lecture for chapter 2.5 (fall 08)
TRANSCRIPT
![Page 1: Lecture for Chapter 2.5 (Fall 08)](https://reader034.vdocuments.us/reader034/viewer/2022042815/5576391ed8b42a015c8b51de/html5/thumbnails/1.jpg)
Communication Network Protocols
Jaya KalidindiCSC 8320(fall 2008)
![Page 2: Lecture for Chapter 2.5 (Fall 08)](https://reader034.vdocuments.us/reader034/viewer/2022042815/5576391ed8b42a015c8b51de/html5/thumbnails/2.jpg)
Overview
Network Protocols OSI Protocol Suite TCP/IP Protocol Suite Protocol Examples in Internet Network References
![Page 3: Lecture for Chapter 2.5 (Fall 08)](https://reader034.vdocuments.us/reader034/viewer/2022042815/5576391ed8b42a015c8b51de/html5/thumbnails/3.jpg)
Network Protocols
Network protocols are sets of standard rules : To regulate the exchange of messages
For Representing the data,authentication and error detection.
To provide a reliable communication.
![Page 4: Lecture for Chapter 2.5 (Fall 08)](https://reader034.vdocuments.us/reader034/viewer/2022042815/5576391ed8b42a015c8b51de/html5/thumbnails/4.jpg)
What does a protocol tell us?
Syntax of a message what fields does it contain? in what format?
Semantics of a message what does a message mean? for example, not-OK message means
receiver got a corrupted file Actions to take on receipt of a message
for example, on receiving not-OK message, retransmit the entire file
![Page 5: Lecture for Chapter 2.5 (Fall 08)](https://reader034.vdocuments.us/reader034/viewer/2022042815/5576391ed8b42a015c8b51de/html5/thumbnails/5.jpg)
Protocol layering
A network that provides many services needs many protocols
Turns out that some services are independent but others depend on each other
Protocol A may use protocol B as a step in its execution for example, packet transfer is one step in the
execution of the example reliable file transfer protocol This form of dependency is called layering
reliable file transfer is layered above packet transfer protocol
like a subroutine
![Page 6: Lecture for Chapter 2.5 (Fall 08)](https://reader034.vdocuments.us/reader034/viewer/2022042815/5576391ed8b42a015c8b51de/html5/thumbnails/6.jpg)
OSI Protocal Suite
![Page 7: Lecture for Chapter 2.5 (Fall 08)](https://reader034.vdocuments.us/reader034/viewer/2022042815/5576391ed8b42a015c8b51de/html5/thumbnails/7.jpg)
![Page 8: Lecture for Chapter 2.5 (Fall 08)](https://reader034.vdocuments.us/reader034/viewer/2022042815/5576391ed8b42a015c8b51de/html5/thumbnails/8.jpg)
Physical Layer
First level in Network Layer Handles all the physical aspects of
communication between two directly connected physical entities.
Provides the basis for higher level communication services.
Main functionality is to transmit bits.
![Page 9: Lecture for Chapter 2.5 (Fall 08)](https://reader034.vdocuments.us/reader034/viewer/2022042815/5576391ed8b42a015c8b51de/html5/thumbnails/9.jpg)
Data Link Layer
This layer accepts the bit streams provided by the physical layer .
Provides reliability of transfer of data between two directly connected entities.
Its functionality includes error detection control, flow control and access control.
Divided into two sub-layers: Medium Access Control Logical Link Control
![Page 10: Lecture for Chapter 2.5 (Fall 08)](https://reader034.vdocuments.us/reader034/viewer/2022042815/5576391ed8b42a015c8b51de/html5/thumbnails/10.jpg)
MAC sub-layer
Defines means by which physical means may be accessed.
It co-ordinates to seize a shared channel by multiple MAC entities.
Provides a limited form of error control.
Ethernet is an example of a shared medium with defined MAC sub-layer functionality.
![Page 11: Lecture for Chapter 2.5 (Fall 08)](https://reader034.vdocuments.us/reader034/viewer/2022042815/5576391ed8b42a015c8b51de/html5/thumbnails/11.jpg)
LLC sub-layer
It is responsible of reliable transfer of message-link protocol data units between two directly connected layer 2 entities.
LLC services can be Connection oriented: Frames are
individually numbered and acknowledged by their sequence number.
Connection-less: Messages are not acknowledged.
![Page 12: Lecture for Chapter 2.5 (Fall 08)](https://reader034.vdocuments.us/reader034/viewer/2022042815/5576391ed8b42a015c8b51de/html5/thumbnails/12.jpg)
Data link layer
![Page 13: Lecture for Chapter 2.5 (Fall 08)](https://reader034.vdocuments.us/reader034/viewer/2022042815/5576391ed8b42a015c8b51de/html5/thumbnails/13.jpg)
Transport Layer
Concerned with getting level 4 messages form source to destination in a reliable manner.
Functions are: Windowing and flow control. Error detection and recovery. Multiplexing.
![Page 14: Lecture for Chapter 2.5 (Fall 08)](https://reader034.vdocuments.us/reader034/viewer/2022042815/5576391ed8b42a015c8b51de/html5/thumbnails/14.jpg)
![Page 15: Lecture for Chapter 2.5 (Fall 08)](https://reader034.vdocuments.us/reader034/viewer/2022042815/5576391ed8b42a015c8b51de/html5/thumbnails/15.jpg)
Continued…
Two types of service quality:
Reliable service: makes sure that data is not lost and provides data error-free to the user.
