Chapter - Two of Networking
Chapter - Two of Networking
1 Compiled by Yilkal B.
Chapter Outline
➢ Architectures
➢ Protocol standards
➢ Open standard
➢ Network architecture is predominantly expressed by its use of the internet protocol suits.
Data Communication Architecture:
➢ Or both point to point and multipoint connection are line configuration to connect two or more
devices in link.
➢ Link : a physical communication pathway that transfers data from one device to another.
➢ point-to-point:- a line configuration where two and only two devices are connected by a
dedicated link.
➢ It is unicast connection because there is Compiled
dedicated linkB. between the two devices
by Yilkal 3
Cntd…
Multipoint:– a line configuration in which more than two specific devices share a single
link.
❖ No dedicated line
Compiled by Yilkal B. 4
Network Design Models
There are basically have 2 network design models
❖ more security
❖ Easy to troubleshoot
➢ Difficult to design
➢ Difficult to implement
Compiled by Yilkal B. 7
Network Protocols and Standards
❖ for instance, for one computer to send a message to another computer, the first computer
must perform the following general steps
▪ break the data into small sections called packets
▪ add addressing information to the packets identifying the destination computer
▪ deliver the data to the network card for transmission over the network
❖ The receiving computer must perform the same steps, but in reverse order
▪ accept the data from the NIC
▪ remove transmitting information that was added by the transmitting computer
▪ reassemble the packets of data in to the original message
Compiled by Yilkal B. 8
Cntd…
❖ the key elements of a protocol are:
▪ syntax: refers to the structure or format of the data
▪ timing: refers to when data should be sent and how fast they can be sent
❖ Direct /indirect:
• If two systems share a point-to-point link - direct
• systems connect through a switched communication network – indirect
❖ Monolithic/structured
• Communications is a complex task for a single unit
• One big protocol vs. many structured protocols function as one.
❖ Symmetric/asymmetric: Communication
Compiledbetween
by Yilkal B. peer entities Vs Client/Server 9
Cntd…
❖ Standard /nonstandard
➢ Non-standard protocols built for specific computers and tasks
Compiled by Yilkal B. 5
Functions of Protocols
❖ Each device must perform the same steps the same way so that the data will
arrive and reassemble properly; if one device uses a protocol with different steps,
the two devices will not be able to communicate with each other
❖ The following are categories of functions that form the basis of protocols
▪ encapsulation
▪ segmentation and reassembly
▪ connection control
▪ addressing
▪ multiplexing
▪ transmission services Compiled by Yilkal B. 11
Cntd…
1. Encapsulation
❖ Each frame contains not only data but also control information
Compiled by Yilkal B. 7
Cntd…
2. Segmentation
➢ by the sender also called fragmentation and reassembly by the receiver a block of data
❖ on receipt, the receiving device must reassemble the segmented data into a
message appropriate to the application
Compiled by Yilkal B. 14
Cntd…
3. Connection control : two types of protocols (services)
➢ connectionless service
❖ the packets are sent from one party to another with no need for connection
establishment or connection release
❖ the packets are not numbered, they may be delayed, lost, or arrive out of
sequence; there is no acknowledgement either.
❖ flow control: a receiving station has to limit the amount or rate of data that is sent by a
transmitting station
▪ the simplest form of flow control is stop-and-wait procedure in which each frame must be
acknowledged before the next can be sent
▪ more efficient protocols involve some form of credit provided to the transmitter, which is the
amount of frames that can be transmitted without an acknowledgement; e.g. sliding
Compiled by Yilkal B. 17
window technique
Cntd …
❖ error control: error control is implemented as two separate functions; error detection and
retransmission
▪ some protocols also employ error correction which enables the receiver not only to
detect errors but, in some cases, to correct them
4. Addressing
▪ a unique address is associated with each end-system in a configuration (e.g.
workstation, server) and each intermediate system (e.g. router)
6. transmission services
▪ a variety of additional services can be provided
▪ priority: messages such as control messages may need to get through to the destination
station with minimum delay
➢ Within the model, one or more protocol standards can be developed at each layer.
➢ Changes in standards in one layer need not affect already existing software in another
layer.
➢ A network protocol is a formal set of rules, conventions and data structure that
governs how computers and other network devices exchange information over a
network .
