Data communication part1
-
Upload
melvin-cabatuan -
Category
Engineering
-
view
284 -
download
0
Transcript of Data communication part1
DATCOMMIntroduction to Data
and Computer Networks
Engr. Melvin K. Cabatuan, MsE
De La Salle University
January 2013
Objectives
- Identify the scope and significance of DataComputer Networking in today’s world
- Define and illustrate Data Communicationsand Data Network.
- Describe the Network Components and itsArchitecture.
- Illustrate and explain the Internet.- Explain the various Network CommunicationModels
Notes
Notes
Objectives
- Identify the scope and significance of DataComputer Networking in today’s world
- Define and illustrate Data Communicationsand Data Network.
- Describe the Network Components and itsArchitecture.
- Illustrate and explain the Internet.- Explain the various Network CommunicationModels
Objectives
- Identify the scope and significance of DataComputer Networking in today’s world
- Define and illustrate Data Communicationsand Data Network.
- Describe the Network Components and itsArchitecture.
- Illustrate and explain the Internet.- Explain the various Network CommunicationModels
Notes
Notes
Objectives
- Identify the scope and significance of DataComputer Networking in today’s world
- Define and illustrate Data Communicationsand Data Network.
- Describe the Network Components and itsArchitecture.
- Illustrate and explain the Internet.
- Explain the various Network CommunicationModels
Objectives
- Identify the scope and significance of DataComputer Networking in today’s world
- Define and illustrate Data Communicationsand Data Network.
- Describe the Network Components and itsArchitecture.
- Illustrate and explain the Internet.- Explain the various Network CommunicationModels
Notes
Notes
Why Study Networks?- Networks support and improve our lives byproviding instantaneous local or globalcommunications.
Why Study Networks?- Networks improve teaching and learningthrough sharing and collaboration.
Notes
Notes
Why Study Networks?
- Networks change the way we work.
Why Study Networks?- Networks supports the way we play.
Notes
Notes
Data Communications
- are the transfer of data from one device toanother via some form of transmission medium.
Data Communications- are the transfer of data from one device toanother via some form of transmission medium.
Notes
Notes
Data Communications
- The five components that make up a datacommunications system are the message,sender, receiver, medium, and protocol.
Possible Quiz QuestionA set of rules that govern data communications. Itrepresents an agreement between thecommunicating devices. Without it, two devicesmay be connected but not communicating.
A. MessageB. SenderC. ReceiverD. MediumE. Protocol
Notes
Notes
Possible Quiz QuestionA set of rules that govern data communications. Itrepresents an agreement between thecommunicating devices. Without it, two devicesmay be connected but not communicating.
A. MessageB. SenderC. ReceiverD. MediumE. Protocol X
Possible Quiz Question
It is a fundamental characteristics of a datacommunication system which refers to thevariation in the packet arrival time.
A. JitterB. AccuracyC. TimelinessD. DeliveryE. All of the above
Notes
Notes
Possible Quiz Question
It is a fundamental characteristics of a datacommunication system which refers to thevariation in the packet arrival time.
A. Jitter X
B. AccuracyC. TimelinessD. DeliveryE. All of the above
�Remember- Delivery.The system must deliver data to the correctdestination.
- Accuracy.The system must deliver the data accurately.
- Timeliness.The system must deliver data in a timelymanner.
- Jitter.Jitter refers to the variation in the packetarrival time.
Notes
Notes
�Remember- Delivery.The system must deliver data to the correctdestination.
- Accuracy.The system must deliver the data accurately.
- Timeliness.The system must deliver data in a timelymanner.
- Jitter.Jitter refers to the variation in the packetarrival time.
�Remember- Delivery.The system must deliver data to the correctdestination.
- Accuracy.The system must deliver the data accurately.
- Timeliness.The system must deliver data in a timelymanner.
- Jitter.Jitter refers to the variation in the packetarrival time.
Notes
Notes
�Remember- Delivery.The system must deliver data to the correctdestination.
- Accuracy.The system must deliver the data accurately.
- Timeliness.The system must deliver data in a timelymanner.
- Jitter.Jitter refers to the variation in the packetarrival time.
What is a Network?Notes
Notes
What is a Network?- A set of communication devices (nodes)connected by media links capable of carryingdifferent types of communications.
�Remember
- DevicesThese are used to communicate with oneanother.
- MediumThis is how the devices are connected together.
- MessagesInformation that travels over the medium.
- Rules / ProtocolGoverns how messages flow across network.
Notes
Notes
�Remember
- DevicesThese are used to communicate with oneanother.
- MediumThis is how the devices are connected together.
- MessagesInformation that travels over the medium.
- Rules / ProtocolGoverns how messages flow across network.
�Remember
- DevicesThese are used to communicate with oneanother.
- MediumThis is how the devices are connected together.
- MessagesInformation that travels over the medium.
- Rules / ProtocolGoverns how messages flow across network.
Notes
Notes
�Remember
- DevicesThese are used to communicate with oneanother.
- MediumThis is how the devices are connected together.
- MessagesInformation that travels over the medium.
- Rules / ProtocolGoverns how messages flow across network.
Computer NetworkNotes
Notes
Computer Network- A network of "computers".
Why Network Computers?
- To increase productivity by linking computersand computer networks allowing users to shareresources and data. Ex.
- Data and applications- Resources, i.e. I/O devices like cameras &printers
- Network Storage- Backup devices
Notes
Notes
Why Network Computers?
- To increase productivity by linking computersand computer networks allowing users to shareresources and data. Ex.
- Data and applications- Resources, i.e. I/O devices like cameras &printers
- Network Storage- Backup devices
Why Network Computers?
- To increase productivity by linking computersand computer networks allowing users to shareresources and data. Ex.
- Data and applications
- Resources, i.e. I/O devices like cameras &printers
- Network Storage- Backup devices
Notes
Notes
Why Network Computers?
- To increase productivity by linking computersand computer networks allowing users to shareresources and data. Ex.
- Data and applications- Resources, i.e. I/O devices like cameras &printers
- Network Storage- Backup devices
Why Network Computers?
- To increase productivity by linking computersand computer networks allowing users to shareresources and data. Ex.
- Data and applications- Resources, i.e. I/O devices like cameras &printers
- Network Storage
- Backup devices
Notes
Notes
Why Network Computers?
- To increase productivity by linking computersand computer networks allowing users to shareresources and data. Ex.
- Data and applications- Resources, i.e. I/O devices like cameras &printers
- Network Storage- Backup devices
Why Network Computers?- Reduced Cost and Easier Installation ofSoftware.
- Ex. Network installation
Notes
Notes
Why Network Computers?
- Improved Security
- Improved Communications- More Workplace Flexibility- Reduced Cost of Peripherals- Centralized Administration
Why Network Computers?
- Improved Security- Improved Communications
- More Workplace Flexibility- Reduced Cost of Peripherals- Centralized Administration
Notes
Notes
Why Network Computers?
- Improved Security- Improved Communications- More Workplace Flexibility
- Reduced Cost of Peripherals- Centralized Administration
Why Network Computers?
- Improved Security- Improved Communications- More Workplace Flexibility- Reduced Cost of Peripherals
- Centralized Administration
Notes
Notes
Why Network Computers?
- Improved Security- Improved Communications- More Workplace Flexibility- Reduced Cost of Peripherals- Centralized Administration
Network Requirements?
- At least two computers
- A resource that needs to be shared- A transmission medium- A communications agreement
Notes
Notes
Network Requirements?
- At least two computers- A resource that needs to be shared
- A transmission medium- A communications agreement
Network Requirements?
- At least two computers- A resource that needs to be shared- A transmission medium
- A communications agreement
Notes
Notes
Network Requirements?
- At least two computers- A resource that needs to be shared- A transmission medium- A communications agreement
Network CategoryBy type of MEDIA
- Wired and Wireless
Notes
Notes
Network Media- this is the channel over which a message travels
Network CategoryBy COVERAGE
Notes
Notes
Local Area NetworkLAN
- Can be as small as two computers.- Laboratory w/ networked computers.- A network within a building or severalbuildings.
- Speed at 10, 100, or 1000 Mbps
Local Area NetworkLAN
- Can be as small as two computers.
- Laboratory w/ networked computers.- A network within a building or severalbuildings.
- Speed at 10, 100, or 1000 Mbps
Notes
Notes
Local Area NetworkLAN
- Can be as small as two computers.- Laboratory w/ networked computers.
- A network within a building or severalbuildings.
- Speed at 10, 100, or 1000 Mbps
Local Area NetworkLAN
- Can be as small as two computers.- Laboratory w/ networked computers.- A network within a building or severalbuildings.
- Speed at 10, 100, or 1000 Mbps
Notes
Notes
Local Area NetworkLAN
- Can be as small as two computers.- Laboratory w/ networked computers.- A network within a building or severalbuildings.
- Speed at 10, 100, or 1000 Mbps
Metropolitan Area NetworkMAN
- covers the area inside a town or a city.- Ex. Cable TV network
Notes
Notes
Metropolitan Area NetworkMAN
- covers the area inside a town or a city.
- Ex. Cable TV network
Metropolitan Area NetworkMAN
- covers the area inside a town or a city.- Ex. Cable TV network
Notes
Notes
Wide Area NetworkWAN
- provides long-distance transmission of data,image, audio, and video information over largegeographic areas that may comprise a country,a continent, or even the whole world.
Wide Area NetworkWAN
- provides long-distance transmission of data,image, audio, and video information over largegeographic areas that may comprise a country,a continent, or even the whole world.
Notes
Notes
Interconnection of Networks:Internetwork
- Today, it is very rare to see a LAN, a MAN inisolation; they are connected to one another.
- When two or more networks are connected,they become an internetwork, or internet.
Interconnection of Networks:Internetwork
- Today, it is very rare to see a LAN, a MAN inisolation; they are connected to one another.
- When two or more networks are connected,they become an internetwork, or internet.
Notes
Notes
Interconnection of Networks:Internetwork
- Today, it is very rare to see a LAN, a MAN inisolation; they are connected to one another.
- When two or more networks are connected,they become an internetwork, or internet.
Example
- Assume that an organization has two offices,one in Manila and the other in Cebu. Theestablished office on Manila has a bus topologyLAN; the newly opened office on Cebu has astar topology LAN. The president of thecompany lives somewhere in the middle andneeds to have control over the company fromher home in Boracay.
