033-PLUMSWeek 4 Ie 2033-PLUMS
Week 4 Ie 2033-PLUMSMohd Yusak
 
business model week 2
business model week 2business model week 2
business model week 2Mohd Yusak
 
Bloc: les videocònsoles
Bloc: les videocònsolesBloc: les videocònsoles
Bloc: les videocònsolesIrisat
 
Tutte pazze per i video
Tutte pazze per i videoTutte pazze per i video
Tutte pazze per i videoSara Baraccani
 
Resultats de les enquestes
Resultats de les enquestes Resultats de les enquestes
Resultats de les enquestes Irisat
 
Developing Irish Online Publishing Through Blogging
Developing Irish Online Publishing Through BloggingDeveloping Irish Online Publishing Through Blogging
Developing Irish Online Publishing Through BloggingUCD Library
 
The Tiger Woke Up
The Tiger Woke UpThe Tiger Woke Up
The Tiger Woke Upoleary1599
 
Using Technology As A Remedial Resource To Improve
Using Technology As A Remedial Resource To ImproveUsing Technology As A Remedial Resource To Improve
Using Technology As A Remedial Resource To Improveclarecruz
 
Pharmacy Businesslaw2
Pharmacy Businesslaw2Pharmacy Businesslaw2
Pharmacy Businesslaw2shyjesta
 

Destaque (20)

Курсовая работа
Курсовая работаКурсовая работа
Курсовая работа
 
Presentation5
Presentation5Presentation5
Presentation5
 
Confluence
ConfluenceConfluence
Confluence
 
Cbs.Blog.Contributors
Cbs.Blog.ContributorsCbs.Blog.Contributors
Cbs.Blog.Contributors
 
Theoretical foundation of health campaign messages
Theoretical foundation of health campaign messagesTheoretical foundation of health campaign messages
Theoretical foundation of health campaign messages
 
Aplicación práctica de Open Data y Transparencia en el sector alimentario
Aplicación práctica de Open Data y Transparencia en el sector alimentarioAplicación práctica de Open Data y Transparencia en el sector alimentario
Aplicación práctica de Open Data y Transparencia en el sector alimentario
 
Presentation6
Presentation6Presentation6
Presentation6
 
Mg Tweek7
Mg Tweek7Mg Tweek7
Mg Tweek7
 
Week 4 Ie 2033-PLUMS
Week 4 Ie 2033-PLUMSWeek 4 Ie 2033-PLUMS
Week 4 Ie 2033-PLUMS
 
business model week 2
business model week 2business model week 2
business model week 2
 
Bloc: les videocònsoles
Bloc: les videocònsolesBloc: les videocònsoles
Bloc: les videocònsoles
 
Dmars Part3b
Dmars Part3bDmars Part3b
Dmars Part3b
 
Tutte pazze per i video
Tutte pazze per i videoTutte pazze per i video
Tutte pazze per i video
 
Resultats de les enquestes
Resultats de les enquestes Resultats de les enquestes
Resultats de les enquestes
 
Week 3
Week 3Week 3
Week 3
 
Dmars Part3d
Dmars Part3dDmars Part3d
Dmars Part3d
 
Developing Irish Online Publishing Through Blogging
Developing Irish Online Publishing Through BloggingDeveloping Irish Online Publishing Through Blogging
Developing Irish Online Publishing Through Blogging
 
The Tiger Woke Up
The Tiger Woke UpThe Tiger Woke Up
The Tiger Woke Up
 
Using Technology As A Remedial Resource To Improve
Using Technology As A Remedial Resource To ImproveUsing Technology As A Remedial Resource To Improve
Using Technology As A Remedial Resource To Improve
 
Pharmacy Businesslaw2
Pharmacy Businesslaw2Pharmacy Businesslaw2
Pharmacy Businesslaw2
 

Semelhante a Presentation5

Wmcn ch.4
Wmcn ch.4Wmcn ch.4
Wmcn ch.4Alaa2
 
komdat1
komdat1komdat1
komdat1pasca
 
komdat1
komdat1komdat1
komdat1pasca
 
Communication Networks 1
Communication Networks 1Communication Networks 1
Communication Networks 1mahamed Ayesh
 
