presentation5
TRANSCRIPT
![Page 1: Presentation5](https://reader035.vdocuments.us/reader035/viewer/2022062703/5550e2a3b4c90513798b49e3/html5/thumbnails/1.jpg)
IE 20303
![Page 2: Presentation5](https://reader035.vdocuments.us/reader035/viewer/2022062703/5550e2a3b4c90513798b49e3/html5/thumbnails/2.jpg)
What is a Protocol?
• Allows entities (i.e. application programs) from different systems to communicate
• Shared conventions for communicating information are called protocols
• Defines a set of rules that govern the exchange of data
• Includes syntax, semantics, and timing
![Page 3: Presentation5](https://reader035.vdocuments.us/reader035/viewer/2022062703/5550e2a3b4c90513798b49e3/html5/thumbnails/3.jpg)
Why Use Protocol Architecture?
• Data communications requires complex procedures– Sender identifies data path/receiver– Systems negotiate preparedness– Applications negotiate preparedness– Translation of file formats
• For all tasks to occur, high level of cooperation is required
![Page 4: Presentation5](https://reader035.vdocuments.us/reader035/viewer/2022062703/5550e2a3b4c90513798b49e3/html5/thumbnails/4.jpg)
Modular Approach
• Breaks complex tasks into subtasks• Each module handles specific subset of tasks• Communication occurs– between different modules on the same system– between similar modules on different systems
![Page 5: Presentation5](https://reader035.vdocuments.us/reader035/viewer/2022062703/5550e2a3b4c90513798b49e3/html5/thumbnails/5.jpg)
Advantages of Modularity
• Easier application development• Network can change without all programs
being modified
![Page 6: Presentation5](https://reader035.vdocuments.us/reader035/viewer/2022062703/5550e2a3b4c90513798b49e3/html5/thumbnails/6.jpg)
Three-Layer Model
• Distributed data communications involves three primary components:– Networks– Computers– Applications
• Three corresponding layers– Network access layer– Transport layer– Application layer
![Page 7: Presentation5](https://reader035.vdocuments.us/reader035/viewer/2022062703/5550e2a3b4c90513798b49e3/html5/thumbnails/7.jpg)
Network Access Layer
• Concerned with exchange of data between computer and network
• Includes addressing, routing, prioritizing, etc• Different networks require different software
at this layer• Example: X.25 standard for network access
procedures on packet-switching networks
![Page 8: Presentation5](https://reader035.vdocuments.us/reader035/viewer/2022062703/5550e2a3b4c90513798b49e3/html5/thumbnails/8.jpg)
Transport Layer
• Concerned with reliable transfer of information between applications
• Independent of the nature of the application• Includes aspects like flow control and error
checking
![Page 9: Presentation5](https://reader035.vdocuments.us/reader035/viewer/2022062703/5550e2a3b4c90513798b49e3/html5/thumbnails/9.jpg)
Application Layer
• Logic needed to support various applications• Each type of application (file transfer, remote
access) requires different software on this layer
![Page 10: Presentation5](https://reader035.vdocuments.us/reader035/viewer/2022062703/5550e2a3b4c90513798b49e3/html5/thumbnails/10.jpg)
Addressing
• Each computer on a network requires a unique address on that network
• Each application requires a unique address within the computer to allow support for multiple applications (service access points, or SAP)
![Page 11: Presentation5](https://reader035.vdocuments.us/reader035/viewer/2022062703/5550e2a3b4c90513798b49e3/html5/thumbnails/11.jpg)
Data Transmission
• Application layer creates data block• Transport layer appends header to create PDU (protocol data unit)
– Destination SAP, Sequence #, Error-Detection Code• Network layer appends another header