Notes
Notes
Example- To create a backbone WAN for connectingthese three entities (two LANs and thepresident’s computer), a switched WAN(operated by a service provider such as atelecom company) has been leased. To connectthe LANs to this switched WAN, however,three point-to-point WANs are required. Thesepoint-to-point WANs can be a high-speed DSLline offered by a telephone company or a cablemodern line offered by a cable TV provider.
IllustrationFour WANs + two LANs
Notes
Notes
Virtual Private NetworkVPN
- It enables a host computer to send and receivedata across shared or public networks as if itwere a private network with all thefunctionality
Virtual Private NetworkVPN
- It enables a host computer to send and receivedata across shared or public networks as if itwere a private network with all thefunctionality
Notes
Notes
Other Networks- Campus Area Network, Corporate AreaNetwork (CAN)essentially a local area network.
- Personal Area Network (PAN)A network, typically of devices centered aroundthe user
- Wireless PAN (WPAN)a typical implementation of a PAN
- Sensor NetworksA specialized network of devices typically usedfor monitoring
Other Networks- Campus Area Network, Corporate AreaNetwork (CAN)essentially a local area network.
- Personal Area Network (PAN)A network, typically of devices centered aroundthe user
- Wireless PAN (WPAN)a typical implementation of a PAN
- Sensor NetworksA specialized network of devices typically usedfor monitoring
Notes
Notes
Other Networks- Campus Area Network, Corporate AreaNetwork (CAN)essentially a local area network.
- Personal Area Network (PAN)A network, typically of devices centered aroundthe user
- Wireless PAN (WPAN)a typical implementation of a PAN
- Sensor NetworksA specialized network of devices typically usedfor monitoring
Other Networks- Campus Area Network, Corporate AreaNetwork (CAN)essentially a local area network.
- Personal Area Network (PAN)A network, typically of devices centered aroundthe user
- Wireless PAN (WPAN)a typical implementation of a PAN
- Sensor NetworksA specialized network of devices typically usedfor monitoring
Notes
Notes
Network Topology
Network TopologyFour Basic Topologies
Notes
Notes
Mesh Topology- Every device has a dedicated point-to-pointlink to every other device.
Possible Quiz Question
- How many duplex-mode links do we have on amesh network with n nodes?
Notes
Notes
Mesh TopologyAdvantages
- Dedicated links guarantees that eachconnection can carry its own data load, thuseliminating the traffic problems.
- A mesh topology is robust.- The advantage of privacy or security.- Point-to-point links make fault identificationand fault isolation easy.
Mesh TopologyAdvantages
- Dedicated links guarantees that eachconnection can carry its own data load, thuseliminating the traffic problems.
- A mesh topology is robust.
- The advantage of privacy or security.- Point-to-point links make fault identificationand fault isolation easy.
Notes
Notes
Mesh TopologyAdvantages
- Dedicated links guarantees that eachconnection can carry its own data load, thuseliminating the traffic problems.
- A mesh topology is robust.- The advantage of privacy or security.
- Point-to-point links make fault identificationand fault isolation easy.
Mesh TopologyAdvantages
- Dedicated links guarantees that eachconnection can carry its own data load, thuseliminating the traffic problems.
- A mesh topology is robust.- The advantage of privacy or security.- Point-to-point links make fault identificationand fault isolation easy.
Notes
Notes
Mesh TopologyDisadvantages
- Installation and reconnection are difficultbecause every device must be connected toevery other device.
- Bulk of the wiring can be greater than theavailable space (in walls, ceilings, or floors) canaccommodate.
- Hardware required to connect each link (I/Oports and cable) can be prohibitively expensive.
Mesh TopologyDisadvantages
- Installation and reconnection are difficultbecause every device must be connected toevery other device.
- Bulk of the wiring can be greater than theavailable space (in walls, ceilings, or floors) canaccommodate.
- Hardware required to connect each link (I/Oports and cable) can be prohibitively expensive.
Notes
Notes
Mesh TopologyDisadvantages
- Installation and reconnection are difficultbecause every device must be connected toevery other device.
- Bulk of the wiring can be greater than theavailable space (in walls, ceilings, or floors) canaccommodate.
- Hardware required to connect each link (I/Oports and cable) can be prohibitively expensive.
Star Topology
- Each device has a dedicated point-to-point linkonly to a central controller, usually called ahub.
Notes
Notes
Star TopologyAdvantages
- Less expensive than a mesh topology.
- Easy to install and reconfigure.- Easy fault identification and fault isolation.- Relatively robust because if one link fails, onlythat link is affected.
Star TopologyAdvantages
- Less expensive than a mesh topology.- Easy to install and reconfigure.
- Easy fault identification and fault isolation.- Relatively robust because if one link fails, onlythat link is affected.
Notes
Notes
Star TopologyAdvantages
- Less expensive than a mesh topology.- Easy to install and reconfigure.- Easy fault identification and fault isolation.
- Relatively robust because if one link fails, onlythat link is affected.
Star TopologyAdvantages
- Less expensive than a mesh topology.- Easy to install and reconfigure.- Easy fault identification and fault isolation.- Relatively robust because if one link fails, onlythat link is affected.
Notes
Notes
Star TopologyDisadvantages
- Dependency of the whole topology on onesingle point, the hub. If the hub goes down, thewhole system is dead.
- Often more cabling is required in a star than insome other topologies (such as ring or bus).
Star TopologyDisadvantages
- Dependency of the whole topology on onesingle point, the hub. If the hub goes down, thewhole system is dead.
- Often more cabling is required in a star than insome other topologies (such as ring or bus).
Notes
Notes
Bus Topology
- One long cable acts as a backbone to link allthe devices in a network.
- Drop line is a connection running between thedevice and the main cable.
Bus TopologyAdvantages
- Ease of installation.
- Uses less cabling than mesh or star topologies,hence less expensive.
Notes
Notes
Bus TopologyAdvantages
- Ease of installation.- Uses less cabling than mesh or star topologies,hence less expensive.
Bus TopologyDisadvantages
- Difficult reconnection and fault isolation.
- Difficult to add new devices.- Signal reflection at the taps can causedegradation in quality.
- A fault or break in the bus cable stops alltransmission.
Notes
Notes
Bus TopologyDisadvantages
- Difficult reconnection and fault isolation.- Difficult to add new devices.
- Signal reflection at the taps can causedegradation in quality.
- A fault or break in the bus cable stops alltransmission.
Bus TopologyDisadvantages
- Difficult reconnection and fault isolation.- Difficult to add new devices.- Signal reflection at the taps can causedegradation in quality.
- A fault or break in the bus cable stops alltransmission.
Notes
Notes
Bus TopologyDisadvantages
- Difficult reconnection and fault isolation.- Difficult to add new devices.- Signal reflection at the taps can causedegradation in quality.
- A fault or break in the bus cable stops alltransmission.
Ring Topology- Each device has a dedicated point-to-pointconnection with only the two devices on eitherside of it.
- When a device receives a signal intended foranother device, its repeater regenerates the bitsand passes them along.
Notes
Notes
Ring TopologyAdvantages
- Easy to install and reconfigure.
- Fault isolation is simplified. Generally in a ring,a signal is circulating at all times. If one devicedoes not receive a signal within a specifiedperiod, it can issue an alarm.
Ring TopologyAdvantages
- Easy to install and reconfigure.- Fault isolation is simplified. Generally in a ring,a signal is circulating at all times. If one devicedoes not receive a signal within a specifiedperiod, it can issue an alarm.
Notes
Notes
Ring TopologyDisadvantages
- Unidirectional traffic can be a disadvantage. Ina simple ring, a break in the ring (such as adisabled station) can disable the entirenetwork.
- Today, the need for higher-speed LANs hasmade this topology less popular.
Ring TopologyDisadvantages
- Unidirectional traffic can be a disadvantage. Ina simple ring, a break in the ring (such as adisabled station) can disable the entirenetwork.
- Today, the need for higher-speed LANs hasmade this topology less popular.
Notes
Notes
Network ArchitectureAccording to Security Relationships
- Peer-to-peer Network (P2P).
- Client-server Network.
Network ArchitectureAccording to Security Relationships
- Peer-to-peer Network (P2P).- Client-server Network.
Notes
Notes
Peer-to-peer Network (P2P)Workgroup
- shared data is distributed on each computers.
Peer-to-peer Network (P2P)Workgroup
Notes
Notes
Peer-to-peer Network (P2P)Pros and Cons
- Advantages◦ Low cost◦ Easy to set up◦ No server required
- Disadvantages◦ No centralized control of security◦ Administrative burden of maintainingaccounts on all computers ◦ Not scalable
Peer-to-peer Network (P2P)Pros and Cons
- Advantages◦ Low cost◦ Easy to set up◦ No server required
- Disadvantages◦ No centralized control of security◦ Administrative burden of maintainingaccounts on all computers ◦ Not scalable
Notes
Notes
Client-server Network
- shared data is centralized on a device called afile server.
Client-server NetworkNotes
Notes
Client-server NetworkPros and Cons
- Advantages◦ Centralized administration◦ Single sign-on◦ Reduced broadcast traffic◦ Scalability
- Disadvantages◦ Higher cost◦ More challenging technically◦ Single point of failure with a single file server
Client-server NetworkPros and Cons
- Advantages◦ Centralized administration◦ Single sign-on◦ Reduced broadcast traffic◦ Scalability
- Disadvantages◦ Higher cost◦ More challenging technically◦ Single point of failure with a single file server
Notes
Notes
Network Transmission Modes
- Unicast (One-to-one).a single source host is sending information to asingle destination host
- Broadcast (One-to-many).a single host is sending information to all otherhosts on the network
- Multicast (One-to-some).a single host is sending a transmission to some,but not all hosts
Network Transmission Modes
- Unicast (One-to-one).a single source host is sending information to asingle destination host
- Broadcast (One-to-many).a single host is sending information to all otherhosts on the network
- Multicast (One-to-some).a single host is sending a transmission to some,but not all hosts
Notes
Notes
Network Transmission Modes
- Unicast (One-to-one).a single source host is sending information to asingle destination host
- Broadcast (One-to-many).a single host is sending information to all otherhosts on the network
- Multicast (One-to-some).a single host is sending a transmission to some,but not all hosts
Transmission ModesIllustration
Notes
Notes
Network Representations
Heirarchical TopologyCisco hierarchical model
- Core layer ==> backbone- Distribution layer ==> routing- Access layer ==> switching
Notes
Notes
Heirarchical TopologyCisco hierarchical model
- Core layer ==> backbone
- Distribution layer ==> routing- Access layer ==> switching
Heirarchical TopologyCisco hierarchical model
- Core layer ==> backbone- Distribution layer ==> routing
- Access layer ==> switching
Notes
Notes
Heirarchical TopologyCisco hierarchical model
- Core layer ==> backbone- Distribution layer ==> routing- Access layer ==> switching
Cisco hierarchical modelCore layer (Backbone)
- Literally the core of the network.- Switch large amounts of traffic both reliablyand quickly.
