SlideShare uma empresa Scribd logo
1 de 7
Baixar para ler offline
CHAP 1. INTRODUCTION TO PROTOCOLS
What is a communication protocol?
(1) A communication protocol is a set of rules that govern the exchange of information in a
    network.
(2) Communications protocols define the manner in which peer processes communicate
    among various hardware devices.
(3) The protocols define the rules for function such as passing and extraction of messages and
    handling error conditions.

What are the reasons for using layered protocols? OR What is protocol layering?

(1) Many problems can arise when data is sent in form of “packets”. Some of these problems
    are: Link failure, Network congestion, Host failure, Packet delay or loss, Data corruption,
    Data duplication, Packets out of sync.
(2) It is not practical for a single protocol to take care of all these potential problems.
    Therefore we organize the protocol software into different layers, so that each layer can
    handle a particular set of problems.
(3) Networking functions which have related uses are grouped together to form layers.
(4) The purpose of each layer is to offer certain services to the higher layers.

Characteristics of a Layered Protocol:
(1) Each layer has a predefined set of functions.
(2) Layers provide services to their immediate upper layers.
(3) Peer layers communicate using a peer protocol.
(4) Layers are separated from each other with interfaces.

What are the Advantages of Layering?
(1) Data hiding and encapsulation: data structures and algorithms in one layer are not visible
    to other layers.
(2) Reduced complexity: Complex systems can be decomposed into more easily understood
    pieces. A layer or a sublayer can be simplified or omitted if some or all of its services are
    not needed.
(3) Increased evolution: Systems can evolve faster since layers can be changed while still
    integrating with existing systems.
(4) Easy extension: Alternate services can be offered at layer N+1 that share the services of
    layer N.
(5) Multi-vendor integration: Different vendors can provide different implementations.
(6) Easy testing: Each layer can be tested independently.

What is an open system?
(1) An open system is a set of protocols that allows any two different systems to
    communicate no matter what the underlying architecture is.
(2) The OSI model of networking is an open system as it allows the communication process
    between different systems without requiring changes to the logic of the underlying
    hardware or software.


What is the OSI Model? What are the seven layers of this model?
OSI Reference Model is a standard approach to network design. It is developed by the
International Standards Organization (ISO). The word “Open” signifies that the model deals
with connecting open systems – that is, systems that are open for communication with other
Prof. Mukesh N Tekwani [9869 488 356]


systems. In the OSI model, each layer performs a subset of the required communication
functions. Each layer relies on the next lower layer to perform the required function.

Layers of the OSI Model:

     Application                  Useful mnemonic to remember the order of these layers:
                                  All People Seem To Need Data Processing
    Presentation
       Session
     Transport
      Network
     Data Link
      Physical


Physical layer
(1) This layer is responsible for transmitting a bit stream over a physical medium such as a
    cable.
(2) It deals with the mechanical and electrical specifications of the interface (e.g., the RJ45
    jack, ports, etc) and the transmission medium.
(3) It defines the procedures and functions that physical devices and interfaces have to
    perform for transmission to occur.
(4) Functions of Physical Layer:
    a. Physical characteristics of interfaces and media – It defines the transmission medium,
        and the interface between the transmitting devices and the medium.
    b. Bit representation – The data in this layer is a stream of bits. These bits are encoded
        into electrical or optical signals. The physical layer defines the type of encoding, i.e.,
        how bits 0 and 1 are changed into signals.
    c. Data transmission rate – The number of bits sent each second, the duration of a bit
        and how long it lasts on the medium are defined by the medium.
    d. Synchronizing the sender and receiver clocks: The sender and receiver must be
        synchronized at the bit level.
    e. Transmission mode – The physical layer defines the direction of transmission i.e.,
        simplex, half-duplex, full duplex
    f. Physical Topology – how devices are connected – ring, star, mesh, bus topology
    g. Line configuration - The physical layer is concerned with connection of devices.
        Devices may be connected in a point-to-point configuration (through a dedicated
        link), or multipoint configuration (link shared between many devices).

Data Link Layer
(1) The physical layer is just transmitting the bits. The data link layer is responsible for
    delivery of data between two systems on the same network.
(2) It does this by breaking up the input data into data frames, each of 100 or 1000 bytes, and
    transmits the frames sequentially.
(3) This layer is responsible for moving frames from one node to another.
(4) Main functions of this layer are:
    a. Framing – divide the stream of bits received into data units called frames.
    b. Physical Addressing – Add a header to the frame to define the physical address of the
         source and the destination machines.
    c. Flow control – Impose a flow control – control rate at which data is transmitted so as
         not to flood the receiver

Page 2 of 7                                                             Chap 1 – Introduction
Prof. Mukesh N Tekwani [mukeshtekwani@hotmail.com
                                                            mukeshtekwani@hotmail.com]


    d. Error Control – Adds mechanisms to detect and retransmit damaged or lost frames;
       and prevent duplication of frames. This is achieved by adding a trailer to the end of a
       frame.
    e. Access control – When two or more devices are connected to the same link, this layer
                                                        connected
       determines which device has control over the link at any given time.




Network Layer
(1) This layer is responsible for the delivery of an individual packet from source to
    destination. This delivery of packets may be across several networks or links.
                .
(2) Main functions of this layer are:
    a. Responsible for delivery of packets across multiple networks
    b. This layer does not recognize any relationship between these packets.
    c. If two systems are connected to the same link, there is no need for the network layer.
                             connected                                                   layer
    d. But if the two systems are connected to different networks the network layer is
        needed for delivery of packets.
    e. Logical addressing – The data link layer handles the addresses at a local level by
                                                                                       leve
        using a physical address. But since the data must pass across networks, the addressing
        mechanism is different. The network layer adds a header to the packet coming from
        the upper layer and this packet includes the logical addresses of the sender and the
        receiver.
    f. Routing – Provide mechanisms to transmit data over independent networks
        (internetworks) that are linked together through routers and switches. The network
        layer at source A sen a packet to the network layer at router B. When the packet
                             sends
        arrives at B, the router makes a decision based on the destination F. The router uses
        its router table to decide that the next hop should be at router E. The network layer at
        E sends the packet to destination address F.
    g. Network layer is responsible only for delivery of individual packets and it does not
        recognize any relationship between those packets




Chap 1 – Introduction                                                              Page 3 of 7
Prof. Mukesh N Tekwani [9869 488 356]


