SlideShare a Scribd company logo
1 of 42
2.1
Chapter 2
Network Models
Copyright © The McGraw-Hill Companies, Inc. Permission required for reproduction or display.
2.2
2-1 LAYERED TASKS2-1 LAYERED TASKS
We use the concept ofWe use the concept of layerslayers in our daily life. As anin our daily life. As an
example, let us consider two friends who communicateexample, let us consider two friends who communicate
through postal mail. The process of sending a letter to athrough postal mail. The process of sending a letter to a
friend would be complex if there were no servicesfriend would be complex if there were no services
available from the post office.available from the post office.
Sender, Receiver, and Carrier
Hierarchy
Topics discussed in this section:Topics discussed in this section:
2.3
Figure 2.1 Tasks involved in sending a letter
2.4
2-2 THE OSI MODEL2-2 THE OSI MODEL
Established in 1947, the International StandardsEstablished in 1947, the International Standards
Organization (Organization (ISOISO) is a multinational body dedicated to) is a multinational body dedicated to
worldwide agreement on international standards. An ISOworldwide agreement on international standards. An ISO
standard that covers all aspects of networkstandard that covers all aspects of network
communications is the Open Systems Interconnectioncommunications is the Open Systems Interconnection
((OSIOSI) model. It was first introduced in the late 1970s.) model. It was first introduced in the late 1970s.
Layered Architecture
Peer-to-Peer Processes
Encapsulation
Topics discussed in this section:Topics discussed in this section:
2.5
ISO is the organization.
OSI is the model.
Note
2.6
Figure 2.2 Seven layers of the OSI model
2.7
Figure 2.3 The interaction between layers in the OSI model
2.8
Figure 2.4 An exchange using the OSI model
2.9
2-3 LAYERS IN THE OSI MODEL2-3 LAYERS IN THE OSI MODEL
In this section we briefly describe the functions of eachIn this section we briefly describe the functions of each
layer in the OSI model.layer in the OSI model.
Physical Layer
Data Link Layer
Network Layer
Transport Layer
Session Layer
Presentation Layer
Application Layer
Topics discussed in this section:Topics discussed in this section:
2.10
Figure 2.5 Physical layer
2.11
The physical layer is responsible for movements of
individual bits from one hop (node) to the next.
Note
2.12
Figure 2.6 Data link layer
2.13
The data link layer is responsible for moving
frames from one hop (node) to the next.
Note
2.14
Figure 2.7 Hop-to-hop delivery
2.15
Figure 2.8 Network layer
2.16
The network layer is responsible for the
delivery of individual packets from
the source host to the destination host.
Note
2.17
Figure 2.9 Source-to-destination delivery
2.18
Figure 2.10 Transport layer
2.19
The transport layer is responsible for the delivery
of a message from one process to another.
Note
2.20
Figure 2.11 Reliable process-to-process delivery of a message
2.21
Figure 2.12 Session layer
2.22
The session layer is responsible for dialog
control and synchronization.
Note
2.23
Figure 2.13 Presentation layer
2.24
The presentation layer is responsible for translation,
compression, and encryption.
Note
2.25
Figure 2.14 Application layer
2.26
The application layer is responsible for
providing services to the user.
Note
2.27
Figure 2.15 Summary of layers
2.28
2-4 TCP/IP PROTOCOL SUITE2-4 TCP/IP PROTOCOL SUITE
The layers in theThe layers in the TCP/IP protocol suiteTCP/IP protocol suite do not exactlydo not exactly
match those in the OSI model. The original TCP/IPmatch those in the OSI model. The original TCP/IP
protocol suite was defined as having four layers:protocol suite was defined as having four layers: host-to-host-to-
networknetwork,, internetinternet,, transporttransport, and, and applicationapplication. However,. However,
when TCP/IP is compared to OSI, we can say that thewhen TCP/IP is compared to OSI, we can say that the
TCP/IP protocol suite is made of five layers:TCP/IP protocol suite is made of five layers: physicalphysical,,
data linkdata link,, networknetwork,, transporttransport, and, and applicationapplication..
Physical and Data Link Layers
Network Layer
Transport Layer
Application Layer
Topics discussed in this section:Topics discussed in this section:
2.29
Figure 2.16 TCP/IP and OSI model
2.30
2-5 ADDRESSING2-5 ADDRESSING
Four levels of addresses are used in an internet employingFour levels of addresses are used in an internet employing
the TCP/IP protocols:the TCP/IP protocols: physicalphysical,, logicallogical,, portport, and, and specificspecific..
Physical Addresses
Logical Addresses
Port Addresses
Specific Addresses
Topics discussed in this section:Topics discussed in this section:
2.31
Figure 2.17 Addresses in TCP/IP
2.32
Figure 2.18 Relationship of layers and addresses in TCP/IP
2.33
In Figure 2.19 a node with physical address 10 sends a
frame to a node with physical address 87. The two nodes
are connected by a link (bus topology LAN). As the
figure shows, the computer with physical address 10 is
the sender, and the computer with physical address 87 is
the receiver.
Example 2.1
2.34
Figure 2.19 Physical addresses
2.35
As we will see in Chapter 13, most local-area networks
use a 48-bit (6-byte) physical address written as 12
hexadecimal digits; every byte (2 hexadecimal digits) is
separated by a colon, as shown below:
Example 2.2
07:01:02:01:2C:4B
A 6-byte (12 hexadecimal digits) physical address.
2.36
Figure 2.20 shows a part of an internet with two routers
connecting three LANs. Each device (computer or
router) has a pair of addresses (logical and physical) for
each connection. In this case, each computer is
connected to only one link and therefore has only one
pair of addresses. Each router, however, is connected to
three networks (only two are shown in the figure). So
each router has three pairs of addresses, one for each
connection.
Example 2.3
2.37
Figure 2.20 IP addresses
2.38
Figure 2.21 shows two computers communicating via
the Internet. The sending computer is running three
processes at this time with port addresses a, b, and c. The
receiving computer is running two processes at this time
with port addresses j and k. Process a in the sending
computer needs to communicate with process j in the
receiving computer. Note that although physical
addresses change from hop to hop, logical and port
addresses remain the same from the source to
destination.
Example 2.4
2.39
Figure 2.21 Port addresses
2.40
The physical addresses will change from hop to hop,
but the logical addresses usually remain the same.
Note
2.41
Example 2.5
As we will see in Chapter 23, a port address is a 16-bit
address represented by one decimal number as shown.
753
A 16-bit port address represented
as one single number.
2.42
The physical addresses change from hop to hop,
but the logical and port addresses usually remain the same.
Note