- If there is a failure in the core, every single usercan be affected.
Notes
Notes
Cisco hierarchical modelCore layer (Backbone)
- Literally the core of the network.
- Switch large amounts of traffic both reliablyand quickly.
- If there is a failure in the core, every single usercan be affected.
Cisco hierarchical modelCore layer (Backbone)
- Literally the core of the network.- Switch large amounts of traffic both reliablyand quickly.
- If there is a failure in the core, every single usercan be affected.
Notes
Notes
Cisco hierarchical modelCore layer (Backbone)
- Literally the core of the network.- Switch large amounts of traffic both reliablyand quickly.
- If there is a failure in the core, every single usercan be affected.
Cisco hierarchical modelDistribution layer (Routing)
- sometimes referred to as the workgroup layer.- provides routing, filtering, and WAN accessand to determine how packets can access thecore, if needed.
- Place to implement security and policies for thenetwork including address translation andfirewalls.
Notes
Notes
Cisco hierarchical modelDistribution layer (Routing)
- sometimes referred to as the workgroup layer.
- provides routing, filtering, and WAN accessand to determine how packets can access thecore, if needed.
- Place to implement security and policies for thenetwork including address translation andfirewalls.
Cisco hierarchical modelDistribution layer (Routing)
- sometimes referred to as the workgroup layer.- provides routing, filtering, and WAN accessand to determine how packets can access thecore, if needed.
- Place to implement security and policies for thenetwork including address translation andfirewalls.
Notes
Notes
Cisco hierarchical modelDistribution layer (Routing)
- sometimes referred to as the workgroup layer.- provides routing, filtering, and WAN accessand to determine how packets can access thecore, if needed.
- Place to implement security and policies for thenetwork including address translation andfirewalls.
Cisco hierarchical modelAccess layer (Switching)
- sometimes referred to as the desktop layer.- controls user and workgroup access tointernetwork resources.
- segmentation
Notes
Notes
Cisco hierarchical modelAccess layer (Switching)
- sometimes referred to as the desktop layer.
- controls user and workgroup access tointernetwork resources.
- segmentation
Cisco hierarchical modelAccess layer (Switching)
- sometimes referred to as the desktop layer.- controls user and workgroup access tointernetwork resources.
- segmentation
Notes
Notes
Cisco hierarchical modelAccess layer (Switching)
- sometimes referred to as the desktop layer.- controls user and workgroup access tointernetwork resources.
- segmentation
Structure of the Internet
- Hierarchical- Common standards- Common protocols
Notes
Notes
Structure of the Internet- Hierarchical
- Common standards- Common protocols
Structure of the Internet- Hierarchical- Common standards
- Common protocols
Notes
Notes
Structure of the Internet- Hierarchical- Common standards- Common protocols
Access NetworksConnects end hosts to the network core
RESIDENTIAL ACCESS:
- Dial-up modem via Public Switched TelephoneNetwork
- DSL- Cable Broadband- Wireless Broadband (Wimax, etc.)- FTTH
ACCESS WITHIN ENTERPRISE LAN’s:
- Ethernet/IEEE 802.3 and Wifi
Notes
Notes
Access NetworksConnects end hosts to the network core
RESIDENTIAL ACCESS:
- Dial-up modem via Public Switched TelephoneNetwork
- DSL- Cable Broadband- Wireless Broadband (Wimax, etc.)- FTTH
ACCESS WITHIN ENTERPRISE LAN’s:
- Ethernet/IEEE 802.3 and Wifi
Access NetworksConnects end hosts to the network core
RESIDENTIAL ACCESS:
- Dial-up modem via Public Switched TelephoneNetwork
- DSL
- Cable Broadband- Wireless Broadband (Wimax, etc.)- FTTH
ACCESS WITHIN ENTERPRISE LAN’s:
- Ethernet/IEEE 802.3 and Wifi
Notes
Notes
Access NetworksConnects end hosts to the network core
RESIDENTIAL ACCESS:
- Dial-up modem via Public Switched TelephoneNetwork
- DSL- Cable Broadband
- Wireless Broadband (Wimax, etc.)- FTTH
ACCESS WITHIN ENTERPRISE LAN’s:
- Ethernet/IEEE 802.3 and Wifi
Access NetworksConnects end hosts to the network core
RESIDENTIAL ACCESS:
- Dial-up modem via Public Switched TelephoneNetwork
- DSL- Cable Broadband- Wireless Broadband (Wimax, etc.)
- FTTHACCESS WITHIN ENTERPRISE LAN’s:
- Ethernet/IEEE 802.3 and Wifi
Notes
Notes
Access NetworksConnects end hosts to the network core
RESIDENTIAL ACCESS:
- Dial-up modem via Public Switched TelephoneNetwork
- DSL- Cable Broadband- Wireless Broadband (Wimax, etc.)- FTTH
ACCESS WITHIN ENTERPRISE LAN’s:
- Ethernet/IEEE 802.3 and Wifi
Access NetworksConnects end hosts to the network core
RESIDENTIAL ACCESS:
- Dial-up modem via Public Switched TelephoneNetwork
- DSL- Cable Broadband- Wireless Broadband (Wimax, etc.)- FTTH
ACCESS WITHIN ENTERPRISE LAN’s:
- Ethernet/IEEE 802.3 and Wifi
Notes
Notes
WAN Technologies
- Links the components of the Internetwork core.- Includes:X.25Frame RelayISDN, BISDNATMSONET/SDH
WAN Technologies
- Links the components of the Internetwork core.
- Includes:X.25Frame RelayISDN, BISDNATMSONET/SDH
Notes
Notes
WAN Technologies
- Links the components of the Internetwork core.- Includes:X.25Frame RelayISDN, BISDNATMSONET/SDH
Packet SwitchingThe Internet and other computer networks usepacket switching
- A persistent path for signals/data (circuit) isnot necessary for duration of communications.
- Data is broken down into chunks (packets) andeach piece is sent through the network.
- Each packet may take various paths throughthe network.
- Packets may arrive out of sequence.
Notes
Notes
Packet SwitchingThe Internet and other computer networks usepacket switching
- A persistent path for signals/data (circuit) isnot necessary for duration of communications.
- Data is broken down into chunks (packets) andeach piece is sent through the network.
- Each packet may take various paths throughthe network.
- Packets may arrive out of sequence.
Packet SwitchingThe Internet and other computer networks usepacket switching
- A persistent path for signals/data (circuit) isnot necessary for duration of communications.
- Data is broken down into chunks (packets) andeach piece is sent through the network.
- Each packet may take various paths throughthe network.
- Packets may arrive out of sequence.
Notes
Notes
Packet SwitchingThe Internet and other computer networks usepacket switching
- A persistent path for signals/data (circuit) isnot necessary for duration of communications.
- Data is broken down into chunks (packets) andeach piece is sent through the network.
- Each packet may take various paths throughthe network.
- Packets may arrive out of sequence.
Packet SwitchingThe Internet and other computer networks usepacket switching
- A persistent path for signals/data (circuit) isnot necessary for duration of communications.
- Data is broken down into chunks (packets) andeach piece is sent through the network.
- Each packet may take various paths throughthe network.
- Packets may arrive out of sequence.
Notes
Notes
Packet Switching
�Remember- X.25 (64-kbps)A virtual-circuit switching network withextensive flow and error control.
- Frame Relay (1.544 - 44.376 Mbps)uses variable-length packets, called frames;strips out most of the overhead involved witherror control.
- Asynchronous transfer mode (ATM)uses fixed-length packets, called cells.(10s, 100s of Mbps, and Gbps range)
Notes
Notes
�Remember- X.25 (64-kbps)A virtual-circuit switching network withextensive flow and error control.
- Frame Relay (1.544 - 44.376 Mbps)uses variable-length packets, called frames;strips out most of the overhead involved witherror control.
- Asynchronous transfer mode (ATM)uses fixed-length packets, called cells.(10s, 100s of Mbps, and Gbps range)
�Remember- X.25 (64-kbps)A virtual-circuit switching network withextensive flow and error control.
- Frame Relay (1.544 - 44.376 Mbps)uses variable-length packets, called frames;strips out most of the overhead involved witherror control.
- Asynchronous transfer mode (ATM)uses fixed-length packets, called cells.(10s, 100s of Mbps, and Gbps range)
Notes
Notes
Quality of ServiceQoS
- treat different traffic flows differently.
Quality of ServiceQoS
- treat different traffic flows differently.
Notes
Notes
Quality of ServiceQoS
- ensure quality of service for applications that require it.
Quality of ServiceQoS
- ensure quality of service for applications that require it.
Notes
Notes
Quality of ServiceQoS
- appropriate QoS strategy for a given type of traffic.
Quality of ServiceQoS
- appropriate QoS strategy for a given type of traffic.
Notes
Notes
ProtocolsRules
- shared conventions for communicatinginformation.
- defines WHAT is communicated, HOW it iscommunicated, and WHEN it is communicated.
- Protocols specifySyntax: Data format, and Signal levelsSemantics: Meaning of each bit section; Flowcontrol, Error handlingTiming: Speed match, and Sequencing
ProtocolsRules
- shared conventions for communicatinginformation.
- defines WHAT is communicated, HOW it iscommunicated, and WHEN it is communicated.
- Protocols specifySyntax: Data format, and Signal levelsSemantics: Meaning of each bit section; Flowcontrol, Error handlingTiming: Speed match, and Sequencing
Notes
Notes
ProtocolsRules
- shared conventions for communicatinginformation.
- defines WHAT is communicated, HOW it iscommunicated, and WHEN it is communicated.