Transport Layer
(1) This layer is responsible for the process-to-process delivery of the entire message. A
    process is just an application program running on a host computer.
(2) The network layer is responsible for source to destination delivery of the packets. It treats
    each packet individually, even if they all belong to the same message.
(3) The transport layer ensures that the whole message arrives intact and in order.
(4) Main functions of this layer are:
    a. Responsible for source-to-destination delivery of the entire message
    b. Segmentation and reassembly – It divides the message into smaller segments,
        numbers them and transmits. It reassembles these messages at the receiving end using
        the sequence number.
    c. Connection control - The transport layer can be either connectionless or connection-
        oriented. A connectionless transport layer treats each segment as an independent
        packet and delivers it to the transport layer at the destination. A connection-oriented
        transport layer first establishes a connection with the transport layer at the destination
        computer before delivering the segments. The connection is then terminated once all
        the data is transferred.
    d. Error control – make sure that the entire message arrives without errors – else
        retransmit.
    e. Flow control - What if data arrives garbled or out of order or too fast? If a packet is
        missing or garbled, or arrives out-of-order, or too soon, the protocol at this layer will
        attempt to correct.
    f. Service-point addressing – Computers may be running many programs
        simultaneously. Hence source-to- destination means not only transmitting data from
        one computer to another but also from a specific process on one computer to a
        specific process on another computer. Therefore the transport layer header must
        include a service-point address (or port address).
    g. Thus, the responsibility of the transport layer is to get an entire message to the correct
        process on the destination computer.

Session Layer
(1) The session layer is the dialog controller. It establishes, maintains and synchronizes the
    interaction between computers.
(2) Main functions of this layer are:
    a. Dialog control – allows two systems to enter into a dialog, keep a track of whose turn
        it is to transmit Transmission mode may be half-duplex or full-duplex.
    b. Synchronization – adds check points (synchronization points) into stream of data.
        These check points enable the system to know which unit has to be retransmitted in
        case there is a crash.
(3) The session layer answers the need for individual hosts to support more than one active
    connection at a time.

Presentation Layer:
(1) This layer is concerned with the syntax and semantics of the information exchanged
    between the two computers.
(2) The main tasks of this layer are: translation, compression, and encryption
(3) Translation
    a. Different computers use different encoding systems (bit order translation)
    b. Convert data into a common format before transmitting. The data received at the
        destination is then converted from the common format into the receiver-dependent
        format.
    c. Syntax represents info such as character codes, data types, and file formats (how
        many bits to represent data – 8 or 7 bits


Page 4 of 7                                                             Chap 1 – Introduction
Prof. Mukesh N Tekwani [mukeshtekwani@hotmail.com
                                                             mukeshtekwani@hotmail.com]


(4) Compression – reduce number of bits to be transmitted. This is more important for
                                                   transmitted.
    transmission of video and audio data
                                    data.
(5) Encryption – Encryption of data is required to ensure privacy of data. This layer
    transforms data into an unintelligible format at the sending end. At the receiving end,
                  a                                              end.
    decryption takes place.




Application Layer:
(1) This is the top layer of the OSI reference model.
(2) This layer enables the user to access the network.
(3) It provides user interfaces for services like: email, browser, file transfer, shared database
                                                                                ,
    management.
(4) It deals with issues such as: How can two applications communicate in a meaningful
    way?
(5) It contains protocols that allow users to access the network (FTP, HTTP, SMTP etc
        ontains                                                                   SMTP),
(6) Services provided by the Application layer are:
         a. Network virtual terminal – This allows a user to log on to a remote host. The
             application creates a software emulation of a terminal at the remote host The
                                                                                        host.
             user’s computer communicates with the software terminal which in turn talks to
             the host.
         b. File transfer, access and management: This application allows a user to access
             files on a remote host, retrieve files from the remote host, and also to manage
             files on a remote host.
         c. Mail – this application provides basic services for email forwarding and storing.
                                                                                        storing


What is the difference between network layer delivery and transport layer delivery
                                                                                delivery?
The transport layer is responsible for source destination delivery of the entire message,
                                          source-to-destination
whereas the network layer oversees delivery of individual packets of data irrespective of their
relationship to each other and to the entire message.

Group the OSI layers by function.
The OSI layers can be grouped into:
       a. network support layers: physical, data link, network
       b. user support layers: session, presentation, application
        .
       c. transport layer: functions as a agent (liaison) between the two groups of layers




Chap 1 – Introduction                                                               Page 5 of 7
Prof. Mukesh N Tekwani [9869 488 356]


What is the difference between a port address, a logical address and a physical address?

Physical Address:
(1) The physical address (or link address) is the local address of a node.
(2) It is used by the data link layer and physical layer to deliver data from one node to
    another within the same network.
(3) It is included in the frame used by the data link layer.
(4) It is the lowest-level address.
(5) The size and format of the physical address depends on the network. E.g., the Ethernet
    uses a 48 bit address which is included in every network interface card (NIC).

Logical Address
(1) The logical address defines the sender and receiver at the network layer and is used to
    deliver messages across multiple networks.
(2) This address is used by the network layer.
(3) This address is independent of the underlying physical networks.
(4) Since different networks have different addressing formats, the physical addresses cannot
    be used when networks are interconnected.
(5) A universal addressing system is used in which the computers can be identified uniquely.
(6) The logical address used on the Internet is a 32-bit address which can uniquely define a
    computer on the Internet.

Port Address:
   (1) The end objective of Internet communication is a process communication with
       another process.
   (2) It is not sufficient to just transfer data from one computer to another.
   (3) E.g., computer A can communicate with computer B using the TELNET protocol At
       the same time, A may be communicating with another computer C using the File
       Transfer Protocol (FTP).
   (4) For these two processes to receive data simultaneously, we need a method by which
       the processes can be given different labels. These labels are the addresses. A label
       assigned to a process is called a port address.

What is the Network Model?
(1) A model is a hypothetical description of a complex entity or process. The process of data
    communication along a network is very complex involving hardware and software.
(2) The Network model is a method of describing and analyzing data communications
    networks by breaking the entire set of communications process into a number of layers.

What is a Protocol?
It is a formal description of message formats and the rules that two computers must follow in
order to exchange messages. This set of rules describes how data is transmitted over a
network. OSI is not a protocol. Protocols are needed for the following reasons:
     (1) In what format will the messages be transmitted?
     (2) At what speed should messages be transmitted?
     (3) What to do if errors take place?
     (4) What to do if parts of a message are lost?

