Beruflich Dokumente
Kultur Dokumente
De facto.
Standards that have not been approved by an
organized body but have been adopted as
standards through widespread use are
de facto standards.
De jure.
De jure standards are those that have been legislated by an officially
rec ognized body.
OSI REFERENCE MODEL
• An open system is a set of protocols that
allows any two different systems to
communicate regardless of their underlying
architecture.
• The purpose of the OSI model is to show how
to facilitate communication between different
systems without requiring changes to the logic
of the underlying hardware and software.
Physical Layer
The physical layer is responsible for moving individual bits from
one(node) to the next.
•Physical characteristics of interfaces and media.
The physical layer defines the characteristics of the interface between the devices
and the transmission media.
❑Representation of bits.
The physical layer data consists of a stream of bits bits must be encoded into
signals—electrical or optical.
❑Data rate.
The number of bits sent each
❑Synchronization of bits.
The sender and receiver must not only use the same bit rate but must also be
synchronized at the bit level..
❑Line configuration.
The physical layer is concerned with the connection of devices to the media. In a
point-to-point configuration,two devices are connected together through a
dedicated
Physical topology.
The physical topology defines how devices are connected to make a
network. Devices can be connected using a mesh topology
(every device connected to every other device), a star topology
(devices are connected through a central device), a ring topology
(each device is connected to the next, forming a ring), or a bus topology
(every device on a common link).
Transmission mode.
The physical layer also defines the direction of transmission
between two devices: simplex, half-duplex, or full-duplex.
The data link layer transforms the physical layer, a raw transmission
facility, to a reliable link.
Framing.
The data link layer divides the stream of bits received from the network
layer into manageable data units called
frames
❑Physical addressing.
If frames are to be distributed to different systems on the network, the data
link layer adds a header to the frame to define the sender and/or
receiver of the frame.
Flow control.
If the rate at which the data is absorbed by the receiver is less than
the rate produced at the sender, the data link layer imposes a flow control mechanism
to prevent overwhelming the receiver.
❑Error control.
The data link layer adds reliability to the physical layer by adding mechanisms to
detect and retransmit damaged or lost frames. It also uses a mecha-
nism to recognize duplicate frames. Error control is normally achieved through a
trailer added to the end of the frame.
❑Access control.
When two or more devices are connected to the same link, data
link layer protocols are necessary to determine which ddevice has control over the
link at any given time.
Network Layer
The network layer is responsible for the source-to-destination delivery of a
packet,possibly across multiple networks (links).
logical addressing
The network layer adds a header to the packet coming from the upper
layer that, among other things, includes the logical addresses of the sender
and receiver.
Routing.
When independent networks or links are connected together to create
internetworks(network of networks) or a large network, the connecting
devices(called routers or switches) route or switch the packets to their
final destination.
Transport Layer
The transport layer is responsible for process-to-process delivery
of the entire message. A process is an application program running on the host.
Connection control.
The transport layer can be either connectionless or connection-oriented.
Flow control.
Like the data link layer, the transport layer is responsible for flow
control. However, flow control at this layer is performed end to end rather
than across a single link.
❑Error control.
Like the data link layer, the transport layer is responsible for error
control.
Session Layer
The services provided by the first four layers (physical, data link, network and
transport) are not sufficient for some processes. The session layer is the network
dialog controller.It establishes, maintains, and synchronizes the interaction
between communicating systems.
Dialog control.
The session layer allows two systems to enter into a dialog. It
allows the communication between two processes to take place in either half-
duplex (one way at a time) or full-duplex (two ways at a time) mode.
synchronization.
The session layer allows a process to add checkpoints (synchronization points)
into a stream of data.
Presentation Layer
The presentation layer is concerned with the syntax and semantics of the
informationexchanged between two systems.
❑Translation.
The presentation layer at the receiving machine changes the com-
mon format into its receiver-dependent format.
Encryption.
