Anda di halaman 1dari 81

UNIT 1

Introduction,OSI,
TCP/IP

GAURAV SHARMA
INTRODUCTION
Data
Telecommunication
Data Communication
Effectiveness of Data Communication depends
on
 Delivery
 Accuracy
 Timeliness
 Jitter
GAURAV SHARMA
Components

GAURAV SHARMA
Figure 1.2 Data flow (simplex, half-duplex, and full-duplex)

GAURAV SHARMA
NETWORKS
A network is a set of devices (often referred to as nodes)
connected by communication links. A node can be a
computer, printer, or any other device capable of sending
and/or receiving data generated by other nodes on the
network.

Topics discussed in this section:


Distributed Processing
Network Criteria
Physical Structures
Network Models
Categories of Networks
Interconnection of Networks: Internetwork
GAURAV SHARMA
Network Criteria

WCB/McGraw-Hill GAURAV SHARMA  The McGraw-Hill Companies, Inc., 1998


Physical Structures:: Types of Connection

GAURAV SHARMA
Figure 1.5 A fully connected mesh topology (five devices)

GAURAV SHARMA
Figure 1.6 A star topology connecting four stations

GAURAV SHARMA
Figure 1.7 A bus topology connecting three stations

GAURAV SHARMA
Figure 1.8 A ring topology connecting six stations

GAURAV SHARMA
Figure 1.9 A hybrid topology: a star backbone with three bus networks

GAURAV SHARMA
Figure 1.10 An isolated LAN connecting 12 computers to a hub in a closet

GAURAV SHARMA
Figure 1.11 WANs: a switched WAN and a point-to-point WAN

GAURAV SHARMA
Figure 1.12 A heterogeneous network made of four WANs and two LANs

GAURAV SHARMA
THE INTERNET

The Internet has revolutionized many aspects of our daily


lives. It has affected the way we do business as well as the
way we spend our leisure time. The Internet is a
communication system that has brought a wealth of
information to our fingertips and organized it for our use.

Topics discussed in this section:


A Brief History
The Internet Today (ISPs)

GAURAV SHARMA
History of Internet
• In the mid-1960s, mainframe computers in research organizations were
standalone devices. Computers from different manufacturers were unable to
communicate with one another.
• The Advanced Research Projects Agency (ARPA) in was interested in finding a
way to connect computers so that the researchers they funded could share their
findings, thereby reducing costs and eliminating duplication of effort.
• In 1967, at an Association for Computing Machinery (ACM) meeting, ARPA
presented its ideas for ARPANET, a small network of connected computers.
The idea was that each host computer would be attached to a specialized
computer, called an interface message processor (IMP).
• The IMPs, in turn, would be connected to one another.
• By 1969, ARPANET was a reality. Four nodes, at different universities of USA
were connected via the IMPs to form a network.
• Software called the Network Control Protocol (NCP) provided communication
between the hosts.
• In 1973, researchers developed TCP to replace NCP.
• Shortly, TCP was split into two protocols called TCP/IP.
GAURAV SHARMA
Internet Today
• The Internet today is not a simple hierarchical structure. It is
made up of many wide- and local-area networks joined by
connecting devices and switching stations.
• It is difficult to give an accurate representation of the Internet
because it is continually changing-new networks are being
added, existing networks are adding addresses, and networks
of defunct companies are being removed.
• Today most end users who want Internet connection use the
services of Internet service providers (lSPs). There are
international service providers, national service providers,
regional service providers, and local service providers.
• The Internet today is run by private companies, not the
government. Next slide shows a conceptual view of the
Internet.
GAURAV SHARMA
Internet Today
• International Service Provider
– At the top of the hierarchy are the international service providers that connect nations
together.
• National Service Provider
– The national Internet service providers are backbone networks created and maintained by
specialized companies.
– To provide connectivity between the end users, these backbone networks are connected
by complex switching stations (normally run by a third party) called network access
points (NAPs).
• Regional Internet Service Providers
– Regional internet service providers or regional ISPs are smaller ISPs that are connected
to one or more national ISPs.
– They are at the third level of the hierarchy with a smaller data rate.
• Local Internet Service Provider
– Local Internet service providers provide direct service to the end users. The local ISPs
can be connected to regional ISPs or directly to national ISPs.
– Most end users are connected to the local ISPs.
– A local ISP can be a company that just provides Internet services, a corporation with a
network that supplies services to its own employees, or a nonprofit organization, such as
a college or a university, that runs its own network.
GAURAV SHARMA
Figure 1.13 Hierarchical organization of the Internet