– Destination computer, facilities (e.g. “priority”)
![Page 12: Presentation5](https://reader035.vdocuments.us/reader035/viewer/2022062703/5550e2a3b4c90513798b49e3/html5/thumbnails/12.jpg)
Protocol Architectures
![Page 13: Presentation5](https://reader035.vdocuments.us/reader035/viewer/2022062703/5550e2a3b4c90513798b49e3/html5/thumbnails/13.jpg)
Protocols in a Simplified Architecture
![Page 14: Presentation5](https://reader035.vdocuments.us/reader035/viewer/2022062703/5550e2a3b4c90513798b49e3/html5/thumbnails/14.jpg)
Transport PDU Headers
• Source port: indicates the application that sent the data
• Destination port: the appplication that the data is to be delivered to
• Sequence number: provides sequential ordering of segments
• Error-detection code: code that is a function of the contents of a segment (e.g., checksum or frame check sequence)
![Page 15: Presentation5](https://reader035.vdocuments.us/reader035/viewer/2022062703/5550e2a3b4c90513798b49e3/html5/thumbnails/15.jpg)
Network Access PDU (Packet Header)
• Source computer address: indicates the source of the packet
• Destination computer address: indicates the computer that the data is to be delivered to
• Facilities requests: indicates if the network is to make use of certain facilities such as priority
![Page 16: Presentation5](https://reader035.vdocuments.us/reader035/viewer/2022062703/5550e2a3b4c90513798b49e3/html5/thumbnails/16.jpg)
Standardized Protocol Architectures
• Vendors like standards because they make their products more marketable
• Customers like standards because they enable products from different vendors to interoperate
• Two protocol standards are well-known:– TCP/IP: widely implemented– OSI: less used, but widely known and still useful for
modeling/conceptualizing
![Page 17: Presentation5](https://reader035.vdocuments.us/reader035/viewer/2022062703/5550e2a3b4c90513798b49e3/html5/thumbnails/17.jpg)
TCP/IP
• Transmission Control Protocol/Internet Protocol
• Developed by DARPA• No official protocol standard
• Identifies 5 Layers– Application– Host-to-Host (transport)– Internet– Network Access– Physical
![Page 18: Presentation5](https://reader035.vdocuments.us/reader035/viewer/2022062703/5550e2a3b4c90513798b49e3/html5/thumbnails/18.jpg)
TCP/IP Physical Layer
• Physical interface between a DTE (e.g. computer or terminal) and a transmission medium
• Specifies:– Characteristics of medium– Nature of signals– Data rate
![Page 19: Presentation5](https://reader035.vdocuments.us/reader035/viewer/2022062703/5550e2a3b4c90513798b49e3/html5/thumbnails/19.jpg)
TCP/IP Network Access Layer
• Exchange of data between systems on a shared network
• Utilizes address of host and destination• Can also prioritize transmission• Software at this layer depends on network
(e.g. X.25 vs. Ethernet)• Segregation means that no other software
needs to be concerned about net specifics
![Page 20: Presentation5](https://reader035.vdocuments.us/reader035/viewer/2022062703/5550e2a3b4c90513798b49e3/html5/thumbnails/20.jpg)
TCP/IP Internet Layer
• An Internet is an interconnection of two or more networks
• Internet layer handles tasks similar to network access layer, but between networks rather than between nodes on a network
• Uses IP for addressing and routing across networks• Implemented in workstations and routers
![Page 21: Presentation5](https://reader035.vdocuments.us/reader035/viewer/2022062703/5550e2a3b4c90513798b49e3/html5/thumbnails/21.jpg)
TCP/IP Transport Layer
• Also called host-to-host layer• Reliable exchange of data between
applications• Uses TCP protocols for transmission