What is meant by Layered Approach To Networking?
(1) Divide the complex task into a number of simpler sub-tasks. A layer performs that simple
    sub-task.
Page 6 of 7                                                         Chap 1 – Introduction
Prof. Mukesh N Tekwani [mukeshtekwani@hotmail.com]


(2) Each layer builds upon the layer below it, adding new functionality.
(3) The entities comprising the corresponding layers on different machines are called peers.
(4) It is the peers that communicate by using the protocols.
(5) Actually, data is not transferred from layer n on one machine to layer n on another
    machine.
(6) Each layer passes data and control information to the layer immediately below it, until the
    lowest layer is reached.
(7) Actual data communication takes place through the lowest layer – the physical layer.

Explain the concept of Services and Protocols
(1) A service is a set of operations that a layer provides to the layer above it.
        a. Service defines what operations the layer is prepared to perform.
        b. A service relates to the interface between two layers – the lower layer is service
            provider and the upper layer is service user.
(2) A protocol is a set of rules governing the format and meaning of the packets.
        a. Protocols relate to packets sent between peer entities on different machines.
        b. Entities use protocols.
        c. Protocols can be changed provided the services visible to the user do not change.
            Thus services and protocols are not joined or dependent.
        d. Protocol relates to the implementation of the service – how it is done
(3) Analogy with programming languages:
        a. A service is like an object in an object-oriented language
        b. What operations can be performed on this object is defined
        c. How these operations are to be performed is not defined

Explain the features of connectionless service and connection-oriented services.

Layers can offer two types of services to the layers above them: connection-oriented and
connectionless.

      Connection-oriented service is modelled after the telephone system. To talk to someone,
      we pick up a phone, dial the number, talk and disconnect. Similarly, in a network, the
      service user will
      1. Establish a connection
      2. Use the connection
      3. Release the connection
      4. The sender, receiver and the network may conduct a negotiation about data transfer
          speed, maximum message size, etc.

When a connection is established, the sender and receiver may conduct a negotiation about
parameters to be used such as maximum message size, data transfer speed, etc.

Connection-oriented service is used when reliability is important. Only a single path is
established for the call, and all the data follows that path.

      Connectionless service is modelled after the post office system. Each message (letter)
      carries the full address of the destination system. Each message is routed through the
      network system independent of the other messages. If two messages are sent to the same
      destination, normally the first one to be sent should arrive first. But it is possible that the
      second message arrives first. Since each message (packet) is routed independently, the
      network cannot guarantee that all the messages will arrive at the destination in the
      transmitting order. Different parts of a message may travel along different routes.




Chap 1 – Introduction                                                                  Page 7 of 7

Mais conteúdo relacionado

Mais procurados

Guided and unguided media
Guided and unguided mediaGuided and unguided media
Guided and unguided mediaHassan Osama
 
Internetworking devices
Internetworking devicesInternetworking devices
Internetworking devicesOnline
 
Web Security Threats and Solutions
Web Security Threats and Solutions Web Security Threats and Solutions
Web Security Threats and Solutions Ivo Andreev
 
Computer Networking - Its Advantages & Disadvantages
Computer Networking - Its Advantages & DisadvantagesComputer Networking - Its Advantages & Disadvantages
Computer Networking - Its Advantages & DisadvantagesRita Gokani
 
process management
 process management process management
process managementAshish Kumar
 
Network security - OSI Security Architecture
Network security - OSI Security ArchitectureNetwork security - OSI Security Architecture
Network security - OSI Security ArchitectureBharathiKrishna6
 
Virus and its CounterMeasures -- Pruthvi Monarch
Virus and its CounterMeasures                         -- Pruthvi Monarch Virus and its CounterMeasures                         -- Pruthvi Monarch
Virus and its CounterMeasures -- Pruthvi Monarch Pruthvi Monarch
 
Pgp pretty good privacy
Pgp pretty good privacyPgp pretty good privacy
Pgp pretty good privacyPawan Arya
 
Computer network : models and topologies
Computer network : models and topologiesComputer network : models and topologies
Computer network : models and topologiesAnup Pandey
 
Transport Layer Security (TLS)
Transport Layer Security (TLS)Transport Layer Security (TLS)
Transport Layer Security (TLS)Arun Shukla
 
Network security & cryptography full notes
Network security & cryptography full notesNetwork security & cryptography full notes
Network security & cryptography full notesgangadhar9989166446
 

Mais procurados (20)

Guided and unguided media
Guided and unguided mediaGuided and unguided media
Guided and unguided media
 
Keymanagement of ipsec
Keymanagement of ipsecKeymanagement of ipsec
Keymanagement of ipsec
 
Distributed System ppt
Distributed System pptDistributed System ppt
Distributed System ppt
 
Sequential consistency model
Sequential consistency modelSequential consistency model
Sequential consistency model
 
Slide05 Message Passing Architecture
Slide05 Message Passing ArchitectureSlide05 Message Passing Architecture
Slide05 Message Passing Architecture
 
Internetworking devices
Internetworking devicesInternetworking devices
Internetworking devices
 
HTTP & WWW
HTTP & WWWHTTP & WWW
HTTP & WWW
 
Web Security Threats and Solutions
Web Security Threats and Solutions Web Security Threats and Solutions
Web Security Threats and Solutions
 
IP Security
IP SecurityIP Security
IP Security
 
Rarp
RarpRarp
Rarp
 
OSI Layers
OSI LayersOSI Layers
OSI Layers
 
Computer Networking - Its Advantages & Disadvantages
Computer Networking - Its Advantages & DisadvantagesComputer Networking - Its Advantages & Disadvantages
Computer Networking - Its Advantages & Disadvantages
 
process management
 process management process management
process management
 
Network security - OSI Security Architecture
Network security - OSI Security ArchitectureNetwork security - OSI Security Architecture
Network security - OSI Security Architecture
 
Virus and its CounterMeasures -- Pruthvi Monarch
Virus and its CounterMeasures                         -- Pruthvi Monarch Virus and its CounterMeasures                         -- Pruthvi Monarch
Virus and its CounterMeasures -- Pruthvi Monarch
 