CN Module 1 ppt final 20.08.2020.ppt
CN Module 1 ppt final 20.08.2020.pptCN Module 1 ppt final 20.08.2020.ppt
CN Module 1 ppt final 20.08.2020.pptdeeplearning6
 
unit-1fon (1).pptx
unit-1fon (1).pptxunit-1fon (1).pptx
unit-1fon (1).pptxDeepVala5
 
OSI Model of Networking
OSI Model of NetworkingOSI Model of Networking
OSI Model of NetworkingMukesh Tekwani
 
computer network and chapter 7 OSI layers.pptx
computer network and chapter 7 OSI layers.pptxcomputer network and chapter 7 OSI layers.pptx
computer network and chapter 7 OSI layers.pptxgadisaAdamu
 
Ch4 Protocols.pptx
Ch4 Protocols.pptxCh4 Protocols.pptx
Ch4 Protocols.pptxazmerawAnna1
 
Lecture 1 networking & internetworking
Lecture 1 networking & internetworkingLecture 1 networking & internetworking
Lecture 1 networking & internetworkingMd. Mashiur Rahman
 
OSI reference Model
OSI reference ModelOSI reference Model
OSI reference ModelJohnson Ubah
 
Ncsweek2 osi model
Ncsweek2 osi modelNcsweek2 osi model
Ncsweek2 osi modeljayvelu
 
Ch4 Protocols.pptx
Ch4 Protocols.pptxCh4 Protocols.pptx
Ch4 Protocols.pptxkebeAman
 
Fundamentals of Networking
Fundamentals of NetworkingFundamentals of Networking
Fundamentals of NetworkingIsrael Marcus
 

Semelhante a Presentation5 (20)

Wmcn ch.4
Wmcn ch.4Wmcn ch.4
Wmcn ch.4
 
Chapter#4
Chapter#4Chapter#4
Chapter#4
 
komdat1
komdat1komdat1
komdat1
 
komdat1
komdat1komdat1
komdat1
 
Communication Networks 1
Communication Networks 1Communication Networks 1
Communication Networks 1
 
Avani
AvaniAvani
Avani
 
Ccna notes
Ccna notesCcna notes
Ccna notes
 
01 pengenalan
01 pengenalan01 pengenalan
01 pengenalan
 
nv.ppt
nv.pptnv.ppt
nv.ppt
 
CN Module 1 ppt final 20.08.2020.ppt
CN Module 1 ppt final 20.08.2020.pptCN Module 1 ppt final 20.08.2020.ppt
CN Module 1 ppt final 20.08.2020.ppt
 
chapter 4.pptx
chapter 4.pptxchapter 4.pptx
chapter 4.pptx
 
unit-1fon (1).pptx
unit-1fon (1).pptxunit-1fon (1).pptx
unit-1fon (1).pptx
 
OSI Model of Networking
OSI Model of NetworkingOSI Model of Networking
OSI Model of Networking
 
computer network and chapter 7 OSI layers.pptx
computer network and chapter 7 OSI layers.pptxcomputer network and chapter 7 OSI layers.pptx
computer network and chapter 7 OSI layers.pptx
 
Ch4 Protocols.pptx
Ch4 Protocols.pptxCh4 Protocols.pptx
Ch4 Protocols.pptx
 
Lecture 1 networking & internetworking
Lecture 1 networking & internetworkingLecture 1 networking & internetworking
Lecture 1 networking & internetworking
 
OSI reference Model
OSI reference ModelOSI reference Model
OSI reference Model
 
Ncsweek2 osi model
Ncsweek2 osi modelNcsweek2 osi model
Ncsweek2 osi model
 
Ch4 Protocols.pptx
Ch4 Protocols.pptxCh4 Protocols.pptx
Ch4 Protocols.pptx
 
Fundamentals of Networking
Fundamentals of NetworkingFundamentals of Networking
Fundamentals of Networking
 

Mais de Mohd Yusak (20)