GAURAV SHARMA
Protocols & Standards
• A Protocol is a set of rules that govern data communication.
• A protocol defines what is communicated, how it is
communicated, and when it is communicated.
• For communication to occur, the entities must agree on a
protocol.
• Examples that we have seen:
– Hyper Text Transfer Protocol (HTTP) – Web Browser
– File Transfer Protocol (FTP) – File transfer
– Simple Mail Transfer Protocol (SMTP) – Email
– Internet Protocol (IP) – Packets across the Internet
• The key elements of a protocol are syntax, semantics, and
timing.
GAURAV SHARMA
Protocols & Standards
• Syntax refers to the structure or format of the
data, meaning the order in which they are
presented.
• Semantics refers to the meaning of each
section of bits. How is a particular pattern to
be interpreted, and what action is to be taken
based on that interpretation?
• Timing refers to two characteristics: when
data should be sent and how fast they can be
sent.

GAURAV SHARMA
Protocols & Standards
• Standards are essential in creating and maintaining an
open and competitive market for equipment
manufacturers and in guaranteeing national and
international interoperability of data and
telecommunications technology and processes.
• Standards provide guidelines to manufacturers,
vendors, government agencies, and other service
providers to ensure the kind of interconnectivity
necessary in today's marketplace and in international
communications.
• Data communication standards fall into two categories:
de facto (meaning "by fact" or "by convention") and de
jure (meaning "by law" or "by regulation").

GAURAV SHARMA
Protocols & Standards
• De facto, standards that have not been
approved by an organized body but have been
adopted as standards through widespread use
are de facto standards.
• These are often established originally by
manufacturers who seek to define the
functionality of a new product or technology.
• De jury, standards that have been legislated by
an officially recognized body are de jure
standards.

GAURAV SHARMA
Standard Organizations
• Standards are developed through the cooperation
of standards creation committees, forums, and
government regulatory agencies.
• Standard Creation Committees
 International Organization for Standardization (ISO)
 International Telecommunication Union-
Telecommunication Standards Sector (ITU-T)
 Consultative Committee for International Telegraphy
and Telephony (CCITT).
 American National Standard Institute.
 Institute of Electrical and Electronics Engineers
(IEEE).
 Electronic Industries Association.

GAURAV SHARMA
Standard Organizations
• Telecommunication Forums.
• Regulatory Agencies – Federal
Communication Commission (FCC).
• Internet Standards - Internet Draft, Request
for Draft.

GAURAV SHARMA
Layered Task

GAURAV SHARMA
Layered Task
• According to our analysis, there are three different activities at the sender
site and another three activities at the receiver site. The task of transporting
the letter between the sender and the receiver is done by the carrier.
• Each layer at the sending site uses the services of the layer immediately
below it.
• The sender at the higher layer uses the services of the middle layer.
• The middle layer uses the services of the lower layer.
• The lower layer uses the services of the carrier.
• The layered model that dominated data communications and networking
literature before 1990 was the Open Systems Interconnection (OSI) model.
• The TCPIIP protocol suite became the dominant commercial architecture
because it was used and tested extensively in the Internet; the OSI model
was never fully implemented.
 Advantages of Layering
 Easier application development
 Breaks complex tasks into subtasks
 Each layer handles a specific subset of tasks
GAURAV SHARMA