Pgp pretty good privacy
Pgp pretty good privacyPgp pretty good privacy
Pgp pretty good privacy
 
Computer network : models and topologies
Computer network : models and topologiesComputer network : models and topologies
Computer network : models and topologies
 
Transport Layer Security (TLS)
Transport Layer Security (TLS)Transport Layer Security (TLS)
Transport Layer Security (TLS)
 
Network security & cryptography full notes
Network security & cryptography full notesNetwork security & cryptography full notes
Network security & cryptography full notes
 
Mobile Transport layer
Mobile Transport layerMobile Transport layer
Mobile Transport layer
 

Destaque

TYBCom Computer Systems and Applications - Sem 6 - University of Mumbai
TYBCom Computer Systems and Applications - Sem 6 - University of MumbaiTYBCom Computer Systems and Applications - Sem 6 - University of Mumbai
TYBCom Computer Systems and Applications - Sem 6 - University of MumbaiMukesh Tekwani
 
Presentation on visual basic 6 (vb6)
Presentation on visual basic 6 (vb6)Presentation on visual basic 6 (vb6)
Presentation on visual basic 6 (vb6)pbarasia
 
Data communications ch 1
Data communications   ch 1Data communications   ch 1
Data communications ch 1Mukesh Tekwani
 
TYBCom Computer Systems and Applications
TYBCom Computer Systems and ApplicationsTYBCom Computer Systems and Applications
TYBCom Computer Systems and ApplicationsMukesh Tekwani
 
Computer Application In Mumbai University
Computer Application In Mumbai UniversityComputer Application In Mumbai University
Computer Application In Mumbai UniversityHitesh Kukreja
 
TYBCom Computer Systems and Applications for Semester 5, University of Mumbai
TYBCom Computer Systems and Applications for Semester 5, University of MumbaiTYBCom Computer Systems and Applications for Semester 5, University of Mumbai
TYBCom Computer Systems and Applications for Semester 5, University of MumbaiMukesh Tekwani
 
Python reading and writing files
Python reading and writing filesPython reading and writing files
Python reading and writing filesMukesh Tekwani
 
Chap 3 data and signals
Chap 3 data and signalsChap 3 data and signals
Chap 3 data and signalsMukesh Tekwani
 
Chapter 2 - Network Models
Chapter 2 - Network ModelsChapter 2 - Network Models
Chapter 2 - Network ModelsWayne Jones Jnr
 
E commerce full notes for mba
E commerce full notes for mba E commerce full notes for mba
E commerce full notes for mba karishma
 
Chapter 3 - Data and Signals
Chapter 3 - Data and SignalsChapter 3 - Data and Signals
Chapter 3 - Data and SignalsWayne Jones Jnr
 
Chapter 1: Introduction to Data Communication and Networks
Chapter 1: Introduction to Data Communication and NetworksChapter 1: Introduction to Data Communication and Networks
Chapter 1: Introduction to Data Communication and NetworksShafaan Khaliq Bhatti
 
The Daffodil Principle
The Daffodil PrincipleThe Daffodil Principle
The Daffodil PrincipleDragano Mike
 
Chapter 5.foreign trade policy
Chapter 5.foreign trade policyChapter 5.foreign trade policy
Chapter 5.foreign trade policyThane
 
Modern Notes: Databases
Modern Notes: DatabasesModern Notes: Databases
Modern Notes: DatabasesPeter Presnell
 
Digital signal and image processing FAQ
Digital signal and image processing FAQDigital signal and image processing FAQ
Digital signal and image processing FAQMukesh Tekwani
 

Destaque (20)

TYBCom Computer Systems and Applications - Sem 6 - University of Mumbai
TYBCom Computer Systems and Applications - Sem 6 - University of MumbaiTYBCom Computer Systems and Applications - Sem 6 - University of Mumbai
TYBCom Computer Systems and Applications - Sem 6 - University of Mumbai
 
Presentation on visual basic 6 (vb6)
Presentation on visual basic 6 (vb6)Presentation on visual basic 6 (vb6)
Presentation on visual basic 6 (vb6)
 
Data communications ch 1
Data communications   ch 1Data communications   ch 1
Data communications ch 1
 
TYBCom Computer Systems and Applications
TYBCom Computer Systems and ApplicationsTYBCom Computer Systems and Applications
TYBCom Computer Systems and Applications
 
Computer Application In Mumbai University
Computer Application In Mumbai UniversityComputer Application In Mumbai University
Computer Application In Mumbai University
 
TYBCom Computer Systems and Applications for Semester 5, University of Mumbai
TYBCom Computer Systems and Applications for Semester 5, University of MumbaiTYBCom Computer Systems and Applications for Semester 5, University of Mumbai
TYBCom Computer Systems and Applications for Semester 5, University of Mumbai
 
Python reading and writing files
Python reading and writing filesPython reading and writing files
Python reading and writing files
 
Chap 3 data and signals
Chap 3 data and signalsChap 3 data and signals
Chap 3 data and signals
 
Chapter 2 - Network Models
Chapter 2 - Network ModelsChapter 2 - Network Models
Chapter 2 - Network Models
 
E commerce full notes for mba
E commerce full notes for mba E commerce full notes for mba
E commerce full notes for mba
 
Chapter 3 - Data and Signals
Chapter 3 - Data and SignalsChapter 3 - Data and Signals
Chapter 3 - Data and Signals
 
Chapter 1: Introduction to Data Communication and Networks
Chapter 1: Introduction to Data Communication and NetworksChapter 1: Introduction to Data Communication and Networks
Chapter 1: Introduction to Data Communication and Networks
 
OSI Model
OSI ModelOSI Model
OSI Model
 
The Daffodil Principle
The Daffodil PrincipleThe Daffodil Principle
The Daffodil Principle
 
Chapter 5.foreign trade policy
Chapter 5.foreign trade policyChapter 5.foreign trade policy
Chapter 5.foreign trade policy
 
Database
DatabaseDatabase
Database
 
Modern Notes: Databases
Modern Notes: DatabasesModern Notes: Databases
Modern Notes: Databases
 
Digital signal and image processing FAQ
Digital signal and image processing FAQDigital signal and image processing FAQ
Digital signal and image processing FAQ
 
Java misc1
Java misc1Java misc1
Java misc1
 
Chap 2 network models
Chap 2 network modelsChap 2 network models
Chap 2 network models
 

