Computer Communication & Networks Lecture # 02 Nadeem Majeed Choudhary...
-
Upload
job-andrew-green -
Category
Documents
-
view
213 -
download
0
Transcript of Computer Communication & Networks Lecture # 02 Nadeem Majeed Choudhary...
![Page 2: Computer Communication & Networks Lecture # 02 Nadeem Majeed Choudhary nadeem.majeed@uettaxila.edu.pk.](https://reader035.fdocuments.in/reader035/viewer/2022070409/56649e8f5503460f94b939c4/html5/thumbnails/2.jpg)
Layering & Protocol Stacks
![Page 3: Computer Communication & Networks Lecture # 02 Nadeem Majeed Choudhary nadeem.majeed@uettaxila.edu.pk.](https://reader035.fdocuments.in/reader035/viewer/2022070409/56649e8f5503460f94b939c4/html5/thumbnails/3.jpg)
Reference Models
OSI reference model TCP/IP
![Page 4: Computer Communication & Networks Lecture # 02 Nadeem Majeed Choudhary nadeem.majeed@uettaxila.edu.pk.](https://reader035.fdocuments.in/reader035/viewer/2022070409/56649e8f5503460f94b939c4/html5/thumbnails/4.jpg)
OSI Reference model
Open System Interconnection 7 layers
1. Crate a layer when different abstraction is needed
2. Each layer performs a well define function
3. Functions of the layers chosen taking internationally standardized protocols
4. Number of layers – large enough to avoid complexity
![Page 5: Computer Communication & Networks Lecture # 02 Nadeem Majeed Choudhary nadeem.majeed@uettaxila.edu.pk.](https://reader035.fdocuments.in/reader035/viewer/2022070409/56649e8f5503460f94b939c4/html5/thumbnails/5.jpg)
Seven layers of the OSI model
![Page 6: Computer Communication & Networks Lecture # 02 Nadeem Majeed Choudhary nadeem.majeed@uettaxila.edu.pk.](https://reader035.fdocuments.in/reader035/viewer/2022070409/56649e8f5503460f94b939c4/html5/thumbnails/6.jpg)
Exchange using OSI Model
![Page 7: Computer Communication & Networks Lecture # 02 Nadeem Majeed Choudhary nadeem.majeed@uettaxila.edu.pk.](https://reader035.fdocuments.in/reader035/viewer/2022070409/56649e8f5503460f94b939c4/html5/thumbnails/7.jpg)
Peer-to-peer Processes Layer x on one machine communicates with layer x on another
machine - called Peer-to-Peer Processes. Interfaces between Layers
Each interface defines what information and services a layer must provide for the layer above it. Well defined interfaces and layer functions provide modularity to a network
Organizations of the layers Network support layers : Layers 1, 2, 3 User support layer : Layer 5, 6, 7
It allows interoperability among unrelated software systems
Transport layer (Layer 4) : links the two subgroups
![Page 8: Computer Communication & Networks Lecture # 02 Nadeem Majeed Choudhary nadeem.majeed@uettaxila.edu.pk.](https://reader035.fdocuments.in/reader035/viewer/2022070409/56649e8f5503460f94b939c4/html5/thumbnails/8.jpg)
The interaction between layers in the OSI model
![Page 9: Computer Communication & Networks Lecture # 02 Nadeem Majeed Choudhary nadeem.majeed@uettaxila.edu.pk.](https://reader035.fdocuments.in/reader035/viewer/2022070409/56649e8f5503460f94b939c4/html5/thumbnails/9.jpg)
OSI Layers
![Page 10: Computer Communication & Networks Lecture # 02 Nadeem Majeed Choudhary nadeem.majeed@uettaxila.edu.pk.](https://reader035.fdocuments.in/reader035/viewer/2022070409/56649e8f5503460f94b939c4/html5/thumbnails/10.jpg)
Physical layer
Transporting bits from one end node to the next- type of the transmission media (twisted-pair, coax, optical fiber, air)- bit representation (voltage levels of logical values)- data rate (speed)- synchronization of bits (time synchronization)- deals with the optical, mechanical and electrical features- transmission modes ( half duplex, full duplex)
physicalconnection
![Page 11: Computer Communication & Networks Lecture # 02 Nadeem Majeed Choudhary nadeem.majeed@uettaxila.edu.pk.](https://reader035.fdocuments.in/reader035/viewer/2022070409/56649e8f5503460f94b939c4/html5/thumbnails/11.jpg)
The physical layer is responsible for movements ofindividual bits from one hop (node) to the next.
