You are on page 1of 51

Data Communications and Computer Networks

Chapter 4 Network Protocols and Architecture

Outline:
Protocol Characteristics OSI reference model TCP/IP reference model

Communicating the Message


In theory, a single communication, such as a music video or an e-mail message, could be sent across a network from a source to a destination as one massive continuous stream of bits. Problem?? Solution - Data is sent across a network in small chunks called segments
Segmentation helps Interleaving/multiplexing messages (many conversation on one network) increase the reliability of network communications - If a particular path becomes congested with data traffic or fails, individual pieces of the message can still be directed to the 4 destination using alternate pathways.

Components of the Network


Network components hardware: Devices and media such as laptop, a PC, a switch, or the cabling used to connect the devices
software: run on the networked devices to deliver Services and do some processes Services include many of the common network applications Processes provide the functionality that directs and moves the messages through the network.

Cont..
End Devices and their Role in the Network End devices (host networking context) form interface with human network & communications network Role of end devices:
client server both client and server

software installed on the host determines which role it plays on the network.
6

Cont..
Servers are hosts that have software installed that enables them to provide information and services Clients are hosts that have software installed that enables them to request and display the information obtained from the server. Role of an intermediary device
provides connectivity and ensures data flows across network Network Access Devices (Hubs, switches, and wireless access points) Internetworking Devices (routers) Communication Servers and Modems Security Devices (firewalls)

The management of data as it flows through the network

Cont..
Processes running on the intermediary network devices perform these functions:
Regenerate and retransmit data signals Maintain information about what pathways exist through the network and internetwork Notify other devices of errors and communication failures Direct data along alternate pathways when there is a link failure Classify and direct messages according to QoS priorities Permit or deny the flow of data, based on security settings
8

Function of Protocol in Network Communication


The importance of protocols and how they are used to facilitate communication over data networks All communication, whether face-to-face or over a network, is governed by predetermined rules called protocols. A group of inter-related protocols that are necessary to perform a communication function is called a protocol suite. The protocols are viewed as a layered hierarchy, with each higher level services depending on the functionality defined by the protocols shown in the lower levels.

10

Standards and Protocols


A standard is - a process or protocol that has been endorsed by the networking industry and ratified by a standards organization - such as the Institute of Electrical and Electronics Engineers (IEEE) or the Internet Engineering Task Force (IETF). The use of standards in developing and implementing protocols ensures that products from different manufacturers can work together for efficient communications.
11

Why Standards?
Communication requires a common language Standards specify how things are done to the smallest detail Standardized things are easier to develop in the future

12

Protocols
One form of network standards A protocol
Is a language spoken between computers to exchange information Is a formal description of message formats and the rules that two computers must follow in order to exchange those messages.

Example: The HTTP protocol defines the format for communication between web browsers and web servers
13

14

15

16

Network models
Specify how networks are implemented One famous model is the Open Systems Interconnection (OSI) reference model Another famous model is TCP/IP model

17

Benefits of using a layered model


Benefits include assists in protocol design fosters competition changes in one layer do not affect other layers provides a common language

18

OSI model
Used to specify a networking framework for implementing protocols Facilitates communication between heterogeneous systems Implemented by almost most network systems

19

Explaining the OSI layer


Breaks network communication to small parts to make it manageable and easier to understand Consists of seven well defined layers Prevents changes in one layer from affecting others Proprietary - one or a small group of companies controls all usage of the technology OSI is proprietary, developed by International Organization for Standardization (ISO)
20

21

22

23

Physical
Concerned with transmission of data across media wires connectors voltages data rates

24

Data link
Concerned with physical addressing network topology error notification flow control reliable transfer of data across media

Divided into two sub layers: Logical Link Control (LLC) and Media Access Control (MAC)
25

Network
Concerned with network addressing best path determination

26

Transport
Concerned with transportation with hosts data transport reliability establish, maintain, terminate virtual circuits Fault detection, flow control, recovery information

27

Session
Concerned with establishing, managing and terminating sessions

28

Presentation
Concerned with format of data data structures data transfer syntax

29

Application
Concerned with providing network service to applications like Email File transfer Terminal emulation

30

31

Encapsulation
Data Packets or packets are information sent over a network. Encapsulation wraps data with the necessary protocol information before network transit. As the data packet moves down through the layers of the OSI model, it receives headers, trailers, and other information.

32

Encapsulation process
As data travels through the layers, the following procedures are carried out Build the data Package the data for end-to-end transport Add the network IP address to the header Add the data link layer header and trailer Convert to bits for transmission

33

Build the data


As a user sends an e-mail message, its alphanumeric characters are converted to data that can travel across the internetwork

34

Package the data for end-toend transport


The data is packaged for internetwork transport. By using segments, the transport function ensures that the message hosts at both ends of the e-mail system can reliably communicate.

35

Add the network IP address to the header


The data is put into a packet or datagram that contains a packet header with source and destination logical addresses Addresses help network devices send the packets across the network along a chosen path

36

Convert to bits for transmission


The frame must be converted into a pattern of 1s and 0s (bits) for transmission on the medium. A clocking function enables the devices to distinguish these bits as they travel across the medium. The medium on the physical internetwork can vary along the path used. Example: The e-mail message can originate on a LAN, cross a campus backbone, and go out a WAN link until it reaches its destination on 37 another remote LAN.

TCP/IP model
Developed by the U.S. Department of Defense Developed as an open standard anyone can use it for free
Has four layers Network access layer Internet layer Transport layer Application layer

38

Network access layer


Concerned with Logical addressing Transmission of data across media wires connectors voltages data rates

39

Internet layer
Concerned with network addressing best path determination

Transport layer
Concerned with -Reliability -Flow control -Error correction
40

Application layer
Concerned with Representation Encoding Dialogue control

41

OSI and TCP/IP - similarities


Both have layers Both assume packets are switched (called packet switched), i.e. that packets could take different paths to reach to the same destination. Circuit switched is a case in which all packets take the same path Both should be known by network professionals

42

OSI and TCP/IP - differences


TCP/IP combines session, presentation and application layers into a single layer TCP/IP combines physical and data link layer into a single layer TCP/IP is the standard in which the internet has grown

43

44

Categorizing protocols
Application protocols work in Application layer Presentation layer Session layer Transport protocols work in Transport layer Network protocols work in Network layer Data link layer Physical layer
45

Application layer protocols


Hypertext Transfer Protocol (HTTP) Used for exchanging files (text, graphic images, sound, video, and other multimedia files) on the World Wide Web. File Transfer Protocol (FTP) Used for transferring files from one computer to another Simple Mail Transfer (SMTP) Used for transferring e-mail across the Internet.
46

Application layer protocols (contd.)


Network File System (NFS) Used to transfer files from one computer to another Simple Network Management Protocol (SNMP) Used to manage a network

47

Transport layer protocols


Transmission Control Protocol (TCP) Enables two hosts to establish a connection and exchange streams of data. It guarantees delivery of data and also guarantees that individual units of data (called packets) will be delivered in the same order in which they were sent Net Bios Extended User Interface (NetBEUI) A communication protocol designed by IBM and often used by Microsoft
48

Network protocols
Internet Protocol (IP) Specifies the format of packets and the addressing scheme. Most networks combine IP with a Transport Control Protocol (TCP), which establishes a virtual connection between a destination and a source. IP by itself is something like the postal system. It allows you to address a package and drop it in the system, but theres no direct link between you and the recipient
49

Network protocols (contd.)


Ethernet The most common local area network (LAN) protocol X.25 Common wide area network (WAN) protocol

50

51

You might also like