Semelhante a Chap 1 introduction

CN_ECE_6th SEM_OSI Layer.pptx
CN_ECE_6th SEM_OSI Layer.pptxCN_ECE_6th SEM_OSI Layer.pptx
CN_ECE_6th SEM_OSI Layer.pptxsubhash750762
 
OSI model layers 7 Types of OSI Model Edifyclue.pdf
OSI model layers  7 Types of OSI Model  Edifyclue.pdfOSI model layers  7 Types of OSI Model  Edifyclue.pdf
OSI model layers 7 Types of OSI Model Edifyclue.pdfsunil shukla
 
Computer Network Unit-1 ppt
Computer Network Unit-1 pptComputer Network Unit-1 ppt
Computer Network Unit-1 pptvmdharxfr
 
ch02 - Network Models- powerpoint-lecture
ch02 - Network Models- powerpoint-lecturech02 - Network Models- powerpoint-lecture
ch02 - Network Models- powerpoint-lecturelaraguler
 
Pwani notes-Network Essentials.pp for Internet Protocoltx
Pwani notes-Network Essentials.pp  for Internet ProtocoltxPwani notes-Network Essentials.pp  for Internet Protocoltx
Pwani notes-Network Essentials.pp for Internet ProtocoltxMosesOkumu4
 
Network internet
Network internetNetwork internet
Network internetKumar
 
Networks internet
Networks internetNetworks internet
Networks internetKumar
 
Unit 2.1 - OSI Model.ppt Physical Layer
Unit 2.1 - OSI Model.ppt  Physical LayerUnit 2.1 - OSI Model.ppt  Physical Layer
Unit 2.1 - OSI Model.ppt Physical Layervedantihp21
 
Report of TCP/IP
Report of TCP/IPReport of TCP/IP
Report of TCP/IPMannu Khani
 
Chapter 4
Chapter 4Chapter 4
Chapter 4asguna
 
OSI Model.It was created in 1983 by osi.
OSI Model.It was created in 1983 by osi.OSI Model.It was created in 1983 by osi.
OSI Model.It was created in 1983 by osi.muhammadsaudm19a
 

Semelhante a Chap 1 introduction (20)

Osi(1)
Osi(1)Osi(1)
Osi(1)
 
Network Connectivity and Protocols and OSI Model
Network Connectivity and Protocols and OSI ModelNetwork Connectivity and Protocols and OSI Model
Network Connectivity and Protocols and OSI Model
 
Iso layers
Iso layersIso layers
Iso layers
 
CN_ECE_6th SEM_OSI Layer.pptx
CN_ECE_6th SEM_OSI Layer.pptxCN_ECE_6th SEM_OSI Layer.pptx
CN_ECE_6th SEM_OSI Layer.pptx
 
OSI model layers 7 Types of OSI Model Edifyclue.pdf
OSI model layers  7 Types of OSI Model  Edifyclue.pdfOSI model layers  7 Types of OSI Model  Edifyclue.pdf
OSI model layers 7 Types of OSI Model Edifyclue.pdf
 
Computer Network Unit-1 ppt
Computer Network Unit-1 pptComputer Network Unit-1 ppt
Computer Network Unit-1 ppt
 
Chap 8 switching
Chap 8 switchingChap 8 switching
Chap 8 switching
 
ch02 - Network Models- powerpoint-lecture
ch02 - Network Models- powerpoint-lecturech02 - Network Models- powerpoint-lecture
ch02 - Network Models- powerpoint-lecture
 
Pwani notes-Network Essentials.pp for Internet Protocoltx
Pwani notes-Network Essentials.pp  for Internet ProtocoltxPwani notes-Network Essentials.pp  for Internet Protocoltx
Pwani notes-Network Essentials.pp for Internet Protocoltx
 
Network internet
Network internetNetwork internet
Network internet
 
Networks internet
Networks internetNetworks internet
Networks internet
 
Unit 2.1 - OSI Model.ppt Physical Layer
Unit 2.1 - OSI Model.ppt  Physical LayerUnit 2.1 - OSI Model.ppt  Physical Layer
Unit 2.1 - OSI Model.ppt Physical Layer
 
Class notes 1
Class notes 1Class notes 1
Class notes 1
 
Report of TCP/IP
Report of TCP/IPReport of TCP/IP
Report of TCP/IP
 
OSI MODEL.pptx
OSI MODEL.pptxOSI MODEL.pptx
OSI MODEL.pptx
 
Computer network layers
Computer network layersComputer network layers
Computer network layers
 
Dc2 t1
Dc2 t1Dc2 t1
Dc2 t1
 
Chapter 4
Chapter 4Chapter 4
Chapter 4
 
OSI Model.It was created in 1983 by osi.
OSI Model.It was created in 1983 by osi.OSI Model.It was created in 1983 by osi.
OSI Model.It was created in 1983 by osi.
 
Osi
OsiOsi
Osi
 

Mais de Mukesh Tekwani

Computer Science Made Easy - Youtube Channel
Computer Science Made Easy - Youtube ChannelComputer Science Made Easy - Youtube Channel
Computer Science Made Easy - Youtube ChannelMukesh Tekwani
 
The Elphinstonian 1988-College Building Centenary Number (2).pdf
The Elphinstonian 1988-College Building Centenary Number (2).pdfThe Elphinstonian 1988-College Building Centenary Number (2).pdf
The Elphinstonian 1988-College Building Centenary Number (2).pdfMukesh Tekwani
 
ISCE-Class 12-Question Bank - Electrostatics - Physics
ISCE-Class 12-Question Bank - Electrostatics  -  PhysicsISCE-Class 12-Question Bank - Electrostatics  -  Physics
ISCE-Class 12-Question Bank - Electrostatics - PhysicsMukesh Tekwani
 
Hexadecimal to binary conversion
Hexadecimal to binary conversion Hexadecimal to binary conversion
Hexadecimal to binary conversion Mukesh Tekwani
 
Hexadecimal to decimal conversion
Hexadecimal to decimal conversion Hexadecimal to decimal conversion
Hexadecimal to decimal conversion Mukesh Tekwani
 
Hexadecimal to octal conversion
Hexadecimal to octal conversionHexadecimal to octal conversion
Hexadecimal to octal conversionMukesh Tekwani
 
Gray code to binary conversion
Gray code to binary conversion Gray code to binary conversion
Gray code to binary conversion Mukesh Tekwani
 