- Protocols specifySyntax: Data format, and Signal levelsSemantics: Meaning of each bit section; Flowcontrol, Error handlingTiming: Speed match, and Sequencing
ProtocolsRules
- shared conventions for communicatinginformation.
- defines WHAT is communicated, HOW it iscommunicated, and WHEN it is communicated.
- Protocols specifySyntax: Data format, and Signal levelsSemantics: Meaning of each bit section; Flowcontrol, Error handlingTiming: Speed match, and Sequencing
Notes
Notes
ProtocolsIllustration
Protocol Architecture
- specifies how a protocol is organized andimplemented.
- layered structure of hardware and software thatsupports the exchange of data between systemsand supports distributed applications, such asemail and file transfer.
- at each layer of a protocol architecture, one ormore common protocols are implemented incommunicating systems.
Notes
Notes
Protocol Architecture
- specifies how a protocol is organized andimplemented.
- layered structure of hardware and software thatsupports the exchange of data between systemsand supports distributed applications, such asemail and file transfer.
- at each layer of a protocol architecture, one ormore common protocols are implemented incommunicating systems.
Protocol Architecture
- specifies how a protocol is organized andimplemented.
- layered structure of hardware and software thatsupports the exchange of data between systemsand supports distributed applications, such asemail and file transfer.
- at each layer of a protocol architecture, one ormore common protocols are implemented incommunicating systems.
Notes
Notes
Protocol Architecture
- specifies how a protocol is organized andimplemented.
- layered structure of hardware and software thatsupports the exchange of data between systemsand supports distributed applications, such asemail and file transfer.
- at each layer of a protocol architecture, one ormore common protocols are implemented incommunicating systems.
Protocol Architecture- Two approaches1. Monolithic (single module)2. Modular (layered)
- Advantages of Modular Approach1. Breaks complex tasks into subtasks.2. Changes in one layer do not affect otherlayers.
Notes
Notes
Protocol Architecture- Two approaches1. Monolithic (single module)2. Modular (layered)
- Advantages of Modular Approach1. Breaks complex tasks into subtasks.2. Changes in one layer do not affect otherlayers.
Layered ModelIllustration
Notes
Notes
Layered Protocol Architecture
- Each layers acts as a module.
- Communication occurs1. between different modules on the samesystem2. between similar modules on different systems
Layered Protocol Architecture
- Each layers acts as a module.- Communication occurs1. between different modules on the samesystem2. between similar modules on different systems
Notes
Notes
Layered ArchitectureExample
- Open Systems Interconnection model (OSI).
OSI Reference Model
- layered framework developed by InternationalOrganization for Standardization (ISO) for thedesign of network systems that allowscommunication between all types of computersystems.
- consists of seven separate but related layers,each of which defines a part of the process ofmoving information across a network.
- not a protocol; it is a reference model.
Notes
Notes
OSI Reference Model
- layered framework developed by InternationalOrganization for Standardization (ISO) for thedesign of network systems that allowscommunication between all types of computersystems.
- consists of seven separate but related layers,each of which defines a part of the process ofmoving information across a network.
- not a protocol; it is a reference model.
OSI Reference Model
- layered framework developed by InternationalOrganization for Standardization (ISO) for thedesign of network systems that allowscommunication between all types of computersystems.
- consists of seven separate but related layers,each of which defines a part of the process ofmoving information across a network.
- not a protocol; it is a reference model.
Notes
Notes
OSI Reference Model
OSI Reference ModelHost-to-host link
Notes
Notes
OSI Model Layers
- Layers 1, 2, and 3 - physical, data link, andnetwork - are the network support layers
- they deal with the physical aspects of movingdata from one device to another (such aselectrical specifications, physical connections,physical addressing, and transport timing andreliability)
OSI Model Layers
- Layers 1, 2, and 3 - physical, data link, andnetwork - are the network support layers
- they deal with the physical aspects of movingdata from one device to another (such aselectrical specifications, physical connections,physical addressing, and transport timing andreliability)
Notes
Notes
OSI Model Layers
- Layers 5, 6, and 7 - session, presentation, andapplication - can be thought of as the usersupport layers;they allow interoperability among unrelatedsoftware systems.
- Layer 4, the transport layer, links the twosubgroups and ensures that what the lowerlayers have transmitted is in a form that theupper layers can use.
OSI Model Layers
- Layers 5, 6, and 7 - session, presentation, andapplication - can be thought of as the usersupport layers;they allow interoperability among unrelatedsoftware systems.
- Layer 4, the transport layer, links the twosubgroups and ensures that what the lowerlayers have transmitted is in a form that theupper layers can use.
Notes
Notes
Physical Layer (PHY)
- is responsible for movements of individual bitsfrom one hop (node) to the next.
Physical Layer (PHY)
- coordinates the functions required to carry abit stream over a physical medium.
- deals with the mechanical and electricalspecifications of the interface and transmissionmedium.
- defines the procedures and functions thatphysical devices and interfaces have to performfor transmission to occur
Notes
Notes
Physical Layer (PHY)
- coordinates the functions required to carry abit stream over a physical medium.
- deals with the mechanical and electricalspecifications of the interface and transmissionmedium.
- defines the procedures and functions thatphysical devices and interfaces have to performfor transmission to occur
Physical Layer (PHY)
- coordinates the functions required to carry abit stream over a physical medium.
- deals with the mechanical and electricalspecifications of the interface and transmissionmedium.
- defines the procedures and functions thatphysical devices and interfaces have to performfor transmission to occur
Notes
Notes
Physical Layer Concerns
- Physical characteristics of interfaces andmedium.
- Representation of bits.- Data rate.- Synchronization of bits.- Physical topology.- Line configuration.- Transmission mode.
Physical Layer Concerns
- Physical characteristics of interfaces andmedium.
- Representation of bits.
- Data rate.- Synchronization of bits.- Physical topology.- Line configuration.- Transmission mode.
Notes
Notes
Physical Layer Concerns
- Physical characteristics of interfaces andmedium.
- Representation of bits.- Data rate.
- Synchronization of bits.- Physical topology.- Line configuration.- Transmission mode.
Physical Layer Concerns
- Physical characteristics of interfaces andmedium.
- Representation of bits.- Data rate.- Synchronization of bits.
- Physical topology.- Line configuration.- Transmission mode.
Notes
Notes
Physical Layer Concerns
- Physical characteristics of interfaces andmedium.
- Representation of bits.- Data rate.- Synchronization of bits.- Physical topology.
- Line configuration.- Transmission mode.
Physical Layer Concerns
- Physical characteristics of interfaces andmedium.
- Representation of bits.- Data rate.- Synchronization of bits.- Physical topology.- Line configuration.
- Transmission mode.
Notes
Notes
Physical Layer Concerns
- Physical characteristics of interfaces andmedium.
- Representation of bits.- Data rate.- Synchronization of bits.- Physical topology.- Line configuration.- Transmission mode.
�RememberLine Configurationconnection of devices to the media.
- Point-to-point configurationtwo devices are connected through a dedicatedlink.
- Multipoint configurationa link is shared among several devices
Notes
Notes
�RememberLine Configurationconnection of devices to the media.
- Point-to-point configurationtwo devices are connected through a dedicatedlink.
- Multipoint configurationa link is shared among several devices
�RememberTransmission modedirection of transmission between two devices.
- Simplex modeonly one device can send; the other can onlyreceive.
- Half-duplex modetwo devices can send and receive, but not atthe same time.
- Full-duplex modetwo devices can send and receive at the sametime.
Notes
Notes
�RememberTransmission modedirection of transmission between two devices.
- Simplex modeonly one device can send; the other can onlyreceive.
- Half-duplex modetwo devices can send and receive, but not atthe same time.
- Full-duplex modetwo devices can send and receive at the sametime.
�RememberTransmission modedirection of transmission between two devices.
- Simplex modeonly one device can send; the other can onlyreceive.
- Half-duplex modetwo devices can send and receive, but not atthe same time.
- Full-duplex modetwo devices can send and receive at the sametime.
Notes
Notes
Transmission modeData flow(simplex, half-duplex, and full-duplex)
Data Link Layer (DLL)or simply Link Layer
- is responsible for moving frames from one hop(node) to the next.
Notes
Notes
Data Link Layer (DLL)
- transforms the physical layer, a rawtransmission facility, to a reliable link.
- makes the physical layer appear error-free tothe upper layer (network layer).
Data Link Layer (DLL)
- transforms the physical layer, a rawtransmission facility, to a reliable link.
- makes the physical layer appear error-free tothe upper layer (network layer).
Notes
Notes
Data Link Layer Concerns- Framingdivides the stream of bits received from thenetwork layer into manageable data unitscalled frames
- Physical addressingadds a header to the frame to define the senderand/or receiver of the frame. If the frame isintended for a system outside the sender’snetwork, the receiver address is the address ofthe device that connects the network to thenext one.
Data Link Layer Concerns- Framingdivides the stream of bits received from thenetwork layer into manageable data unitscalled frames
- Physical addressingadds a header to the frame to define the senderand/or receiver of the frame. If the frame isintended for a system outside the sender’snetwork, the receiver address is the address ofthe device that connects the network to thenext one.
Notes
Notes
Data Link Layer (DLL)Hop-to-hop delivery
- communication at the data link layer occursbetween two adjacent nodes
Data Link Layer Concerns- Flow controlimposes a flow control mechanism to avoidoverwhelming the receiver.
- Error controlAdds reliability to the physical layer by addingmechanisms to detect and retransmit damagedor lost frames.
- Access controlin multipoint configuration, link layer protocolsare necessary to determine which device hascontrol over the link at any given time.
Notes
Notes
Data Link Layer Concerns- Flow controlimposes a flow control mechanism to avoidoverwhelming the receiver.
- Error controlAdds reliability to the physical layer by addingmechanisms to detect and retransmit damagedor lost frames.
- Access controlin multipoint configuration, link layer protocolsare necessary to determine which device hascontrol over the link at any given time.
Data Link Layer Concerns- Flow controlimposes a flow control mechanism to avoidoverwhelming the receiver.
- Error controlAdds reliability to the physical layer by addingmechanisms to detect and retransmit damagedor lost frames.
- Access controlin multipoint configuration, link layer protocolsare necessary to determine which device hascontrol over the link at any given time.
