1 / 66

Behrouz A. Forouzan TCP/IP Protocol Suite, 3 rd Ed.

Behrouz A. Forouzan TCP/IP Protocol Suite, 3 rd Ed. Introduction and review. PROTOCOLS AND STANDARDS.

maryanns
Download Presentation

Behrouz A. Forouzan TCP/IP Protocol Suite, 3 rd Ed.

An Image/Link below is provided (as is) to download presentation Download Policy: Content on the Website is provided to you AS IS for your information and personal use and may not be sold / licensed / shared on other websites without getting consent from its author. Content is provided to you AS IS for your information and personal use only. Download presentation by click this link. While downloading, if for some reason you are not able to download a presentation, the publisher may have deleted the file from their server. During download, if you can't get a presentation, the file might be deleted by the publisher.

E N D

Presentation Transcript


  1. Behrouz A. Forouzan TCP/IP Protocol Suite, 3rd Ed. Introduction and review

  2. PROTOCOLS AND STANDARDS • In this section, we define two widely used terms: protocols and standards. First, we define protocol, which is synonymous with rule. Then we discuss standards, which are agreed-upon rules.

  3. PROTOCOLS • Two entities (anything capable of sending or receiving information) can’t simply send bit streams to each other and expect to be understood. • So, the entities must agree on a protocol. • A protocol is a set of rules that govern data communications. • A protocol defines what is communicated, how it is communicated, and when it is communicated

  4. PROTOCOLS • Key elements of protocol are: • Syntax • refers to the structure or format of the data • first 8 bits = source address. • Semantics • refers to the meaning of each section of bits. • How is a particular pattern to be interpreted. • What action is to be taken based on that interpretation. • e.g. does an address identify the route to be taken or the final destination of the message.

  5. PROTOCOLS • Timing • When data should be sent. • How fast they can be sent. • E.g. matching the speed between the sender and receiver

  6. STANDARDS • Standards are essential for creating a competitive market for equipment and guaranteeing interoperability of data and telecommunication.

  7. STANDARDS • Two categories: • De facto: Standards that have not been approved by an organized body but have been adopted as standards through widespread use. • De jure: Standards that have been legislated by an officially recognized body. • Standards are developed through the cooperation of standards creation committees, forums, and government regulatory agencies.

  8. Internet standard • An Internet standard is a thoroughly tested specification that is useful and adhered to those who work with the internet. • There is a strict procedure by which a specification attains Internet standard status. • A specification begins as an internet draft. • Internet draft is a working document (work in progress) with no official status and a 6 month lifetime.

  9. Internet standard • After recommendation from the Internet authority, a draft may be published as a Request for Comment (RFC). • Each RFC is edited, assigned a number, and made available to all interested parties. • Then, RFC might become a standard after going through maturity levels

  10. Maturity levels of an RFC

  11. Maturity levels of an RFC • Proposed Standard A proposed standard is a specification that is stable, well understood, and of sufficient interest to the Internet community. At this level, the specification is usually tested and implemented by several different groups. • Draft Standard A proposed standard is elevated to draft standard status after at least two successful independent and interoperable implementations. Barring difficulties, a draft standard, with modifications if specific problems are encountered, normally becomes an Internet standard.

  12. Maturity levels of an RFC • Internet Standard A draft standard reaches Internet standard status after demonstrations of successful implementation. • Historic The historic RFCs are significant from a historical perspective. They either have been superseded by later specifications or have never passed the necessary maturity levels to become an Internet standard.

  13. Maturity levels of an RFC • Experimental • An RFC classified as experimental describes work related to an experimental situation that does not affect the operation of the Internet. Such an RFC should not be implemented in any functional Internet service. • Informational • An RFC classified as informational contains general, historical, or tutorial information related to the Internet. It is usually written by someone in a non-Internet organization, such as a vendor.

  14. Requirement levels of an RFC

  15. Requirement levels of an RFC • Required An RFC is labeled required if it must be implemented by all Internet systems to achieve minimum conformance. For example, IP and ICMP are required protocols. • Recommended An RFC labeled recommended is not required for minimum conformance; it is recommended because of its usefulness. For example, FTP and TELNET are recommended protocols.

  16. Requirement levels of an RFC • Elective An RFC labeled elective is not required and not recommended. However, a system can use it for its own benefit. • Limited Use An RFC labeled limited use should be used only in limited situations. Most of the experimental RFCs fall under this category. • Not Recommended An RFC labeled not recommended is inappropriate for general use. Normally a historic (deprecated) RFC may fall under this category.