More Related Content

What's hot

11 Data Link_Control
11 Data Link_Control11 Data Link_Control
11 Data Link_ControlAhmar Hashmi
 
22 Network Layer_Delivery_forwarding_and_Routing
22 Network Layer_Delivery_forwarding_and_Routing22 Network Layer_Delivery_forwarding_and_Routing
22 Network Layer_Delivery_forwarding_and_RoutingAhmar Hashmi
 
09 Using Telephone_and_Cable_Networks_for_Data_Transmission
09 Using Telephone_and_Cable_Networks_for_Data_Transmission09 Using Telephone_and_Cable_Networks_for_Data_Transmission
09 Using Telephone_and_Cable_Networks_for_Data_TransmissionAhmar Hashmi
 
Chapter 26 - Remote Logging, Electronic Mail & File Transfer
Chapter 26 - Remote Logging, Electronic Mail & File TransferChapter 26 - Remote Logging, Electronic Mail & File Transfer
Chapter 26 - Remote Logging, Electronic Mail & File TransferWayne Jones Jnr
 
23 Process to_Process_Delivery_UDP_TCP_and_SCTP
23 Process to_Process_Delivery_UDP_TCP_and_SCTP23 Process to_Process_Delivery_UDP_TCP_and_SCTP
23 Process to_Process_Delivery_UDP_TCP_and_SCTPAhmar Hashmi
 
20 Network Layer_Internet_Protocol
20 Network Layer_Internet_Protocol20 Network Layer_Internet_Protocol
20 Network Layer_Internet_ProtocolAhmar Hashmi
 
Cisco.actualtests.200 120.v2013-12-10.by.watson.314q (2 new q)
Cisco.actualtests.200 120.v2013-12-10.by.watson.314q (2 new q)Cisco.actualtests.200 120.v2013-12-10.by.watson.314q (2 new q)
Cisco.actualtests.200 120.v2013-12-10.by.watson.314q (2 new q)keiko277
 
4c Address Mapping, Error Reporting and Multicasting
4c Address Mapping, Error Reporting and Multicasting4c Address Mapping, Error Reporting and Multicasting
4c Address Mapping, Error Reporting and Multicastingkavish dani
 

What's hot (20)