![Page 22: Presentation5](https://reader035.vdocuments.us/reader035/viewer/2022062703/5550e2a3b4c90513798b49e3/html5/thumbnails/22.jpg)
TCP/IP Application Layer
• Logic needed to support variety of applications
• Separate module supports each type of application (e.g. file transfer)
![Page 23: Presentation5](https://reader035.vdocuments.us/reader035/viewer/2022062703/5550e2a3b4c90513798b49e3/html5/thumbnails/23.jpg)
Operation of TCP/IP
![Page 24: Presentation5](https://reader035.vdocuments.us/reader035/viewer/2022062703/5550e2a3b4c90513798b49e3/html5/thumbnails/24.jpg)
TCP & UDP
• Most TCP/IP applications use TCP for transport layer• TCP provides a connection (logical association)
between two entities to regulate flow check errors• UDP (User Datagram Protocol) does not maintain a
connection, and therefore does not guarantee delivery, preserve sequences, or protect against duplication
![Page 25: Presentation5](https://reader035.vdocuments.us/reader035/viewer/2022062703/5550e2a3b4c90513798b49e3/html5/thumbnails/25.jpg)
TCP & UDP
![Page 26: Presentation5](https://reader035.vdocuments.us/reader035/viewer/2022062703/5550e2a3b4c90513798b49e3/html5/thumbnails/26.jpg)
IP and IPv6
• IP provides for 32-bit source and destination addresses
• IPv6 (1996 standard) provides for 128-bit addresses
• Migraqtion to IPv6 will be a very slow process
![Page 27: Presentation5](https://reader035.vdocuments.us/reader035/viewer/2022062703/5550e2a3b4c90513798b49e3/html5/thumbnails/27.jpg)
IP Headers
![Page 28: Presentation5](https://reader035.vdocuments.us/reader035/viewer/2022062703/5550e2a3b4c90513798b49e3/html5/thumbnails/28.jpg)
TCP/IP Applications
• SMTP (Simple Mail Transfer Protocol)– Basic e-mail facility, transferring messages among hosts
• FTP (File Transfer Protocol)– Sends files from one system to another on user command
• SSH (Secure Shell)– Secure remote login capability, allowing a user to remotely
logon to a computer
![Page 29: Presentation5](https://reader035.vdocuments.us/reader035/viewer/2022062703/5550e2a3b4c90513798b49e3/html5/thumbnails/29.jpg)
Internetworking
• Interconnected networks, usually implies TCP/IP
• Can appear to users as a single large network• The global Internet is the largest example, but
intranets and extranets are also examples
![Page 30: Presentation5](https://reader035.vdocuments.us/reader035/viewer/2022062703/5550e2a3b4c90513798b49e3/html5/thumbnails/30.jpg)
Routers
• Equipment used to interconnect independent networks
• Several essential functions– Provide a link between networks– Provide routing and delivery of data between
processes on systems from different networks– Provide these functions without requiring
modification of networking architecture
![Page 31: Presentation5](https://reader035.vdocuments.us/reader035/viewer/2022062703/5550e2a3b4c90513798b49e3/html5/thumbnails/31.jpg)
Router Issues
• Addressing schemes• Maximum packet size• Interfaces• Reliability
![Page 32: Presentation5](https://reader035.vdocuments.us/reader035/viewer/2022062703/5550e2a3b4c90513798b49e3/html5/thumbnails/32.jpg)
Operation of TCP/IP: Action at the Sender
![Page 33: Presentation5](https://reader035.vdocuments.us/reader035/viewer/2022062703/5550e2a3b4c90513798b49e3/html5/thumbnails/33.jpg)
Operation of TCP/IP: Action at the Router
![Page 34: Presentation5](https://reader035.vdocuments.us/reader035/viewer/2022062703/5550e2a3b4c90513798b49e3/html5/thumbnails/34.jpg)
Operation of TCP/IP: Action at the Receiver
![Page 35: Presentation5](https://reader035.vdocuments.us/reader035/viewer/2022062703/5550e2a3b4c90513798b49e3/html5/thumbnails/35.jpg)
Why Study OSI?
