IE 20303<br />
What is a Protocol?<br />Allows entities (i.e. application programs)  from different systems to communicate<br />Shared co...
Why Use Protocol Architecture?<br />Data communications requires complex procedures<br />Sender identifies data path/recei...
Modular Approach<br />Breaks complex tasks into subtasks<br />Each module handles specific subset of tasks<br />Communicat...
Advantages of Modularity<br />Easier application development<br />Network can change without all programs being modified<b...
Three-Layer Model<br />Distributed data communications involves three primary components:<br />Networks<br />Computers<br ...
Network Access Layer<br />Concerned with exchange of data between computer and network<br />Includes addressing, routing, ...
Transport Layer<br />Concerned with reliable transfer of information between applications<br />Independent of the nature o...
Application Layer<br />Logic needed to support various applications<br />Each type of application (file transfer, remote a...
Addressing<br />Each computer on a network requires a unique address on that network<br />Each application requires a uniq...
Data Transmission<br />Application layer creates data block<br />Transport layer appends header to create PDU (protocol da...
Protocol Architectures<br />
Protocols in a Simplified Architecture<br />
Transport PDU Headers<br />Source port: indicates the application that sent the data<br />Destination port: the appplicati...
Network Access PDU (Packet Header)<br />Source computer address: indicates the source of the packet<br />Destination compu...
Standardized Protocol Architectures<br />Vendors like standards because they make their products more marketable<br />Cust...
TCP/IP<br />Transmission Control Protocol/Internet Protocol<br />Developed by DARPA<br />No official protocol standard<br ...
TCP/IP Physical Layer<br />Physical interface between a DTE (e.g. computer or terminal) and a transmission medium <br />Sp...
TCP/IP Network Access Layer<br />Exchange of data between systems on a shared network<br />Utilizes address of host and de...
TCP/IP Internet Layer<br />An Internet is an interconnection of two or more networks<br />Internet layer handles tasks sim...
TCP/IP Transport Layer<br />Also called host-to-host layer<br />Reliable exchange of data between applications<br />Uses T...
TCP/IP Application Layer<br />Logic needed to support variety of applications<br />Separate module supports each type of a...
Operation of TCP/IP<br />
TCP & UDP<br />Most TCP/IP applications use TCP for transport layer<br />TCP provides a connection (logical association) b...
TCP & UDP<br />
IP and IPv6<br />IP provides for 32-bit source and destination addresses<br />IPv6 (1996 standard) provides for 128-bit ad...
IP Headers<br />
TCP/IP Applications<br />SMTP (Simple Mail Transfer Protocol)<br />Basic e-mail facility, transferring messages among host...
Internetworking<br />Interconnected networks, usually implies TCP/IP<br />Can appear to users as a single large network<br...
Routers<br />Equipment used to interconnect independent networks<br />Several essential functions<br />Provide a link betw...
Router Issues<br />Addressing schemes<br />Maximum packet size<br />Interfaces<br />Reliability<br />
Operation of TCP/IP: Action at the Sender<br />
Operation of TCP/IP: Action at the Router<br />
Operation of TCP/IP: Action at the Receiver<br />
Why Study OSI?<br />Still an excellent model for conceptualizing and understanding protocol architectures<br />Key points:...
OSI<br />Open Systems Interconnection<br />Developed by ISO<br />Contains seven layers<br />
OSI Lower Layers<br />Physical<br />Data Link<br />Network<br />
OSI Physical Layer<br />Responsible for transmission of bits<br />Always implemented through hardware<br />Encompasses mec...
OSI Data Link Layer<br />Responsible for error-free, reliable transmission of data<br />Flow control, error correction<br ...
OSI Network Layer<br />Responsible for routing of messages through network<br />Concerned with type of switching used (cir...
OSI Upper Layers<br />Transport<br />Session<br />Presentation<br />Application<br />
OSI Transport Layer<br />Isolates messages from lower and upper layers<br />Breaks down message size<br />Monitors quality...
OSI Session Layer<br />Establishes logical connections between systems<br />Manages log-ons, password exchange, log-offs<b...
OSI Presentation Layer<br />Provides format and code conversion services<br />Examples <br />File conversion from ASCII to...
OSI Application Layer<br />Provides access to network for end-user<br />User’s capabilities are determined by what items a...
The OSI Environment<br />
TCP/IP - OSI Comparison<br />
IPSec<br />Developed by the Internet Architecture Board in 1994 (RFC 1636)<br />Examples of Applications include:-Secure b...
Benefits of IPSec<br />Provides stronger secuirty to routers and firewalls<br />Is resistant to bypass within a firewall<b...
Upcoming SlideShare
Loading in...5
×