Presentation6
Presentation6Presentation6
Presentation6
 
Presentation5
Presentation5Presentation5
Presentation5
 
Presentation4
Presentation4Presentation4
Presentation4
 
Presentation3
Presentation3Presentation3
Presentation3
 
Tone
ToneTone
Tone
 
Presentation2
Presentation2Presentation2
Presentation2
 
Presentation1
Presentation1Presentation1
Presentation1
 
Presentation8
Presentation8Presentation8
Presentation8
 
Presentation2
Presentation2Presentation2
Presentation2
 
Chapter 5
Chapter 5Chapter 5
Chapter 5
 
Chapter 9
Chapter 9Chapter 9
Chapter 9
 
Chapter 8
Chapter 8Chapter 8
Chapter 8
 
Chapter 6
Chapter 6Chapter 6
Chapter 6
 
M G Tweek10
M G Tweek10M G Tweek10
M G Tweek10
 
Mg Tweek9
Mg Tweek9Mg Tweek9
Mg Tweek9
 
Presentation6
Presentation6Presentation6
Presentation6
 
Mg Tweek10
Mg Tweek10Mg Tweek10
Mg Tweek10
 
Mg Tweek8
Mg Tweek8Mg Tweek8
Mg Tweek8
 
Mg Tweek6
Mg Tweek6Mg Tweek6
Mg Tweek6
 
Mg Tweek5
Mg Tweek5Mg Tweek5
Mg Tweek5
 

Presentation5

  • 2. What is a Protocol? Allows entities (i.e. application programs) from different systems to communicate Shared conventions for communicating information are called protocols Defines a set of rules that govern the exchange of data Includes syntax, semantics, and timing
  • 3. Why Use Protocol Architecture? Data communications requires complex procedures Sender identifies data path/receiver Systems negotiate preparedness Applications negotiate preparedness Translation of file formats For all tasks to occur, high level of cooperation is required
  • 4. Modular Approach Breaks complex tasks into subtasks Each module handles specific subset of tasks Communication occurs between different modules on the same system between similar modules on different systems
  • 5. Advantages of Modularity Easier application development Network can change without all programs being modified
  • 6. Three-Layer Model Distributed data communications involves three primary components: Networks Computers Applications Three corresponding layers Network access layer Transport layer Application layer
  • 7. Network Access Layer Concerned with exchange of data between computer and network Includes addressing, routing, prioritizing, etc Different networks require different software at this layer Example: X.25 standard for network access procedures on packet-switching networks
  • 8. Transport Layer Concerned with reliable transfer of information between applications Independent of the nature of the application Includes aspects like flow control and error checking
  • 9. Application Layer Logic needed to support various applications Each type of application (file transfer, remote access) requires different software on this layer
  • 10. Addressing Each computer on a network requires a unique address on that network Each application requires a unique address within the computer to allow support for multiple applications (service access points, or SAP)
  • 11. Data Transmission Application layer creates data block Transport layer appends header to create PDU (protocol data unit) Destination SAP, Sequence #, Error-Detection Code Network layer appends another header Destination computer, facilities (e.g. “priority”)
  • 13. Protocols in a Simplified Architecture
  • 14. Transport PDU Headers Source port: indicates the application that sent the data Destination port: the appplication that the data is to be delivered to Sequence number: provides sequential ordering of segments Error-detection code: code that is a function of the contents of a segment (e.g., checksum or frame check sequence)
  • 15. Network Access PDU (Packet Header) Source computer address: indicates the source of the packet Destination computer address: indicates the computer that the data is to be delivered to Facilities requests: indicates if the network is to make use of certain facilities such as priority
  • 16. Standardized Protocol Architectures Vendors like standards because they make their products more marketable Customers like standards because they enable products from different vendors to interoperate Two protocol standards are well-known: TCP/IP: widely implemented OSI: less used, but widely known and still useful for modeling/conceptualizing
  • 17. TCP/IP Transmission Control Protocol/Internet Protocol Developed by DARPA No official protocol standard Identifies 5 Layers Application Host-to-Host (transport) Internet Network Access Physical
  • 18. TCP/IP Physical Layer Physical interface between a DTE (e.g. computer or terminal) and a transmission medium Specifies: Characteristics of medium Nature of signals Data rate
