Sie sind auf Seite 1von 79

Agenda

 The Layered Model


 Layers 1 & 2: Physical &
Data Link Layers
 Layer 3: Network Layer
 Layers 4–7: Transport,
Session, Presentation,
and Application Layers

Section VII
The Layered Model
Layered Communication

Location A
I like
Message
rabbits

L: Dutch Information
Ik hou for the
Remote
van Translator
konijnen

Fax #:--- Information


L: Dutch for the
Ik hou Remote
van Secretary
konijnen
Source: Tanenbaum, 1996

Section VII
Layered Communication

Location A Location B
I like J’aime
Message
rabbits les lapins

L: Dutch Information L: Dutch


Ik hou for the Ik hou
Remote
van van
Translator
konijnen konijnen

Fax #:---
Fax #:--- Information L: Dutch
L: Dutch for the Ik hou
Ik hou Remote
van
van Secretary
konijnen
konijnen

Section VII
Layered Communication

Location A Location B
Layers
I like J’aime
rabbits
Message
3 les lapins

L: Dutch Information L: Dutch


for the
Ik hou
van
remote 2 Ik hou
van
translator
konijnen konijnen

Fax #:---
Fax #:--- Information L: Dutch
L: Dutch for the Ik hou
Ik hou remote
van secretary 1 van
konijnen
konijnen

Section VII
Why a Layered Network Model?

7 Application • Reduces complexity (one big


problem to seven smaller
6 Presentation
ones)
5 Session • Standardizes interfaces
4 Transport • Facilitates modular
engineering
3 Network
• Assures interoperable
2 Data Link technology
1 Physical • Accelerates evolution
• Simplifies teaching and
learning

Section VII
Devices Function at Layers

7 Application
6 Presentation
NIC Card
5 Session
4 Transport
3 Network
2 Data Link
1 Physical

Hub

Section VII
Host Layers

7
6
5
4
3
Application
Presentation
Session
Transport
Network
} Host layers: Provide
accurate data delivery
between computers

2 Data Link
1 Physical

Section VII
Media Layers

}
7 Application
6 Presentation Host layers: Provide
5 Session accurate data delivery
between computers
4 Transport
3 Network
2
1
Data Link
Physical
} Media layers: Control
physical delivery of messages
over the network

Section VII
Layer Functions

7 Application Provides network services to


application processes (such as
electronic mail, file transfer, and
terminal emulation)

Section VII
Layer Functions

7 Application Network services to applications

6 Presentation Data representation


• Ensures data is readable by
receiving system
• Format of data
• Data structures
• Negotiates data transfer
syntax for application layer

Section VII
Layer Functions

7 Application Network services to applications

6 Presentation Data representation

5 Session Inter-host communication


• Establishes, manages, and
terminates sessions between
applications

Section VII
Layer Functions

7 Application Network services to applications

6 Presentation Data representation

5 Session Inter-host communication

4 Transport End-to-end connection reliability


• Concerned with data transport
issues between hosts
• Data transport reliability
• Establishes, maintains, and
terminates virtual circuits
• Fault detection and recovery
• Information flow control

Section VII
Layer Functions

7 Application Network services to applications

6 Presentation Data representation

5 Session Inter-host communication

4 Transport End-to-end connection reliability

3 Network Addresses and best path


• Provides connectivity and path
selection between two end
systems
• Domain of routing

Section VII
Layer Functions
7 Application Network services to applications

6 Presentation Data representation

5 Session Inter-host communication

4 Transport End-to-end connection reliability

3 Network Addresses and best path

2 Data Link Access to media


• Provides reliable transfer of data
across media
• Physical addressing, network
topology, error notification, flow
control

Section VII
Layer Functions
7 Application Network services to applications

6 Presentation Data representation

5 Session Inter-host communication

4 Transport End-to-end connection reliability

3 Network Addresses and best path

2 Data Link Access to media

1 Physical Binary transmission


• Wires, connectors, voltages,
data rates
Section VII
Peer-to-Peer Communications

Host A Host B
7 Application Application
6 Presentation Presentation
5 Session Session
4 Transport Segments Transport
3 Network Packets Network
2 Data Link Frames Data Link
1 Physical Bits Physical

Section VII
Data Encapsulation
Host A Host B
Application Application

Presentation

Session

Transport
} { Data Presentation

Session

Transport

Network Network

Data Link Data Link

Physical Physical
Section VII
Data Encapsulation
Host A Host B
Application Application

