Chapter 2 Network Models Copyright © The McGraw-Hill Companies, Inc. Permission required for...

54
Chapter 2 Network Models Copyright © The McGraw-Hill Companies, Inc. Permission required for reproduction or display.

Transcript of Chapter 2 Network Models Copyright © The McGraw-Hill Companies, Inc. Permission required for...

Page 1: Chapter 2 Network Models Copyright © The McGraw-Hill Companies, Inc. Permission required for reproduction or display.

Chapter 2

NetworkModels

Copyright © The McGraw-Hill Companies, Inc. Permission required for reproduction or display.

Page 2: Chapter 2 Network Models Copyright © The McGraw-Hill Companies, Inc. Permission required for reproduction or display.

Components of Communication Sender Receiver Message Transmission medium Protocol

Page 3: Chapter 2 Network Models Copyright © The McGraw-Hill Companies, Inc. Permission required for reproduction or display.

Effectiveness of Communication Delivery (confidentiality) Accuracy (integrity) Timeliness (availability)

Jitter – a subset of timeliness

2.3

Page 4: Chapter 2 Network Models Copyright © The McGraw-Hill Companies, Inc. Permission required for reproduction or display.

Data Flow

Simplex Half-Duplex Duplex

2.4

Page 5: Chapter 2 Network Models Copyright © The McGraw-Hill Companies, Inc. Permission required for reproduction or display.

Connection Types

Point-to-Point A circuit switch creates a point to point

connection. Multi-point

Many packet switched networks are multi-point

2.5

Page 6: Chapter 2 Network Models Copyright © The McGraw-Hill Companies, Inc. Permission required for reproduction or display.

Physical Topologies

Bus Ring Star Mesh Compound

2.6

Page 7: Chapter 2 Network Models Copyright © The McGraw-Hill Companies, Inc. Permission required for reproduction or display.

Physical Topology Links

Let n=# of nodes. The number of links is: Bus n-1 Ring n Star n-1 (includes the hub) Mesh n*(n-1)/2

2.7

Page 8: Chapter 2 Network Models Copyright © The McGraw-Hill Companies, Inc. Permission required for reproduction or display.

Network Types

LAN – nodes belonging to an address space that are part of a well defined domain.

WAN – When two or more LANs are linked together.

2.8

Page 9: Chapter 2 Network Models Copyright © The McGraw-Hill Companies, Inc. Permission required for reproduction or display.

Chapter 2: Outline

2.1 2.1 Protocol LayeringProtocol Layering

2.2 2.2 TCP/IP Protocol SuiteTCP/IP Protocol Suite

2.3 2.3 OSI ModelOSI Model

Page 10: Chapter 2 Network Models Copyright © The McGraw-Hill Companies, Inc. Permission required for reproduction or display.

2.10

2-1 PROTOCOL LAYERING2-1 PROTOCOL LAYERING

A protocol defines the rules that the sender, receiver and all intermediate devices must follow to communicate effectively.

Page 11: Chapter 2 Network Models Copyright © The McGraw-Hill Companies, Inc. Permission required for reproduction or display.

2.11

2.1.1 Scenarios2.1.1 Scenarios

Consider two scenarios.

Scenario 1: communication is so simple it occurs in one layer.

Scenario 2: communication takes place in three layers.

Page 12: Chapter 2 Network Models Copyright © The McGraw-Hill Companies, Inc. Permission required for reproduction or display.

2.12

2-1 PROTOCOL LAYERING2-1 PROTOCOL LAYERING

When communication is simple, one simple protocol may be enough;

When the communication is complex, layers are introduced, and each layer has its own protocol.

Page 13: Chapter 2 Network Models Copyright © The McGraw-Hill Companies, Inc. Permission required for reproduction or display.

2.13

Figure 2.1: A single-layer protocol

Page 14: Chapter 2 Network Models Copyright © The McGraw-Hill Companies, Inc. Permission required for reproduction or display.