Notes
Notes
Data Link Layer Example
- Ethernet (802.3) and Media Access Control(MAC) address applied to the network adaptorby the manufacturer during production.
Network Layer
- is responsible for the delivery of individual packetsfrom the source host to the destination host.
Notes
Notes
Network Layer
- ensures that each packet gets from its point oforigin to its final destination.
- If two systems are connected to the same link,there is usually no need for a network layer.
- If the two systems are attached to differentnetworks with connecting devices between thenetworks, there is often a need for the networklayer to accomplish source-to-destinationdelivery.
Network Layer
- ensures that each packet gets from its point oforigin to its final destination.
- If two systems are connected to the same link,there is usually no need for a network layer.
- If the two systems are attached to differentnetworks with connecting devices between thenetworks, there is often a need for the networklayer to accomplish source-to-destinationdelivery.
Notes
Notes
Network Layer
- ensures that each packet gets from its point oforigin to its final destination.
- If two systems are connected to the same link,there is usually no need for a network layer.
- If the two systems are attached to differentnetworks with connecting devices between thenetworks, there is often a need for the networklayer to accomplish source-to-destinationdelivery.
Network Layer Concerns
- Logical addressingif a packet passes the network boundary, weneed another addressing system to helpdistinguish the source and destination systems.
- Routingprovides mechanism to route or set the path ofthe packets to their final destination
Notes
Notes
Network Layer Concerns
- Logical addressingif a packet passes the network boundary, weneed another addressing system to helpdistinguish the source and destination systems.
- Routingprovides mechanism to route or set the path ofthe packets to their final destination
Network LayerNotes
Notes
Transport Layer- is responsible for process-to-process delivery ofthe entire message.
- a process is an application program running ona host.
Transport Layer- is responsible for process-to-process delivery ofthe entire message.
- a process is an application program running ona host.
Notes
Notes
Transport Layer
- ensures that the whole message arrives intactand in order.
�Understand- The network layer gets each packet to thecorrect computer; the transport layer gets theentire message to the correct process on thatcomputer.
- Network layer does not recognize anyrelationship between the packets it delivers andtreats each one independently.
- The transport layer, however, ensures that thewhole message arrives intact and in order,overseeing both error control and flow control.
Notes
Notes
�Understand- The network layer gets each packet to thecorrect computer; the transport layer gets theentire message to the correct process on thatcomputer.
- Network layer does not recognize anyrelationship between the packets it delivers andtreats each one independently.
- The transport layer, however, ensures that thewhole message arrives intact and in order,overseeing both error control and flow control.
�Understand- The network layer gets each packet to thecorrect computer; the transport layer gets theentire message to the correct process on thatcomputer.
- Network layer does not recognize anyrelationship between the packets it delivers andtreats each one independently.
- The transport layer, however, ensures that thewhole message arrives intact and in order,overseeing both error control and flow control.
Notes
Notes
Transport Layer Concerns
- Service-point addressingaddress for delivery from a specific process(running program) on one computer to aspecific process (running program) on theother.
- Segmentation and reassemblymessage is divided into transmittable segments,with each segment containing a sequencenumbers enabling the transport layer toreassemble the message correctly.
Transport Layer Concerns
- Service-point addressingaddress for delivery from a specific process(running program) on one computer to aspecific process (running program) on theother.
- Segmentation and reassemblymessage is divided into transmittable segments,with each segment containing a sequencenumbers enabling the transport layer toreassemble the message correctly.
Notes
Notes
Transport Layer Concerns
- Connection controleither connectionless or connection-oriented.
- End-to-end Flow control- Process-to-process Error control- Transport layer protocol and the port number
Transport Layer Concerns
- Connection controleither connectionless or connection-oriented.
- End-to-end Flow control
- Process-to-process Error control- Transport layer protocol and the port number
Notes
Notes
Transport Layer Concerns
- Connection controleither connectionless or connection-oriented.
- End-to-end Flow control- Process-to-process Error control
- Transport layer protocol and the port number
Transport Layer Concerns
- Connection controleither connectionless or connection-oriented.
- End-to-end Flow control- Process-to-process Error control- Transport layer protocol and the port number
Notes
Notes
Session Layer- is responsible for dialog control andsynchronization.
- establishes, maintains, & synchronizes theinteraction among communicating systems.
Session Layer- is responsible for dialog control andsynchronization.
- establishes, maintains, & synchronizes theinteraction among communicating systems.
Notes
Notes
Session Layer Concerns
- Dialog controlallows two systems to enter into a dialogallows the communication between twoprocesses to take place in either half-duplex orfull-duplex mode.
- Synchronizationallows a process to add checkpoints, orsynchronization points, to a stream of data.
Session Layer Concerns
- Dialog controlallows two systems to enter into a dialogallows the communication between twoprocesses to take place in either half-duplex orfull-duplex mode.
- Synchronizationallows a process to add checkpoints, orsynchronization points, to a stream of data.
Notes
Notes
Presentation Layer
- is responsible for translation, compression, andencryption.
- concerned with the syntax and semantics of theinformation exchanged between two systems.
Presentation Layer
- is responsible for translation, compression, andencryption.
- concerned with the syntax and semantics of theinformation exchanged between two systems.
Notes
Notes
Presentation Layer Concerns
- Translationresponsible for interoperability betweendifferent encoding methods
- Encryptionthe sender transforms the original informationto another form and sends the resultingmessage.
- Compressionreduce the number of bits.
Presentation Layer Concerns
- Translationresponsible for interoperability betweendifferent encoding methods
- Encryptionthe sender transforms the original informationto another form and sends the resultingmessage.
- Compressionreduce the number of bits.
Notes
Notes
Presentation Layer Concerns
- Translationresponsible for interoperability betweendifferent encoding methods
- Encryptionthe sender transforms the original informationto another form and sends the resultingmessage.
- Compressionreduce the number of bits.
Presentation Layer Examples
- JPEG- Joint Photographic Experts Group
- MPEG- The Moving Picture Experts Group’sstandard
- MIDI- Musical Instrument Digital Interface- TIFF- Tagged Image File Format
Notes
Notes
Presentation Layer Examples
- JPEG- Joint Photographic Experts Group- MPEG- The Moving Picture Experts Group’sstandard
- MIDI- Musical Instrument Digital Interface- TIFF- Tagged Image File Format
Presentation Layer Examples
- JPEG- Joint Photographic Experts Group- MPEG- The Moving Picture Experts Group’sstandard
- MIDI- Musical Instrument Digital Interface
- TIFF- Tagged Image File Format
Notes
Notes
Presentation Layer Examples
- JPEG- Joint Photographic Experts Group- MPEG- The Moving Picture Experts Group’sstandard
- MIDI- Musical Instrument Digital Interface- TIFF- Tagged Image File Format
Application Layer- is responsible for providing services to the user.
- enables the user, whether human or software,to access the network.
Notes
Notes
Application Layer- is responsible for providing services to the user.- enables the user, whether human or software,to access the network.
Application LayerThe Interface Between Human and Data Networks
Notes
Notes
Application LayerThe Interface Between Human and Data Networks
Application Layer Concerns
- Network virtual terminala software version of a physical terminal, and itallows a user to log on to a remote host.
- File transfer, access, and managementallows a user to access files in a remote host,and to manage or control files
- Mail services- Directory services
Notes
Notes
Application Layer Concerns
- Network virtual terminala software version of a physical terminal, and itallows a user to log on to a remote host.
- File transfer, access, and managementallows a user to access files in a remote host,and to manage or control files
- Mail services- Directory services
Application Layer Concerns
- Network virtual terminala software version of a physical terminal, and itallows a user to log on to a remote host.
- File transfer, access, and managementallows a user to access files in a remote host,and to manage or control files
- Mail services
- Directory services
Notes
Notes
Application Layer Concerns
- Network virtual terminala software version of a physical terminal, and itallows a user to log on to a remote host.
- File transfer, access, and managementallows a user to access files in a remote host,and to manage or control files
- Mail services- Directory services
Application LayerNotes
Notes
Application Layer Examples
- World Wide Web (WWW)
- E-mail gateways- Internet navigation utilities- Financial transaction services- Domain Name System (DNS) queries- File Transfer Protocol (FTP) transfers- Simple Mail Transfer Protocol (SMTP) emailtransfers
Application Layer Examples
- World Wide Web (WWW)- E-mail gateways
- Internet navigation utilities- Financial transaction services- Domain Name System (DNS) queries- File Transfer Protocol (FTP) transfers- Simple Mail Transfer Protocol (SMTP) emailtransfers
Notes
Notes
Application Layer Examples
- World Wide Web (WWW)- E-mail gateways- Internet navigation utilities
- Financial transaction services- Domain Name System (DNS) queries- File Transfer Protocol (FTP) transfers- Simple Mail Transfer Protocol (SMTP) emailtransfers
Application Layer Examples
- World Wide Web (WWW)- E-mail gateways- Internet navigation utilities- Financial transaction services
- Domain Name System (DNS) queries- File Transfer Protocol (FTP) transfers- Simple Mail Transfer Protocol (SMTP) emailtransfers
Notes
Notes
Application Layer Examples
- World Wide Web (WWW)- E-mail gateways- Internet navigation utilities- Financial transaction services- Domain Name System (DNS) queries
- File Transfer Protocol (FTP) transfers- Simple Mail Transfer Protocol (SMTP) emailtransfers
Application Layer Examples
- World Wide Web (WWW)- E-mail gateways- Internet navigation utilities- Financial transaction services- Domain Name System (DNS) queries- File Transfer Protocol (FTP) transfers
- Simple Mail Transfer Protocol (SMTP) emailtransfers
Notes
Notes
Application Layer Examples
- World Wide Web (WWW)- E-mail gateways- Internet navigation utilities- Financial transaction services- Domain Name System (DNS) queries- File Transfer Protocol (FTP) transfers- Simple Mail Transfer Protocol (SMTP) emailtransfers
OSI Reference ModelData exchange and Encapsulation
Notes
Notes
Data Encapsulation
- To communicate and exchange information,each layer uses Protocol Data Units (PDUs).These hold the control information attached tothe data at each layer of the model.
- The data portion at levelN – 1 carries the whole PDU (data and headerand maybe trailer) from level N.
- For level N – 1, the whole PDU coming fromlevel N is treated as one integral unit.
