Documente Academic
Documente Profesional
Documente Cultură
Topics
What are Protocols ? Why we need Protocols and Standards The OSI Reference Model The Seven Layers of the Model Responsibilities of Each Layer The Application Layer The Presentation Layer The Session Layer The Transport Layer The Network Layer
They do not understand each other because they are using different languages.
They can understand each other because they are using the same language.
So in order for two people to speak to each other, the first thing they should to agree on is the language, or protocols, to use. Communication between hosts on the network is the same. When hosts begin communicating with each other, they first must agree on what protocols to use.
IPX
IPX
Netware PC running IPX protocol
When combined with other protocols, the protocol group that result is called a protocol suite. TCP/IP, for example, is a protocol suite.
Rules or protocols and standards are important to ensure compatibility between different kinds of things
Developing protocols is an ongoings (vic ang pht trin lin lc), ever-changing (lun lun thay i) science. As the industry is increasing so dynamically (si ni) and rapidly.
However, before a protocol is accepted and widely implemented, it has to pass rigorous testing. So a standard framework is used to help design, compare, test, and evaluate protocols.
For network communications to take place, hundreds of questions must be answered by a set of protocol (how, when, what). Evaluating and working with these hundreds of questions would be unmanageable.
So, in 1977, the International Standards Organization (ISO) adopted (chp nhn) the Open Standard Interconnection (OSI) model.
The OSI model breaks down the many tasks involved in moving data from one host to another.
The hundreds of questions are divided into seven smaller. The seven groups are called layers.
The goal of the OSI model is to break down the task of data communication into simple steps. These steps are called layers. The OSI model is made up of seven distinct layers. Each layer has certain responsibilities.
The purpose of each layer in the OSI model is to provide services to the layer above it.
The higher layers do not need to what happened at the lower layers. Following is the process of moving data from one host to another:
Data Stream
Application
Presentation
Data Stream
Data Stream
segment
This one is Data Data Stream Data Data called
Transport
Data
Data Stream
Transport
packet
Data IP IP Header Header Data This one is called
1 1
IP Header Data
Network
Data
frame
Data Link
Data 1 Frame Header Header IP Frame 1 IPHeader Header Data
I I
IP Header Data
Data Link
Physical
Physical
Web Browser
Web Server
Web Browser
Transport The purpose of the Application layer is to Network manage communications between Data Link applications. Physical
File transfer Electronic mail Terminal access Word processing Web Browser
MAC PC
The Presentation provide set of tools for Window PC to encrypt the file in the suitable format before sending it to Mac PC and Sun PC
Windows PC
Sun PC
The Presentation layer is the layer below the Application layer and above the Session layer.
MAC PC Windows PC
Application
The Presentation ensures that the Session information that the application layer Transport of one system sends out isNetwork readable by the application layer of Data another Link system. Physical
Presentation Sun PC
Examples of the Presentation layer: PICT This is picture format used by Macintosh
Format of data Data structure Data conversion Data compression Data encryption
MPEG The Moving Picture Experts Groups standard for the compression and coding of motion video for CDs. RTF Rich Text Format is a file format that lets you exchange text files
between different word processors, even in different operating systems.
Web Browser
The Session layer allows them to meet each other and make agreement.
Web Server
But how the Web Browser and Web Server can negotiate the meeting port ?
The Session is below the Presentation layer. The Session layer establishes, manages, Application and terminates sessions between two Presentation Session communicating hosts.
Transport Network Data Link
Web Browser
Web Server
Physical
Examples of the Session layer: Network File System (NFS) Developed by Sun Microsystems and used with TCP/IP and Unix workstation to allow transparent access to remote resources. AppleTalk Session Protocol (ASP) client/server
mechanism, which both establishes and maintains sessions between AppleTalk client and server machines.
