SlideShare a Scribd company logo
1 of 11
Download to read offline
CS425: Computer Networks
             Bhaskaran Raman
         [braman] AT [cse.iitk.ac.in]

http://www.cse.iitk.ac.in/users/braman/cs425/

      Department of CSE, IIT Kanpur
             Jul-Dec 2006

        Lecture 02: Fri, 04 Aug 2006
Updates/Announcements
●
    Course web-page is up
●
    Lecture times (CS101):
    –   Mon 11-12, Fri 5-6:30
●
    Tutorial times (CS101):
    –   Tue 4:30-6, Wed 11-12:30, Thu 5:30-7
    –   May be reduced to one hour
●
    Will have to move to LHC if needed
Recap and Lecture Outline
●
    Recap:
    –   What is a network?
    –   What is a protocol?
●
    Lecture outline:
    –   What are the required/desirable functionalities?
    –   How to structure them?
    –   Concepts of layering, encapsulation
    –   Physical layer encoding (Kameswari Chebrolu)
Required/Desired Functionalities
●
    Modulation,              ●
                                 Multiplexing,
    demodulation                 demultiplexing
●
    Encoding                 ●
                                 Quality-of-Service
●
    Framing                  ●
                                 Security
●
    Detect, correct errors   ●
                                 Compression
●
    Medium Access Control    ●
                                 Naming, addressing
●
    Routing                  ●
                                 Application
●
    Reliability
●
    In-order delivery
OSI Layering
    ●
        What is layering?                  Application

        –   “ Structuring technique       Presentation
             which permits the
             network... to be viewed        Session
             as logically composed of      Transport
             a succession of layers,
             each wrapping the lower        Network
             layers and isolating them   Link-Layer-Ctrl
             from higher layers”         Medium-Access
             [Zim80]                        Physical
                                   
Advantages of Layering
    ●
        Handle heterogeneity
    ●
        Software reuse, modularity
    ●
        Allows extensibility, new technologies




                              
Inter-Layer Communication

                Layer N+1         Layer N+1

     Downcall                                 Upcall


                 Layer N           Layer N




                Layer N-1         Layer N-1
                            PHY
                Host-1              Host-2


      Interface definition between layers is crucial
                              
Encapsulation & Decapsulation

              Layer N+1         Layer N+1




               Layer N           Layer N




              Layer N-1         Layer N-1
                          PHY
               Host-1             Host-2




          Each layer adds/removes its header
                            
Logical Communication between
       Layers at the Same Level
            Application             Application
                          Logical


            Transport               Transport
                          Logical


             Network                 Network
                          Logical

            LLC/MAC                 LLC/MAC
                          Logical

               PHY                     PHY
                           PHY

              Host-1                    Host-2
End-to-end versus Hop-by-hop
    Application                                                                 Application
                                            Logical

     Transport                                                                  Transport
                                            Logical

     Network                Network                     Network                  Network
                  Logical                   Logical                   Logical

     LLC/MAC                LLC/MAC                    LLC/MAC                  LLC/MAC
                  Logical                   Logical                   Logical

       PHY                    PHY                        PHY                       PHY
                   PHY                       PHY                       PHY
    End-Host-1              Intermediate-             Intermediate-             End-Host-2
                            Host-1                    Host-2
                                                
Summary of Concepts
    ●
        Layering
    ●
        Inter-layer communication
    ●
        Encapsulation
    ●
        End-to-end versus hop-by-hop communication
    ●
        Concepts not covered from Chapter-1 of
        Peterson book:
        –   Packet switching
        –   Sockets
        –   Protocol graph
        –   Bandwidth-Delay Product (BDP)
                                  

More Related Content

Similar to Lec02 layering

OLPC Mesh networking improvements
OLPC Mesh networking improvementsOLPC Mesh networking improvements
OLPC Mesh networking improvements
OSLL
 

Similar to Lec02 layering (20)