Data Encapsulation
- To communicate and exchange information,each layer uses Protocol Data Units (PDUs).These hold the control information attached tothe data at each layer of the model.
- The data portion at levelN – 1 carries the whole PDU (data and headerand maybe trailer) from level N.
- For level N – 1, the whole PDU coming fromlevel N is treated as one integral unit.
Notes
Notes
Data Encapsulation
- To communicate and exchange information,each layer uses Protocol Data Units (PDUs).These hold the control information attached tothe data at each layer of the model.
- The data portion at levelN – 1 carries the whole PDU (data and headerand maybe trailer) from level N.
- For level N – 1, the whole PDU coming fromlevel N is treated as one integral unit.
Data EncapsulationNotes
Notes
Data EncapsulationPDU and layer Addressing
Data Segmentation- Segment the data stream into small boundedsize blocks or PDUs.
- the network may accept data blocks only up toa certain size (53 octets for atm, 1526 octetsfor Ethernet)
- Advantages◦ Efficient error control with PDU size ◦ Fewerbits retransmitted in the event of failure ◦Better access to shared transmission facilities,with shorter delay ◦ Smaller buffers at receiverstations
Notes
Notes
Data Segmentation- Segment the data stream into small boundedsize blocks or PDUs.
- the network may accept data blocks only up toa certain size (53 octets for atm, 1526 octetsfor Ethernet)
- Advantages◦ Efficient error control with PDU size ◦ Fewerbits retransmitted in the event of failure ◦Better access to shared transmission facilities,with shorter delay ◦ Smaller buffers at receiverstations
Data Segmentation- Segment the data stream into small boundedsize blocks or PDUs.
- the network may accept data blocks only up toa certain size (53 octets for atm, 1526 octetsfor Ethernet)
- Advantages◦ Efficient error control with PDU size ◦ Fewerbits retransmitted in the event of failure ◦Better access to shared transmission facilities,with shorter delay ◦ Smaller buffers at receiverstations
Notes
Notes
Data Segmentation
- Disadvantages◦ Larger overhead with smaller PDU size◦ More interrupts as PDUs announce theirarrival◦ More time spent to process many smallerPDUs◦ Reassembly is an issue to be addressed
OSI Example
Imagine that you are on DLSU website and youhave clicked a link on the page. By doing so youhave just made a request of the web server to sendyou a document (most web pages exist asdocuments with an .html extension). Thisdocument will be sent to your computer which willuse the proper application (your Internet browser)to display the document so you can view it.
Notes
Notes
Example
Web server EndSOURCE
- Layer 7 obtains the data in the form of theHTML document.
- Layer 6 adds information about the formatting.- Layer 5 adds information required to create asession between the web server and the webbrowser on the laptop.
Notes
Notes
Web server EndSOURCE
- Layer 7 obtains the data in the form of theHTML document.
- Layer 6 adds information about the formatting.
- Layer 5 adds information required to create asession between the web server and the webbrowser on the laptop.
Web server EndSOURCE
- Layer 7 obtains the data in the form of theHTML document.
- Layer 6 adds information about the formatting.- Layer 5 adds information required to create asession between the web server and the webbrowser on the laptop.
Notes
Notes
Web server EndSOURCE
- Layer 4 adds the transport protocol and thesource and destination port numbers, in thiscase TCP (it’s a unicast) and port 80 (HTTP).
- Layer 3 adds the source and destination IPaddresses, in this case a source of 192.168.5.1and a destination of 192.168.5.2.
Web server EndSOURCE
- Layer 4 adds the transport protocol and thesource and destination port numbers, in thiscase TCP (it’s a unicast) and port 80 (HTTP).
- Layer 3 adds the source and destination IPaddresses, in this case a source of 192.168.5.1and a destination of 192.168.5.2.
Notes
Notes
Web server endSOURCE
- Layer 2 learns the destination MAC addressand adds the source and destination MACaddresses, in this case, a source of 5-5-5-5-5-5and destination of 6-6-6-6-6-6.
- Layer 1 converts the entire package into bitsand sends it across the network to the laptop.
Web server endSOURCE
- Layer 2 learns the destination MAC addressand adds the source and destination MACaddresses, in this case, a source of 5-5-5-5-5-5and destination of 6-6-6-6-6-6.
- Layer 1 converts the entire package into bitsand sends it across the network to the laptop.
Notes
Notes
Laptop endDESTINATION
- Layer 1 receives the bits in electrical format,converts them to be read by layer 2, and handsthem to layer 2.
- Layer 2 examines the destination MAC addressto see whether it is addressed to it, sees theMAC address of 6-6-6-6-6 (its own), drops thatpart of the transmission, and hands theremaining data to layer 3.
- Layer 3 examines the destination IP address toensure that it is its own (192. 168.5.2), dropsthat part, and hands the rest of the package tolayer 4.
Laptop endDESTINATION
- Layer 1 receives the bits in electrical format,converts them to be read by layer 2, and handsthem to layer 2.
- Layer 2 examines the destination MAC addressto see whether it is addressed to it, sees theMAC address of 6-6-6-6-6 (its own), drops thatpart of the transmission, and hands theremaining data to layer 3.
- Layer 3 examines the destination IP address toensure that it is its own (192. 168.5.2), dropsthat part, and hands the rest of the package tolayer 4.
Notes
Notes
Laptop endDESTINATION
- Layer 1 receives the bits in electrical format,converts them to be read by layer 2, and handsthem to layer 2.
- Layer 2 examines the destination MAC addressto see whether it is addressed to it, sees theMAC address of 6-6-6-6-6 (its own), drops thatpart of the transmission, and hands theremaining data to layer 3.
- Layer 3 examines the destination IP address toensure that it is its own (192. 168.5.2), dropsthat part, and hands the rest of the package tolayer 4.
Laptop endDESTINATION
- Layer 4 examines the destination port number(port 80), alerts the browser that HTTP datais coming in, drops that part, and hands therest of the package to layer 5.
- Layer 5 uses the information that was placedon this layer by the web server to create thesession between the web server and the webbrowser and then hands the rest of theinformation to layer 6.
Notes
Notes
Laptop endDESTINATION
- Layer 4 examines the destination port number(port 80), alerts the browser that HTTP datais coming in, drops that part, and hands therest of the package to layer 5.
- Layer 5 uses the information that was placedon this layer by the web server to create thesession between the web server and the webbrowser and then hands the rest of theinformation to layer 6.
Laptop endDESTINATION
- Layer 6 performs any format translation thatmay be required and hands the remaining data(the HTML document) to layer 7.
- The layer 7 application (the web browser)receives the HTML document and opens thedocument in the browser window.
Notes
Notes
Laptop endDESTINATION
- Layer 6 performs any format translation thatmay be required and hands the remaining data(the HTML document) to layer 7.
- The layer 7 application (the web browser)receives the HTML document and opens thedocument in the browser window.
�UnderstandWhich of the following is not an advantage ofnetworking reference models?A. They encourage standardization by defining what functionsare performed at particular layers of the model.B. They prevent changes in one layer from causing a need forchanges in other layers, speeding development.C. They ensure that networks perform better.D. They encourage vendors to build on each other’sdevelopments through use of a common framework.E. None of the above
Notes
Notes
�UnderstandWhich of the following is not an advantage ofnetworking reference models?A. They encourage standardization by defining what functionsare performed at particular layers of the model.B. They prevent changes in one layer from causing a need forchanges in other layers, speeding development.C. They ensure that networks perform better. X
D. They encourage vendors to build on each other’sdevelopments through use of a common framework.E. None of the above
�UnderstandWhich layer of the OSI model is responsible forcoordinating the exchanges of information betweenthe layer 7 applications or services that are in use?
A. ApplicationB. SessionC. Data-LinkD. PhysicalE. None of the above
Notes
Notes
�UnderstandWhich layer of the OSI model is responsible forcoordinating the exchanges of information betweenthe layer 7 applications or services that are in use?
A. ApplicationB. Session X
C. Data-LinkD. PhysicalE. None of the above
�Understand
What is the information that is used on layer 3 ofthe OSI model?
A. A bit patternB. MAC addressesC. IP addressesD. Port numbersE. All of the above
Notes
Notes
�Understand
What is the information that is used on layer 3 ofthe OSI model?
A. A bit patternB. MAC addressesC. IP addresses X
D. Port numbersE. All of the above
�Reading Assignment
- Illustrate and Contrast OSI andTCP/IP models.
Notes
Notes
OSI and TCP/IP modelsComparison
OSI and TCP/IP Model
- There are seven layers in the OSI model andfour in the TCP/IP model.
- The top three layers of the OSI model(Application, Presentation and Session) map tothe Application layer of the TCP/IP model.
- The bottom two layers of the OSI model(Data-Link and Physical) map to the NetworkAccess layer of the TCP/IP model.
Notes
Notes
OSI and TCP/IP Model
- There are seven layers in the OSI model andfour in the TCP/IP model.
- The top three layers of the OSI model(Application, Presentation and Session) map tothe Application layer of the TCP/IP model.
- The bottom two layers of the OSI model(Data-Link and Physical) map to the NetworkAccess layer of the TCP/IP model.
OSI and TCP/IP Model
- There are seven layers in the OSI model andfour in the TCP/IP model.
- The top three layers of the OSI model(Application, Presentation and Session) map tothe Application layer of the TCP/IP model.
- The bottom two layers of the OSI model(Data-Link and Physical) map to the NetworkAccess layer of the TCP/IP model.
Notes
Notes
OSI vs. TCP/IP Model
- In the OSI model, it was envisioned that theSession layer would handle the establishmentand management of the communication sessionbetween the application or service being used.
- In TCP/IP, those functions are performed bythe TCP /IP protocol itself at a different layer,the Transport layer.
OSI vs. TCP/IP Model
- In the OSI model, it was envisioned that theSession layer would handle the establishmentand management of the communication sessionbetween the application or service being used.
- In TCP/IP, those functions are performed bythe TCP /IP protocol itself at a different layer,the Transport layer.
Notes
Notes
OSI vs. TCP/IP Model
- OSI model envisioned the host devices as deaf,dumb, and blind bystanders to the networkingprocess, not participants (dumb terminal).
- In TCP/IP, the hosts participate and take partin functions such as end-to-end verification,routing, and network control (intelligent roleplayers)
OSI vs. TCP/IP Model
- OSI model envisioned the host devices as deaf,dumb, and blind bystanders to the networkingprocess, not participants (dumb terminal).
