3 layers
TRANSCRIPT
-
8/14/2019 3 Layers
1/37
-
8/14/2019 3 Layers
2/37
Types of Applications
Direct Network Applications Most applications that work in a networked
environment are classified as client-server applications. These applications, such as
FTP, web browsers, and e-mail, all have twocomponents, which allow them to function -the client side, and the server side. The clientside is located on the local computer and is
the requestor of the services. The server sideis located on a remote computer and providesservices in response to the client's requests.
-
8/14/2019 3 Layers
3/37
Direct Network Applications(cont.)
A client-server application works by constantly repeating the followinglooped routine: client-request, server-response; client-request, server-response; etc. For example, a web browser accesses a web page byrequesting a uniform resource locator (URL), or web address, on a
remote web server. After it locates the URL, the web server that isidentified by that URL responds to the request. Then, based on theinformation received from the web server, the client can request moreinformation from the same web server, or can access another webpage from a different web server.
-
8/14/2019 3 Layers
4/37
Types of Applications
Indirect Network Applications Within a LAN environment, indirect-application
network support is a client-server function. If aclient wants to save a file from a word processor to a network server, the redirector enables theword processing application to become a networkclient.
Redirector is a protocol that works with computer operating systems and network clients instead of specific application programs
-
8/14/2019 3 Layers
5/37
Indirect Network Applications(cont.)
Examples of redirectors Apple File Protocol NetBIOS Extended User Interface (NetBEUI)
Novell IPX/SPX Protocols Network File System (NFS) of the TCP/IP Protocol
Suite
-
8/14/2019 3 Layers
6/37
Indirect Network Applications(cont.)
The requester software is part of the network client software that isinstalled on the client computer of a network. The requester (redirector) part of the software works with client computersoperating system to determine if the operation that is to be performedneeds to use network resources or local computer resources.
-
8/14/2019 3 Layers
7/37
Indirect Network Applications(cont.)
A redirector (requester) will allow a local companyto use network storage devices as if they werelocally attached. This is done through the use of drive mappings.
-
8/14/2019 3 Layers
8/37
Presentation Layer (Layer 6)
The presentation layer is responsible for presenting data in a formthat the receiving device can understand. To better understand theconcept, use the analogy of two people speaking differentlanguages. The only way for them to understand each other is tohave another person translate. The presentation layer serves as thetranslator for devices that need to communicate over a network
Insures data is readable by receving system Deals with format of the data and data structures Negotiates data transfer syntax for application layer
Examples JPEG, ASCII, EBCDIC,TIFF, GIF, PICT, encryption, MPEG, MIDI, etc.
-
8/14/2019 3 Layers
9/37
Presentation Layer
Three Main Functions Data Formatting (Presentation) Data Encryption
Data Compression
-
8/14/2019 3 Layers
10/37
Data Formatting ASCII - Interchange EBCDIC - Extended Binary Coded
Decimal Interchange CodePICT - a picture format used totransfer QuickDraw graphics betweenprograms on the MAC operatingsystemTIFF (Tagged Image File Format) - aformat for high-resolution, bit-mappedimagesJPEG (Joint Photographic ExpertsGroup) - graphic format used mostoften to compress still images of complex pictures and photographsMIDI (Musical Instrument DigitalInterface) - for digitized musicMPEG (Motion Picture Experts Group)- standard for the compression andcoding of motion video for CDs anddigital storageQuickTime - a standard that handlesaudio and video for programs on bothMAC and PC operating system
-
8/14/2019 3 Layers
11/37
Session Layer (Layer 5) The session layer defines how to start, control, and end
conversations (called sessions). This includes the control andmanagement of multiple bidirectional messages so that theapplication can be notified if only some of a series of messagesare completed. This allows the presentation layer to have aseamless view of an incoming stream of data. The presentation
layer can be presented with data if all flows occur in somecases. For example, an automated teller machine transactionin which you withdraw cash from your checking account shouldnot debit your account, and then fail, before handing you thecash, recording the transaction even though you did notreceive money. The session layer creates ways to imply whichflows are part of the same session and which flows must
complete before any are considered complete. RPC, SQL, NFS, NetBIOS names, AppleTalk ASP, DECnet SCP
-
8/14/2019 3 Layers
12/37
Session Layer (cont.)
Accounting, conversation control who can talk when, and session parameter negotiation.