Flexible Data Centre Fabric - FabricPath/TRILL, OTV, LISP and VXLAN
Flexible Data Centre Fabric - FabricPath/TRILL, OTV, LISP and VXLANFlexible Data Centre Fabric - FabricPath/TRILL, OTV, LISP and VXLAN
Flexible Data Centre Fabric - FabricPath/TRILL, OTV, LISP and VXLAN
 
Gsm protl
Gsm protlGsm protl
Gsm protl
 
Architecting data center networks in the era of big data and cloud
Architecting data center networks in the era of big data and cloudArchitecting data center networks in the era of big data and cloud
Architecting data center networks in the era of big data and cloud
 
Ultra-scalable Architectures for Telecommunications and Web 2.0 Services
Ultra-scalable Architectures for Telecommunications and Web 2.0 ServicesUltra-scalable Architectures for Telecommunications and Web 2.0 Services
Ultra-scalable Architectures for Telecommunications and Web 2.0 Services
 
Contribution of Non-Scrambled Chroma Information in Privacy-Protected Face Im...
Contribution of Non-Scrambled Chroma Information in Privacy-Protected Face Im...Contribution of Non-Scrambled Chroma Information in Privacy-Protected Face Im...
Contribution of Non-Scrambled Chroma Information in Privacy-Protected Face Im...
 
Basic networking 07-2012
Basic networking 07-2012Basic networking 07-2012
Basic networking 07-2012
 
XS Boston 2008 XenLoop
XS Boston 2008 XenLoopXS Boston 2008 XenLoop
XS Boston 2008 XenLoop
 
Rev 090004 Radio Layer 2 And Rrc Aspects
Rev 090004 Radio Layer 2 And Rrc AspectsRev 090004 Radio Layer 2 And Rrc Aspects
Rev 090004 Radio Layer 2 And Rrc Aspects
 
LTE Radio Layer 2 And Rrc Aspects
LTE Radio Layer 2 And Rrc AspectsLTE Radio Layer 2 And Rrc Aspects
LTE Radio Layer 2 And Rrc Aspects
 
ROS distributed architecture
ROS  distributed architectureROS  distributed architecture
ROS distributed architecture
 
Designing.and.implementing.linux
Designing.and.implementing.linuxDesigning.and.implementing.linux
Designing.and.implementing.linux
 
Openflow勉強会 「OpenFlowコントローラを取り巻く状況とその実装」
Openflow勉強会 「OpenFlowコントローラを取り巻く状況とその実装」Openflow勉強会 「OpenFlowコントローラを取り巻く状況とその実装」
Openflow勉強会 「OpenFlowコントローラを取り巻く状況とその実装」
 
Networking interview questions
Networking interview questionsNetworking interview questions
Networking interview questions
 
OLPC Mesh networking improvements
OLPC Mesh networking improvementsOLPC Mesh networking improvements
OLPC Mesh networking improvements
 
Osi 7 layer
Osi 7 layerOsi 7 layer
Osi 7 layer
 
Software-Defined Networking SDN - A Brief Introduction
Software-Defined Networking SDN - A Brief IntroductionSoftware-Defined Networking SDN - A Brief Introduction
Software-Defined Networking SDN - A Brief Introduction
 
Luxbg fringe
Luxbg fringeLuxbg fringe
Luxbg fringe
 
Tom Krcha - Future of Flash
Tom Krcha - Future of FlashTom Krcha - Future of Flash
Tom Krcha - Future of Flash
 
Parallel computing(1)
Parallel computing(1)Parallel computing(1)
Parallel computing(1)
 
OpenStack and OpenFlow Demos
OpenStack and OpenFlow DemosOpenStack and OpenFlow Demos
OpenStack and OpenFlow Demos
 

Recently uploaded

+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...
+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...
+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...
?#DUbAI#??##{{(☎️+971_581248768%)**%*]'#abortion pills for sale in dubai@
 

Recently uploaded (20)

Repurposing LNG terminals for Hydrogen Ammonia: Feasibility and Cost Saving
Repurposing LNG terminals for Hydrogen Ammonia: Feasibility and Cost SavingRepurposing LNG terminals for Hydrogen Ammonia: Feasibility and Cost Saving
Repurposing LNG terminals for Hydrogen Ammonia: Feasibility and Cost Saving
 