Decimal to Binary conversion
Decimal to Binary conversionDecimal to Binary conversion
Decimal to Binary conversionMukesh Tekwani
 
Video Lectures for IGCSE Physics 2020-21
Video Lectures for IGCSE Physics 2020-21Video Lectures for IGCSE Physics 2020-21
Video Lectures for IGCSE Physics 2020-21Mukesh Tekwani
 
Refraction and dispersion of light through a prism
Refraction and dispersion of light through a prismRefraction and dispersion of light through a prism
Refraction and dispersion of light through a prismMukesh Tekwani
 
Refraction of light at a plane surface
Refraction of light at a plane surfaceRefraction of light at a plane surface
Refraction of light at a plane surfaceMukesh Tekwani
 
Atom, origin of spectra Bohr's theory of hydrogen atom
Atom, origin of spectra Bohr's theory of hydrogen atomAtom, origin of spectra Bohr's theory of hydrogen atom
Atom, origin of spectra Bohr's theory of hydrogen atomMukesh Tekwani
 
Refraction of light at spherical surfaces of lenses
Refraction of light at spherical surfaces of lensesRefraction of light at spherical surfaces of lenses
Refraction of light at spherical surfaces of lensesMukesh Tekwani
 
ISCE (XII) - PHYSICS BOARD EXAM FEB 2020 - WEIGHTAGE
ISCE (XII) - PHYSICS BOARD EXAM FEB 2020 - WEIGHTAGEISCE (XII) - PHYSICS BOARD EXAM FEB 2020 - WEIGHTAGE
ISCE (XII) - PHYSICS BOARD EXAM FEB 2020 - WEIGHTAGEMukesh Tekwani
 

Mais de Mukesh Tekwani (20)

Computer Science Made Easy - Youtube Channel
Computer Science Made Easy - Youtube ChannelComputer Science Made Easy - Youtube Channel
Computer Science Made Easy - Youtube Channel
 
The Elphinstonian 1988-College Building Centenary Number (2).pdf
The Elphinstonian 1988-College Building Centenary Number (2).pdfThe Elphinstonian 1988-College Building Centenary Number (2).pdf
The Elphinstonian 1988-College Building Centenary Number (2).pdf
 
Circular motion
Circular motionCircular motion
Circular motion
 
Gravitation
GravitationGravitation
Gravitation
 
ISCE-Class 12-Question Bank - Electrostatics - Physics
ISCE-Class 12-Question Bank - Electrostatics  -  PhysicsISCE-Class 12-Question Bank - Electrostatics  -  Physics
ISCE-Class 12-Question Bank - Electrostatics - Physics
 
Hexadecimal to binary conversion
Hexadecimal to binary conversion Hexadecimal to binary conversion
Hexadecimal to binary conversion
 
Hexadecimal to decimal conversion
Hexadecimal to decimal conversion Hexadecimal to decimal conversion
Hexadecimal to decimal conversion
 
Hexadecimal to octal conversion
Hexadecimal to octal conversionHexadecimal to octal conversion
Hexadecimal to octal conversion
 
Gray code to binary conversion
Gray code to binary conversion Gray code to binary conversion
Gray code to binary conversion
 
What is Gray Code?
What is Gray Code? What is Gray Code?
What is Gray Code?
 
Decimal to Binary conversion
Decimal to Binary conversionDecimal to Binary conversion
Decimal to Binary conversion
 
Video Lectures for IGCSE Physics 2020-21
Video Lectures for IGCSE Physics 2020-21Video Lectures for IGCSE Physics 2020-21
Video Lectures for IGCSE Physics 2020-21
 
Refraction and dispersion of light through a prism
Refraction and dispersion of light through a prismRefraction and dispersion of light through a prism
Refraction and dispersion of light through a prism
 
Refraction of light at a plane surface
Refraction of light at a plane surfaceRefraction of light at a plane surface
Refraction of light at a plane surface
 
Spherical mirrors
Spherical mirrorsSpherical mirrors
Spherical mirrors
 
Atom, origin of spectra Bohr's theory of hydrogen atom
Atom, origin of spectra Bohr's theory of hydrogen atomAtom, origin of spectra Bohr's theory of hydrogen atom
Atom, origin of spectra Bohr's theory of hydrogen atom
 
Refraction of light at spherical surfaces of lenses
Refraction of light at spherical surfaces of lensesRefraction of light at spherical surfaces of lenses
Refraction of light at spherical surfaces of lenses
 
ISCE (XII) - PHYSICS BOARD EXAM FEB 2020 - WEIGHTAGE
ISCE (XII) - PHYSICS BOARD EXAM FEB 2020 - WEIGHTAGEISCE (XII) - PHYSICS BOARD EXAM FEB 2020 - WEIGHTAGE
ISCE (XII) - PHYSICS BOARD EXAM FEB 2020 - WEIGHTAGE
 
