Thanks to visit codestin.com
Credit goes to www.scribd.com

0% found this document useful (0 votes)
17 views52 pages

Ch02 Network Models

Chapter 2 discusses network models, focusing on the OSI and TCP/IP models which utilize a layered task approach for communication. The OSI model consists of seven layers, each with specific functions, while the TCP/IP model is structured into five layers. The chapter also covers addressing in TCP/IP, including physical, logical, port, and specific addresses.

Uploaded by

22054323
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
17 views52 pages

Ch02 Network Models

Chapter 2 discusses network models, focusing on the OSI and TCP/IP models which utilize a layered task approach for communication. The OSI model consists of seven layers, each with specific functions, while the TCP/IP model is structured into five layers. The chapter also covers addressing in TCP/IP, including physical, logical, port, and specific addresses.

Uploaded by

22054323
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
You are on page 1/ 52

Chapter-2

Network Models

Faculty: Asif Uddin Khan

McGraw-Hill ©The McGraw-Hill Companies, Inc., 2000


Network Models

Two network models


1. OSI(Open System Interconnection) model

2. TCP/IP Model

Both models use layered task approach

2.2
2-1 LAYERED TASKS

•We use the concept of layers in our daily life


life.. As an
example, let us consider two friends who communicate
through postal mail
mail..
•The process of sending a letter to a friend would be
complex if there were no services available from the post
office..
office

2.3
Figure 2.1 Tasks involved in sending a letter

2.4
2-2 THE OSI MODEL
Established in 1947 1947,, the International Standards
Organization (ISOISO)) is a multinational body dedicated to
worldwide agreement on international standards
standards.. An ISO
standard that covers all aspects of network
communications is the Open Systems Interconnection
(OSI
OSI)) model
model.. It was first introduced in the late 1970
1970ss.

The purpose of OSI model is to show how to facilitate


communication between different systems without
requring changes to the logic of underlying hardware and
software.

2.5
Note ISO is the organization.
OSI is the model.

Open systems
 In open systems, set of protocols allow
any two different systems to communicate
regardless of their underlying architecture

Layered Architecture is used:


•To reduce design complexity computer networks
are organized as stack of layers or levels.
•Each layer get service from the layer below it.
•The OSI model is divided in to seven layers.
2.6
Figure 2.2 Seven layers of the OSI model

2.7
Why layering is necessary
 To reduce design complexity
 To provide well-defined interfaces

between adjacent layers ie a change in


one layer that does not affect the change
in other layers.
 Allows structured development of network
software.
(Note: A set of layers and protocols is called
a network architecture)

2.8
The interaction between layers in the OSI model

2.9
Peer-to-Peer Processes

 The processes on each machine that


communicate at a given layer are called
peer-to- peer processes.

2.10
Figure 2.4 An exchange using the OSI model

2.11
Encapsulation

 A packet(header,data and trailer) at level


n is encapsulated in level n-1.
ie
 The data portion of a packet at level n-1
carries the whole packet (data,header,and
trailer) from level n

2.12
LAYERS IN THE OSI MODEL

7 layers of OSI Model


1.Physical Layer
2.Data Link Layer
3.Network Layer
4.Transport Layer
5.Session Layer
6.Presentation Layer
7.Application Layer

2.13
Figure 2.5 Physical layer
The physical layer is responsible for movements of
individual bits from one hop (node) to the next.

2.14
Functions of physical layer
 Define Physical characteristics of the interface between
devices and transmission medium.
 Representation of bits: bits are converted in to electrical
or optical signals.
 Data rate/Transmission rate: The no of bits sent each
second and how long it lasts.
 Syncronization of bits:Sender and the receiver clocks
must be syncronized.
 Line configuration:point to point or multipoint.
 Physical topology:star,bus ring,mesh etc.
 Transmission modes:full-duplex,half-duplex etc.

2.15
Figure 2.6 Data link layer
The data link layer is responsible for moving
frames from one hop (node) to the next.

2.16
Functions of data link layer
 Framing:The data link layer divides the stream of bits
received from the network layer in to manageable data
units called as frames.
 Physical addressing: MAC address
 Flow control: Controls the flow of data between sender
and receiver
 Error control: Controls the error in data during
transmission in the link.
 Congestion control: Controls network traffic.
 Access control: When two or more devices are
connected to the same link then data link layer protocols
determine which device has the control over the link at a
given time
2.17
Sub layers of Data link layer

1. Logical Link Control(LLC)


2. Media Access Control(MAC)
Functions
LLC:
 Acts as an interface between the media access control (MAC) sublayer and
the network layer.
 Link control: Managing error control and flow control
 Multiplexing
MAC:
 Physical addressing
 Multiple access

2.18
Figure 2.7 Hop-to-hop delivery

2.19
Figure 2.8 Network layer

The network layer is responsible for the


delivery of individual packets from
the source host to the destination host.