Vector Search -An Introduction in Oracle Database 23ai.pptx
Vector Search -An Introduction in Oracle Database 23ai.pptxVector Search -An Introduction in Oracle Database 23ai.pptx
Vector Search -An Introduction in Oracle Database 23ai.pptx
 
FWD Group - Insurer Innovation Award 2024
FWD Group - Insurer Innovation Award 2024FWD Group - Insurer Innovation Award 2024
FWD Group - Insurer Innovation Award 2024
 
AI+A11Y 11MAY2024 HYDERBAD GAAD 2024 - HelloA11Y (11 May 2024)
AI+A11Y 11MAY2024 HYDERBAD GAAD 2024 - HelloA11Y (11 May 2024)AI+A11Y 11MAY2024 HYDERBAD GAAD 2024 - HelloA11Y (11 May 2024)
AI+A11Y 11MAY2024 HYDERBAD GAAD 2024 - HelloA11Y (11 May 2024)
 
Platformless Horizons for Digital Adaptability
Platformless Horizons for Digital AdaptabilityPlatformless Horizons for Digital Adaptability
Platformless Horizons for Digital Adaptability
 
Apidays New York 2024 - Passkeys: Developing APIs to enable passwordless auth...
Apidays New York 2024 - Passkeys: Developing APIs to enable passwordless auth...Apidays New York 2024 - Passkeys: Developing APIs to enable passwordless auth...
Apidays New York 2024 - Passkeys: Developing APIs to enable passwordless auth...
 
Web Form Automation for Bonterra Impact Management (fka Social Solutions Apri...
Web Form Automation for Bonterra Impact Management (fka Social Solutions Apri...Web Form Automation for Bonterra Impact Management (fka Social Solutions Apri...
Web Form Automation for Bonterra Impact Management (fka Social Solutions Apri...
 
Strategies for Landing an Oracle DBA Job as a Fresher
Strategies for Landing an Oracle DBA Job as a FresherStrategies for Landing an Oracle DBA Job as a Fresher
Strategies for Landing an Oracle DBA Job as a Fresher
 
Six Myths about Ontologies: The Basics of Formal Ontology
Six Myths about Ontologies: The Basics of Formal OntologySix Myths about Ontologies: The Basics of Formal Ontology
Six Myths about Ontologies: The Basics of Formal Ontology
 
CNIC Information System with Pakdata Cf In Pakistan
CNIC Information System with Pakdata Cf In PakistanCNIC Information System with Pakdata Cf In Pakistan
CNIC Information System with Pakdata Cf In Pakistan
 
Connector Corner: Accelerate revenue generation using UiPath API-centric busi...
Connector Corner: Accelerate revenue generation using UiPath API-centric busi...Connector Corner: Accelerate revenue generation using UiPath API-centric busi...
Connector Corner: Accelerate revenue generation using UiPath API-centric busi...
 
MINDCTI Revenue Release Quarter One 2024
MINDCTI Revenue Release Quarter One 2024MINDCTI Revenue Release Quarter One 2024
MINDCTI Revenue Release Quarter One 2024
 
How to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerHow to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected Worker
 
+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...
+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...
+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...
 
TrustArc Webinar - Unlock the Power of AI-Driven Data Discovery
TrustArc Webinar - Unlock the Power of AI-Driven Data DiscoveryTrustArc Webinar - Unlock the Power of AI-Driven Data Discovery
TrustArc Webinar - Unlock the Power of AI-Driven Data Discovery
 
Spring Boot vs Quarkus the ultimate battle - DevoxxUK
Spring Boot vs Quarkus the ultimate battle - DevoxxUKSpring Boot vs Quarkus the ultimate battle - DevoxxUK
Spring Boot vs Quarkus the ultimate battle - DevoxxUK
 
Artificial Intelligence Chap.5 : Uncertainty
Artificial Intelligence Chap.5 : UncertaintyArtificial Intelligence Chap.5 : Uncertainty
Artificial Intelligence Chap.5 : Uncertainty
 
Apidays New York 2024 - APIs in 2030: The Risk of Technological Sleepwalk by ...
Apidays New York 2024 - APIs in 2030: The Risk of Technological Sleepwalk by ...Apidays New York 2024 - APIs in 2030: The Risk of Technological Sleepwalk by ...
Apidays New York 2024 - APIs in 2030: The Risk of Technological Sleepwalk by ...
 