Application
Application Presentation Session Transport Network Data Link Physical
The Transport layers segments and reassembles data into a data stream
Data Stream
Application
Data Stream
Application Presentation
Data Stream
Data
Data
Data
Connectionless transmission
Connection-oriented transmission The three-way handshake
Flow control
Acknowledgement Windowing
The primary function of the Transport layer is to ensure that the data packets it receives from the Session layer arrive reliably. The Transport layer does this by using two types of transmissions: connectionless and connection oriented.
The Transport layer also has the job of managing the speed of communication between devices. This is known as flow control.
Thats The Buthe the letter OK. letter then The may letter delivered be is lost not from on important, the the way local and itPost is left never just Office a Lets So Harry look want goes at to what the send happens: local mail Post to Wilson Office and the friendly through come to letter. the the Post destination. Office system arrive at the letter there
Destination Post Office then delivered to Wilson
Wilson
destination (lease line) thats Host AOK. want to send data to Host B, it only put the packet onto the network and hope that it will be arrive at the destination.
Post Office system
Destination Post Office
Harry
Wilson
Internet
Host A
Local Router Destination Router
Host B
User Datagram Protocol (UDP) is an example of connectionless protocol Applications that use UDP to send their data information is DNS, TFTP.
When Harry receive an acknowledge phone from He The then letter goes then to sent the and Local when Post Wilson Office and receives send the the But Lets Harry this look want time, atto what it send is happens: an mail important to Wilson business again. letter. Wilson, he is Wilson now the letter. letter and a certified see thatstop form. it phone is worrying an Itimportant means business Post letter, So hein want him about tothat acknowledge Office so he then guarantee phone the Harry letter to letter. will acknowledge arrive at the (bo cho right bit) when Wilson receive the
Wilson
Connection-oriented transmissions
(cont)
Because The But after advantage Host waiting Asame of and for connection-oriented Host a predefined B both use time, connectiontransmission Host A does When Working Host in the A receive way, an acknowledgement with connection-oriented packet, it oriented using not receive connection-oriented protocol an acknowledgement to send and protocol receive packet is that packets. from it is Host So then transmission stop worrying using connection-oriented about the packet. protocol, when reliable B, Host Host although A will B resend it to has packet the higher packet from latency and A, it wait. than will The A receive want send data to Host B, send it putan the acknowledge connectionless processonto happens packet protocol. until toHost specify A wait receive that it an has received. packet the network and for the destination acknowledgement from Host B. to acknowledge of packet receiving packet.
Post Office system
Harry
Wilson
Internet
Host A
Local Router Destination Router
Host B
Applications that use TCP to send their data information is DNS, FTP, HTTP, SMTP,
In connection-oriented transmission, both the sender and receiver have to join to the session. The receiver must know that the sender is sending packets in order to answer (acknowledgment)
So, the sender must first establish a connectionoriented session with the receiver, which is called a call setup, or three-way handshake
In the three-way handshake process, when from Host Host A Blook after (receiver) receives after the examine synchronize the synchronize segment Lets at what happens:
A (sender) want to establish with Host B to Host packet B, from it will Host send A, an if acknowledgement agree,aitsession will send segment (receiver), it first send to receiver a to Host A. acknowledgement synchronize segment Host B to acknowledge tothe connection. synchronize segment.
Synchronize (Can I talk to you ?) Connection Established Ack (Yes), Synchronize ( Can I talk to you ?)
TCP
Sender Host A
Once data transfer is in progress, congestion can occur for two reasons.
First, the sending device might be able to generate traffic faster than the network can transfer it.
ta da ta da ta da ta da ta da ta da ta da ta da ta da
data data data data data data
The second reason is that multiple devices need to send data to the same destination.
ta da
ta da
ta da ta da ta da ta da ta da
ta da
ta da ta da
ta da ta da
ta da
When datagram arrive too quickly for a device to process, it temporarily stores them in memory.
ta da
ta da
ta da
ta da ta da ta da ta da
ta da
ta da
ta da
da t
da t
ta da
If the datagrams are part of a small burst, this buffering solves the problem.
ta da
ta da
ta da
ta da ta da ta da ta da
ta da
ta da
ta da
da t
da t
ta da
However, if the traffic continues at this rate, the device eventually exhausts its memory and must discard additional datagrams that arrive.