OSI Model
Open System Interconnection.
• An ISO standard that covers all aspects of network
communications.
• Introduced in late 1970.
• An open system is a set of protocols that allows any two
different systems to communicate regardless of their underlying
architecture.
• The OSI model is not a protocol; it is a model for understanding
and designing a network architecture that is flexible, robust, and
interoperable.
• ISO is the organization; while OSI is the model.
• It consists of seven separate but related layers, each of which
defines a part of the process of moving information across a
network.
• It follows the layered architecture.
Figure 3-1
OSI Model

WCB/McGraw-Hill GAURAV SHARMA  The McGraw-Hill Companies, Inc., 1998


OSI Model
• Between machines, layer x on one machine
communicates with layer x on another
machine. This communication is governed by
an agreed-upon series of rules and conventions
called protocols.
• The processes on each machine that
communicate at a given layer are called peer-
to-peer processes.
• Communication between machines is therefore
a peer-to-peer process using the protocols
appropriate to a given layer.
Figure 3-2
OSI Layers

WCB/McGraw-Hill GAURAV SHARMA  The McGraw-Hill Companies, Inc., 1998


Peer to Peer Processes
• Device A sends a stream of bits to device B (through
intermediate nodes). At the higher layers, however,
communication must move down through the layers on device
A, over to device B, and then back up through the layers.
• Each layer in the sending device adds its own information to the
message it receives from the layer just above it and passes the
whole package to the layer just below it.
• At layer I the entire package is converted to a form that can be
transmitted to the receiving device.
• At the receiving machine, the message is unwrapped layer by
layer, with each process receiving and removing the data meant
for it.
• For example, layer 2 removes the data meant for it, then passes
the rest to layer 3. Layer 3 then removes the data meant for it
and passes the rest to layer 4, and so on.
Data Encapsulation
• Next slide reveals another aspect of data
communications in the OSI model: Data Encapsulation.
• A packet (header and data) at level 7 is encapsulated in a
packet at level 6.
• The whole packet at level 6 is encapsulated in a packet
at level 5, and so on.
• In other words, the data portion of a packet at level N - 1
carries the whole packet (data and header and maybe
trailer) from level N. The concept is called
encapsulation; level N - 1 is not aware of which part of
the encapsulated packet is data and which part is the
header or trailer. For level N - 1, the whole packet
coming from level N is treated as one integral unit.
DATA ENCAPSULATION

GAURAV SHARMA
Organization of Layers
• The seven layers can be thought of as
belonging to three subgroups.
• Layers 1, 2, and 3-physical, data link, and
network-are the network support layers.
• They deal with the physical aspects of moving
data from one device to another.
• Perform functions as,
– Electrical Specification
– Physical Connection
– Physical Addressing
– Transport Timing
– Reliability
Organization of Layers
• Layers 5, 6, and 7-Session, Presentation, and
Application can be thought of as the user
support layers; they allow interoperability
among unrelated software systems.
• Layer 4, the transport layer, links the two
subgroups and ensures that what the lower
layers have transmitted is in a form that the
upper layers can use.
• The upper OSI layers are almost always
implemented in software; lower layers are a
combination of hardware and software, except
for the physical layer, which is mostly
hardware
Physical Layer
• The physical layer is responsible for movements of
individual bits from one hop (node) to the next.
• The Physical layer
– coordinates the functions required to carry a bit stream over
a physical medium.
– deals with the mechanical and electrical specifications of the
interface and transmission medium.
– defines the procedures and functions that physical devices
and interfaces have to perform for transmission to occur.
• The Physical layer concerns about
– Representation of bits
– Data Rate
– Synchronization of bits
– Line Configuration
– Physical Topology
– Transmission Mode
Figure 3-4

Physical Layer

WCB/McGraw-Hill GAURAV SHARMA  The McGraw-Hill Companies, Inc., 1998


Data Link Layer
• The data link layer is responsible for moving
frames from one hop (node) to the next.
• It is responsible for
– Framing
– Physical Addressing
– Error Control
– Flow Control
– Access Control
Figure 3-5