Cyber Laws
Cyber LawsCyber Laws
Cyber Laws
 
XML
XMLXML
XML
 

Chap 1 introduction

  • 1. CHAP 1. INTRODUCTION TO PROTOCOLS What is a communication protocol? (1) A communication protocol is a set of rules that govern the exchange of information in a network. (2) Communications protocols define the manner in which peer processes communicate among various hardware devices. (3) The protocols define the rules for function such as passing and extraction of messages and handling error conditions. What are the reasons for using layered protocols? OR What is protocol layering? (1) Many problems can arise when data is sent in form of “packets”. Some of these problems are: Link failure, Network congestion, Host failure, Packet delay or loss, Data corruption, Data duplication, Packets out of sync. (2) It is not practical for a single protocol to take care of all these potential problems. Therefore we organize the protocol software into different layers, so that each layer can handle a particular set of problems. (3) Networking functions which have related uses are grouped together to form layers. (4) The purpose of each layer is to offer certain services to the higher layers. Characteristics of a Layered Protocol: (1) Each layer has a predefined set of functions. (2) Layers provide services to their immediate upper layers. (3) Peer layers communicate using a peer protocol. (4) Layers are separated from each other with interfaces. What are the Advantages of Layering? (1) Data hiding and encapsulation: data structures and algorithms in one layer are not visible to other layers. (2) Reduced complexity: Complex systems can be decomposed into more easily understood pieces. A layer or a sublayer can be simplified or omitted if some or all of its services are not needed. (3) Increased evolution: Systems can evolve faster since layers can be changed while still integrating with existing systems. (4) Easy extension: Alternate services can be offered at layer N+1 that share the services of layer N. (5) Multi-vendor integration: Different vendors can provide different implementations. (6) Easy testing: Each layer can be tested independently. What is an open system? (1) An open system is a set of protocols that allows any two different systems to communicate no matter what the underlying architecture is. (2) The OSI model of networking is an open system as it allows the communication process between different systems without requiring changes to the logic of the underlying hardware or software. What is the OSI Model? What are the seven layers of this model? OSI Reference Model is a standard approach to network design. It is developed by the International Standards Organization (ISO). The word “Open” signifies that the model deals with connecting open systems – that is, systems that are open for communication with other
  • 2. Prof. Mukesh N Tekwani [9869 488 356] systems. In the OSI model, each layer performs a subset of the required communication functions. Each layer relies on the next lower layer to perform the required function. Layers of the OSI Model: Application Useful mnemonic to remember the order of these layers: All People Seem To Need Data Processing Presentation Session Transport Network Data Link Physical Physical layer (1) This layer is responsible for transmitting a bit stream over a physical medium such as a cable. (2) It deals with the mechanical and electrical specifications of the interface (e.g., the RJ45 jack, ports, etc) and the transmission medium. (3) It defines the procedures and functions that physical devices and interfaces have to perform for transmission to occur. (4) Functions of Physical Layer: a. Physical characteristics of interfaces and media – It defines the transmission medium, and the interface between the transmitting devices and the medium. b. Bit representation – The data in this layer is a stream of bits. These bits are encoded into electrical or optical signals. The physical layer defines the type of encoding, i.e., how bits 0 and 1 are changed into signals. c. Data transmission rate – The number of bits sent each second, the duration of a bit and how long it lasts on the medium are defined by the medium. d. Synchronizing the sender and receiver clocks: The sender and receiver must be synchronized at the bit level. e. Transmission mode – The physical layer defines the direction of transmission i.e., simplex, half-duplex, full duplex f. Physical Topology – how devices are connected – ring, star, mesh, bus topology g. Line configuration - The physical layer is concerned with connection of devices. Devices may be connected in a point-to-point configuration (through a dedicated link), or multipoint configuration (link shared between many devices). Data Link Layer (1) The physical layer is just transmitting the bits. The data link layer is responsible for delivery of data between two systems on the same network. (2) It does this by breaking up the input data into data frames, each of 100 or 1000 bytes, and transmits the frames sequentially. (3) This layer is responsible for moving frames from one node to another. (4) Main functions of this layer are: a. Framing – divide the stream of bits received into data units called frames. b. Physical Addressing – Add a header to the frame to define the physical address of the source and the destination machines. c. Flow control – Impose a flow control – control rate at which data is transmitted so as not to flood the receiver Page 2 of 7 Chap 1 – Introduction
  • 3. Prof. Mukesh N Tekwani [mukeshtekwani@hotmail.com mukeshtekwani@hotmail.com] d. Error Control – Adds mechanisms to detect and retransmit damaged or lost frames; and prevent duplication of frames. This is achieved by adding a trailer to the end of a frame. e. Access control – When two or more devices are connected to the same link, this layer connected determines which device has control over the link at any given time. Network Layer (1) This layer is responsible for the delivery of an individual packet from source to destination. This delivery of packets may be across several networks or links. . (2) Main functions of this layer are: a. Responsible for delivery of packets across multiple networks b. This layer does not recognize any relationship between these packets. c. If two systems are connected to the same link, there is no need for the network layer. connected layer d. But if the two systems are connected to different networks the network layer is needed for delivery of packets. e. Logical addressing – The data link layer handles the addresses at a local level by leve using a physical address. But since the data must pass across networks, the addressing mechanism is different. The network layer adds a header to the packet coming from the upper layer and this packet includes the logical addresses of the sender and the receiver. f. Routing – Provide mechanisms to transmit data over independent networks (internetworks) that are linked together through routers and switches. The network layer at source A sen a packet to the network layer at router B. When the packet sends arrives at B, the router makes a decision based on the destination F. The router uses its router table to decide that the next hop should be at router E. The network layer at E sends the packet to destination address F. g. Network layer is responsible only for delivery of individual packets and it does not recognize any relationship between those packets Chap 1 – Introduction Page 3 of 7
  • 4. Prof. Mukesh N Tekwani [9869 488 356] Transport Layer (1) This layer is responsible for the process-to-process delivery of the entire message. A process is just an application program running on a host computer. (2) The network layer is responsible for source to destination delivery of the packets. It treats each packet individually, even if they all belong to the same message. (3) The transport layer ensures that the whole message arrives intact and in order. (4) Main functions of this layer are: a. Responsible for source-to-destination delivery of the entire message b. Segmentation and reassembly – It divides the message into smaller segments, numbers them and transmits. It reassembles these messages at the receiving end using the sequence number. c. Connection control - The transport layer can be either connectionless or connection- oriented. A connectionless transport layer treats each segment as an independent packet and delivers it to the transport layer at the destination. A connection-oriented transport layer first establishes a connection with the transport layer at the destination computer before delivering the segments. The connection is then terminated once all the data is transferred. d. Error control – make sure that the entire message arrives without errors – else retransmit. e. Flow control - What if data arrives garbled or out of order or too fast? If a packet is missing or garbled, or arrives out-of-order, or too soon, the protocol at this layer will attempt to correct. f. Service-point addressing – Computers may be running many programs simultaneously. Hence source-to- destination means not only transmitting data from one computer to another but also from a specific process on one computer to a specific process on another computer. Therefore the transport layer header must include a service-point address (or port address). g. Thus, the responsibility of the transport layer is to get an entire message to the correct process on the destination computer. Session Layer (1) The session layer is the dialog controller. It establishes, maintains and synchronizes the interaction between computers. (2) Main functions of this layer are: a. Dialog control – allows two systems to enter into a dialog, keep a track of whose turn it is to transmit Transmission mode may be half-duplex or full-duplex. b. Synchronization – adds check points (synchronization points) into stream of data. These check points enable the system to know which unit has to be retransmitted in case there is a crash. (3) The session layer answers the need for individual hosts to support more than one active connection at a time. Presentation Layer: (1) This layer is concerned with the syntax and semantics of the information exchanged between the two computers. (2) The main tasks of this layer are: translation, compression, and encryption (3) Translation a. Different computers use different encoding systems (bit order translation) b. Convert data into a common format before transmitting. The data received at the destination is then converted from the common format into the receiver-dependent format. c. Syntax represents info such as character codes, data types, and file formats (how many bits to represent data – 8 or 7 bits Page 4 of 7 Chap 1 – Introduction