Dialogue control and seperation enable applications to communicate between the source and
destination
-
8/14/2019 3 Layers
13/37
Session Layer (cont.)Dialogue Control
Two-way alternate communication Communication partners take turns while sending messages to
avoid interrupting each other. For example; Internet Relay Chat (IRC)
Two-way simultaneous communication Communication partners send each other whatever they want
without waiting turns. Synchronization Problem
-
8/14/2019 3 Layers
14/37
Session Layer (cont.)Dialogue Seperation
Dialogue separation is the orderly initiation,termination, and managing of communication.The main graphic illustrates a minor synchronization. At the "Time Axis,
t = checkpoint", the host A session layer sends a synchronization message to host B, atwhich time both hosts perform the followingroutine:
1. back up the particular files2. save the network settings3. save the clock settings4. make note of the end point in the
conversation
A major synchronization would involve more back-and-forth steps and conversation than is shown in thisdiagram.
-
8/14/2019 3 Layers
15/37
Session Layer (cont.)Dialogue Seperation
Checkpointing is similar tothe way a word processor on a stand-alone computer pauses for a second when itperforms an AutoSave of the current document.However, these checkpointsare used, instead, toseparate parts of a sessionpreviously referred to asdialogues.
-
8/14/2019 3 Layers
16/37
Session Layer Protocols
Network File System (NFS) Structured Query Language (SQL) Remote Procedure Call (RPC)
X-Window System AppleTalk Session Protocol (ASP) Digital Network Architecture Session Control
Protocol (DNA SCP)
-
8/14/2019 3 Layers
17/37
The Transport Layer
Layer 4 of the OSI reference model. This layer isresponsible for reliable network communicationbetween end nodes. The transport layer providesmechanisms for the establishment, maintenance,
and termination of virtual circuits, transport faultdetection and recovery, and information flowcontrol.
-
8/14/2019 3 Layers
18/37
TCP/IP Protocol Suite has twoTransport Layer Protocols (TCP & UDP)
TCP (Transmission Control Protocol) supplies a virtual circuitbetween end-user applications. These are its characteristics: connection-oriented reliable divides outgoing messages into segments reassembles messages at the destination station re-sends anything not received reassembles messages from incoming segments. flow control
UDP (User Datagram Protocol) transports data unreliably betweenhosts. Following are the characteristics of UDP : connectionless unreliable transmit messages (called user datagrams) provides no software checking for message delivery (unreliable) does not reassemble incoming messages uses no acknowledgments provides no flow control
-
8/14/2019 3 Layers
19/37
TCP/IP Protocol Graph
-
8/14/2019 3 Layers
20/37
TCP Segment Format
source port -- number of the callingport
destination port -- number of thecalled port
sequence number -- number usedto ensure correct sequencing of the arriving data
acknowledgment number - nextexpected TCP octet
HLEN -- number of 32-bit words inthe header
reserved -- set to zerocode bits -- control functions (such
as setup and termination of asession)
-
8/14/2019 3 Layers
21/37
TCP Segment Format (cont.)
window specifies the size of the sender s receivewindow (that is, the buffer space available for incoming data)
checksum -- calculatedchecksum of the header and data fields
urgent pointer -- indicatesthe end of the urgent data
option-one option --maximum TCP segment
sizedata -- upper-layer protocol
data
-
8/14/2019 3 Layers
22/37
UDP Datagram Format User Datagram Protocol (UDP) is the connectionless transport
protocol in the TCP/IP protocol stack. UDP is a simple protocol thatexchanges datagrams, without acknowledgments or guaranteeddelivery. Error processing and retransmission must be handled byother protocols.
UDP uses no windowing or acknowledgments, therefore applicationlayer protocols provide reliability. UDP is designed for applicationsthat do not need to put sequences of segments together.
Protocols that use UDP include: TFTP (Trivial File Transfer Protocol) SNMP (Simple Network Management Protocol) DHCP (Dynamic Host Control Protocol)
DNS (Domain Name System)
-
8/14/2019 3 Layers
23/37
Port Numbers
Both TCP and UDP use port (or socket) numbers to pass information to the upper layers. Port numbers areused to keep track of different conversations thatcross the network at the same time.
-
8/14/2019 3 Layers
24/37
Port Numbers (cont.)
Application software developers have agreed to usethe well-known port numbers that are defined in
RFC1700. Windows 2000 c:\winnt\system32\drivers\etc Linux/Unix /etc/services
Reserved Port Numbers Numbers 0 - 255 for public applications Numbers from 256-1023 assigned to companies
for marketable applications Numbers above 1024 -65536 are unregulated
-
8/14/2019 3 Layers
25/37
TCP Mechanisms
Data transfer Multiplexing Error recovery (reliability)
Flow control using windowing Connection establishment and termination
Exam Certification Guide Page 217
-
8/14/2019 3 Layers
26/37
Ordered Data Transfer
TCP accomplishes data transfer by establishing aconnection between a socket on each of theendpoint computers.