Data Link Layer

WCB/McGraw-Hill GAURAV SHARMA  The McGraw-Hill Companies, Inc., 1998


Figure 3-6

Data Link Layer Example

WCB/McGraw-Hill GAURAV SHARMA  The McGraw-Hill Companies, Inc., 1998


Hop-to-Hop Delivery
• Communication at the data link layer occurs between two adjacent
nodes. To send data from A to F, three partial deliveries are made.
• First, the data link layer at A sends a frame to the data link layer at B (a
router).
• Second, the data link layer at B sends a new frame to the data link
layer at E.
• Finally, the data link layer at E sends a new frame to the data link layer
at F. Note that the frames that are exchanged between the three nodes
have different values in the headers.
• The frame from A to B has B as the destination address and A as the
source address.
• The frame from B to E has E as the destination address and B as the
source address.
• The frame from E to F has F as the destination address and E as the
source address.
• The values of the trailers can also be different if error checking
includes the header of the frame.
Hop-to-Hop Delivery

GAURAV SHARMA
Network Layer
• The network layer is responsible for the
delivery of individual packets from the source
host to the destination host.
• If two systems are connected to the same link,
there is usually no need for a network layer.
• However, if the two systems are attached to
different networks (links) with connecting
devices between the networks (links), there is
often a need for the network layer to
accomplish source-to-destination delivery.
• Other responsibilities carried by Network
Layer are,
– Logical Addressing
– Routing
Figure 3-7

Network Layer

WCB/McGraw-Hill GAURAV SHARMA  The McGraw-Hill Companies, Inc., 1998


Figure 3-8
Network Layer Example

WCB/McGraw-Hill GAURAV SHARMA  The McGraw-Hill Companies, Inc., 1998


Figure 3-8-continued
Network Layer Example

WCB/McGraw-Hill GAURAV SHARMA  The McGraw-Hill Companies, Inc., 1998


Source-to-destination delivery

GAURAV SHARMA
Source-to-Destination Delivery
• The network layer at A sends the packet to the
network layer at B.
• When the packet arrives at router B, the router
makes a decision based on the final destination (F)
of the packet.
• It will be seen later, router B uses its routing table
to find that the next hop is router E.
• The network layer at B, therefore, sends the packet
to the network layer at E.
• The network layer at E, in turn, sends the packet to
the network layer at F
Transport Layer
• The transport layer is responsible for the delivery of a message
from one process to another.
• Also called Process-to-Process Delivery.
• A process is an application program running on a host.
• The network layer oversees source-to-destination delivery of
individual packets, it does not recognize any relationship
between those packets. It treats each one independently, as
though each piece belonged to a separate message, whether or
not it does.
• The transport layer, on the other hand, ensures that the whole
message arrives intact and in order, overseeing both error
control and flow control at the source-to-destination level.
• Other responsibilities carried are,
– Service Point Addressing
– Segmentation and Reassembly
– Connection Control
– Flow Control
– Error Control
Figure 3-9
Transport Layer

WCB/McGraw-Hill GAURAV SHARMA  The McGraw-Hill Companies, Inc., 1998


Figure 3-10
Transport Layer Example

WCB/McGraw-Hill GAURAV SHARMA  The McGraw-Hill Companies, Inc., 1998


Figure 3-10-continued

Transport Layer Example

WCB/McGraw-Hill GAURAV SHARMA  The McGraw-Hill Companies, Inc., 1998


Reliable process-to-process delivery of a message

GAURAV SHARMA
Session Layer
• The session layer is responsible for dialog
control and synchronization.
• It establishes, maintains, and synchronizes
the interaction among communicating
systems.
• Other responsibilities carried are,
– Dialog Control
– Synchronization
Figure 3-11
Session Layer

WCB/McGraw-Hill GAURAV SHARMA  The McGraw-Hill Companies, Inc., 1998


Presentation Layer
• The presentation layer is concerned with the
syntax and semantics of the information
exchanged between two systems.
• The presentation layer is responsible for
translation, compression, and encryption.
Figure 3-12