2.14

Figure 2.2: A three-layer protocol

Postal carrier facility

Page 15: Chapter 2 Network Models Copyright © The McGraw-Hill Companies, Inc. Permission required for reproduction or display.

2.15

2.1.2 Principles of Protocol Layering2.1.2 Principles of Protocol Layering

Consider two principles of protocol layering.

Page 16: Chapter 2 Network Models Copyright © The McGraw-Hill Companies, Inc. Permission required for reproduction or display.

2.16

2.1.2 Principles of Protocol Layering2.1.2 Principles of Protocol Layering

Consider two principles of protocol layering.

1. For half-duplex or full duplex data flow, each layer must perform a forward operation and the corresponding inverse operation.

Page 17: Chapter 2 Network Models Copyright © The McGraw-Hill Companies, Inc. Permission required for reproduction or display.

2.17

2.1.2 Principles of Protocol Layering2.1.2 Principles of Protocol Layering

Consider two principles of protocol layering.

2. The two objects under each logically linked layer at both sites should be identical.

Page 18: Chapter 2 Network Models Copyright © The McGraw-Hill Companies, Inc. Permission required for reproduction or display.

2.18

2.1.2 Principles of Protocol Layering2.1.2 Principles of Protocol Layering

Consider two principles of protocol layering.

1. For half-duplex or full duplex data flow, each layer must perform a forward operation and the corresponding inverse operation.

2. The two objects under each logically linked layer at both sites should be identical.

Page 19: Chapter 2 Network Models Copyright © The McGraw-Hill Companies, Inc. Permission required for reproduction or display.

2.19

Figure 2.2: A three-layer protocol

Postal carrier facility

Page 20: Chapter 2 Network Models Copyright © The McGraw-Hill Companies, Inc. Permission required for reproduction or display.

2.20

2.1.3 Logical Connections2.1.3 Logical Connections

The principles of protocol layering lead to a logical connection between the layers at sending and receiving ends of the communication.

Page 21: Chapter 2 Network Models Copyright © The McGraw-Hill Companies, Inc. Permission required for reproduction or display.

2.21

Figure 2.3: Logical connection between peer layers

Page 22: Chapter 2 Network Models Copyright © The McGraw-Hill Companies, Inc. Permission required for reproduction or display.

2.22

2-2 TCP/IP PROTOCOL SUITE2-2 TCP/IP PROTOCOL SUITE

A protocol defines the rules that both the sender and receiver and all intermediate devices must follow to communicate effectively.

Page 23: Chapter 2 Network Models Copyright © The McGraw-Hill Companies, Inc. Permission required for reproduction or display.

2.23

2-2 TCP/IP PROTOCOL SUITE2-2 TCP/IP PROTOCOL SUITE

TCP/IP is a five layer protocol suite.

Page 24: Chapter 2 Network Models Copyright © The McGraw-Hill Companies, Inc. Permission required for reproduction or display.

2.24

2-2 TCP/IP PROTOCOL SUITE2-2 TCP/IP PROTOCOL SUITE

TCP/IP is a five layer protocol suite.•Application Layer

Page 25: Chapter 2 Network Models Copyright © The McGraw-Hill Companies, Inc. Permission required for reproduction or display.

2.25

2-2 TCP/IP PROTOCOL SUITE2-2 TCP/IP PROTOCOL SUITE

TCP/IP is a five layer protocol suite.•Application Layer•Transport Layer

Page 26: Chapter 2 Network Models Copyright © The McGraw-Hill Companies, Inc. Permission required for reproduction or display.

2.26

2-2 TCP/IP PROTOCOL SUITE2-2 TCP/IP PROTOCOL SUITE

TCP/IP is a five layer protocol suite.•Application Layer•Transport Layer•Network Layer

Page 27: Chapter 2 Network Models Copyright © The McGraw-Hill Companies, Inc. Permission required for reproduction or display.