- In TCP/IP, the hosts participate and take partin functions such as end-to-end verification,routing, and network control (intelligent roleplayers)
Notes
Notes
OSI vs. TCP/IP Model
- When TCP/IP was developed, it was decidedthat the division of the bottom layer intoData-Link and Physical layers was unnecessary.
- Thus their functions are combined in theNetwork Access layer of the TCP/IP model.
OSI vs. TCP/IP Model
- When TCP/IP was developed, it was decidedthat the division of the bottom layer intoData-Link and Physical layers was unnecessary.
- Thus their functions are combined in theNetwork Access layer of the TCP/IP model.
Notes
Notes
TCP/IP Model
- Developed by US Defense Advanced ResearchProject Agency (DARPA) for ARPANETpacket switched network.
- generally referred to as the TCP/IP protocolsuite, which consists of a large collection ofprotocols.
- predates the OSI reference model.
TCP/IP Model
- Developed by US Defense Advanced ResearchProject Agency (DARPA) for ARPANETpacket switched network.
- generally referred to as the TCP/IP protocolsuite, which consists of a large collection ofprotocols.
- predates the OSI reference model.
Notes
Notes
TCP/IP Model
- Developed by US Defense Advanced ResearchProject Agency (DARPA) for ARPANETpacket switched network.
- generally referred to as the TCP/IP protocolsuite, which consists of a large collection ofprotocols.
- predates the OSI reference model.
TCP/IP Model- Transmission Control Protocol (TCP)is the primary transport layer (layer 4)protocol, and is responsible for connectionestablishment and management and reliabledata transport between software processes ondevices.
- Internet Protocol (IP)is the primary OSI network layer (layer 3)protocol that provides addressing, datagramrouting and other functions in an internetwork.
Notes
Notes
TCP/IP Model- Transmission Control Protocol (TCP)is the primary transport layer (layer 4)protocol, and is responsible for connectionestablishment and management and reliabledata transport between software processes ondevices.
- Internet Protocol (IP)is the primary OSI network layer (layer 3)protocol that provides addressing, datagramrouting and other functions in an internetwork.
TCP/IP ModelNotes
Notes
TCP/IP Layers
- Application (Process) Layer
- Host-to-host (Transport) Layer- Internet Layer- Network Access/Interface Layer
TCP/IP Layers
- Application (Process) Layer- Host-to-host (Transport) Layer
- Internet Layer- Network Access/Interface Layer
Notes
Notes
TCP/IP Layers
- Application (Process) Layer- Host-to-host (Transport) Layer- Internet Layer
- Network Access/Interface Layer
TCP/IP Layers
- Application (Process) Layer- Host-to-host (Transport) Layer- Internet Layer- Network Access/Interface Layer
Notes
Notes
TCP/IP Model CommunicationProcess
Application (Process) layer
- corresponds to the OSI’s Application,Presentation, and Session layers
- defines protocols for node-to-node applicationcommunication
- controls user-interface specifications.
Notes
Notes
Application (Process) layer
- corresponds to the OSI’s Application,Presentation, and Session layers
- defines protocols for node-to-node applicationcommunication
- controls user-interface specifications.
Application (Process) layer
- corresponds to the OSI’s Application,Presentation, and Session layers
- defines protocols for node-to-node applicationcommunication
- controls user-interface specifications.
Notes
Notes
Application layer services
Application layer servicesNotes
Notes
�Recall
Telnet / Terminal Emulation- allows a user on a remote client machine, calledthe Telnet client, to access the resources ofanother machine, the Telnet server.
Notes
Notes
Telnet / Terminal Emulation
Domain Name ServiceDNS
- resolves hostnames-specifically, Internet names,such as www.dlsu.edu.ph
Notes
Notes
HTTPHypertext transfer protocol
- rules governing the delivery of web pages to theclient
�Understand
- Differentiate HTTP and HTML?
- HTML: hypertext markup languageDefinitions of tags that are added to Webdocuments to control their appearance.
- HTTP: hypertext transfer protocolThe rules governing the conversation between aWeb client and a Web server.
Notes
Notes
�Understand
- Differentiate HTTP and HTML?- HTML: hypertext markup languageDefinitions of tags that are added to Webdocuments to control their appearance.
- HTTP: hypertext transfer protocolThe rules governing the conversation between aWeb client and a Web server.
�Understand
- Differentiate HTTP and HTML?- HTML: hypertext markup languageDefinitions of tags that are added to Webdocuments to control their appearance.
- HTTP: hypertext transfer protocolThe rules governing the conversation between aWeb client and a Web server.
Notes
Notes
POP and SMTPPost Office and Simple Mail Transport Protocols
Server Message Block (SMB)Protocol
- supports file sharing in Microsoft-basednetworks
Notes
Notes
Gnutella Protocol- supports P2P services
Host-to-host (Transport) Layer
- parallels the functions of the OSI’s Transportlayer
- define protocols for setting up the level oftransmission service for applications.
- concerned with◦ reliable end-to-end communication◦ error-free delivery of data◦ packet sequencing
Notes
Notes
Host-to-host (Transport) Layer
- parallels the functions of the OSI’s Transportlayer
- define protocols for setting up the level oftransmission service for applications.
- concerned with◦ reliable end-to-end communication◦ error-free delivery of data◦ packet sequencing
Host-to-host (Transport) Layer
- parallels the functions of the OSI’s Transportlayer
- define protocols for setting up the level oftransmission service for applications.
- concerned with◦ reliable end-to-end communication◦ error-free delivery of data◦ packet sequencing
Notes
Notes
Transport Layer Role
Transport Layer Functions
- Enables multiple applications to communicateover the network at the same time on a singledevice
- Ensures that, if required, all the data isreceived reliably and in order by the correctapplication
- Employs error handling mechanisms- UDP- User Datagram protocol- an exchange ofdata w/o acknowledgment, sure delivery
Notes
Notes
Transport Layer Functions
- Enables multiple applications to communicateover the network at the same time on a singledevice
- Ensures that, if required, all the data isreceived reliably and in order by the correctapplication
- Employs error handling mechanisms- UDP- User Datagram protocol- an exchange ofdata w/o acknowledgment, sure delivery
Transport Layer Functions
- Enables multiple applications to communicateover the network at the same time on a singledevice
- Ensures that, if required, all the data isreceived reliably and in order by the correctapplication
- Employs error handling mechanisms
- UDP- User Datagram protocol- an exchange ofdata w/o acknowledgment, sure delivery
Notes
Notes
Transport Layer Functions
- Enables multiple applications to communicateover the network at the same time on a singledevice
- Ensures that, if required, all the data isreceived reliably and in order by the correctapplication
- Employs error handling mechanisms- UDP- User Datagram protocol- an exchange ofdata w/o acknowledgment, sure delivery
Transport Layer Purpose
- Segmenting data & managing each piece -data must be prepared to be sent across themedia in manageable pieces.
- Tracking the individual communicationbetween applications on the source anddestination hosts -maintains the multiple communication streamsbetween these applications.
Notes
Notes
Transport Layer Purpose
- Segmenting data & managing each piece -data must be prepared to be sent across themedia in manageable pieces.
- Tracking the individual communicationbetween applications on the source anddestination hosts -maintains the multiple communication streamsbetween these applications.
Transport Layer Purpose
- Reassembling the segments into streams ofapplication data -At the receiving host, each piece of data will bereconstructed and directed to the appropriateapplication.
- Identifying the different applications-assigns each application an identifier; theTCP/IP protocols call this identifier aport number.
Notes
Notes
Transport Layer Purpose
- Reassembling the segments into streams ofapplication data -At the receiving host, each piece of data will bereconstructed and directed to the appropriateapplication.
- Identifying the different applications-assigns each application an identifier; theTCP/IP protocols call this identifier aport number.
Transport Layer Protocols
- Transmission Control Protocol (TCP)◦ Connection-oriented◦ Guaranteed Delivery◦ Supports Flow Control and Error control
- User Datagram Protocol (UDP)◦ Connectionless-oriented◦ Nonguaranteed Delivery◦ No Flow Control and Error control
Notes
Notes
Transport Layer Protocols
- Transmission Control Protocol (TCP)◦ Connection-oriented◦ Guaranteed Delivery◦ Supports Flow Control and Error control
- User Datagram Protocol (UDP)◦ Connectionless-oriented◦ Nonguaranteed Delivery◦ No Flow Control and Error control
Internet Layer
- corresponds to the OSI’s Network layer.
- designates the protocols relating to the logicaltransmission of packets over the entire network.
- concerned with◦ logical addressing, i.e. IP (Internet Protocol)address◦ routing of packets among multiple networks
Notes
Notes
Internet Layer
- corresponds to the OSI’s Network layer.- designates the protocols relating to the logicaltransmission of packets over the entire network.
- concerned with◦ logical addressing, i.e. IP (Internet Protocol)address◦ routing of packets among multiple networks
Internet Layer
- corresponds to the OSI’s Network layer.- designates the protocols relating to the logicaltransmission of packets over the entire network.
- concerned with◦ logical addressing, i.e. IP (Internet Protocol)address◦ routing of packets among multiple networks
Notes
Notes
Internet Layer
Internet Protocol (IP)Notes
Notes
Internet Protocol (IP)Connectionless
Internet Protocol (IP)Unreliable Protocol
Notes
Notes
Internet Protocol (IP)Media Independent
Internet Protocol (IP)- Segments are encapsulated as packets
Notes
Notes
Network Access Layer
- interface to the local network
- concerned with the exchange of data betweenan end system (server, workstation, etc.) andthe network to which it is attached.
- concerned with◦ hardware addressing◦ protocols for the physical transmission ofdata
Network Access Layer
- interface to the local network- concerned with the exchange of data betweenan end system (server, workstation, etc.) andthe network to which it is attached.
- concerned with◦ hardware addressing◦ protocols for the physical transmission ofdata
Notes
Notes
Network Access Layer
- interface to the local network- concerned with the exchange of data betweenan end system (server, workstation, etc.) andthe network to which it is attached.
- concerned with◦ hardware addressing◦ protocols for the physical transmission ofdata
Network Access Layer
- the source and destination physical addressesare put on the front of the package in a partcalled the header.