➢ In earlier days, many of the networks that were built used different hardware and
software implementations
▪ they were incompatible and it became difficult for networks using different
specifications to communicate with each other
Compiled by Yilkal B. 21
Cntd…
❑ To address the problem of networks being incompatible and unable to communicate
with each other, we need some way of model .
➢ It provides services to the next-higher layer and accepts service for the lower layer
➢ Layering specifies different functions and services as data moves from one computer
through the network cabling to another computer
Compiled by Yilkal B. 22
Cntd…
➢ The layers are separated from each other by boundaries called interfaces
➢ All requests are passed from one layer, through the interface, to the next layer
Why layering?
➢ reduces complexity (one big problem to smaller ones)
➢ Allows different types of network hardware and software to communicate with each
other.
➢ All layers are independent and changes does not affect other layers.
Compiled by Yilkal B. 18
The Seven OSI Reference Model Layers
➢ Each layer provides a service to the layer above it in the protocol specification.
➢ Each layer communicates with the same layer’s software or hardware on other
computers.
➢ The lower 4 layers (transport, network, data link and physical : Layers 4, 3, 2,
and 1) are concerned with the flow of data from end to end through the
network.
➢ The upper three layers of the OSI model (application, presentation and session:
Layers 7, 6 and 5) are orientated more toward services to the applications.
Compiled by Yilkal B. 19
Cntd…
Compiled by Yilkal B. 28
Cntd…
The principles applied to arrive at the seven layers
➢ The layer boundaries should be chosen to minimize the information flow across the
interfaces.
➢ The number of layers should be large enough that distinct functions need not be
thrown together in the same layer out of necessity and small enough that the
architecture does not become unwieldy.
Compiled by Yilkal B. 22
Cntd…
Layer 7: Application
➢ The application layer is the OSI layer that is closest to the user.
➢ It provides network services to the user’s applications.
➢ contains all the higher level protocols that are commonly needed by users
Layer 6: Presentation
➢ The presentation layer ensures that the information that the application layer of one
system sends out is readable by the application layer of another system.
➢ The transport layer segments data from the sending host's system and reassembles the data
into a data stream on the receiving host's system.
➢ Defines how routing works and how routes are learned so that the packets can be
delivered.
➢ The network layer also defines how to fragment a packet into smaller packets to
accommodate different media.
Compiled by Yilkal B. 33
Cntd…
Layer 2: Data Link
➢ The data link layer provides access to the networking media and physical transmission
across the media and this enables the data to locate its intended destination on a network.
➢ The data link layer provides reliable transit of data across a physical link by using the
Media Access Control (MAC) addresses.
➢ The data link layer uses the MAC address to define a hardware or data link address in
order for multiple stations to share the same medium and still uniquely identify each other.
➢ Concerned with network topology, network access, error notification, ordered delivery
of frames, and flow control.
Compiled by Yilkal B. 36
Cntd…
Shortcomings of OSI
➢ Bad Technology
➢ Session and presentation almost empty
➢ addressing, flow control, and error control, reappear again and again in each layer
➢ Bad implementation
➢ Bad timing
➢ Bad politics
Compiled by Yilkal B. 37
Cntd…
Compiled by Yilkal B. 39
Functions of layer
Goals
➢ The Process/Application : protocols for node-to-node application communication and also co
ntrols user-interface specifications.
➢ The Host-to-Host
▪ parallels the functions of the OSI’s Transport layer, defining protocols for setting up the le
vel of transmission service for applications.
➢ The Internet layer
▪ corresponds to the OSI’s Network layer, designating the protocols relating to the logical tr
ansmission of packets over the entire network.
➢ Network Access layer
▪ The equivalent of the Data Link and Physical layers of the OSI model
▪ Oversees hardware addressing andCompiled
definesbyprotocols
Yilkal B. for the physical transmission of data.
40
Cntd…
Shortcomings of TCP/IP
➢ the model does not clearly distinguish the concepts of service, interface, and p
rotocol
➢ the TCP/IP model is not at all general and is poorly suited to describing any
➢ does not distinguish (or even mention) the physical and data link layers
Compiled by Yilkal B. 41
OSI vs. TCP/IP
Compiled by Yilkal B. 42
Cntd…
Compiled by Yilkal B. 44
Cntd…
Application/Process layer
➢ Telnet - allows a user on a remote client machine, called the Telnet client, to access the
resources of another machine, the Telnet server.