Note
![Page 12: Computer Communication & Networks Lecture # 02 Nadeem Majeed Choudhary nadeem.majeed@uettaxila.edu.pk.](https://reader035.fdocuments.in/reader035/viewer/2022070409/56649e8f5503460f94b939c4/html5/thumbnails/12.jpg)
Protocols:
- Modems
- Optical Cables, Connectors
Network Devices:
- Hubs, Repeaters, and Amplifier.
![Page 13: Computer Communication & Networks Lecture # 02 Nadeem Majeed Choudhary nadeem.majeed@uettaxila.edu.pk.](https://reader035.fdocuments.in/reader035/viewer/2022070409/56649e8f5503460f94b939c4/html5/thumbnails/13.jpg)
Data Link layer
Transporting frames from one end node to the next one
logicalconnection
- framing - physical addressing
- flow control - error control
- access control
![Page 14: Computer Communication & Networks Lecture # 02 Nadeem Majeed Choudhary nadeem.majeed@uettaxila.edu.pk.](https://reader035.fdocuments.in/reader035/viewer/2022070409/56649e8f5503460f94b939c4/html5/thumbnails/14.jpg)
Data Link layer- hop-to-hop delivery-
![Page 15: Computer Communication & Networks Lecture # 02 Nadeem Majeed Choudhary nadeem.majeed@uettaxila.edu.pk.](https://reader035.fdocuments.in/reader035/viewer/2022070409/56649e8f5503460f94b939c4/html5/thumbnails/15.jpg)
Data Link layer- example-
![Page 16: Computer Communication & Networks Lecture # 02 Nadeem Majeed Choudhary nadeem.majeed@uettaxila.edu.pk.](https://reader035.fdocuments.in/reader035/viewer/2022070409/56649e8f5503460f94b939c4/html5/thumbnails/16.jpg)
The data link layer is responsible for moving frames from one hop (node) to the next.
Note
![Page 17: Computer Communication & Networks Lecture # 02 Nadeem Majeed Choudhary nadeem.majeed@uettaxila.edu.pk.](https://reader035.fdocuments.in/reader035/viewer/2022070409/56649e8f5503460f94b939c4/html5/thumbnails/17.jpg)
Data Link layer
Network Devices:
-Bridge, Switch, ISDN Router, Intelligent Hub, NIC, Advanced Cable Tester
![Page 18: Computer Communication & Networks Lecture # 02 Nadeem Majeed Choudhary nadeem.majeed@uettaxila.edu.pk.](https://reader035.fdocuments.in/reader035/viewer/2022070409/56649e8f5503460f94b939c4/html5/thumbnails/18.jpg)
Data Link layer
Protocols: Logical Link Control • error correction and flow control• manages link control and defines SAPs
Media Access Control • controls the type of media being used:802.3 CSMA/CD (Ethernet)802.4 Token Bus (ARCnet)802.5 Token Ring802.12 Demand Priority
![Page 19: Computer Communication & Networks Lecture # 02 Nadeem Majeed Choudhary nadeem.majeed@uettaxila.edu.pk.](https://reader035.fdocuments.in/reader035/viewer/2022070409/56649e8f5503460f94b939c4/html5/thumbnails/19.jpg)
Network Layer The network layer is responsible for
the delivery of individual packets from the source host to the destination host.