2.20
Functions of Network layer
 Logical addressing: IP address
 Routing: Routes the packets from source
to destination using routing algorithm.

2.21
Figure 2.9 Source-to-destination delivery

2.22
Figure 2.10 Transport layer
The transport layer is responsible for the delivery
of a message(segments) from one process to another.

2.23
Functions
 Service point addressing: process to process communication is done
using port addressing
 Segmentation and reassembly:message is divided in to segments
with a sequence number and reassembled after received at
destination.
 Connection control:Transport layer is either connection less or
connection oriented.
 Flow control:end to end flow control is performed rather than on a
single link.
 Error control:Transport layer performs process to process error
control rather than on a single link.The sending transport layer
makes sure that the entire message arrives at the receiving
transport layer without error.Error correction is usulay done by
retransmission.

2.24
Figure 2.11 Reliable process-to-process delivery of a message

2.25
Connection oriented vs connection less
Connection oriented
 Before any data transmission takes place a dedicated
path needs to be established between the source and
destination.
Connection less
 No need to establish a path before any data transmission
takes place between the source and destination.
 The source simply puts the data on to the network and
expects that the data to be reached to the destination
properly.

2.26
Figure 2.12 Session layer

The session layer is responsible for dialog


control and synchronization.

2.27
Functions

 Dialog Control:session Layer allows two systems to enter


in to a dialog.It allows the communication between two
processes to take place either in half duplex or full
duplex mode.
 Syncronization:The session layer allows processes to add
checkpoints or syncronization points to a stream of data
in order to minimize the data loss.

2.28
Figure 2.13 Presentation layer
The presentation layer is responsible for translation,
compression, and encryption.

2.29
Functions
 Translation: Different computers use different encoding
systems, the presentation layer is responsible for
interoperability between these different encoding
methods. At sender side it changes the information from
its sender dependent format to in to a common format
and at the receiving side it changes the common format
in to receiver dependent format.
 Encryption: Message is converted in to some secrete
code in order to achieve privacy.
 Compression: Data compression reduces the no of bits
contained in the information.

2.30
Figure 2.14 Application layer

The application layer is responsible for


providing services to the user.

2.31
Functions
 Network virtual terminal: It is a software version of a
physical terminal and it allows a user to log on to a
remote host. To do so the application creates a software
emulation of a terminal at the remote host.
 File transfer ,access and management: This allows a
user to access files in a remote host, to retrieve files and
manage files at remote host.
 Mail services: Provides the basis for email forwarding
and storage.
 Directory services: Provides distributed database sources
and access for global information about various objects
and services

2.32
Devices used in each layer
 Physical layer : Hubs, Repeaters, Cables, Fibers.
 Data-link layer: Bridges, Modems, Network cards, layer-2
switches.
 Network layer: Routers, Brouters, layer-3 switches.
 Transport layer: Gateways, Firewalls.
 Session layer: Gateways, Firewalls
 Presentation layer : Gateways, Firewalls
 Application layer: Gateways, Firewalls

2.33
2.34
Figure 2.15 Summary of layers

2.35
2-4 TCP/IP PROTOCOL SUITE

The layers in the TCP/IP protocol suite do not exactly match those
in the OSI model
model.. The original TCP/IP protocol suite was defined
as having four layers
layers:: host
host--to
to--network
network,, internet
internet,, transport
transport,, and
application.. However, when TCP/IP is compared to OSI, we can
application
say that the TCP/IP protocol suite is made of five layers layers:: physical
physical,,
data link
link,, network transport,, and application.
network,, transport

Layers of TCP/IP Model:


1. Physical
2. Data Link Layer
3. Network Layer
4. Transport Layer
5. Application Layer
2.36
Figure 2.16 TCP/IP and OSI model