  • 5. Prof. Mukesh N Tekwani [mukeshtekwani@hotmail.com mukeshtekwani@hotmail.com] (4) Compression – reduce number of bits to be transmitted. This is more important for transmitted. transmission of video and audio data data. (5) Encryption – Encryption of data is required to ensure privacy of data. This layer transforms data into an unintelligible format at the sending end. At the receiving end, a end. decryption takes place. Application Layer: (1) This is the top layer of the OSI reference model. (2) This layer enables the user to access the network. (3) It provides user interfaces for services like: email, browser, file transfer, shared database , management. (4) It deals with issues such as: How can two applications communicate in a meaningful way? (5) It contains protocols that allow users to access the network (FTP, HTTP, SMTP etc ontains SMTP), (6) Services provided by the Application layer are: a. Network virtual terminal – This allows a user to log on to a remote host. The application creates a software emulation of a terminal at the remote host The host. user’s computer communicates with the software terminal which in turn talks to the host. b. File transfer, access and management: This application allows a user to access files on a remote host, retrieve files from the remote host, and also to manage files on a remote host. c. Mail – this application provides basic services for email forwarding and storing. storing What is the difference between network layer delivery and transport layer delivery delivery? The transport layer is responsible for source destination delivery of the entire message, source-to-destination whereas the network layer oversees delivery of individual packets of data irrespective of their relationship to each other and to the entire message. Group the OSI layers by function. The OSI layers can be grouped into: a. network support layers: physical, data link, network b. user support layers: session, presentation, application . c. transport layer: functions as a agent (liaison) between the two groups of layers Chap 1 – Introduction Page 5 of 7
  • 6. Prof. Mukesh N Tekwani [9869 488 356] What is the difference between a port address, a logical address and a physical address? Physical Address: (1) The physical address (or link address) is the local address of a node. (2) It is used by the data link layer and physical layer to deliver data from one node to another within the same network. (3) It is included in the frame used by the data link layer. (4) It is the lowest-level address. (5) The size and format of the physical address depends on the network. E.g., the Ethernet uses a 48 bit address which is included in every network interface card (NIC). Logical Address (1) The logical address defines the sender and receiver at the network layer and is used to deliver messages across multiple networks. (2) This address is used by the network layer. (3) This address is independent of the underlying physical networks. (4) Since different networks have different addressing formats, the physical addresses cannot be used when networks are interconnected. (5) A universal addressing system is used in which the computers can be identified uniquely. (6) The logical address used on the Internet is a 32-bit address which can uniquely define a computer on the Internet. Port Address: (1) The end objective of Internet communication is a process communication with another process. (2) It is not sufficient to just transfer data from one computer to another. (3) E.g., computer A can communicate with computer B using the TELNET protocol At the same time, A may be communicating with another computer C using the File Transfer Protocol (FTP). (4) For these two processes to receive data simultaneously, we need a method by which the processes can be given different labels. These labels are the addresses. A label assigned to a process is called a port address. What is the Network Model? (1) A model is a hypothetical description of a complex entity or process. The process of data communication along a network is very complex involving hardware and software. (2) The Network model is a method of describing and analyzing data communications networks by breaking the entire set of communications process into a number of layers. What is a Protocol? It is a formal description of message formats and the rules that two computers must follow in order to exchange messages. This set of rules describes how data is transmitted over a network. OSI is not a protocol. Protocols are needed for the following reasons: (1) In what format will the messages be transmitted? (2) At what speed should messages be transmitted? (3) What to do if errors take place? (4) What to do if parts of a message are lost? What is meant by Layered Approach To Networking? (1) Divide the complex task into a number of simpler sub-tasks. A layer performs that simple sub-task. Page 6 of 7 Chap 1 – Introduction
  • 7. Prof. Mukesh N Tekwani [mukeshtekwani@hotmail.com] (2) Each layer builds upon the layer below it, adding new functionality. (3) The entities comprising the corresponding layers on different machines are called peers. (4) It is the peers that communicate by using the protocols. (5) Actually, data is not transferred from layer n on one machine to layer n on another machine. (6) Each layer passes data and control information to the layer immediately below it, until the lowest layer is reached. (7) Actual data communication takes place through the lowest layer – the physical layer. Explain the concept of Services and Protocols (1) A service is a set of operations that a layer provides to the layer above it. a. Service defines what operations the layer is prepared to perform. b. A service relates to the interface between two layers – the lower layer is service provider and the upper layer is service user. (2) A protocol is a set of rules governing the format and meaning of the packets. a. Protocols relate to packets sent between peer entities on different machines. b. Entities use protocols. c. Protocols can be changed provided the services visible to the user do not change. Thus services and protocols are not joined or dependent. d. Protocol relates to the implementation of the service – how it is done (3) Analogy with programming languages: a. A service is like an object in an object-oriented language b. What operations can be performed on this object is defined c. How these operations are to be performed is not defined Explain the features of connectionless service and connection-oriented services. Layers can offer two types of services to the layers above them: connection-oriented and connectionless. Connection-oriented service is modelled after the telephone system. To talk to someone, we pick up a phone, dial the number, talk and disconnect. Similarly, in a network, the service user will 1. Establish a connection 2. Use the connection 3. Release the connection 4. The sender, receiver and the network may conduct a negotiation about data transfer speed, maximum message size, etc. When a connection is established, the sender and receiver may conduct a negotiation about parameters to be used such as maximum message size, data transfer speed, etc. Connection-oriented service is used when reliability is important. Only a single path is established for the call, and all the data follows that path. Connectionless service is modelled after the post office system. Each message (letter) carries the full address of the destination system. Each message is routed through the network system independent of the other messages. If two messages are sent to the same destination, normally the first one to be sent should arrive first. But it is possible that the second message arrives first. Since each message (packet) is routed independently, the network cannot guarantee that all the messages will arrive at the destination in the transmitting order. Different parts of a message may travel along different routes. Chap 1 – Introduction Page 7 of 7