![Page 20: Computer Communication & Networks Lecture # 02 Nadeem Majeed Choudhary nadeem.majeed@uettaxila.edu.pk.](https://reader035.fdocuments.in/reader035/viewer/2022070409/56649e8f5503460f94b939c4/html5/thumbnails/20.jpg)
20
Network layer
End-to-End packet delivery From the original source to a destination
Needed when 2 devices are attached to different networks What is the network definition here?
Main duties:1. Logical addressing2. Routing3. Switching4. Congestion control and QoS
Not a message
![Page 21: Computer Communication & Networks Lecture # 02 Nadeem Majeed Choudhary nadeem.majeed@uettaxila.edu.pk.](https://reader035.fdocuments.in/reader035/viewer/2022070409/56649e8f5503460f94b939c4/html5/thumbnails/21.jpg)
21
Source to destination delivery
Data Link
Network layer
![Page 22: Computer Communication & Networks Lecture # 02 Nadeem Majeed Choudhary nadeem.majeed@uettaxila.edu.pk.](https://reader035.fdocuments.in/reader035/viewer/2022070409/56649e8f5503460f94b939c4/html5/thumbnails/22.jpg)
22
Network layer- example -
Network layer addresses
Data Link layer addresses
![Page 23: Computer Communication & Networks Lecture # 02 Nadeem Majeed Choudhary nadeem.majeed@uettaxila.edu.pk.](https://reader035.fdocuments.in/reader035/viewer/2022070409/56649e8f5503460f94b939c4/html5/thumbnails/23.jpg)
23
The network layer is responsible for the delivery of individual packets from
the source host to the destination host.
Note
![Page 24: Computer Communication & Networks Lecture # 02 Nadeem Majeed Choudhary nadeem.majeed@uettaxila.edu.pk.](https://reader035.fdocuments.in/reader035/viewer/2022070409/56649e8f5503460f94b939c4/html5/thumbnails/24.jpg)
Network Layer
Router works as the post office and network layer stamps the letters (data) for the specific destinations.
Protocols: These protocols work on the network layer IP, ICMP, ARP, RIP, OSI, IPX and OSPF.
Network Devices: Network devices including Router, Frame Relay device and ATM switch devices work on the network layer.
![Page 25: Computer Communication & Networks Lecture # 02 Nadeem Majeed Choudhary nadeem.majeed@uettaxila.edu.pk.](https://reader035.fdocuments.in/reader035/viewer/2022070409/56649e8f5503460f94b939c4/html5/thumbnails/25.jpg)
25
Transport layer
Process-to-Process delivery of the entire message From the original source to a destination
Needed when several processes (running programs) active at the same time
Main tasks: Port addressing Segmentation and reassembly Congestion control Flow control Error control
![Page 26: Computer Communication & Networks Lecture # 02 Nadeem Majeed Choudhary nadeem.majeed@uettaxila.edu.pk.](https://reader035.fdocuments.in/reader035/viewer/2022070409/56649e8f5503460f94b939c4/html5/thumbnails/26.jpg)
Transport Layer The transport layer is responsible for the delivery
of a message from one process to another.
![Page 27: Computer Communication & Networks Lecture # 02 Nadeem Majeed Choudhary nadeem.majeed@uettaxila.edu.pk.](https://reader035.fdocuments.in/reader035/viewer/2022070409/56649e8f5503460f94b939c4/html5/thumbnails/27.jpg)
27
Transport Layer
![Page 28: Computer Communication & Networks Lecture # 02 Nadeem Majeed Choudhary nadeem.majeed@uettaxila.edu.pk.](https://reader035.fdocuments.in/reader035/viewer/2022070409/56649e8f5503460f94b939c4/html5/thumbnails/28.jpg)
28
Transport layer -an example of a reliable delivery -
![Page 29: Computer Communication & Networks Lecture # 02 Nadeem Majeed Choudhary nadeem.majeed@uettaxila.edu.pk.](https://reader035.fdocuments.in/reader035/viewer/2022070409/56649e8f5503460f94b939c4/html5/thumbnails/29.jpg)
29
The transport layer is responsible for the delivery of a message from one process to another.