2.27

2-2 TCP/IP PROTOCOL SUITE2-2 TCP/IP PROTOCOL SUITE

TCP/IP is a five layer protocol suite.•Application Layer•Transport Layer•Network Layer•Data Link Layer

Page 28: Chapter 2 Network Models Copyright © The McGraw-Hill Companies, Inc. Permission required for reproduction or display.

2.28

2-2 TCP/IP PROTOCOL SUITE2-2 TCP/IP PROTOCOL SUITE

TCP/IP is a five layer protocol suite.•Application Layer•Transport Layer•Network Layer•Data Link Layer•Physical Layer

Page 29: Chapter 2 Network Models Copyright © The McGraw-Hill Companies, Inc. Permission required for reproduction or display.

2.29

Figure 2.4: Layers in the TCP/IP protocol suite

Page 30: Chapter 2 Network Models Copyright © The McGraw-Hill Companies, Inc. Permission required for reproduction or display.

2.30

2.2.1 Layered Architecture2.2.1 Layered Architecture

TCP/IP protocol suite example:

Consider three LANs

Each LAN has a group of hosts connected to a switch (aka 2-level switch).

Each switch is connected to a router (aka 3-level switch)

Page 31: Chapter 2 Network Models Copyright © The McGraw-Hill Companies, Inc. Permission required for reproduction or display.

2.31

Figure 2.5: Communication through an internet

Page 32: Chapter 2 Network Models Copyright © The McGraw-Hill Companies, Inc. Permission required for reproduction or display.

2.32

2.2.2 Layers in the TCP/IP Protocol Suite2.2.2 Layers in the TCP/IP Protocol Suite

Draw a diagram with multiple nodes in each LANWhy is it called a 2-level switch?Why is a router is 3-level switch?

Page 33: Chapter 2 Network Models Copyright © The McGraw-Hill Companies, Inc. Permission required for reproduction or display.

2.33

Figure 2.6: Logical connections between layers in TCP/IP

Logical connections

Page 34: Chapter 2 Network Models Copyright © The McGraw-Hill Companies, Inc. Permission required for reproduction or display.

2.34

Network Data ObjectsNetwork Data Objects

Data objects:message

Page 35: Chapter 2 Network Models Copyright © The McGraw-Hill Companies, Inc. Permission required for reproduction or display.

2.35

Network Data ObjectsNetwork Data Objects

Data objects:messagesegment

Page 36: Chapter 2 Network Models Copyright © The McGraw-Hill Companies, Inc. Permission required for reproduction or display.

2.36

Network Data ObjectsNetwork Data Objects

Data objects:messagesegmentdatagram

Page 37: Chapter 2 Network Models Copyright © The McGraw-Hill Companies, Inc. Permission required for reproduction or display.

2.37

Network Data ObjectsNetwork Data Objects

Data objects:messagesegmentdatagramframe

Page 38: Chapter 2 Network Models Copyright © The McGraw-Hill Companies, Inc. Permission required for reproduction or display.

2.38

Network Data ObjectsNetwork Data Objects

Network data object taxonomy:messagesegmentdatagramframesignals representing bits

Page 39: Chapter 2 Network Models Copyright © The McGraw-Hill Companies, Inc. Permission required for reproduction or display.

2.39

Figure 2.7: Identical objects in the TCP/IP protocol suite

Identical objects (messages)

Identical objects (segment or user datagram)

Identical objects (datagram)

Identical objects (frame)

Identical objects (bits)

Identical objects (datagram)

Identical objects (frame)

Identical objects (bits)

Page 40: Chapter 2 Network Models Copyright © The McGraw-Hill Companies, Inc. Permission required for reproduction or display.

2.40

Network Data ObjectsNetwork Data Objects

Data Object Taxonomy:Application layer - messageTransport layer - segmentNetwork layer - datagramData link layer - framePhysical layer – signals representing bits

Page 41: Chapter 2 Network Models Copyright © The McGraw-Hill Companies, Inc. Permission required for reproduction or display.