2.37
Protocols of TCP/IP layers
 Physical layer protocols:
1. Telephone network modems- V.92
2. 802.11
3. Wi-Fi

 Datalink layer protocols


1. Point-to-Point Protocol(PPP)
2. IEEE 802.11 wireless LAN
3. Token ring
4. Fiber Distributed Data Interface (FDDI)

 Network Layer Protocols


1. Internet protocol(IP)
2. Internet Control Message Protocol (ICMP)
3. Internet Group Multicast Protocol(IGMP )
4. Address Resolution Protocol (ARP)
5. Reverse Address Resolution Protocol (RARP)
2.38
Transport layer protocols
1. Transmission Control Protocol (TCP)
2. User Datagram Protocol (UDP)
3. Stream Control Transmission Protocol (SCTP)

 Application layer protocols


1. File transfer protocol (FTP)
2. Simple Mail Transfer Protocol (SMTP )
3. Hypertext Transfer Protocol (http)
4. Domain Name System (DNS)
5. telnet

2.39
Some important protocols of Network Layer
 Internet protocol IP
It is unreliable and connection less protocol.It transports data in packets
called datagrams, each of which is transported separately.
 Address Resolution Protocol ARP
Used to find physical address from logical address.
 Reverse Address Resolution Protocol RARP
Used to find logical address from physical address
 Internet control Message Message Protocol ICMP
Allows the host to send notification of datagram problems back to the
sender.
 Internet Group Message Protocol IGMP
Used to facilitate the simultaneous transmission of a message to a group of
recipients.

2.40
Some Important protocols of Transport layer
 User Datagram Protocol UDP
 It is a process to process protocol that adds only port addresses,
checksum, error control and length information to the data from
upper layer.
 Transmission control protocol TCP
 It is a connection oriented protocol. A connection must be
established between both ends of transmission before either can
transmit data.
 At the sending end TCP divides a stream of data into smaller
units called segments with a sequence number.
 At the receiving end TCP collects each datagram as it comes and
reorders the transmission based on sequence number.

2.41
2-5 ADDRESSING

Four levels of addresses are used in an internet employing


the TCP/IP protocols
protocols:: physical
physical,, logical
logical,, port
port,, and specific
specific..

Topics discussed in this section:


Physical Addresses
Logical Addresses
Port Addresses
Specific Addresses

2.42
Figure 2.17 Addresses in TCP/IP

2.43
Addresses in TCP/IP
 Physical address
 It is the actual address of the device, generally a number printed on the
network interface card also known as MAC address.

 Logical Address
 Different networks have different physical addressing format. so a
universal addressing scheme system needed in which each host can be
identified uniquely regardless of the underlying physical network.
 A 32 bit IP address is the logical address.

 Port address
 The end objective of internet communication is a process communicating
with another process.The level assigned to a process is called a port
address.A port address in TCP/IP is 16 bit in length.

 Specific address
This is the specific address of the application such as url , email-id.
Eg www.google.com, [email protected] etc
2.44
Figure 2.18 Relationship of layers and addresses in TCP/IP

2.45
Example of Physical Address scenario

In Figure 2.19 a node with physical address 10 sends a frame to a


node with physical address 87. The two nodes are connected by a
link (bus topology LAN). As the figure shows, the computer with
physical address 10 is the sender, and the computer with physical
address 87 is the receiver.

Figure 2.19 Physical addresses

2.46
Physical Address format

As we will see in Chapter 13, most local-area networks


use a 48-bit (6-byte) physical address written as 12
hexadecimal digits; every byte (2 hexadecimal digits) is
separated by a colon, as shown below:

07:01:02:01:2C:4B

A 6-byte (12 hexadecimal digits) physical address.

2.47
Example scenario of Physical and Logical Address

Figure shows a part of an


internet with two routers
connecting three LANs.
Each device has a pair of
addresses (logical and
physical) for each connection.
In this case, each computer
is connected to only one link
and therefore has only one
pair of addresses.
Each router, however, is
connected to three networks
(only two are shown in the
figure).
So each router has three
pairs of addresses, one for
each connection.

2.48
Port addresses

Figure 2.21 shows two computers


communicating via the Internet.
The sending computer is running
three processes at this time with
port addresses a, b, and c.
The receiving computer is
running two processes at this time
with port addresses j and k.
Process a in the sending
computer needs to communicate
with process j in the receiving
computer.
Note that although physical
addresses change from hop to hop,
logical and port addresses remain
the same from the source to
destination.

2.49 Figure 2.21


Note

The physical addresses will change from hop to hop,


but the logical addresses usually remain the same.

2.50
Example 2.5

As we will see in Chapter 23, a port address is a 16-bit


address represented by one decimal number as shown.

753

A 16-bit port address represented


as one single number.

2.51
Note

The physical addresses change from hop to hop,


but the logical and port addresses usually remain the same.

2.52

You might also like