Presentation5

440

Published on

0 Comments
0 Likes
Statistics
Notes
  • Be the first to comment

  • Be the first to like this

No Downloads
Views
Total Views
440
On Slideshare
0
From Embeds
0
Number of Embeds
0
Actions
Shares
0
Downloads
31
Comments
0
Likes
0
Embeds 0
No embeds

No notes for slide

Presentation5

  1. 1. IE 20303<br />
  2. 2. What is a Protocol?<br />Allows entities (i.e. application programs) from different systems to communicate<br />Shared conventions for communicating information are called protocols<br />Defines a set of rules that govern the exchange of data<br />Includes syntax, semantics, and timing<br />
  3. 3. Why Use Protocol Architecture?<br />Data communications requires complex procedures<br />Sender identifies data path/receiver<br />Systems negotiate preparedness<br />Applications negotiate preparedness<br />Translation of file formats<br />For all tasks to occur, high level of cooperation is required<br />
  4. 4. Modular Approach<br />Breaks complex tasks into subtasks<br />Each module handles specific subset of tasks<br />Communication occurs<br />between different modules on the same system<br />between similar modules on different systems<br />
  5. 5. Advantages of Modularity<br />Easier application development<br />Network can change without all programs being modified<br />
  6. 6. Three-Layer Model<br />Distributed data communications involves three primary components:<br />Networks<br />Computers<br />Applications<br />Three corresponding layers<br />Network access layer<br />Transport layer<br />Application layer<br />
  7. 7. Network Access Layer<br />Concerned with exchange of data between computer and network<br />Includes addressing, routing, prioritizing, etc<br />Different networks require different software at this layer<br />Example: X.25 standard for network access procedures on packet-switching networks<br />
  8. 8. Transport Layer<br />Concerned with reliable transfer of information between applications<br />Independent of the nature of the application<br />Includes aspects like flow control and error checking<br />
  9. 9. Application Layer<br />Logic needed to support various applications<br />Each type of application (file transfer, remote access) requires different software on this layer<br />
  10. 10. Addressing<br />Each computer on a network requires a unique address on that network<br />Each application requires a unique address within the computer to allow support for multiple applications (service access points, or SAP)<br />
  11. 11. Data Transmission<br />Application layer creates data block<br />Transport layer appends header to create PDU (protocol data unit)<br />Destination SAP, Sequence #, Error-Detection Code<br />Network layer appends another header<br />Destination computer, facilities (e.g. “priority”)<br />
  12. 12. Protocol Architectures<br />
  13. 13. Protocols in a Simplified Architecture<br />
  14. 14. Transport PDU Headers<br />Source port: indicates the application that sent the data<br />Destination port: the appplication that the data is to be delivered to<br />Sequence number: provides sequential ordering of segments <br />Error-detection code: code that is a function of the contents of a segment (e.g., checksum or frame check sequence)<br />
  15. 15. Network Access PDU (Packet Header)<br />Source computer address: indicates the source of the packet<br />Destination computer address: indicates the computer that the data is to be delivered to<br />Facilities requests: indicates if the network is to make use of certain facilities such as priority<br />
  16. 16. Standardized Protocol Architectures<br />Vendors like standards because they make their products more marketable<br />Customers like standards because they enable products from different vendors to interoperate<br />Two protocol standards are well-known:<br />TCP/IP: widely implemented<br />OSI: less used, but widely known and still useful for modeling/conceptualizing<br />
  17. 17. TCP/IP<br />Transmission Control Protocol/Internet Protocol<br />Developed by DARPA<br />No official protocol standard<br />Identifies 5 Layers<br />Application<br />Host-to-Host (transport)<br />Internet<br />Network Access<br />Physical<br />
  18. 18. TCP/IP Physical Layer<br />Physical interface between a DTE (e.g. computer or terminal) and a transmission medium <br />Specifies:<br />Characteristics of medium<br />Nature of signals<br />Data rate<br />
  19. 19. TCP/IP Network Access Layer<br />Exchange of data between systems on a shared network<br />Utilizes address of host and destination<br />Can also prioritize transmission<br />Software at this layer depends on network (e.g. X.25 vs. Ethernet)<br />Segregation means that no other software needs to be concerned about net specifics<br />
  20. 20. TCP/IP Internet Layer<br />An Internet is an interconnection of two or more networks<br />Internet layer handles tasks similar to network access layer, but between networks rather than between nodes on a network<br />Uses IP for addressing and routing across networks<br />Implemented in workstations and routers <br />