11 Data Link_Control
11 Data Link_Control11 Data Link_Control
11 Data Link_Control
 
Chapter 21
Chapter 21Chapter 21
Chapter 21
 
22 Network Layer_Delivery_forwarding_and_Routing
22 Network Layer_Delivery_forwarding_and_Routing22 Network Layer_Delivery_forwarding_and_Routing
22 Network Layer_Delivery_forwarding_and_Routing
 
20CS2008 Computer Networks
20CS2008 Computer Networks 20CS2008 Computer Networks
20CS2008 Computer Networks
 
09 Using Telephone_and_Cable_Networks_for_Data_Transmission
09 Using Telephone_and_Cable_Networks_for_Data_Transmission09 Using Telephone_and_Cable_Networks_for_Data_Transmission
09 Using Telephone_and_Cable_Networks_for_Data_Transmission
 
Chapter 22
Chapter 22Chapter 22
Chapter 22
 
CN Unit 3
CN Unit 3 CN Unit 3
CN Unit 3
 
Chapter 13
Chapter 13Chapter 13
Chapter 13
 
Chapter 8: Switching
Chapter 8: SwitchingChapter 8: Switching
Chapter 8: Switching
 
Cs8591 Computer Networks
Cs8591 Computer NetworksCs8591 Computer Networks
Cs8591 Computer Networks
 
Chapter 26 - Remote Logging, Electronic Mail & File Transfer
Chapter 26 - Remote Logging, Electronic Mail & File TransferChapter 26 - Remote Logging, Electronic Mail & File Transfer
Chapter 26 - Remote Logging, Electronic Mail & File Transfer
 
Network Layer
Network LayerNetwork Layer
Network Layer
 
23 Process to_Process_Delivery_UDP_TCP_and_SCTP
23 Process to_Process_Delivery_UDP_TCP_and_SCTP23 Process to_Process_Delivery_UDP_TCP_and_SCTP
23 Process to_Process_Delivery_UDP_TCP_and_SCTP
 
20 Network Layer_Internet_Protocol
20 Network Layer_Internet_Protocol20 Network Layer_Internet_Protocol
20 Network Layer_Internet_Protocol
 
Ch22
Ch22Ch22
Ch22
 
Cisco.actualtests.200 120.v2013-12-10.by.watson.314q (2 new q)
Cisco.actualtests.200 120.v2013-12-10.by.watson.314q (2 new q)Cisco.actualtests.200 120.v2013-12-10.by.watson.314q (2 new q)
Cisco.actualtests.200 120.v2013-12-10.by.watson.314q (2 new q)
 
Ch19
Ch19Ch19
Ch19
 
Ch15
Ch15Ch15
Ch15
 
4c Address Mapping, Error Reporting and Multicasting
4c Address Mapping, Error Reporting and Multicasting4c Address Mapping, Error Reporting and Multicasting
4c Address Mapping, Error Reporting and Multicasting
 
Ch18
Ch18Ch18
Ch18
 

Viewers also liked

01 Introduction (CN)
01 Introduction (CN)01 Introduction (CN)
01 Introduction (CN)Ahmar Hashmi
 
Power Point Lesson 09 Part 2
Power Point Lesson 09 Part 2Power Point Lesson 09 Part 2
Power Point Lesson 09 Part 2Nasir Jumani
 
Ahaana - How Internet Works
Ahaana - How Internet WorksAhaana - How Internet Works
Ahaana - How Internet WorksAnkur Jain
 
Asia Pacific Internet Leadership Program
Asia Pacific Internet Leadership ProgramAsia Pacific Internet Leadership Program
Asia Pacific Internet Leadership ProgramAPNIC
 
Power Point Lesson 08 P2
Power Point Lesson 08 P2Power Point Lesson 08 P2
Power Point Lesson 08 P2Nasir Jumani
 
How the Internet Works
How the Internet WorksHow the Internet Works
How the Internet WorksDan Goldstein
 
Java programming: Elementary programming
Java programming: Elementary programmingJava programming: Elementary programming
Java programming: Elementary programmingKarwan Mustafa Kareem
 
Akram Atallah Presentation from Middle East DNS Forum
Akram Atallah Presentation from Middle East DNS ForumAkram Atallah Presentation from Middle East DNS Forum
Akram Atallah Presentation from Middle East DNS ForumICANN
 
Dark web by Claudine Impas
Dark web by Claudine ImpasDark web by Claudine Impas
Dark web by Claudine ImpasClaudine Impas
 
Toward The Semantic Deep Web
Toward The Semantic Deep WebToward The Semantic Deep Web
Toward The Semantic Deep WebSamiul Hoque
 
