The OSI Model and The TCP/IP Protocol Suite: Objectives
The OSI Model and The TCP/IP Protocol Suite: Objectives
The OSI Model and The TCP/IP Protocol Suite: Objectives
Figure 2.1
Figure 2.2
OSI layers
n-PDUs
n
entity
n
entity
Figure 2.3
n+1 entity
n-SDU n-SDU
n+1 entity
n-SAP
n-SDU H
n-SAP
n entity
H n-SDU n-PDU
n entity
Figure 2.4
(a)
Segmentation n-SDU
Reassembly n-SDU
n-PDU
(b)
n-PDU Blocking
n-PDU
n-PDU
n-PDU
n-PDU
n-SDU
n-SDU
n-PDU
n-PDU
Figure 2.5
Figure 2.3
10
Figure 2.4
Physical layer
11
Note: The physical layer is responsible for the movement of individual bits from one hop (node) to the next.
12
Physical characteristics of interfaces and media. The physical layer defines the characteristics of the interface between the devices and the transmission media. Representation of bits. The physical layer data consists of a stream of bits (sequence of 0s or 1s) with no interpretation. To be transmitted, bits must be encoded into signalselectrical or optical. The physical layer defines the type of encoding (how 0s and 1s are changed to signals, the voltage representation for 0 and 1). Data rate. The transmission ratethe number of bits sent each secondis also defined by the physical layer. In other words, the physical layer defines the duration of a bit, which is how long it lasts.
13
Line configuration. The physical layer is concerned with the connection of devices to the media. In a point-to-point configuration, two devices are connected together through a dedicated link. In a multipoint configuration, a link is shared between several devices. Physical topology. The physical topology defines how devices are connected to make a network. Devices can be connected using a mesh, star tree bus ring topologies. Transmission mode. The physical layer also defines the direction of transmission between two devices: simplex, half-duplex, or fullduplex.
14
Figure 2.5
15
Note: The data link layer is responsible for moving frames from one hop (node) to the next.
16
Framing. The data link layer divides the stream of bits received from the network layer into manageable data units called frames. Physical addressing. If frames are to be distributed to different systems on the network, the data link layer adds a header to the frame to define the sender and/or receiver of the frame. If the frame is intended for a system outside the senders network, the receiver address is the address of the connecting device that connects the network to the next one. Flow control. If the rate at which the data is absorbed by the receiver is less than the rate produced at the sender, the data link layer imposes a flow control mechanism to prevent overwhelming the receiver. Error control. The data link layer adds reliability to the physical layer by adding mechanisms to detect and retransmit damaged or lost frames. It also uses a mechanism to recognize duplicate frames. Error control is normally achieved through a trailer added to the end of the frame. Access control. When two or more devices are connected to the same link, data link layer protocols are necessary to determine which device has control over the link at any given time.
17
Figure 2.6
Hop-to-hop delivery
18
Figure 2.18
Physical addresses
19
Figure 2.7
Network layer
20
Note: The network layer is responsible for the delivery of individual packets from the source host to the destination host.
21
Logical addressing. The physical addressing implemented by the data link layer handles the addressing problem locally. If a packet passes the network boundary, we need another addressing system to help distinguish the source and destination systems. The network layer adds a header to the packet coming from the upper layer that, among other things, includes the logical addresses of the sender and receiver. Routing. When independent networks or links are connected together to create internetworks (network of networks) or a large network, the connecting devices (called routers or switches) route or switch the packets to their final destination
22
Figure 2.8
Source-to-destination delivery
23
Figure 2.19
IP addresses
24
Figure 2.9
Transport layer
25
Note: The transport layer is responsible for the delivery of a message from one process to another.
26
Figure 2.10
27
Service-point addressing. Computers often run several programs at the same time. For this reason, source-to-destination delivery means delivery not only from one computer to the next but also from a specific process (running program) on one computer to a specific process (running program) on the other. The transport layer header must therefore include a type of address called a service-point address (or port address). The network layer gets each packet to the correct computer; the transport layer gets the entire message to the correct process on that computer. Segmentation and reassembly. A message is divided into transmittable segments, with each segment containing a sequence number. These numbers enable the transport layer to reassemble the message correctly upon arriving at the destination and to identify and replace packets that were lost in transmission.
28
Connection control. The transport layer can be either connectionless or connection oriented. A connectionless transport layer treats each segment as an independent packet and delivers it to the transport layer at the destination machine. A connection oriented transport layer makes a connection with the transport layer at the destination machine first before delivering the packets. After all the data are transferred, the connection is terminated. Flow control. Like the data link layer, the transport layer is responsible for flow control. However, flow control at this layer is performed end to end rather than across a single link. Error control. Like the data link layer, the transport layer is responsible for error control. The sending transport layer makes sure that the entire message arrives at the receiving transport layer without error (damage, loss, or duplication). Error correction is usually achieved through retransmission
29
30
Note:
The session layer is the network dialog controller. It establishes, maintains, and synchronizes the interaction between communicating systems.