Presentation

Session

Transport
} { Data

Network Data
Header
Presentation

Session

Transport

Network Network

Data Link Data Link

Physical Physical
Section VII
Data Encapsulation
Host A Host B
Application Application

Presentation

Session

Transport
} { Data

Network Data
Header
Presentation

Session

Transport

Network Network

Frame Network Data Frame


Data Link Data Link
Header Header Trailer

Physical Physical
Section VII
Data Encapsulation
Host A Host B
Application Application

Presentation

Session

Transport
} { Data

Network Data
Header
Presentation

Session

Transport

Network Network

Frame Network Data Frame


Data Link Data Link
Header Header Trailer

Physical Physical
0101101010110001
Section VII
Layers 1 & 2:
Physical & Data Link Layers
Physical and Logical Addressing

0000.0c12.3456

Section VII
MAC Address

24 bits 24 bits

Vendor Code Serial Number

0000.0c12. 3456
ROM
RAM

• MAC address is burned into ROM on a


network interface card
Section VII
Layer 3:
Network Layer
Network Layer: Path Determination

Which
Which Path?
Path?

• Layer 3 functions to find the best


path through the internetwork

Section VII
Network Layer: Communicate Path

5
2 9
6 8
4
10 11
1 3
7

 Addresses represent the path of media


connections
 Routing helps contain broadcasts
Section VII
Addressing—Network and Node

Network Node

1 1
2.1
2
3 1.2

2 1 1.3 1.1 3.1

3 1

• Network address—Path part used by the router


• Node address—Specific port or device on the network

Section VII
Protocol Addressing Variations

General Network Node


Example 1
1

Network Host
TCP/IP
Example 10. 8.2.48 (Mask 255.0.0.0)

Network Node
Novell IPX
Example 1aceb0b. 0000.0c00.6e25

Section VII
Network Layer
Protocol Operations
X Y
C
C

A
A

 Each router provides its services to support


upper layer functions

Section VII
Network Layer
Protocol Operations
X Y
C
C

A
A

B
B
Host X Host Y
Application Application
Presentation Presentation
Session Router A Router B Router C Session
Transport Transport
Network Network Network Network Network
Data Link Data Link Data Link Data Link Data Link
Physical Physical Physical Physical Physical

 Each router provides its services to


support upper layer functions Section VII
Multiprotocol Routing

Routing Tables
IPX 3a.0800.5678.12ab
Novell Apple
IP 15.16.50.3
IPX 4b.0800.0121.ab13 DEC IP Token
Ring

AppleTalk 100.110

VAX

DECnet 5.8 Token


Ring VAX

IP 15.16.42.8 DECnet 10.1

AppleTalk 200.167 IP 15.17.132.6

 Routers pass traffic from all routed protocols over the internetwork
Section VII
Routed Versus Routing Protocol

• Routed protocol
used between
routers to direct
user traffic

Examples: IP, IPX,


AppleTalk, DECnet Network Destination Exit Port
Protocol Network to Use
Protocol Name 1.0 1.1
2.0 2.1
3.0 3.1

Section VII
Routed Versus Routing Protocol

• Routed protocol
used between
routers to direct
user traffic

Examples: IP, IPX,


AppleTalk, DECnet

• Routing protocol
used only between
routers to maintain
routing tables
Examples: RIP, IGRP, OSPF

Section VII
Static Versus Dynamic Routes

Static Route
Uses a protocol route that a network
administrator enters into the router

Dynamic Route
Uses a route that a network protocol
adjusts automatically for topology or
traffic changes

Section VII
Static Route Example

Point-to-point or
A
A circuit-switched
connection

Only a single network


connection with no need B
B
for routing updates

“Stub” network
 Fixed route to address reflects
administrator’s knowledge
Section VII
Adapting to Topology Change

A
A B
B

D
D C
C

 Can an alternate route substitute


for a failed route?
Section VII
Adapting to Topology Change

A
A B
B

X
D
D C
C

Section VII
Adapting to Topology Change

A
A B
B

X
D
D C
C

 Can an alternate route substitute


for a failed route?
Yes—With dynamic routing enabled
Section VII
LAN-to-LAN Routing Example