  21. 21. TCP/IP Transport Layer<br />Also called host-to-host layer<br />Reliable exchange of data between applications<br />Uses TCP protocols for transmission<br />
  22. 22. TCP/IP Application Layer<br />Logic needed to support variety of applications<br />Separate module supports each type of application (e.g. file transfer)<br />
  23. 23. Operation of TCP/IP<br />
  24. 24. TCP & UDP<br />Most TCP/IP applications use TCP for transport layer<br />TCP provides a connection (logical association) between two entities to regulate flow check errors<br />UDP (User Datagram Protocol) does not maintain a connection, and therefore does not guarantee delivery, preserve sequences, or protect against duplication<br />
  25. 25. TCP & UDP<br />
  26. 26. IP and IPv6<br />IP provides for 32-bit source and destination addresses<br />IPv6 (1996 standard) provides for 128-bit addresses<br />Migraqtion to IPv6 will be a very slow process<br />
  27. 27. IP Headers<br />
  28. 28. TCP/IP Applications<br />SMTP (Simple Mail Transfer Protocol)<br />Basic e-mail facility, transferring messages among hosts<br />FTP (File Transfer Protocol)<br />Sends files from one system to another on user command<br />SSH (Secure Shell)<br />Secure remote login capability, allowing a user to remotely logon to a computer <br />
  29. 29. Internetworking<br />Interconnected networks, usually implies TCP/IP<br />Can appear to users as a single large network<br />The global Internet is the largest example, but intranets and extranets are also examples<br />
  30. 30. Routers<br />Equipment used to interconnect independent networks<br />Several essential functions<br />Provide a link between networks<br />Provide routing and delivery of data between processes on systems from different networks<br />Provide these functions without requiring modification of networking architecture<br />
  31. 31. Router Issues<br />Addressing schemes<br />Maximum packet size<br />Interfaces<br />Reliability<br />
  32. 32. Operation of TCP/IP: Action at the Sender<br />
  33. 33. Operation of TCP/IP: Action at the Router<br />
  34. 34. Operation of TCP/IP: Action at the Receiver<br />
  35. 35. Why Study OSI?<br />Still an excellent model for conceptualizing and understanding protocol architectures<br />Key points:<br />Modular<br />Hierarchical<br />Boundaries between layers=interfaces<br />
  36. 36. OSI<br />Open Systems Interconnection<br />Developed by ISO<br />Contains seven layers<br />
  37. 37. OSI Lower Layers<br />Physical<br />Data Link<br />Network<br />
  38. 38. OSI Physical Layer<br />Responsible for transmission of bits<br />Always implemented through hardware<br />Encompasses mechanical, electrical, and functional interfaces<br />e.g. RS-232<br />
  39. 39. OSI Data Link Layer<br />Responsible for error-free, reliable transmission of data<br />Flow control, error correction<br />e.g. HDLC<br />
  40. 40. OSI Network Layer<br />Responsible for routing of messages through network<br />Concerned with type of switching used (circuit v. packet)<br />Handles routing between networks, as well as through packet-switching networks<br />
  41. 41. OSI Upper Layers<br />Transport<br />Session<br />Presentation<br />Application<br />
  42. 42. OSI Transport Layer<br />Isolates messages from lower and upper layers<br />Breaks down message size<br />Monitors quality of communications channel<br />Selects most efficient communication service necessary for a given transmission<br />
  43. 43. OSI Session Layer<br />Establishes logical connections between systems<br />Manages log-ons, password exchange, log-offs<br />Terminates connection at end of session<br />
  44. 44. OSI Presentation Layer<br />Provides format and code conversion services<br />Examples <br />File conversion from ASCII to EBDIC<br />Invoking character sequences to generate bold, italics, etc on a printer<br />
  45. 45. OSI Application Layer<br />Provides access to network for end-user<br />User’s capabilities are determined by what items are available on this layer<br />
  46. 46. The OSI Environment<br />
  47. 47. TCP/IP - OSI Comparison<br />
  48. 48. IPSec<br />Developed by the Internet Architecture Board in 1994 (RFC 1636)<br />Examples of Applications include:-Secure branch office connectivity over the Internet-Secure remote access over the Internet-Establishing extranet and intranet connectivity with partners-Enhancing electronic security<br />
  49. 49. Benefits of IPSec<br />Provides stronger secuirty to routers and firewalls<br />Is resistant to bypass within a firewall<br />Is transparent to applications <br />Is transparent to end users<br />Can provide security to end-users<br />
  1. A particular slide catching your eye?

    Clipping is a handy way to collect important slides you want to go back to later.

×