Note
![Page 30: Computer Communication & Networks Lecture # 02 Nadeem Majeed Choudhary nadeem.majeed@uettaxila.edu.pk.](https://reader035.fdocuments.in/reader035/viewer/2022070409/56649e8f5503460f94b939c4/html5/thumbnails/30.jpg)
Transport Layer
Protocols: These protocols work on the transport layer TCP, UDP, SPX, NETBIOS, ATP and NWLINK.
Network Devices: The Brouter, Gateway and Cable tester work on the transport layer.
![Page 31: Computer Communication & Networks Lecture # 02 Nadeem Majeed Choudhary nadeem.majeed@uettaxila.edu.pk.](https://reader035.fdocuments.in/reader035/viewer/2022070409/56649e8f5503460f94b939c4/html5/thumbnails/31.jpg)
31
The session layer is responsible for dialog control and synchronization.
Note
![Page 32: Computer Communication & Networks Lecture # 02 Nadeem Majeed Choudhary nadeem.majeed@uettaxila.edu.pk.](https://reader035.fdocuments.in/reader035/viewer/2022070409/56649e8f5503460f94b939c4/html5/thumbnails/32.jpg)
Session Layer The session layer is responsible for
dialog control and synchronization.
![Page 33: Computer Communication & Networks Lecture # 02 Nadeem Majeed Choudhary nadeem.majeed@uettaxila.edu.pk.](https://reader035.fdocuments.in/reader035/viewer/2022070409/56649e8f5503460f94b939c4/html5/thumbnails/33.jpg)
Presentation Layer
![Page 34: Computer Communication & Networks Lecture # 02 Nadeem Majeed Choudhary nadeem.majeed@uettaxila.edu.pk.](https://reader035.fdocuments.in/reader035/viewer/2022070409/56649e8f5503460f94b939c4/html5/thumbnails/34.jpg)
Presentation Layer
Presentation layer is a best layer for cryptography.
![Page 35: Computer Communication & Networks Lecture # 02 Nadeem Majeed Choudhary nadeem.majeed@uettaxila.edu.pk.](https://reader035.fdocuments.in/reader035/viewer/2022070409/56649e8f5503460f94b939c4/html5/thumbnails/35.jpg)
35
The presentation layer is responsible for translation, compression, and encryption.
Note
![Page 36: Computer Communication & Networks Lecture # 02 Nadeem Majeed Choudhary nadeem.majeed@uettaxila.edu.pk.](https://reader035.fdocuments.in/reader035/viewer/2022070409/56649e8f5503460f94b939c4/html5/thumbnails/36.jpg)
Application Layer The application layer is responsible
for providing services to the user.
![Page 37: Computer Communication & Networks Lecture # 02 Nadeem Majeed Choudhary nadeem.majeed@uettaxila.edu.pk.](https://reader035.fdocuments.in/reader035/viewer/2022070409/56649e8f5503460f94b939c4/html5/thumbnails/37.jpg)
Application Layer
Services provided by Application layer:
- File transfer, Access
- Mail services
![Page 38: Computer Communication & Networks Lecture # 02 Nadeem Majeed Choudhary nadeem.majeed@uettaxila.edu.pk.](https://reader035.fdocuments.in/reader035/viewer/2022070409/56649e8f5503460f94b939c4/html5/thumbnails/38.jpg)
38
Application layer
Enables user to access the network Provides services to a user
E-mail Remote file access and transfer (Telnet, FTP) Access to WWW (HTTP)
![Page 39: Computer Communication & Networks Lecture # 02 Nadeem Majeed Choudhary nadeem.majeed@uettaxila.edu.pk.](https://reader035.fdocuments.in/reader035/viewer/2022070409/56649e8f5503460f94b939c4/html5/thumbnails/39.jpg)
39
The application layer is responsible for providing services to the user.
