1 / 58

ITC242 – Introduction to Data Communications TCP/IP and OSI

This study algorithm provides the background knowledge for the Introduction to Data Communications unit. It covers centralised and distributed data processing, the Internet's architecture, TCP/IP and OSI protocols, and more.

marthan
Download Presentation

ITC242 – Introduction to Data Communications TCP/IP and OSI

An Image/Link below is provided (as is) to download presentation Download Policy: Content on the Website is provided to you AS IS for your information and personal use and may not be sold / licensed / shared on other websites without getting consent from its author. Content is provided to you AS IS for your information and personal use only. Download presentation by click this link. While downloading, if for some reason you are not able to download a presentation, the publisher may have deleted the file from their server. During download, if you can't get a presentation, the file might be deleted by the publisher.

E N D

Presentation Transcript


  1. ITC242 – Introduction to Data CommunicationsTCP/IP and OSI

  2. “Study algorithm for this unit” • Make up the background knowledge for this unit. • The subsequent chapter is related logically to the previous chapters.------- This means that you must make up them if you miss one or more. • You cannot fully understand the contents being covered by only attending the class ! • The content I am lecturing in the classes is harder than that of the text • Different learning outcomes, depending on the degree for which you are studying • The exam is relatively easier than….. Before coming to my classes (1) Read the corresponding chapter(s) to be covered (2) Read my PowerPoint slides published on the course website (3) Write down the questions you have If you have not done the above, then …… During my classes Concentrate on listening and thinking rather than talking ! Concentrate on understanding rather than writing ! ( make notes) After my classes Read the text and the slides again ! If you still have questions, then go to my office If you still have questions, then read the reference book(s) If you still have questions, then consider withdrawing from this unit

  3. Last Week Topic 3 – Distributed Data Processing • Describe the differences between centralised and distributed data processing • Describe different types of distributed data processing for applications and distributed databases • Describe the implications for data comms of distributed data processing • Understand the motivation towards client server architectures

  4. Last Week Topic 4 – The Internet • Discuss the history of the Internet and explain it’s explosive growth • Describe the overall Internet architecture including key components • Explain the components and operation of the Domain Name System

  5. Topic 5 – TCP/IP and OSI Learning objectives • Describe the definition of a protocol; • Discuss the need and benefits of using protocol architectures; • Describe the TCP/IP protocol architecture • Describe the OSI reference model.

  6. human protocols: “what’s the time?” “I have a question” introductions … specific msgs sent … specific actions taken when msgs received, or other events network protocols: machines rather than humans all communication activity in Internet governed by protocols What’s a protocol? protocols define format, order of msgs sent and received among network entities, and actions taken on msg transmission, receipt

  7. a human protocol and a computer network protocol: TCP connection response Get http://www.awl.com/kurose-ross Got the time? 2:00 <file> time What’s a protocol? Hi TCP connection request Hi

  8. Protocol Architecture – Modular Approach • Breaks complex tasks into subtasks • Each module handles specific subset of tasks • Communication occurs • between different modules on the same system • between similar modules on different systems

  9. Advantages of Modularity • Easier application development • Network can change without all programs being modified

  10. ticket (complain) baggage (claim) gates (unload) runway landing airplane routing ticket (purchase) baggage (check) gates (load) runway takeoff airplane routing airplane routing Organization of air travel • a series of steps

  11. ticket ticket (purchase) baggage (check) gates (load) runway (takeoff) airplane routing ticket (complain) baggage (claim gates (unload) runway (land) airplane routing baggage gate airplane routing airplane routing takeoff/landing airplane routing departure airport intermediate air-traffic control centers arrival airport Layering of airline functionality Layers: each layer implements a service • via its own internal-layer actions • relying on services provided by layer below

  12. Three-Layer Model • Distributed data communications involves three primary components: • Networks • Computers • Applications • Three corresponding layers • Network access layer • Transport layer • Application layer

  13. Network Access Layer • Concerned with exchange of data between computer and network • Includes addressing, routing, prioritizing, etc • Different networks require different software at this layer • Example: X.25 standard for network access procedures on packet-switching networks

  14. Transport Layer • Concerned with reliable transfer of information between applications • Independent of the nature of the application • Includes aspects like flow control and error checking

  15. Application Layer • Logic needed to support various applications • Each type of application (file transfer, remote access) requires different software on this layer