Applications use TCP services by opening asocket; TCP manages the delivery of the data tothe other socket.
A socket source/destination pair uniquelyidentifies a relationship between two applicationsin a network. TCP manages the ordered transferof data between these two sockets, using IPservices to deliver the data.
-
8/14/2019 3 Layers
27/37
Multiplexing
-
8/14/2019 3 Layers
28/37
Error Recovery Reliability
TCP provides sequencing of segments with a forward referenceacknowledgment. Each datagram is numbered before transmission. At thereceiving station, TCP reassembles the segments into a completemessage. If a sequence number is missing in the series, that segment isre-transmitted. Segments that are not acknowledged within a given time
period result in re-transmission Positive acknowledgment and retransmission, or PAR, is a common
technique many protocols use to provide reliability. With PAR, the sourcesends a packet, starts a timer, and waits for an acknowledgment beforesending the next packet. If the timer expires before the source receives anacknowledgment, the source retransmits the packet and starts the timer over again.
-
8/14/2019 3 Layers
29/37
Flow control using windowing Window size determines the amount of data
that you can transmit at one time beforereceiving an acknowledgment from thedestination. The larger the window sizenumber (bytes), the greater the amount of data that the host can transmit. After a hosttransmits the window-sized number of bytes,the host must receive an acknowledgmentthat the data has been received before it cansend any more messages. For example, witha window size of 1, each individual (1)segment must be acknowledged before youcan send the next segment.
TCP uses expectational acknowledgments ,meaning that the acknowledgment number
refers to the octet that is next expected. The"sliding" part, of sliding window , refers to thefact that the window size is negotiateddynamically during the TCP session. Thisresults in inefficient use of bandwidth by thehosts.
-
8/14/2019 3 Layers
30/37
Connection Establishment andTermination
Three-Way Handshake / Connection EstablishmentSYN & ACK Flags
Two single-bit portions of the flags field of the TCP header areused to signal the three-step process for connectionestablishment. Called the SYN and ACK flags, these bits have aparticularly interesting meaning. SYN means, Synchronize thesequence numbers, which is one necessary component in
initialization for TCP. The ACK field means the acknowledgmentfield is valid in this header.
-
8/14/2019 3 Layers
31/37
Connection Establishment andTermination
This four-way termination sequence is straightforward and usesan additional flag, called the FIN bit. (FIN is short for finished,as you might guess.) One interesting note: Before the devicereceiving the first FIN segment sends the third flow in thesequence, TCP notifies the application that the connection iscoming down. TCP waits on an acknowledgment from theapplication before sending the segment. Thats why the secondflow is required: To acknowledge the first so that the sidetaking down the connection doesnt start resending the first
TCP segment.
-
8/14/2019 3 Layers
32/37
The Domain Name System (DNS)
Internet is built on a hierarchicaladdressing scheme. All protocols uses 32-bit IP addresses for networkcommunication. They are difficult to remember Do not provide a functional logical grouping
Domain Name System Host name IP Address Mapping
-
8/14/2019 3 Layers
33/37
The Domain Name System(cont.)
The Domain Name System (DNS) is a distributeddatabase used by TCP/IP applications to map betweenhostnames and IP addresses
Each site maintains its own database in its DomainName Server or Internet Service Providers provides thisservice to their customers.
DNS Servers also resolves hostnames to IP addressesupon a client request (resolver function)
-
8/14/2019 3 Layers
34/37
Fully Qualified Domain Name (FQDN)
When using the Domain Name System, it is common to work with onlya part of the domain hierarchy, for example, the ral.ibm.com domain.The Domain Name System provides a simple method of minimizing thetyping necessary in this circumstance. If a domain name ends in a dot(for example, www.btegitim.com. ), it is assumed to be complete. This is
termed a fully qualified domain name (FQDN) or an absolutedomain name . However, if it does not end in a dot (for example,www.btegitim), it is incomplete and the DNS resolver may completethis, for example, by appending a suffix such as .com or .com.tr to thedomain name. The rules for doing this are implementation-dependentand locally configurable.
-
8/14/2019 3 Layers
35/37
Hierarchical Name Space
TLDs (Top Level Domains)
-
8/14/2019 3 Layers
36/37
Root Servers
If the name server doesn't contain the information requested, it mustcontact another name server. Not every server, however, knows howto contact every other server. Instead, every name server must knowhow to contact the root name servers. The root servers then know thename and location (i.e. IP address) of each authoritative name servers
for all the second-level domains. There are six root servers in theworld and every primary name server has to know the address of oneof root server.
-
8/14/2019 3 Layers
37/37
Resource Record Types / Query Types