Note
![Page 40: Computer Communication & Networks Lecture # 02 Nadeem Majeed Choudhary nadeem.majeed@uettaxila.edu.pk.](https://reader035.fdocuments.in/reader035/viewer/2022070409/56649e8f5503460f94b939c4/html5/thumbnails/40.jpg)
Application Layer
Protocols: FTP, DNS, SNMP, SMTP, FINGER, TELNET, TFTP, BOOTP and SMB protocol are operated on the application layer.
Network Devices: Gateway network device is operated on the application layer.
![Page 41: Computer Communication & Networks Lecture # 02 Nadeem Majeed Choudhary nadeem.majeed@uettaxila.edu.pk.](https://reader035.fdocuments.in/reader035/viewer/2022070409/56649e8f5503460f94b939c4/html5/thumbnails/41.jpg)
41
OSI Reference Model
A convenient aid for remembering the OSI layer names is to use the first letter of each word in the phrase:
All People Seem To Need Data Processing
![Page 42: Computer Communication & Networks Lecture # 02 Nadeem Majeed Choudhary nadeem.majeed@uettaxila.edu.pk.](https://reader035.fdocuments.in/reader035/viewer/2022070409/56649e8f5503460f94b939c4/html5/thumbnails/42.jpg)
42
Summary of layers and protocols
Low-level protocols define the electrical and physical standards to be observed, bit- and byte-ordering and the transmission and error detection and correction of the bit stream
High-level protocols deal with the data formatting, including the syntax of messages, the terminal to computer dialogue, character sets, sequencing of messages
![Page 43: Computer Communication & Networks Lecture # 02 Nadeem Majeed Choudhary nadeem.majeed@uettaxila.edu.pk.](https://reader035.fdocuments.in/reader035/viewer/2022070409/56649e8f5503460f94b939c4/html5/thumbnails/43.jpg)
43
TCP/IP Protocol
![Page 44: Computer Communication & Networks Lecture # 02 Nadeem Majeed Choudhary nadeem.majeed@uettaxila.edu.pk.](https://reader035.fdocuments.in/reader035/viewer/2022070409/56649e8f5503460f94b939c4/html5/thumbnails/44.jpg)
44
TCP/IP Vs OSI Model
![Page 45: Computer Communication & Networks Lecture # 02 Nadeem Majeed Choudhary nadeem.majeed@uettaxila.edu.pk.](https://reader035.fdocuments.in/reader035/viewer/2022070409/56649e8f5503460f94b939c4/html5/thumbnails/45.jpg)
45
Four Level of Addresses
![Page 46: Computer Communication & Networks Lecture # 02 Nadeem Majeed Choudhary nadeem.majeed@uettaxila.edu.pk.](https://reader035.fdocuments.in/reader035/viewer/2022070409/56649e8f5503460f94b939c4/html5/thumbnails/46.jpg)
46
Relationship of Layers & Addresses in TCP/IP
![Page 47: Computer Communication & Networks Lecture # 02 Nadeem Majeed Choudhary nadeem.majeed@uettaxila.edu.pk.](https://reader035.fdocuments.in/reader035/viewer/2022070409/56649e8f5503460f94b939c4/html5/thumbnails/47.jpg)
47
The physical addresses will change from hop to hop,but the logical addresses usually remain the same.
Note
![Page 48: Computer Communication & Networks Lecture # 02 Nadeem Majeed Choudhary nadeem.majeed@uettaxila.edu.pk.](https://reader035.fdocuments.in/reader035/viewer/2022070409/56649e8f5503460f94b939c4/html5/thumbnails/48.jpg)
In Figure 2.19 a node with physical address 10 sends a frame to a node with physical address 87. The two nodes are connected by a link (bus topology LAN). As the figure shows, the computer with physical address 10 is the sender, and the computer with physical address 87 is the receiver.