Un-reliable service: does not have a mechanism to show that receiver has received the data sent.
![Page 16: Lecture for Chapter 2.5 (Fall 08)](https://reader034.vdocuments.us/reader034/viewer/2022042815/5576391ed8b42a015c8b51de/html5/thumbnails/16.jpg)
Network Layer
Used to support data communication between indirectly connected entities.
Has the ability to forward messages from layer 3 entity to another, until final destination is reached.
Functions are: Routing Forwarding packets to final destination
port. Providing logical addressing.
![Page 17: Lecture for Chapter 2.5 (Fall 08)](https://reader034.vdocuments.us/reader034/viewer/2022042815/5576391ed8b42a015c8b51de/html5/thumbnails/17.jpg)
Session layer
Controls communication or dialogues between applications on hosts.
Synchronization is achieved at coordinated timing .
NFS, NetBios, SQL are some examples.
![Page 18: Lecture for Chapter 2.5 (Fall 08)](https://reader034.vdocuments.us/reader034/viewer/2022042815/5576391ed8b42a015c8b51de/html5/thumbnails/18.jpg)
Session initiation protocol
![Page 19: Lecture for Chapter 2.5 (Fall 08)](https://reader034.vdocuments.us/reader034/viewer/2022042815/5576391ed8b42a015c8b51de/html5/thumbnails/19.jpg)
Presentation Layer
Performs data transformation or formatting if required by the end applications.
Functions are: Data compression File formatting Encryption
• MPEG, Quicktime are some examples.
![Page 20: Lecture for Chapter 2.5 (Fall 08)](https://reader034.vdocuments.us/reader034/viewer/2022042815/5576391ed8b42a015c8b51de/html5/thumbnails/20.jpg)
Application Layer
Provides services that directly support an application that runs on the host.
Most network management activities are based on services provided by the layer 7.
FTP, Telnet, SNMP, SMTP are some examples.
![Page 21: Lecture for Chapter 2.5 (Fall 08)](https://reader034.vdocuments.us/reader034/viewer/2022042815/5576391ed8b42a015c8b51de/html5/thumbnails/21.jpg)
OSI vsTCP/IP
![Page 22: Lecture for Chapter 2.5 (Fall 08)](https://reader034.vdocuments.us/reader034/viewer/2022042815/5576391ed8b42a015c8b51de/html5/thumbnails/22.jpg)
FTP (file transfer control )
Allows users to access remote file servers, list remote directories, and move files to or from remote hosts.
FTP understands basic file formats and can transfer files in ASCII character or binary format., FTP provides a standard
UNIX-like user interface, regardless of the actual underlying operating system.
![Page 23: Lecture for Chapter 2.5 (Fall 08)](https://reader034.vdocuments.us/reader034/viewer/2022042815/5576391ed8b42a015c8b51de/html5/thumbnails/23.jpg)
Telnet
Telnet provides a remote terminal access protocol running over Transport Control Protocol. It allows a user at one site to establish a virtual circuit connection to a remote system
Using Telnet, a user at one
host can login to another host, appearing like directly attached.
![Page 24: Lecture for Chapter 2.5 (Fall 08)](https://reader034.vdocuments.us/reader034/viewer/2022042815/5576391ed8b42a015c8b51de/html5/thumbnails/24.jpg)
SNMP
Is an application service that has evolved with the growth of TCP/IP. It was derived from a low-overhead protocol designed to monitor Internet
routers
![Page 25: Lecture for Chapter 2.5 (Fall 08)](https://reader034.vdocuments.us/reader034/viewer/2022042815/5576391ed8b42a015c8b51de/html5/thumbnails/25.jpg)
UDP
The User Datagram Protocol (UDP) is a Transport Layer protocol in the TCP/IP protocol suite. UDP provides a connectionless, best effort delivery service
UDP.
![Page 26: Lecture for Chapter 2.5 (Fall 08)](https://reader034.vdocuments.us/reader034/viewer/2022042815/5576391ed8b42a015c8b51de/html5/thumbnails/26.jpg)
SMTP
Email is the most widely used application on the Internet (although it does not account for the highest volume of traffic). The Simple mail transfer protocol (SMTP) provides a simple, text-oriented protocol to transfer mail reliably between TCP/IP-based systems
![Page 27: Lecture for Chapter 2.5 (Fall 08)](https://reader034.vdocuments.us/reader034/viewer/2022042815/5576391ed8b42a015c8b51de/html5/thumbnails/27.jpg)
Reference
R. Chow and T. Johnson. Distributed Operating Systems & Algorithms. 1997
Jim Kurose, Keith Ross, Computer Networking: A Top Down Approach Featuring the Internet, 3rd edition. Addison-Wesley, July 2004.
Cisco Systems, OSI Network Protocols, October 2006.
Diagrams:www.wikipedia.org,www. google.com
![Page 28: Lecture for Chapter 2.5 (Fall 08)](https://reader034.vdocuments.us/reader034/viewer/2022042815/5576391ed8b42a015c8b51de/html5/thumbnails/28.jpg)
TCP/IP
![Page 29: Lecture for Chapter 2.5 (Fall 08)](https://reader034.vdocuments.us/reader034/viewer/2022042815/5576391ed8b42a015c8b51de/html5/thumbnails/29.jpg)
![Page 30: Lecture for Chapter 2.5 (Fall 08)](https://reader034.vdocuments.us/reader034/viewer/2022042815/5576391ed8b42a015c8b51de/html5/thumbnails/30.jpg)
THANK YOU