Digging into the Deep Web
Digging into the Deep WebDigging into the Deep Web
Digging into the Deep WebWendy DeGroat
 
Ghassan Shahrour, The 70th anniversary of the atomic bombings at Hiroshima an...
Ghassan Shahrour, The 70th anniversary of the atomic bombings at Hiroshima an...Ghassan Shahrour, The 70th anniversary of the atomic bombings at Hiroshima an...
Ghassan Shahrour, The 70th anniversary of the atomic bombings at Hiroshima an...Ghassan Shahrour
 
Left, right or middle
Left, right or middleLeft, right or middle
Left, right or middleBrent Heard
 
Making domain name and IP address policy at ICANN
Making domain name and IP address policy at ICANNMaking domain name and IP address policy at ICANN
Making domain name and IP address policy at ICANNStephane Van Gelder
 

Viewers also liked (20)

01 Introduction (CN)
01 Introduction (CN)01 Introduction (CN)
01 Introduction (CN)
 
TCP IP Addressing
TCP IP AddressingTCP IP Addressing
TCP IP Addressing
 
Power Point Lesson 09 Part 2
Power Point Lesson 09 Part 2Power Point Lesson 09 Part 2
Power Point Lesson 09 Part 2
 
Ahaana - How Internet Works
Ahaana - How Internet WorksAhaana - How Internet Works
Ahaana - How Internet Works
 
Why do some people believe in myths?
Why do some people believe in myths?Why do some people believe in myths?
Why do some people believe in myths?
 
Asia Pacific Internet Leadership Program
Asia Pacific Internet Leadership ProgramAsia Pacific Internet Leadership Program
Asia Pacific Internet Leadership Program
 
Power Point Lesson 08 P2
Power Point Lesson 08 P2Power Point Lesson 08 P2
Power Point Lesson 08 P2
 
How the Internet Works
How the Internet WorksHow the Internet Works
How the Internet Works
 
Java programming: Elementary programming
Java programming: Elementary programmingJava programming: Elementary programming
Java programming: Elementary programming
 
Akram Atallah Presentation from Middle East DNS Forum
Akram Atallah Presentation from Middle East DNS ForumAkram Atallah Presentation from Middle East DNS Forum
Akram Atallah Presentation from Middle East DNS Forum
 
World war ii
World war iiWorld war ii
World war ii
 
Internet servers
Internet serversInternet servers
Internet servers
 
Dark web by Claudine Impas
Dark web by Claudine ImpasDark web by Claudine Impas
Dark web by Claudine Impas
 
Brief History of the PC
Brief History of the PCBrief History of the PC
Brief History of the PC
 
Toward The Semantic Deep Web
Toward The Semantic Deep WebToward The Semantic Deep Web
Toward The Semantic Deep Web
 
Digging into the Deep Web
Digging into the Deep WebDigging into the Deep Web
Digging into the Deep Web
 
Ghassan Shahrour, The 70th anniversary of the atomic bombings at Hiroshima an...
Ghassan Shahrour, The 70th anniversary of the atomic bombings at Hiroshima an...Ghassan Shahrour, The 70th anniversary of the atomic bombings at Hiroshima an...
Ghassan Shahrour, The 70th anniversary of the atomic bombings at Hiroshima an...
 
Whats app
Whats appWhats app
Whats app
 
Left, right or middle
Left, right or middleLeft, right or middle
Left, right or middle
 
Making domain name and IP address policy at ICANN
Making domain name and IP address policy at ICANNMaking domain name and IP address policy at ICANN
Making domain name and IP address policy at ICANN
 

Similar to 02 Network Models (20)

Lecture 1 osi model
Lecture 1 osi modelLecture 1 osi model
Lecture 1 osi model
 
Ch2 v1
Ch2 v1Ch2 v1
Ch2 v1
 
Data Communication And Networking - Network Models
Data Communication And Networking - Network ModelsData Communication And Networking - Network Models
Data Communication And Networking - Network Models
 
Osi model34
Osi model34Osi model34
Osi model34
 
Chapter 2 network models -computer_network
Chapter 2   network models -computer_networkChapter 2   network models -computer_network
Chapter 2 network models -computer_network
 
Chapter 2
Chapter 2Chapter 2
Chapter 2
 
Chapter 2 - Network Models
Chapter 2 - Network ModelsChapter 2 - Network Models
Chapter 2 - Network Models
 