Example 2.1
![Page 49: Computer Communication & Networks Lecture # 02 Nadeem Majeed Choudhary nadeem.majeed@uettaxila.edu.pk.](https://reader035.fdocuments.in/reader035/viewer/2022070409/56649e8f5503460f94b939c4/html5/thumbnails/49.jpg)
Figure 2.19 Physical addresses
![Page 50: Computer Communication & Networks Lecture # 02 Nadeem Majeed Choudhary nadeem.majeed@uettaxila.edu.pk.](https://reader035.fdocuments.in/reader035/viewer/2022070409/56649e8f5503460f94b939c4/html5/thumbnails/50.jpg)
most local-area networks use a 48-bit (6-byte) physical address written as 12 hexadecimal digits; every byte (2 hexadecimal digits) is separated by a colon, as shown below:
Example 2.2
07:01:02:01:2C:4B
A 6-byte (12 hexadecimal digits) physical address.
![Page 51: Computer Communication & Networks Lecture # 02 Nadeem Majeed Choudhary nadeem.majeed@uettaxila.edu.pk.](https://reader035.fdocuments.in/reader035/viewer/2022070409/56649e8f5503460f94b939c4/html5/thumbnails/51.jpg)
Figure 2.20 shows a part of an internet with two routers connecting three LANs. Each device (computer or router) has a pair of addresses (logical and physical) for each connection. In this case, each computer is connected to only one link and therefore has only one pair of addresses. Each router, however, is connected to three networks (only two are shown in the figure). So each router has three pairs of addresses, one for each connection.
Example 2.3
![Page 52: Computer Communication & Networks Lecture # 02 Nadeem Majeed Choudhary nadeem.majeed@uettaxila.edu.pk.](https://reader035.fdocuments.in/reader035/viewer/2022070409/56649e8f5503460f94b939c4/html5/thumbnails/52.jpg)
Figure 2.20 IP addresses
![Page 53: Computer Communication & Networks Lecture # 02 Nadeem Majeed Choudhary nadeem.majeed@uettaxila.edu.pk.](https://reader035.fdocuments.in/reader035/viewer/2022070409/56649e8f5503460f94b939c4/html5/thumbnails/53.jpg)
Figure 2.21 shows two computers communicating via the Internet. The sending computer is running three processes at this time with port addresses a, b, and c. The receiving computer is running two processes at this time with port addresses j and k. Process a in the sending computer needs to communicate with process j in the receiving computer. Note that although physical addresses change from hop to hop, logical and port addresses remain the same from the source to destination.
Example 2.4
![Page 54: Computer Communication & Networks Lecture # 02 Nadeem Majeed Choudhary nadeem.majeed@uettaxila.edu.pk.](https://reader035.fdocuments.in/reader035/viewer/2022070409/56649e8f5503460f94b939c4/html5/thumbnails/54.jpg)
Figure 2.21 Port addresses
![Page 55: Computer Communication & Networks Lecture # 02 Nadeem Majeed Choudhary nadeem.majeed@uettaxila.edu.pk.](https://reader035.fdocuments.in/reader035/viewer/2022070409/56649e8f5503460f94b939c4/html5/thumbnails/55.jpg)
Example 2.5
A port address is a 16-bit address represented by one decimal number as shown.
753
A 16-bit port address represented as one single number.
![Page 56: Computer Communication & Networks Lecture # 02 Nadeem Majeed Choudhary nadeem.majeed@uettaxila.edu.pk.](https://reader035.fdocuments.in/reader035/viewer/2022070409/56649e8f5503460f94b939c4/html5/thumbnails/56.jpg)
56
Readings
Chapter 2 (B. A Forouzan) Section 2.2,2.3, 2.4, 2.5
![Page 57: Computer Communication & Networks Lecture # 02 Nadeem Majeed Choudhary nadeem.majeed@uettaxila.edu.pk.](https://reader035.fdocuments.in/reader035/viewer/2022070409/56649e8f5503460f94b939c4/html5/thumbnails/57.jpg)
Q & A