  16. Addressing • Each computer on a network requires a unique address on that network • Each application requires a unique address within the computer to allow support for multiple applications (service access points, or SAP)

  17. Data Transmission • Application layer creates data block • Transport layer appends header to create PDU (protocol data unit) • Destination SAP, Sequence #, Error-Detection Code • Network layer appends another header • Destination computer, facilities (e.g. “priority”)

  18. Simplified Architecture

  19. Protocol Architecture Operation

  20. Standardised Protocol Architectures • Vendors like standards because they make their products more marketable • Customers like standards because they enable products from different vendors to interoperate • Two protocol standards are well-known: • TCP/IP: widely implemented • OSI: less used, but widely known and still useful for modeling/conceptualizing

  21. Transmission Control Protocol/Internet Protocol Developed by DARPA No official protocol model Identified by 5 Layers Application Host-to-Host (transport) Internet (Network) Network Access (link) Physical TCP/IP

  22. network link physical link physical M M M Ht M Hn Hn Hn Hn Ht Ht Ht Ht M M M M Hn Ht Ht Hl Hl Hl Hn Hn Hn Ht Ht Ht M M M source Encapsulation message application transport network link physical segment datagram frame switch destination application transport network link physical router

  23. TCP/IP Physical Layer • Physical interface between a DTE (e.g. computer or terminal) and a transmission medium • Specifies: • Characteristics of medium • Nature of signals • Data rate

  24. TCP/IP Network Access (link) • Exchange of data between systems on a shared network • Utilizes address of host and destination • Can also prioritize transmission • Software at this layer depends on network (e.g. X.25 vs. Ethernet)

  25. TCP/IP Internet Layer • An Internet is an interconnection of two or more networks • Internet layer handles tasks similar to network access layer, but between networks rather than between nodes on a network • Uses IP for addressing and routing across networks • Implemented in workstations and routers

  26. TCP/IP Transport Layer • Also called host-to-host layer • Reliable exchange of data between applications • Uses TCP protocols for transmission

  27. TCP/IP Application Layer • Logic needed to support variety of applications • Separate module supports each type of application (e.g. file transfer)

  28. TCP & UDP • Most TCP/IP applications use TCP for transport layer • TCP provides a connection (logical association) between two entities to regulate flow check errors • UDP (User Datagram Protocol) does not maintain a connection, and therefore does not guarantee delivery, preserve sequences, or protect against duplication

  29. TCP service • Reliable, in-order byte-stream data transfer • loss: acknowledgements and retransmissions • Flow control: • sender won’t overwhelm receiver • Congestion control: • senders “slow down sending rate” when network congested

  30. Goal: data transfer between end systems same as TCP UDP - User Datagram Protocol : connectionless unreliable data transfer no flow control no congestion control App’s using TCP: HTTP (Web), FTP (file transfer), Telnet (remote login), SMTP (email) App’s using UDP: streaming media, teleconferencing, DNS, Internet telephony UDP

  31. IP and IPv6 • IP provides for 32-bit source and destination addresses • IPv6 (1996 standard) provides for 128-bit addresses • Migration to IPv6 will be a very slow process

  32. TCP/IP Applications • SMTP (Simple Mail Transfer Protocol) • Basic e-mail facility, transferring messages among hosts • FTP (File Transfer Protocol) • Sends files from one system to another on user command • Telnet • Remote login capability, allowing a user to emulate a terminal on the remote system

  33. Internetworking • Interconnected networks, usually implies TCP/IP • Can appear to users as a single large network • The global Internet is the largest example, but intranets and extranets are also examples

  34. Origins of the OSI reference model • The early development of LANs, MANs, and WANs was chaotic in many ways. The early 1980s saw tremendous increases in the number and sizes of networks. • As companies realized that they could save money and gain productivity by using networking technology, they added networks and expanded existing networks as rapidly as new network technologies and products were introduced. • By the middle of the 1980s, companies began to experience difficulties from all the expansions they had made. It became more difficult for networks using different specifications and implementations to communicate with each other. To address the problem of networks being incompatible and unable to communicate with each other, the International Organization for Standardization (ISO) researched different network schemes.As a result of this research, the ISO created a model that would help vendors create networks that would be compatible with, and operate with, other networks. • the OSI reference model describes how data travels from application programs (for example, spreadsheets), through a network medium, to an application program located in another computer, even if the sender and receiver are connected using different network media.