- Information used to perform a frame checksequence on the message is placed at the backof the package in a section called the trailer.
- the package is converted to ones and zeros inthe format required by the physical medium inuse.
Notes
Notes
Network Access Layer
- the source and destination physical addressesare put on the front of the package in a partcalled the header.
- Information used to perform a frame checksequence on the message is placed at the backof the package in a section called the trailer.
- the package is converted to ones and zeros inthe format required by the physical medium inuse.
Network Access Layer
- the source and destination physical addressesare put on the front of the package in a partcalled the header.
- Information used to perform a frame checksequence on the message is placed at the backof the package in a section called the trailer.
- the package is converted to ones and zeros inthe format required by the physical medium inuse.
Notes
Notes
TCP/IP Data Encapsulation
TCP/IP Data Encapsulation
- Application layer adds any requiredinformation concerning the presentation andformatting of the data to the header.
- Transport layer adds port number informationto the data that was handed down from theApplication layer.
- Internet layer adds the required logical addressinformation to the segment.
Notes
Notes
TCP/IP Data Encapsulation
- Application layer adds any requiredinformation concerning the presentation andformatting of the data to the header.
- Transport layer adds port number informationto the data that was handed down from theApplication layer.
- Internet layer adds the required logical addressinformation to the segment.
TCP/IP Data Encapsulation
- Application layer adds any requiredinformation concerning the presentation andformatting of the data to the header.
- Transport layer adds port number informationto the data that was handed down from theApplication layer.
- Internet layer adds the required logical addressinformation to the segment.
Notes
Notes
TCP/IP Data Encapsulation
- Network Access layer adds physical addressinformation in the form of a frame header.
- Network Access layer also adds a frame trailerwhich contains information that can be used tocheck the integrity of the data, calledframe check sequence (FCS).
- Integrity means that the data has not changedeven 1 bit.
TCP/IP Data Encapsulation
- Network Access layer adds physical addressinformation in the form of a frame header.
- Network Access layer also adds a frame trailerwhich contains information that can be used tocheck the integrity of the data, calledframe check sequence (FCS).
- Integrity means that the data has not changedeven 1 bit.
Notes
Notes
TCP/IP Data Encapsulation
- Network Access layer adds physical addressinformation in the form of a frame header.
- Network Access layer also adds a frame trailerwhich contains information that can be used tocheck the integrity of the data, calledframe check sequence (FCS).
- Integrity means that the data has not changedeven 1 bit.
TCP/IP Data Encapsulation
- Network adaptor converts the information intoa series of ones and zeros.
- At the beginning of the frame is a series of onesand zeros that are designed to allow thereceiving device to lock on to or synch up withthe signal.
- Once the receiving device has synched up withthe frame, it will start reading.
Notes
Notes
TCP/IP Data Encapsulation
- Network adaptor converts the information intoa series of ones and zeros.
- At the beginning of the frame is a series of onesand zeros that are designed to allow thereceiving device to lock on to or synch up withthe signal.
- Once the receiving device has synched up withthe frame, it will start reading.
TCP/IP Data Encapsulation
- Network adaptor converts the information intoa series of ones and zeros.
- At the beginning of the frame is a series of onesand zeros that are designed to allow thereceiving device to lock on to or synch up withthe signal.
- Once the receiving device has synched up withthe frame, it will start reading.
Notes
Notes
Protocol Operation of Sendingand Receiving
�Readings
In what year was it mandated that all computersconnected to the ARPANET use TCP/IP?
A. 1969B. 1974C. 1979D. 1983E. None of the above
Notes
Notes
�Readings
In what year was it mandated that all computersconnected to the ARPANET use TCP/IP?
A. 1969B. 1974C. 1979D. 1983 X
E. None of the above
TCP/IP Protocol SuiteNotes
Notes
Application Protocols- Telnet (Terminal emulation)allows a user on a remote client machine, calledthe Telnet client, to access the resources ofanother machine, the Telnet server.
- File Transfer Protocol (FTP)the protocol for transferring files
- Trivial File Transfer Protocol (TFTP)stripped-down, stock version of FTP; TFTPhas no directory-browsing abilities; it can donothing but send and receive files.
Application Protocols
- Network File System (NFS)allows two different types of file systems tointeroperate. Ex. NT and Unix file systems
- Simple Mail Transfer Protocol (SMTP)answering our ubiquitous call to email, uses aspooled, or queued, method of mail delivery.
- Line Printer Daemon (LPD)designed for printer sharing
Notes
Notes
Application Protocols- X Windowdefines a protocol for writing client/serverapplications based on a graphical user interface(GUI)
- Simple Network Management Protocol (SNMP)collects and manipulates valuable networkinformation. It gathers data by polling thedevices on the network from a managementstation at fixed or random intervals, requiringthem to disclose certain information.
Application Protocols
- Domain Name Service (DNS)resolves hostnamesâĂŤspecifically, Internetnames, such as www.dlsu.edu.ph.
- Dynamic Host Configuration Protocol(DHCP)/Bootstrap Protocol (BootP)assigns IP addresses to hosts. It allows easieradministration and works well in small to evenvery large network environments.
Notes
Notes
Host-to-host (Transport)Protocols
- Transmission Control Protocol (TCP)a full-duplex, connection-oriented, reliable, andaccurate protocol, but costly in terms ofnetwork overhead.
- User Datagram Protocol (UDP)a minimalist protocol mechanism with nohandshaking dialogues, thus exposes anyunreliability of the underlying network protocolto the user’s program. There is no guarantee ofdelivery, ordering or duplicate protection.
Internet Protocols
- Internet Control Message Protocol (ICMP)a management protocol and messaging serviceprovider for IP. Its messages are carried as IPdatagrams.
- Address Resolution Protocol (ARP)finds the hardware address of a host from aknown IP address.
Notes
Notes
Internet Protocols- Reverse Address Resolution Protocol (RARP)discovers the identity of the IP address fordiskless machines by sending out a packet thatincludes its MAC address and a request for theIP address assigned to that MAC address.
- Proxy Address Resolution Protocol (ProxyARP)help machines on a subnet reach remotesubnets without configuring routing or even adefault gateway.
Other Terms
- De facto standardone that becomes the standard simply by being the methodthat all parties gradually choose to use over a period oftime, without a formal adoption process.
- Default gatewayThis is the IP address of the nearest router in the network.
Notes
Notes
Other Terms
- IP addressa number in a specific format that is used to identify acomputer.
- ISO (International Organization for Standardization)is the world’s largest developer of voluntary InternationalStandards. International Standards give state of the artspecifications for products, services and good practice,helping to make industry more efficient and effective.Note: ISO is derived from the Greek isos, meaning equal.
Other Terms
- Local vs. RemoteIf the source and destination hosts are on the same network,the destination device is considered to be on the localnetwork.If the two computers are on different networks, thedestination device is considered to be on a remote network.
Notes
Notes
Other Terms
- Peripheralsare any devices that operate in conjunction with thecomputer yet reside outside the computer’s box. Ex.display, mouse, keyboard, printer, camera, speakers, andscanners.
- Resourcerefers to anything that a user on one computer may want toaccess on a different computer. Ex. files, folders, printers,and scanners.
- Telecommutingworking from another physical location, usually from home.
Other Terms
- Standard vs. ProprietaryProprietary refers to any process or way of doing somethingthat works only on a single vendor’s equipment whilestandard any process that the industry has agreed upon.
Notes
Notes
�Understand
- How do you ensure that products from differentmanufacturers can work together as expected?
- Answer:Using Standards which provide guidelines tomanufacturers, vendors, government agencies,and other service providers to ensure the kindof interconnectivity necessary in today’smarketplace and in internationalcommunications.
�Understand
- How do you ensure that products from differentmanufacturers can work together as expected?
- Answer:Using Standards which provide guidelines tomanufacturers, vendors, government agencies,and other service providers to ensure the kindof interconnectivity necessary in today’smarketplace and in internationalcommunications.
Notes
Notes
OSI Model and NetworkingDevices
�Networking andInternetworking Devices
Notes
Notes
�Networking andInternetworking DevicesExamples
Repeaters
- a physical layer device used to interconnect themedia segments of an extended network.
- does not actually connect two LANs; itconnects two segments of the same LAN.
Notes
Notes
Repeaters
- a physical layer device used to interconnect themedia segments of an extended network.
- does not actually connect two LANs; itconnects two segments of the same LAN.
Repeaters- repeaters regenerate signals corruptedprimarily due to distance effects
- A repeater forwards every frame; it has nofiltering capability.
Notes
Notes
Repeaters- repeaters regenerate signals corruptedprimarily due to distance effects
- A repeater forwards every frame; it has nofiltering capability.
HubMultiport repeater
- a physical-layer device that connects multipleuser stations, each via a dedicated cable
- used to create a physical star network whilemaintaining the logical bus or ringconfiguration of the LAN
Notes
Notes
HubMultiport repeater
- a physical-layer device that connects multipleuser stations, each via a dedicated cable
- used to create a physical star network whilemaintaining the logical bus or ringconfiguration of the LAN
Bridge
- A physical and data-link layer device that linksone LAN segment to others
- Read all frames transmitted on one LAN andaccept those address to any station on theother LAN
- Using MAC protocol for second LAN,retransmit each frame
Notes
Notes
Bridge
- A physical and data-link layer device that linksone LAN segment to others
- Read all frames transmitted on one LAN andaccept those address to any station on theother LAN
- Using MAC protocol for second LAN,retransmit each frame
Bridge
- A physical and data-link layer device that linksone LAN segment to others
- Read all frames transmitted on one LAN andaccept those address to any station on theother LAN
- Using MAC protocol for second LAN,retransmit each frame
Notes
Notes
ReferencesTEXTBOOK:
- Data Communications and Networking,Behrouz Forouzan, 4th Edition, McGraw-Hill,2007
ReferencesSECONDARY SOURCE:
- Data and Computer Communications, WilliamStallings, 2007
Notes
Notes
ReferencesSECONDARY SOURCE:
- TCP/IP Protocol Suite, Behrouz Forouzan, 4thedition, 2010
ReferencesSECONDARY SOURCE:
- CISCO Networking Essentials, Troy McMillan,2012
Notes
Notes
ReferencesSECONDARY SOURCE:
- Network Fundamentals, Cisco NetworkingAcademy, 2007
Thank you for your attention!Notes
Notes