Network 2
Host 4 Network 3
Host 5
Token
E1 Ring
Network 1 E0 To0

802.3 Net 2, Host 5

Routing Table
Destination Outgoing
Network Interface
1 E0
2 To0
3 E1

Section VII
LAN-to-LAN Routing

From LAN to LAN


Network 2
Host 4 Network 3
Host 5
Token
E1 Ring
Network 1 E0 To0

802.3 Net 2, Host 5 802.5 Net 2, Host 5

Routing Table
Destination Outgoing
Network Interface
1 E0
2 To0
3 E1

Section VII
LAN-to-WAN Routing

Data

1.3 2.4 Data


From
LAN 1.3
Token
Token Ring 1.3 2.4 Data
Ring

A
A
To
WAN Frame
Relay

B
B
2.4
To
LAN

Section VII
LAN-to-WAN Routing

Data

1.3 2.4 Data


From
LAN 1.3
Token
Token Ring 1.3 2.4 Data
Ring

1.3 2.4 Data


A
A
To
WAN Frame Frame Relay 1.3 2.4 Data
Relay

B
B
2.4
To
LAN

Section VII
LAN-to-WAN Routing

Data

1.3 2.4 Data


From
LAN 1.3
Token
Token Ring 1.3 2.4 Data
Ring

1.3 2.4 Data


A
A
To
WAN Frame Frame Relay 1.3 2.4 Data
Relay

1.3 2.4 Data


B
B
2.4 1.3 2.4 Data
To Ethernet
LAN
1.3 2.4 Data

Data Section VII


Layers 4–7:
Transport, Session, Presentation, and
Application Layers
Transport Layer

 Segments upper-layer applications


 Establishes an end-to-end connection
 Sends segments from one end host to another
 Optionally, ensures data reliability

Section VII
Transport Layer—
Segments Upper-Layer Applications

Application Electronic File Terminal

Presentation Mail Transfer Session

Session

Transport Application Application


Data Data
Port Port

Segments

Section VII
Transport Layer—
Establishes Connection

Sender Receiver
Synchronize
Negotiate Connection
Synchronize
Acknowledge

Connection Established
Data Transfer

(Send Segments)

Section VII
Transport Layer—
Sends Segments with Flow Control

Transmit

Sender Receiver

Buffer Full
Not Ready
Stop
Process
Segments

Go Ready
Buffer OK

Resume Transmission

Section VII
Transport Layer—
Reliability with Windowing

• Window Size = 1
Send 1 Receive 1
Ack 2
Sender Send 2 Receive 2 Receiver
Ack 3

• Window Size = 3
Send 1 Receive 1
Send 2 Receive 2
Sender
Send 3 Receive 3 Receiver
Ack 4
Send 4

Section VII
Transport Layer—
An Acknowledgement Technique

Sender Receiver

1 2 3 4 5 6 7 1 2 3 4 5 6 7
Send 1
Send 2
Send 3
Ack 4
Send 4
Send 5
Send 6
Ack 5
Send 5
Ack 7
Section VII
Transport to Network Layer

End-to-End Segments

Routed Packets

Section VII
Session Layer

• Network File System (NFS)


• Structured Query Language (SQL)
• Remote-Procedure Call (RPC)
• X Window System
• AppleTalk Session Protocol (ASP)
• DEC Session Control Protocol (SCP)

Service Request

Service Reply

 Coordinates applications as
they interact on different hosts
Section VII
Presentation Layer

• Text • Graphics
• Data • Visual images
ASCII PICT
login:
EBCDIC TIFF
Encrypted JPEG
• Sound GIF
MIDI
• Video
MPEG
QuickTime

 Provides code formatting and


conversion for applications
Section VII
Application Layer
COMPUTER
APPLICATIONS
NETWORK
Word Processor APPLICATIONS INTERNETWORK
Presentation Graphics Electronic Mail
APPLICATIONS
Spreadsheet File Transfer Electronic Data Interchange
Database Remote Access World Wide Web
Design/Manufacturing Client-Server Process E-Mail Gateways
Project Planning Information Location Special-Interest Bulletin Boards
Others Network Management Financial Transaction Services
Others Internet Navigation Utilities
Conferencing (Voice, Video, Data)
Others
 Internetwork applications
can extend beyond the
enterprise (i.e., to suppliers, etc.)
Section VII
Internet Backbone
The Internet: A Network of
Networks

Section VII
Internet Hierarchy
Boston

ISP ISP
POP POP
Backbone
NAP NAP

San Francisco
• Routers and circuits
• Multiple paths
• Adaptive routing
Section VII
The New Business Model

59
The Internet Is Changing the Way
Everyone Does Business

The Internet is driving


acceleration of
technology adoption.