Presentation Layer

WCB/McGraw-Hill GAURAV SHARMA  The McGraw-Hill Companies, Inc., 1998


Application Layer
• The application layer enables the user, whether
human or software, to access the network.
• It provides user interfaces and support for services
such as electronic mail, remote file access and
transfer, shared database management, and other
types of distributed information services.
• The application layer is responsible for providing
services to the user.
• Other responsibilities carried are,
– Network Virtual Terminal
– File Transfer Access and Management
– Mail Services
– Directory Services
Figure 3-13

Application Layer

WCB/McGraw-Hill GAURAV SHARMA  The McGraw-Hill Companies, Inc., 1998


Figure 3-14

Summary of Layer Functions

WCB/McGraw-Hill GAURAV SHARMA  The McGraw-Hill Companies, Inc., 1998


TCP/IP Protocol Suite

GAURAV SHARMA
TCP/IP Protocol Suite
• The TCPIIP protocol suite was developed prior to the OSI
model.
• The original TCP/IP protocol suite was defined as having
four layers: host-to-network, internet, transport, and
application.
• However, host-to-network layer is equivalent to the
combination of the physical and data link layers.
• The internet layer is equivalent to the network layer, and the
application layer is roughly doing the job of the session,
presentation, and application layers with the transport layer
in TCP/IP taking care of part of the duties of the session
layer.
• So, we assume that the TCPIIP protocol suite is made of
five layers: physical, data link, network, transport, and
application.

GAURAV SHARMA
TCP/IP Protocol Suite
• TCP/IP is a hierarchical protocol made up of interactive modules,
each of which provides a specific functionality; however, the
modules are not necessarily interdependent.
• Whereas the OSI model specifies which functions belong to each of
its layers, the layers of the TCP/IP protocol suite contain relatively
independent protocols that can be mixed and matched depending on
the needs of the system.
• At Network Layer main protocol defined is IP with other supporting
protocols as,
– ICMP
– IGMP
– RARP
– ARP
• At Transport Layer TCP/IP defines three protocol,
– TCP
– UDP
– SCTP

GAURAV SHARMA
Physical and Data Link Layers
• At the physical and data link layers, TCP/IP
does not define any specific protocol.
• It supports all the standard and proprietary
protocols.
• A network in a TCP/IP internetwork can be a
local-area network or a wide-area network.

GAURAV SHARMA
Network Layer
• At the network layer, TCP/IP supports the Internetworking Protocol.
• IP, in turn, uses four supporting protocols: ARP, RARP, ICMP, and IGMP.
• Internetworking Protocol
– The Internetworking Protocol (IP) is the transmission mechanism used by the TCP/IP protocol suite.
– It is an unreliable and connectionless protocol-a best-effort delivery service.
– IP transports data in packets called datagrams, each of which is transported separately.
– Datagrams can travel along different routes and can arrive out of sequence or be duplicated.
– IP does not keep track of the routes and has no facility for reordering datagrams once they arrive at
their destination.
• Address Resolution Protocol
– The Address Resolution Protocol (ARP) is used to associate a logical address with a physical address.
– ARP is used to find the physical address of the node when its Internet address is known.
• Reverse Address Resolution Protocol
– The Reverse Address Resolution Protocol (RARP) allows a host to discover its Internet address when
it knows only its physical address.
• Internet Control Message Protocol
– The Internet Control Message Protocol (ICMP) is a mechanism used by hosts and gateways to send
notification of datagram problems back to the sender.
• Internet Group Message Protocol
– The Internet Group Message Protocol (IGMP) is used to facilitate the simultaneous transmission of a
message to a group of recipients.
GAURAV SHARMA
Transport Layer
• The transport layer was represented in TCP/IP by two
protocols: TCP and UDP.
• UDP and TCP are transport level protocols responsible for
delivery of a message from a process (running program) to
another process.
• User Datagram Protocol
– The User Datagram Protocol (UDP) is the simpler one.
– It is a process-to-process protocol that adds only port addresses, checksum
error control, and length information to the data from the upper layer
• Transmission Control Protocol
– Transmission Control Protocol provides full transport-layer services to
applications.
– It is reliable connection oriented protocol.
• Stream Controlled Transmission Protocol
– Contains best features of UDPGAURAV
and SCTP.
SHARMA
Application Layer
• The application layer in TCP/IP is equivalent to the
combined session, presentation, and application
layers in the OSI model.
• Many protocols are defined at this layer.