  35. Open Systems Interconnection Developed by ISO Contains seven layers OSI

  36. OSI Lower Layers • Physical • Data Link • Network

  37. OSI Physical Layer • Responsible for transmission of bits--binary transmission • Always implemented through hardware • This layer outlines the functional, procedural, electrical, and mechanical specifications for controlling physical links. The specifications relate to the activation, maintenance, and deactivation of physical links. It also controls the transmitting of data onto physical media. • e.g. RS-232 • A “hub” operates at this layer

  38. OSI Data Link Layer • The data-link layer arranges bits from the physical layer into logical chunks of data, known as frames. A frame is a contiguous series of data with a common function. Framing enables the network to organize bits into a logical data format and send them to the correct computer. • This layer controls how data is formatted and how transmission on the network is controlled • Responsible for error-free, reliable transmission of data • Flow control, error correction • Controls access to the medium • e.g. HDLC, ethernet • A “switch” operates at this layer

  39. OSI Network Layer • Responsible for routing of messages through network • ensures data delivery by providing connectivity and path selection between two host systems. • selects the most appropriate path for sending data, and routes data packets • Concerned with type of switching used (circuit v. packet) • Handles routing between networks, as well as through packet-switching networks • provides logical LAN-to-LAN communications by supporting the routing of data between different networks • IP protocol and IP addressing at this layer • A “router” operates at this layer

  40. OSI Upper Layers • Transport • Session • Presentation • Application

  41. OSI Transport Layer • Aids point-to-point communications • Isolates messages from lower and upper layers • Provides reliability in the transportation of data between hosts and ensures complete data transfer. The transport layer uses error detection and recovery information flow control to establish, maintain, and terminate all virtual circuits. • Breaks down message size • Monitors quality of communications channel • Selects most efficient communication service necessary for a given transmission • TCP/UDP operate at this layer

  42. OSI Session Layer • Establishes logical connections between hosts:connection establishment, data transfer, and connection release • Manages log-ons, password exchange, log-offs • Terminates connection at end of session

  43. OSI Presentation Layer • manages data representation • transforms data into a mutually agreed format that each application can understand • Provides format and code conversion services • Examples • File conversion from ASCII to EBDIC(Extended Binary-Coded Decimal Interchange Code ) • Encryption and compression • Invoking character sequences to generate bold, italics, etc on a printer

  44. OSI Application Layer • Provides access to network for end-user • User’s capabilities are determined by what items are available on this layer

  45. Layering: The OSI Model layer-to-layer communication Application Application 7 7 Presentation Presentation 6 6 Session Session 5 5 Peer-layer communication Transport Transport Router Router 4 4 Network Network Network Network 3 3 Link Link Link Link 2 2 Physical Physical Physical Physical 1 1

  46. FTP ASCII/Binary TCP IP Ethernet TCP/IP - OSI Comparison Application Application Presentation Transport Session Transport Network Network Link Link Physical The 4-layer Internet model The 7-layer OSI Model

  47. 1 20 2 3 4 19 18 17 14 5 15 6 11 8 16 7 12 9 13 10 Example: FTP over the Internet Using TCP/IP and Ethernet App App “A” Stanford “B” (MIT) OS OS Ethernet Ethernet R5 R1 R2 R3 R4

  48. In the sending host • Application-Programming Interface (API) • Application requests TCP connection with “B” • Transmission Control Protocol (TCP) • Creates TCP “Connection setup” packet • TCP requests IP packet to be sent to “B” TCP Packet TCP Data TCP Header Type = Connection Setup Empty

  49. TCP Data TCP Header In the sending host (2) 3. Internet Protocol (IP) • Creates IP packet with correct addresses. • IP requests packet to be sent to router. TCP Packet Encapsulation Destination Address: IP “B” Source Address: IP “A” Protocol = TCP IP Data IP Header IP Packet

  50. IP Data IP Header In the sending host (3) 4. Link (“MAC” or Ethernet) Protocol • Creates MAC frame with Frame Check Sequence (FCS). • Wait for Access to the line. • MAC requests PHY to send each bit of the frame. IP Packet Destination Address: MAC “R1” Source Address: MAC “A” Protocol = IP Encapsulation Ethernet FCS Ethernet Data Ethernet Header Ethernet Packet

More Related