Encryption means that the sender transforms the original information to
another form and sends the resulting message out over the network.
Decryption reverses the original process to transform the message back to its
original form.
Compression.
Data compression reduces the number of bits contained in the
information.
Application Layer
The application layer enables the user, whether human or software, to access
the network.
Directory services.
This application provides distributed database sources and
access for global information about various objects and services.
TCP/IP PROTOCOL SUITE
Transport Layer
The transport layer provides the end-to-end data transfer by delivering data
from an application to its remote peer. Multiple applications can be supported
simultaneously. The most-used transport layer protocol is the Transmission
Control Protocol (TCP), which provides connection-oriented reliable data
delivery, duplicate data suppression, congestion control, and flow control.
Another transport layer protocol is the User Datagram Protocol It provides
connectionless, unreliable, best-effort service. As a result, applications using
UDP as the transport protocol have to provide their own end-to-end integrity,
flow control, and congestion control, if desired. Usually, UDP is used by
applications that need a fast transport mechanism and can tolerate the loss of
some data.
Internetwork Layer
The internetwork layer, also called the internet layer or the network layer,
provides the “virtual network” image of an internet this layer shields the
higherlevels from the physical network architecture below it. Internet Protocol
(IP) is the most important protocol in this layer. It is a connectionless
protocol that does not assume reliability from lower layers. IP does not provide
reliability, flow control, or error recovery.
These functions must be provided at a higher level. IP provides a routing
function that attempts to deliver transmitted messages to their destination. A
message unit in an IP network is called an IP datagram.
This is the basic unit of information transmitted across TCP/IP networks. Other
internetwork-layer protocols are IP, ICMP, IGMP, ARP, and RARP.
132.24.75.9
NOTE
753
A 16-bit port address represented as one single number.
Port address
Application Specific address
• User friendly address designed for specific
application
• Egs(email address,Url)
Introduction to internetworking
1)connection oriented
1) connection establishment
2)data transfer
3) connection termination
2)connectionless
1)data transfer
IP Addresses:
Classful Addressing
• IP address is used to identify each device which
is connected to internet
Note:
An IP address is a 32-bit address.
The IP addresses are unique and
universal
Address space
=128 blocks,
= =16777216 address
Blocks in class B
16,384 blocks:65,536 address in each blocks
Net id:128.0 Net id:128.1 Net id:191.255
224.0.0.0……..239.255.255.255
problems
Masking concept
32 bit number
Gives the network address
Default masks
Header(20-60)bytes
datagram
data
Internet protocol
• 1)unreliable
• 2)connectionless
• 3)each datagram is handled independently
• 4)datagram can take different route to
destination
• 5)datagram sent by the same source to same
destination could arrive out of order.
Ip datagram
• Packets in ip layer are called datagrams.
• A datagram is a variable length packet
consisting of two parts header and data
IP datagram
Version :4 bit field defines the version of the IP protocol
two versions 4 and 6
Time to live field:A datagram has limited life time in its travel through an
internet.This field was originally designed to hold a time stamp which was
decremented by each visited router This datagram was discarded when the
value became zero.
When a source host sends the datagram it stores a number in this field
.This value is approximately two times the maximum number of routes
between any two hosts
ICMP encapsulation
Types of messages
Code0:n/w unreachable
Code:1 host unreachable
Code 2:protocol unreachable
Code 3:port unreachable
Code 4:fragmentation required,but DF field of the datagram
has been set
Code 5:source routing cannot be accomplished
Code 6:dest network unknown
Code 7:dest host unknown
Code 8:the source host is isolated
Code 9:communication with destination prohibited
Code 10:communication with dest host prohibited
Source-quench format
Note:
A parameter-
problem message
can be created by a
router or the
destination host.
Redirection message format
Redirection concept
Note:
• 2.A router acts only on those packets in which the physical destination
address matches the address of the interface at which the packet arrives.
• 3.A router changes the physical address of the packet (both source and
destination) when it forwards the packet.