GAURAV SHARMA
Addressing
• Four levels of addresses are used in
an internet employing the TCP/IP
protocols:
– Physical (link) addresses
– Logical (IP) addresses
– Port addresses
– Specific addresses

GAURAV SHARMA
GAURAV SHARMA
Relationship with Layers

GAURAV SHARMA
Physical Addresses
• The physical address, also known as the link address, is
the address of a node as defined by its LAN or WAN.
• It is included in the frame used by the data link layer.
• It is the lowest-level address.
• The physical addresses have authority over the network
(LAN or WAN).
• The size and format of these addresses vary depending
on the network.
• For example, Ethernet uses a 6-byte (48-bit) physical
address that is imprinted on the network interface card
(NIC).
• LocalTalk (Apple), however, has a 1-byte dynamic
address that changes each time the station comes up.

GAURAV SHARMA
Physical addresses

• A node with physical address 10 sends a frame to a node with physical


address 87. The two nodes are connected by a link (bus topology LAN).

• The computer with physical address 10 is the sender, and the computer
with physical address 87 is the receiver.

• In most data link protocols, the destination address (87) comes before the
source address (10).

GAURAV SHARMA
Most local-area networks use a 48-bit (6-byte) physical
address written as 12 hexadecimal digits; every byte (2
hexadecimal digits) is separated by a colon.

07:01:02:01:2C:4B

A 6-byte (12 hexadecimal digits) physical address.

GAURAV SHARMA
Logical Addresses
• Logical addresses are necessary for universal communications
that are independent of underlying physical networks.
• Physical addresses are not adequate in an internetwork
environment where different networks can have different address
formats.
• A universal addressing system is needed in which each host can
be identified uniquely, regardless of the underlying physical
network.
• The logical addresses are designed for this purpose.
• A logical address in the Internet is currently a 32-bit address that
can uniquely define a host connected to the Internet.
• No two publicly addressed and visible hosts on the Internet can
have the same IP address.
• The physical addresses will change from hop to hop, but the
logical addresses usually remain the same.
GAURAV SHARMA
Logical Address

GAURAV SHARMA
Port Addresses
• The IP address and the physical address are necessary for a
quantity of data to travel from a source to the destination host.
• However, arrival at the destination host is not the final
objective of data communications on the Internet.
• A system that sends nothing but data from one computer to
another is not complete.
• Today, computers are devices that can run multiple processes
at the same time.
• The end objective of Internet communication is a process
communicating with another process.
• For example, computer A can communicate with computer C
by using TELNET.
• At the same time, computer A communicates with computer B
by using the File TransferGAURAV
Protocol
SHARMA (FTP).
Port Addresses
• For these processes to receive data simultaneously, we need a
method to label the different processes.
• In other words, they need addresses. In the TCP/IP
architecture, the label assigned to a process is called a port
address. A port address in TCP/IP is 16 bits in length.
• The physical addresses change from hop to hop, but the logical
and port addresses usually remain the same.
• A port address is a 16-bit address represented by one decimal
number as, 753.
• A 16-bit port address represented as one single number

GAURAV SHARMA
Port addresses

GAURAV SHARMA
Specific Addresses
• Some applications have user-friendly addresses that are
designed for that specific address.
• Examples include the e-mail address (for example,
gaurav.sharma.hitm@sgei.org) and the Universal Resource
Locator (URL) (for example, www.sgei.org).
• The first defines the recipient of an e-mail; the second is used
to find a document on the World Wide Web.

GAURAV SHARMA

Anda mungkin juga menyukai