• Still an excellent model for conceptualizing and understanding protocol architectures
• Key points:– Modular– Hierarchical– Boundaries between layers=interfaces
![Page 36: Presentation5](https://reader035.vdocuments.us/reader035/viewer/2022062703/5550e2a3b4c90513798b49e3/html5/thumbnails/36.jpg)
OSI
• Open Systems Interconnection
• Developed by ISO
• Contains seven layers
![Page 37: Presentation5](https://reader035.vdocuments.us/reader035/viewer/2022062703/5550e2a3b4c90513798b49e3/html5/thumbnails/37.jpg)
OSI Lower Layers
• Physical• Data Link• Network
![Page 38: Presentation5](https://reader035.vdocuments.us/reader035/viewer/2022062703/5550e2a3b4c90513798b49e3/html5/thumbnails/38.jpg)
OSI Physical Layer
• Responsible for transmission of bits• Always implemented through hardware• Encompasses mechanical, electrical, and
functional interfaces• e.g. RS-232
![Page 39: Presentation5](https://reader035.vdocuments.us/reader035/viewer/2022062703/5550e2a3b4c90513798b49e3/html5/thumbnails/39.jpg)
OSI Data Link Layer
• Responsible for error-free, reliable transmission of data
• Flow control, error correction• e.g. HDLC
![Page 40: Presentation5](https://reader035.vdocuments.us/reader035/viewer/2022062703/5550e2a3b4c90513798b49e3/html5/thumbnails/40.jpg)
OSI Network Layer
• Responsible for routing of messages through network
• Concerned with type of switching used (circuit v. packet)
• Handles routing between networks, as well as through packet-switching networks
![Page 41: Presentation5](https://reader035.vdocuments.us/reader035/viewer/2022062703/5550e2a3b4c90513798b49e3/html5/thumbnails/41.jpg)
OSI Upper Layers
• Transport• Session• Presentation• Application
![Page 42: Presentation5](https://reader035.vdocuments.us/reader035/viewer/2022062703/5550e2a3b4c90513798b49e3/html5/thumbnails/42.jpg)
OSI Transport Layer
• Isolates messages from lower and upper layers• Breaks down message size• Monitors quality of communications channel• Selects most efficient communication service
necessary for a given transmission
![Page 43: Presentation5](https://reader035.vdocuments.us/reader035/viewer/2022062703/5550e2a3b4c90513798b49e3/html5/thumbnails/43.jpg)
OSI Session Layer
• Establishes logical connections between systems
• Manages log-ons, password exchange, log-offs• Terminates connection at end of session
![Page 44: Presentation5](https://reader035.vdocuments.us/reader035/viewer/2022062703/5550e2a3b4c90513798b49e3/html5/thumbnails/44.jpg)
OSI Presentation Layer
• Provides format and code conversion services• Examples – File conversion from ASCII to EBDIC– Invoking character sequences to generate bold,
italics, etc on a printer
![Page 45: Presentation5](https://reader035.vdocuments.us/reader035/viewer/2022062703/5550e2a3b4c90513798b49e3/html5/thumbnails/45.jpg)
OSI Application Layer
• Provides access to network for end-user• User’s capabilities are determined by what
items are available on this layer
![Page 46: Presentation5](https://reader035.vdocuments.us/reader035/viewer/2022062703/5550e2a3b4c90513798b49e3/html5/thumbnails/46.jpg)
The OSI Environment
![Page 47: Presentation5](https://reader035.vdocuments.us/reader035/viewer/2022062703/5550e2a3b4c90513798b49e3/html5/thumbnails/47.jpg)
TCP/IP - OSI Comparison
![Page 48: Presentation5](https://reader035.vdocuments.us/reader035/viewer/2022062703/5550e2a3b4c90513798b49e3/html5/thumbnails/48.jpg)
IPSec
• Developed by the Internet Architecture Board in 1994 (RFC 1636)
• Examples of Applications include:-Secure branch office connectivity over the Internet-Secure remote access over the Internet-Establishing extranet and intranet connectivity with partners-Enhancing electronic security
![Page 49: Presentation5](https://reader035.vdocuments.us/reader035/viewer/2022062703/5550e2a3b4c90513798b49e3/html5/thumbnails/49.jpg)
Benefits of IPSec
• Provides stronger secuirty to routers and firewalls
• Is resistant to bypass within a firewall• Is transparent to applications • Is transparent to end users• Can provide security to end-users