  • 19. TCP/IP Network Access Layer Exchange of data between systems on a shared network Utilizes address of host and destination Can also prioritize transmission Software at this layer depends on network (e.g. X.25 vs. Ethernet) Segregation means that no other software needs to be concerned about net specifics
  • 20. TCP/IP Internet Layer An Internet is an interconnection of two or more networks Internet layer handles tasks similar to network access layer, but between networks rather than between nodes on a network Uses IP for addressing and routing across networks Implemented in workstations and routers
  • 21. TCP/IP Transport Layer Also called host-to-host layer Reliable exchange of data between applications Uses TCP protocols for transmission
  • 22. TCP/IP Application Layer Logic needed to support variety of applications Separate module supports each type of application (e.g. file transfer)
  • 24. TCP & UDP Most TCP/IP applications use TCP for transport layer TCP provides a connection (logical association) between two entities to regulate flow check errors UDP (User Datagram Protocol) does not maintain a connection, and therefore does not guarantee delivery, preserve sequences, or protect against duplication
  • 26. IP and IPv6 IP provides for 32-bit source and destination addresses IPv6 (1996 standard) provides for 128-bit addresses Migraqtion to IPv6 will be a very slow process
  • 28. TCP/IP Applications SMTP (Simple Mail Transfer Protocol) Basic e-mail facility, transferring messages among hosts FTP (File Transfer Protocol) Sends files from one system to another on user command SSH (Secure Shell) Secure remote login capability, allowing a user to remotely logon to a computer
  • 29. Internetworking Interconnected networks, usually implies TCP/IP Can appear to users as a single large network The global Internet is the largest example, but intranets and extranets are also examples
  • 30. Routers Equipment used to interconnect independent networks Several essential functions Provide a link between networks Provide routing and delivery of data between processes on systems from different networks Provide these functions without requiring modification of networking architecture
  • 31. Router Issues Addressing schemes Maximum packet size Interfaces Reliability
  • 32. Operation of TCP/IP: Action at the Sender
  • 33. Operation of TCP/IP: Action at the Router
  • 34. Operation of TCP/IP: Action at the Receiver
  • 35. Why Study OSI? Still an excellent model for conceptualizing and understanding protocol architectures Key points: Modular Hierarchical Boundaries between layers=interfaces
  • 36. OSI Open Systems Interconnection Developed by ISO Contains seven layers
  • 37. OSI Lower Layers Physical Data Link Network
  • 38. OSI Physical Layer Responsible for transmission of bits Always implemented through hardware Encompasses mechanical, electrical, and functional interfaces e.g. RS-232
  • 39. OSI Data Link Layer Responsible for error-free, reliable transmission of data Flow control, error correction e.g. HDLC
  • 40. OSI Network Layer Responsible for routing of messages through network Concerned with type of switching used (circuit v. packet) Handles routing between networks, as well as through packet-switching networks
  • 41. OSI Upper Layers Transport Session Presentation Application
  • 42. OSI Transport Layer Isolates messages from lower and upper layers Breaks down message size Monitors quality of communications channel Selects most efficient communication service necessary for a given transmission
  • 43. OSI Session Layer Establishes logical connections between systems Manages log-ons, password exchange, log-offs Terminates connection at end of session
  • 44. OSI Presentation Layer Provides format and code conversion services Examples File conversion from ASCII to EBDIC Invoking character sequences to generate bold, italics, etc on a printer
  • 45. OSI Application Layer Provides access to network for end-user User’s capabilities are determined by what items are available on this layer
  • 47. TCP/IP - OSI Comparison
  • 48. IPSec Developed by the Internet Architecture Board in 1994 (RFC 1636) Examples of Applications include:-Secure branch office connectivity over the Internet-Secure remote access over the Internet-Establishing extranet and intranet connectivity with partners-Enhancing electronic security
  • 49. Benefits of IPSec Provides stronger secuirty to routers and firewalls Is resistant to bypass within a firewall Is transparent to applications Is transparent to end users Can provide security to end-users