Corporate and higher education May webinar.pptx
Corporate and higher education May webinar.pptxCorporate and higher education May webinar.pptx
Corporate and higher education May webinar.pptx
 
EMPOWERMENT TECHNOLOGY GRADE 11 QUARTER 2 REVIEWER
EMPOWERMENT TECHNOLOGY GRADE 11 QUARTER 2 REVIEWEREMPOWERMENT TECHNOLOGY GRADE 11 QUARTER 2 REVIEWER
EMPOWERMENT TECHNOLOGY GRADE 11 QUARTER 2 REVIEWER
 

Lec02 layering

  • 1. CS425: Computer Networks Bhaskaran Raman [braman] AT [cse.iitk.ac.in] http://www.cse.iitk.ac.in/users/braman/cs425/ Department of CSE, IIT Kanpur Jul-Dec 2006 Lecture 02: Fri, 04 Aug 2006
  • 2. Updates/Announcements ● Course web-page is up ● Lecture times (CS101): – Mon 11-12, Fri 5-6:30 ● Tutorial times (CS101): – Tue 4:30-6, Wed 11-12:30, Thu 5:30-7 – May be reduced to one hour ● Will have to move to LHC if needed
  • 3. Recap and Lecture Outline ● Recap: – What is a network? – What is a protocol? ● Lecture outline: – What are the required/desirable functionalities? – How to structure them? – Concepts of layering, encapsulation – Physical layer encoding (Kameswari Chebrolu)
  • 4. Required/Desired Functionalities ● Modulation, ● Multiplexing, demodulation demultiplexing ● Encoding ● Quality-of-Service ● Framing ● Security ● Detect, correct errors ● Compression ● Medium Access Control ● Naming, addressing ● Routing ● Application ● Reliability ● In-order delivery
  • 5. OSI Layering ● What is layering? Application – “ Structuring technique Presentation which permits the network... to be viewed Session as logically composed of Transport a succession of layers, each wrapping the lower Network layers and isolating them Link-Layer-Ctrl from higher layers” Medium-Access [Zim80] Physical    
  • 6. Advantages of Layering ● Handle heterogeneity ● Software reuse, modularity ● Allows extensibility, new technologies    
  • 7. Inter-Layer Communication Layer N+1 Layer N+1 Downcall Upcall Layer N Layer N Layer N-1 Layer N-1 PHY Host-1 Host-2 Interface definition between layers is crucial    
  • 8. Encapsulation & Decapsulation Layer N+1 Layer N+1 Layer N Layer N Layer N-1 Layer N-1 PHY Host-1 Host-2 Each layer adds/removes its header    
  • 9. Logical Communication between Layers at the Same Level Application Application Logical Transport Transport Logical Network Network Logical LLC/MAC LLC/MAC Logical PHY PHY PHY   Host-1   Host-2
  • 10. End-to-end versus Hop-by-hop Application Application Logical Transport Transport Logical Network Network Network Network Logical Logical Logical LLC/MAC LLC/MAC LLC/MAC LLC/MAC Logical Logical Logical PHY PHY PHY PHY PHY PHY PHY End-Host-1 Intermediate- Intermediate- End-Host-2 Host-1 Host-2    
  • 11. Summary of Concepts ● Layering ● Inter-layer communication ● Encapsulation ● End-to-end versus hop-by-hop communication ● Concepts not covered from Chapter-1 of Peterson book: – Packet switching – Sockets – Protocol graph   – Bandwidth-Delay Product (BDP)