  17. The OSI Model

  18. The OSI Model

  19. Organization of the Layers • Layers 1, 2, and 3—physical, data link, and network—are the network support layers; they deal with the physical aspects of moving data from one device to another (such as electrical specifications, physical connections, physical addressing, and transport timing and reliability). • Layers 5, 6, and 7—session, presentation, and application—can be thought of as the user support layers • Layer 4, the transport layer, links the two subgroups and ensures that what the lower layers have transmitted is in a form that the upper layers can use. • The upper OSI layers are almost always implemented in software; lower layers are a combination of hardware and software, except for the physical layer, which is mostly hardware.

  20. The OSI Model

  21. OSI Model Layers

  22. Physical Layer • The physical layer is concerned with transmitting raw bits over a communication channel. • It deals with mechanical and electrical specifications of interfaces and medium. • It also defines the procedures and functions that physical devices and interfaces have to perform for transmission to occur.

  23. Physical Layer • The physical layer is also concerned with the following: • Physical characteristics of interfaces and media. The physical layer defines the characteristics of the interface between the devices and the transmission media. It also defines the type of transmission media. • Representation of bits. The physical layer data consists of a stream of bits (sequence of 0s or 1s) with no interpretation. To be transmitted, bits must be encoded into signals—electrical or optical. The physical layer defines the type of encoding (how 0s and 1s are changed to signals).

  24. Physical Layer • Data rate. The transmission rate—the number of bits sent each second—is also defined by the physical layer. In other words, the physical layer defines the duration of a bit, which is how long it lasts. • Synchronization of bits. The sender and receiver must not only use the same bit rate but must also be synchronized at the bit level. In other words, the sender and the receiver clocks must be synchronized. • Line configuration. The physical layer is concerned with the connection of devices to the media. In a point-to-point configuration, two devices are connected together through a dedicated link. In a multipoint configuration, a link is shared between several devices.

  25. Physical Layer • Physical topology. The physical topology defines how devices are connected to make a network. Devices can be connected using a mesh topology (every device connected to every other device), a star topology (devices are connected through a central device), a ring topology (each device is connected to the next, forming a ring), or a bus topology (every device on a common link). • Transmission mode. The physical layer also defines the direction of transmission between two devices: simplex, half-duplex, or full-duplex.

  26. Physical Layer

  27. Physical Layer Example

  28. Physical layer

  29. Data Link Layer • The data link layer is responsible for moving frames from one hop (node) to the next.

  30. Data Link Layer • The data link layer transform the physical layer, a raw transmission facility, to a reliable link. • It makes the physical layer appear error-free. • Framing • Physical Addressing • Flow Control • Error Control • Access Control • Determine which device has control over the link

  31. Data Link Layer

  32. Data Flow from Data Link Layer

  33. Hop-to-hop delivery

  34. Network Layer • The network layer is responsible for the delivery of individual packets from the source host to the destination host.

  35. Network Layer • Logical Addressing • The physical addressing implemented by the data link layer handles the addressing problem locally.(same link) • If a packet passes the network boundary, we need another addressing system to help distinguish the source and destination systems. (different links) • Routing

  36. Network Layer

  37. Data Flow from Network Layer

  38. Source-to-destination delivery

  39. Transport Layer • The transport layer is responsible for the delivery of a message from one process to another.

  40. Transport Layer • Service-Point Addressing • Computers run several programs at the same time. • Process-to-process delivery means delivery from a specific process (running program) on one computer to a specific process on the other. • The transport layer header must include a type of address called a service point address. • Segmentation and Reassembly • A message is divided into transmittable segments. • Each segment containing a sequence number.

  41. Transport Layer • Connection Control • The transport layer can be either connectionless or connection-oriented. • Flow Control • Error Control

  42. Process-to-Process delivery

  43. Session Layer • The session layer is responsible for dialog control and synchronization.

  44. Session Layer • Dialog control • Allows two systems to enter into a dialog.(half/full duplex) • Synchronization • Allows a process to add checkpoints, to a stream of data.

  45. Presentation Layer • The presentation layer is concerned with the syntax and semantics of the information exchanged between two systems.

  46. Presentation Layer • Translation • The processes in two systems are usually exchanging information in the form of character strings, numbers, and so on. • The information must be changed to bit streams before being transmitted. • Encryption • Encryption means that the sender transform the original information to another form and sends the resulting message out over the network.

  47. Presentation Layer • Decryption reverses the original process to transform the message back to its original form. • compression • Data compression reduces the number of bits contained in the information.

  48. Application Layer • It enables the user to access the network. • contains a variety of protocols that are commonly needed by users.

  49. Application Layer • Network Virtual Terminal • It allows user to log on to a remote host. • File Transfer, Access and Management • It allows user to access and manage files in a remote host. • Mail Services • Directory Services • It provides distributed database sources and access for global information about various objects and services.

  50. Summary of layers

More Related