▪ Telnet makes client machine appear as though it were a terminal directly attached
to the server.
➢ File Transfer Protocol (FTP) - is the protocol that actually lets us transfer files, and it
can accomplish this between any two machines using it.
➢ Network File System (NFS) - a protocol specializing in file sharing allowing two
different types of file systems to interoperate.
Compiled by Yilkal B. 45
Cntd…
➢ Simple Mail Transfer Protocol (SMTP) - uses a spooled, or queued, method of mail
delivery.
▪ POP3 is used to receive mail.
➢ Simple Network Management Protocol (SNMP) - collects and manipulates valuable
network information.
▪ This protocol stands as a watchdog over the network, quickly notifying managers
of any sudden turn of events.
➢ Domain Name Service (DNS) – resolves hostnames—specifically, Internet names, such
as www.amu.edu.et to the IP address 10.6.10.3
➢ Dynamic Host Configuration Protocol (DHCP) - gives IP addresses to hosts.
▪ It allows easier administration and works well in small-to-even-very large network
environments.
Compiled by Yilkal B. 46
Host-to-Host layer
➢ Transmission Control Protocol (TCP) - takes large blocks of information from an
application and breaks them into segments.
▪ It numbers and sequences each segment so that the destination’s TCP protocol can put
the segments back into the order the application intended.
➢ User Datagram Protocol (UDP) - does not sequence the segments and does not care in
which order the segments arrive at the destination. But after that, UDP sends the
segments off and forgets about them. It doesn’t follow through, check up on them, or
even allow for an acknowledgment of safe arrival — complete abandonment.
Compiled by Yilkal B. 47
Cntd…
➢ TCP and UDP must use port numbers to communicate with the upper layers, because they’re
what keeps track of different conversations crossing the network simultaneously.
➢ These port numbers identify the source and destination application or process in the TCP
segment.
Compiled by Yilkal B. 48
Cntd…
➢ If a port is closed/blocked, you cannot communicate with the computer by the protocol
using that port.
Compiled by Yilkal B. 49
Internet Layer
➢ Internet Protocol (IP) essentially is the Internet layer.
➢ The other protocols found here merely exist to support it.
➢ It can do this because all the machines on the network have a software, or logical,
address called an IP address.
➢ Internet Control Message Protocol (ICMP) works at the Network layer and is used by
IP for many different services.
❖ ICMP is a management protocol and messaging service provider for IP.
❖ The following are some common events and messages that ICMP relates to:
▪ Destination Unreachable If a router can’t send an IP datagram any further, it uses
ICMP to send a message back to the sender, advising it of the situation.
▪ Buffer Full If a router’s memory buffer for receiving incoming datagrams is full, it
Compiled by Yilkal B. 50
will use ICMP to send out this message until the congestion abates.
Cntd…
• Hops Each IP datagram is allotted a certain number of routers, called hops, to pass through. If
it reaches its limit of hops before arriving at its destination, the last router to receive that
datagram deletes it.
• The executioner router then uses ICMP to send a message, informing the sending machine of the
end of its datagram.
• Ping (Packet Internet Groper) uses ICMP echo messages to check the physical and logical
connectivity of machines on a network.
• Trace route Using ICMP timeouts, Traceroute is used to discover the path a packet takes as it
traverses an internetwork.
➢ Address Resolution Protocol (ARP) finds the hardware address of a host from a known IP
address.
• ARP interrogates the local network by sending out a broadcast asking the machine with
the specified IP address to reply with its hardware
Compiled by Yilkal B. address. 51
Cntd…
Reverse Address Resolution Protocol (RARP)
➢ discovers the identity of the IP address for diskless machines by sending out a packet
that includes its MAC address and a request for the IP address assigned to that MAC
address.
➢ A designated machine, called a RARP server, responds with the answer, and the
identity crisis is over.
Compiled by Yilkal B. 52
Network Access
➢ Wi-Fi(wireless fidelity)
➢ ATM
➢ PPP
➢ Ethernet
➢ Fast Ethernet
➢ FDDI
➢ Token ring
Any question??
Compiled by Yilkal B. 54