Beruflich Dokumente
Kultur Dokumente
Powerpoint Templates
ACKNOWLEDGMENTS
These lecture slides contain material from slides prepared
by Behrouz Forouzan for his book Data Communication
and Networking (4th edition).
Week 2: Course Plan
Protocol
◦ defines the rules that both the sender and receiver and all
intermediate devices need to follow to be able to
communicate effectively.
We need only one simple protocol when
communication is simple
Protocol layering: for complex communication,
we may need to divide the task between different
layers; and we need a protocol at each layer
Protocol layering scenarios
Scenario of simple communication (only one layer)
◦ Suppose A and B are office neighbors with common ideas
◦ Communication between them takes place in one layer (face to face)
in the same language
Both must follow a set of rules for this simple
communication to occur
◦ Greet each other when they meet
◦ know vocabulary at their friendship level
◦ Only one should speak at a time
◦ Conversation in the form of dialogue instead of monolog (between
teacher-student)
◦ Exchange of some nice words when they leave
Protocol layering scenarios
A bit complex scenario (many layers)
◦ Now suppose A moves to other branch of company but still
wants to communicate ideas with B
◦ They opt for regular mail service through post office for their
conversation without revealing their ideas in case their letters
are intercepted
◦ They agree in encryption/decryption technique
A encrypts the letter to make it unreadable by an intruder
(interceptor)
B decrypts to get the original letter
◦ Communication between A and B takes place in three layers
Tasks involved in sending a letter
Plain/text Plain/text
Encrypt/decrypt Encrypt/decrypt
Principles of Protocol Layering
Protocol layering allows us to divide a complex task into
several smaller and simpler tasks
A layer (module) is a black box with inputs and outputs
without concerns about the conversion of inputs to outputs
Protocol layering allows to separate the services from
implementation
A layer needs to be able to receive a set of services from
the lower layer and to give the services to the upper layer
◦ We do not care about how the layer is implemented
There are also intermediate systems other than end-
systems used by communication with respect to protocol
layering in the Internet
Principles of Protocol layering
First principle
For bidirectional communication: Each layer should be
able to perform two opposite tasks
◦ 3rd layer task is to listen (in one direction) and talk (in
other direction)
◦ 2nd layer encrypt (on one side) and decrypt (other side)
◦ 1st layer, send and receive email
Principles of Protocol layering
Second principle
Two objects under each layer at both sides should be
identical
Objects under layer 3 : plain text
Plain/text Plain/text
Logical connection
Encrypt/decrypt Encrypt/decrypt
Logical connection
Logical connection
Networks are complex with many pieces
◦ Hosts, routers, links, applications, protocols, hardware,
software
Can we organize it, somehow?
Let’s consider a Web page request:
◦ Browser requests Web page from server
◦ Server should determine if access is privileged
◦ Reliable transfer page from server to client
◦ Physical transfer of “bits” from server to client
Reasons to choose for a Layered Architecture
Change: When changes are made to one layer, the impact on the
other layers is minimized. If the model consists of a single, all-
encompassing layer, any change affects the entire model
07:01:02:01:2C:4B
Port Address:
There are many application running on the computer.
Each application run with a port no.(logically) on the
computer.
This port no. for application is decided by the Karnal
of the OS.
This port no. is called port address.
Example: Port Address
Figure shows two computers
communicating via the Internet.
The sending computer is
running three processes at this
time with port addresses a, b,
and c. The receiving computer
is running two processes at this
time with port addresses j and
k. Process a in the sending
computer needs to
communicate with process j in
the receiving computer. Note
that although physical
addresses change from hop to
hop, logical and port addresses
remain the same from the
source to destination.
Example: Port Address
753
Specific Address:
Some applications have user-friendly addresses that are designed for
that specific address.
Examples: e-mail address (for example, forouzan@fhda.edu) and the
Universal Resource Locator (URL) (for example, www.mhhe.com).
The first defines the recipient of an e-mail; the second is used to find
a document on the World Wide Web
These addresses, however, get changed to the corresponding port and
logical addresses by the sending computer