2.41

2.2.3 The TCP/IP Layers2.2.3 The TCP/IP Layers

Descriptions of the TCP/IP layers will come later; next, we will follow a data object through the layers…

Page 42: Chapter 2 Network Models Copyright © The McGraw-Hill Companies, Inc. Permission required for reproduction or display.

2.42

2.2.4 Encapsulation and Decapsulation2.2.4 Encapsulation and Decapsulation

One of the important concepts in protocol layering in the Internet is encapsulation/ decapsulation.

Page 43: Chapter 2 Network Models Copyright © The McGraw-Hill Companies, Inc. Permission required for reproduction or display.

2.43

2.2.4 Encapsulation and Decapsulation2.2.4 Encapsulation and Decapsulation

As the object passes through each layer, an information header (and or trailer) is added to the object.

The information header is used to assist in any of these tasks: routing of the object, flow control, error detection, error correction, etc.

(see next slide)

Page 44: Chapter 2 Network Models Copyright © The McGraw-Hill Companies, Inc. Permission required for reproduction or display.

2.44

Figure 2.8: Encapsulation / Decapsulation

Page 45: Chapter 2 Network Models Copyright © The McGraw-Hill Companies, Inc. Permission required for reproduction or display.

Encapsulation payload

Each layer receives an object that is referred to as the payload, and then attaches a data header.

Payload can be relative to each layer, or absolute.

The absolute case refers to the original object message.

2.45

Page 46: Chapter 2 Network Models Copyright © The McGraw-Hill Companies, Inc. Permission required for reproduction or display.

Example Encapsulation

Q: What is the efficiency of the link in figure 2.8, between LANs if each header is 60 bytes and the message is 1000 bytes?

2.46

Page 47: Chapter 2 Network Models Copyright © The McGraw-Hill Companies, Inc. Permission required for reproduction or display.

Example Encapsulation

Q: What is the efficiency of the link in figure 2.8, between LANs if each header is 60 bytes and the message is 1000 bytes?

A: 84.7%

2.47

Page 48: Chapter 2 Network Models Copyright © The McGraw-Hill Companies, Inc. Permission required for reproduction or display.

Example Encapsulation

Q: How does the efficiency change if the message is only 100 bytes?

2.48

Page 49: Chapter 2 Network Models Copyright © The McGraw-Hill Companies, Inc. Permission required for reproduction or display.

Example Encapsulation

Q: How does the efficiency change if the message is only 100 bytes?

A: 35.7%

2.49

Page 50: Chapter 2 Network Models Copyright © The McGraw-Hill Companies, Inc. Permission required for reproduction or display.

2.50

Figure 2.9: Addressing in the TCP/IP protocol suite

Page 51: Chapter 2 Network Models Copyright © The McGraw-Hill Companies, Inc. Permission required for reproduction or display.

2.51

2-3 OSI MODEL2-3 OSI MODEL

A seven layer protocol model.It never really caught on due to the success of TCP/IP

Page 52: Chapter 2 Network Models Copyright © The McGraw-Hill Companies, Inc. Permission required for reproduction or display.

2.52

Figure 2.11: The OSI model

Page 53: Chapter 2 Network Models Copyright © The McGraw-Hill Companies, Inc. Permission required for reproduction or display.

2.53

Figure 2.12: TCP/IP and OSI model

Page 54: Chapter 2 Network Models Copyright © The McGraw-Hill Companies, Inc. Permission required for reproduction or display.

2.54

2.3.1 OSI versus TCP/IP2.3.1 OSI versus TCP/IP

When we compare the two models, we find that two layers, session and presentation, are missing from the TCP/IP protocol suite. These two layers were not added to the TCP/IP protocol suite after the publication of the OSI model. The application layer in the suite is usually considered to be the combination of three layers in the OSI model, as shown in Figure 2.12.