So, the data will be lost ?
ta da
ta da
ta da
ta da
ta da
ta da
ta da ta da
ta da ta da
ta da
ta da
ta da ta da
ta da ta da
ta da ta da
ta da ta da
da t
a
a
da t
ta da
da ta
da ta
da t
da t
Instead of losing the data, the transport function can issue a not ready indicator to the sender.
ta da
ta da
ta da
ta da
ta da ta da
ta da ta da
ta da
ta da
ta da ta da
ta da ta da
ta da ta da
ta da ta da
da t
a
a
da ta
da t
p s to
da t
ta da
da t
rt po s n Tra
da ta
This acts like a stop sign and signal the sender to discontinue sending segment traffic to the receiver.
Stop
da t a
a
da t a
da ta
da t
p s to
da t
rt po s n Tra
da ta
After the receiving device has processed sufficient segments to free space in its buffer, the receiver sends a ready transport indicator which is like a go signal.
Go
da t
a
da t a
da ta
da t
go ort sp n Tra
da ta
da t
When they receives this indicator, the senders can resume segment transmission.
ta da
ta da
ta da
ta da
ta da
ta da
ta da
go rt po s n Tra
ta da
The transport layer provide a reliable service regardless of the quality of the underlying network
ort p ns a r T
One technique that is used to guarantee reliable delivery is called positive acknowledgement (Thng bo xc thc) with retransmission. This requires the receiver to issue an acknowledgement message to the sender when it receivers data.
ta da
ta da
ta da
Acknowledging every data segment, however, has its drawback (iu tr ngi).
If the sender has to wait for an acknowledgement of each data segment, the throughput will be very low.
ta da
ta da
The quantity of data segments (measured in bytes) that the transmitting machine is allowed to send without receiving an acknowledgment for them is called a window. the size of the window controls how much information is transferred from one end to the other
TCP
TCP
Send 1 Send 2
Send 5
Receive 5 Ack 7
E0 192.168.1.1
It is because router is a Network layer device and the Network The Network layer also layer provide a set a of tools for router provides mechanism for to collect about router informations to route packet to 172.16.1.1 host.
E1 10.0.0.1 But how router know that the 172.16.1.1 host is in the network attached to E2 interface. And how it can route the packet to the destination.
E2
172.16.1.1
The Network layer, which is below the Transport layer. It is responsible for routing the packet based on its logical address. Application
E0 E1 10.0.0.1
Presentation Session
192.168.1.1
E2
Physical
172.16.1.1
Soto So Yeah, But I have the host network 10.0.0.1 re-encapsulate is attached located this packet in tonetwork S0 into is Frame a Frame attached Relay to frame. network S0.
S0
192.168.1.1
ISDN
E0
Br0
10.0.0.1
E0
ISDN router
172.16.1.1
The Data Link layer provides the physical Session transmission of the data. Transport
MAC address 00-06-7B-02-EF-05
Network Data Link Physical
Presentation
The Logical Link Control (LLC) sublayer. The Media Access Control (MAC) sublayer
Logical Link Control (LLC) sublayer is responsible for identifying Network layer protocols and then encapsulating into frame
But If the if the Network Network layer layer give give me me an IP an IPX packet, packet, I will I will encapsulate encapsulate it into it into a frame frame like like this
Media Access Control (MAC) sublayer defines how packets are placed on the media.
If the network interface card (NIC) has RJ45 port and connected to crossover cable. I will transfer But if the network interface frame on pin 2 and receive frame card (NIC) has BNC port, I will on pin 3 transfer frame in another way.
Logical Link Control (LLC) Media Access Control (MAC)
Transmission of an unstructured bit stream over a physical link between end systems.
Electrical, mechanical, procedural and functional specifications Physical data rate Distances Physical connector
For Example:
UTP, STP, coaxial, Fiber cable RJ45, RJ11 connector DB9, DB25 connector 10base2, 10base5, 100baseT, 1000baseTx