31
Dialog control. The session layer allows two systems to enter into a dialog. It allows the communication between two processes to take place in either half-duplex (one way at a time) or full-duplex (two ways at a time) mode. Synchronization. The session layer allows a process to add checkpoints (synchronization points) into a stream of data. For example, if a system is sending a file of 2,000 pages, it is advisable to insert checkpoints after every 100 pages to ensure that each 100-page unit is received and acknowledged independently. In this case, if a crash happens during the transmission of page 523, the only pages that need to be resent after system recovery are pages 501 to 523. Pages previous to 501 need not be resent.
32
Figure 2.12
Presentation layer
33
Note:
The presentation layer is concerned with the syntax and semantics of the information exchanged between two systems.
34
Translation. The processes (running programs) in two systems are usually exchanging information in the form of character strings, numbers, and so on. The information should be changed to bit streams before being transmitted. Because different computers use different encoding systems, the presentation layer is responsible for interoperability between these different encoding methods. The presentation layer at the sender changes the information from its sender-dependent format into a common format. The presentation layer at the receiving machine changes the common format into its receiverdependent format. Encryption. To carry sensitive information a system must be able to assure privacy. Encryption means that the sender transforms the original information to another form and sends the resulting message out over the network. Decryption reverses the original process to transform the message back to its original form. Compression. Data compression reduces the number of bits contained in the information. Data compression becomes particularly important in the transmission of multimedia such as text, audio, and video.
35
Figure 2.13
Application layer
36
Note:
The application layer provides the interfaces and services to access the network
37
Network virtual terminal. A network virtual terminal is a software version of a physical terminal and allows a user to log on to a remote host. File transfer, access, and management (FTAM). This application allows a user to access files in a remote host (to make changes or read data), to retrieve files from a remote computer for use in the local computer, and to manage or control files in a remote computer locally. E-mail services. This application provides the basis for e-mail forwarding and storage. Directory services. This application provides distributed database sources and access for global information about various objects and services.
38
Figure 2.14
Summary of layers
39
40
Figure 2.15
41
2.4 Addressing
Three different levels of addresses are used in an internet using the TCP/IP protocols: physical (link) address, logical (IP) address, and port address. The topics discussed in this section include:
42
Figure 2.16
Addresses in TCP/IP
43
Figure 2.17
44
Example 1
In Figure 2.18 a node with physical address 10 sends a frame to a node with physical address 87. The two nodes are connected by a link. At the data link level this frame contains physical (link) addresses in the header. These are the only addresses needed. The rest of the header contains other information needed at this level. The trailer usually contains extra bits needed for error detection. See Next Slide
TCP/IP Protocol Suite
45
Figure 2.18
Physical addresses
46
Example 2
As we will see in Chapter 3, most local area networks use a 48-bit (6 bytes) physical address written as 12 hexadecimal digits, with every 2 bytes separated by a colon as shown below:
07:01:02:01:2C:4B
A 6-byte (12 hexadecimal digits) physical address.
47
Example 3
In Figure 2.19 we want to send data from a node with network address A and physical address 10, located on one LAN, to a node with a network address P and physical address 95, located on another LAN. Because the two devices are located on different networks, we cannot use link addresses only; the link addresses have only local jurisdiction. What we need here are universal addresses that can pass through the LAN boundaries. The network (logical) addresses have this characteristic.
48
Example 3 (Continued)
The packet at the network layer contains the logical addresses, which remain the same from the original source to the final destination (A and P, respectively, in the figure). They will not change when we go from network to network. However, the physical addresses will change as the packet moves from one network to another. The boxes labeled routers are internetworking devices, which we will discuss in Chapter 3.
49
Figure 2.19
IP addresses
50
Example 4
As we will see in Chapter 4, an Internet address (in IPv4) is 32 bits in length, normally written as four decimal numbers, with each number representing 1 byte. The numbers are separated by a dot. Below is an example of such an address. 132.24.75.9 An internet address in IPv4 in decimal numbers
51
Example 5
Figure 2.20 shows an example of transport layer communication. Data coming from the upperlayers have port addresses j and k ( j is the address of the sending process, and k is the address of the receiving process). Since the data size is larger than the network layer can handle, the data are split into two packets, each packet retaining the service-point addresses ( j and k). Then in the network layer, network addresses (A and P) are added to each packet. See Next Slide
TCP/IP Protocol Suite
52
Example 5 (Continued)
The packets can travel on different paths and arrive at the destination either in order or out of order. The two packets are delivered to the destination transport layer, which is responsible for removing the network layer headers and combining the two pieces of data for delivery to the upper layers.
53
Figure 2.20
Port addresses
54
Example 6
As we will see in Chapters 11, 12, and 13, a port address is a 16-bit address represented by one decimal number as shown below.
55
2.5 IP Versions
IP became the official protocol for the Internet in 1983. As the Internet has evolved, so has IP. There have been six versions since its inception. We look at the latter three versions here. The topics discussed in this section include:
56