Internet
 Compression of:
 Time
 Distance

 Business cycles

 Market turbulence
 Networked business Section VII
Forces Driving Change

Compressed Need to
Product Do “More
Lifestyle with Less”

Blurring of Blurring of
Geographical Industries
Boundaries
Section VII
Traditional Business Model Versus New
Business Model

Traditional New
Closely held Widely distributed among
knowledge base partners, suppliers

Limited access to Ubiquitous access to


information information by employees

Costly duplication Removal of redundancy


of effort through cost justification
and analysis
Limited hours to Global 24 x 7 access
conduct business
Section VII
Intranets
What Is an Intranet?

 An internal network based


on Internet and WWW
technology that delivers
immediate, up-to-date
information and services to
networked employees
 Platform independent
 Quick to implement
 Global reach

Section VII
Typical Intranet Applications

 Employee self-
service
 Distance learning

 Technical support

 Videoconferencing

Section VII
Extranets
What Is an Extranet?

 An extension of the
company network,
facilitating secure
collaborative
connections with:
 Key customers
 Suppliers
 Partners
Section VII
Typical Extranet Applications
 Supply-chain management
 Customer communications
 Distributor promotions
 Online continuing education/training
 Customer service
 Order status inquiry
 Inventory inquiry
 Account status inquiry
 Warranty registration
 Claims
 Online discussion forums
Section VII
Example: Supply Chain Management

Distributors/
Suppliers Manufacturers Wholesalers Retailers Consumers

• From my suppliers’ suppliers to


my customers’ customers
Section VII
Benefits of Extranets
 Provide access to specific company
information, and facilitate closer
working relationships
 Streamline day-to-day operations
with your partners and suppliers
 Reduce inventories and cycle times
 Improve channel performance
 Reduce costs
 Improve customer satisfaction

Section VII
E-Commerce
E-Commerce Market
Growing Rapidly 349
327

 97% of companies Business to Consumer


conducting Business to Business
e-commerce Total
have less than 123 131
499 employees
25 31
 71% of them have 0.5 0.6 1.1 6 8 22
less than 49 1996 1998 2000
employees! 2002

Source: Forrester Research


Section VII
Typical E-Commerce Applications

 Online catalog
 Order entry
 Configuration
 Pricing
 Order verification
 Credit authorization
 Invoicing
 Payment and receivables
 Inventory management

Section VII
Technology Implications of Internet
Applications
Applications Need Bandwidth

Kbps
Leased Line,
1544 Frame Relay, Video, Multimedia
XDSL
128
Simple Video, Voice
64 ISDN, FR

56K Web Browsing


New Modem
28.8
E-Mail, File Transfer
19.2
Old Modem Telnet
9.6
Minimum Bandwidth for Application per User
Section VII
Internet Security Solutions
Headquarters
Sales
Office Mainframe

Firewall ISDN
Gateway Campus
PSTN
Internet Backbone

Public
Web 3178454

Server
Token
 Firewalls Intranet Card
Servers AAA Server
 Network Address Translation (NAT)
 Encryption: IPSec, DES, 3DES
 Token cards
 AAA Section VII
Virtual Private Network
IP Packet
(Private, • Extends private network through public Internet
Encrypted) • Lower cost than private WAN
• Relies on tunneling and encryption
IP Header (Public)

Internet
Geneva

Frankfurt

Section VII
Electronic Data Interchange (EDI)

Internet

Boston
EDI Format Purchase
San Francisco Order (Encrypted)

Public IP Packet

 Trading partners send and receive documents


 Proprietary formats are converted into partner-agreed EDI standards
 Reduces time, cost, and errors
Section VII
The Library
 Cuckoo’s Egg -- Cliff Stoll (1989 - but still relevant)
 Digital Signatures – Fred Piper, Simon Blake-Wilson, John Mitchell
 E-Commerce Security – Anup K. Ghosh
 Firewalls & Internet Security – William Cheswick, Steven Bellovin
 Growing up Digital – The Rise of the Net Generation - Don Tapscott
--interesting book about the impact of the Internet on today’s youth
 Hacking Exposed (2nd ed), Kurtz, McClure, Scambray
 How the Internet Works – Preston Gralla
 Internet Security – The Complete Guide – Mark Merkow, James
Breithaupt
 Network Security Essentials – William Stallings
 Secrets & Lies – Digital Security in a Networked World – Bruce Schneier
 Web Design in a Nutshell – Jennifer Niederst -- good reference & back
ground on webpage design including use of HTML, XML, Java, etc.

Das könnte Ihnen auch gefallen