Ch2
Ch2Ch2
Ch2
 
Computer Network - Chapter 2
Computer Network - Chapter 2Computer Network - Chapter 2
Computer Network - Chapter 2
 
Lecture-2 Data Communication ~www.fida.com.bd
Lecture-2 Data Communication ~www.fida.com.bdLecture-2 Data Communication ~www.fida.com.bd
Lecture-2 Data Communication ~www.fida.com.bd
 
Lec2_CH02.PPT
Lec2_CH02.PPTLec2_CH02.PPT
Lec2_CH02.PPT
 
Data Communications and Networking ch02
Data Communications and Networking  ch02Data Communications and Networking  ch02
Data Communications and Networking ch02
 
Ch02
Ch02Ch02
Ch02
 
Ch02
Ch02Ch02
Ch02
 
ch2_v1.ppt
ch2_v1.pptch2_v1.ppt
ch2_v1.ppt
 
dcn 2.ppt
dcn 2.pptdcn 2.ppt
dcn 2.ppt
 
ANAND1.ppt
ANAND1.pptANAND1.ppt
ANAND1.ppt
 
ch2_v1.ppt
ch2_v1.pptch2_v1.ppt
ch2_v1.ppt
 
Ch2 v1
Ch2 v1Ch2 v1
Ch2 v1
 
ch2_v1.ppt
ch2_v1.pptch2_v1.ppt
ch2_v1.ppt
 

More from Ahmar Hashmi

32 Security in_Internet_IP_SEC_SSL/TLS_PGN_VPN_and_Firewalls
32 Security in_Internet_IP_SEC_SSL/TLS_PGN_VPN_and_Firewalls32 Security in_Internet_IP_SEC_SSL/TLS_PGN_VPN_and_Firewalls
32 Security in_Internet_IP_SEC_SSL/TLS_PGN_VPN_and_FirewallsAhmar Hashmi
 
31 Network Security
31 Network Security31 Network Security
31 Network SecurityAhmar Hashmi
 
28 Network Management_SNMP
28 Network Management_SNMP28 Network Management_SNMP
28 Network Management_SNMPAhmar Hashmi
 
26 Remote Logging_Electronic_Mail_and_File_Transfer
26 Remote Logging_Electronic_Mail_and_File_Transfer26 Remote Logging_Electronic_Mail_and_File_Transfer
26 Remote Logging_Electronic_Mail_and_File_TransferAhmar Hashmi
 
24 Congestion Control_and_Quality_of_Service
24 Congestion Control_and_Quality_of_Service24 Congestion Control_and_Quality_of_Service
24 Congestion Control_and_Quality_of_ServiceAhmar Hashmi
 
19 Network Layer_Logical_Addressing
19 Network Layer_Logical_Addressing19 Network Layer_Logical_Addressing
19 Network Layer_Logical_AddressingAhmar Hashmi
 
18 Virtual Circuit_Networks_Frame_Relay_and_ATM
18 Virtual Circuit_Networks_Frame_Relay_and_ATM18 Virtual Circuit_Networks_Frame_Relay_and_ATM
18 Virtual Circuit_Networks_Frame_Relay_and_ATMAhmar Hashmi
 
16 Wireless WANs_Cellular_Telephone_and_Satellite_Networks
16 Wireless WANs_Cellular_Telephone_and_Satellite_Networks16 Wireless WANs_Cellular_Telephone_and_Satellite_Networks
16 Wireless WANs_Cellular_Telephone_and_Satellite_NetworksAhmar Hashmi
 
15 Connecting LANs_Backbone_Networks_and_Virtual_LAN
15 Connecting LANs_Backbone_Networks_and_Virtual_LAN15 Connecting LANs_Backbone_Networks_and_Virtual_LAN
15 Connecting LANs_Backbone_Networks_and_Virtual_LANAhmar Hashmi
 
10 Error Detection_and_Correction
10 Error Detection_and_Correction10 Error Detection_and_Correction
10 Error Detection_and_CorrectionAhmar Hashmi
 
07 Transmission Media
07 Transmission Media07 Transmission Media
07 Transmission MediaAhmar Hashmi
 
06 Bandwidth Utilization_Multiplexing_and_Spreading
06 Bandwidth Utilization_Multiplexing_and_Spreading06 Bandwidth Utilization_Multiplexing_and_Spreading
06 Bandwidth Utilization_Multiplexing_and_SpreadingAhmar Hashmi
 
05 Analog Transmission
05 Analog Transmission05 Analog Transmission
05 Analog TransmissionAhmar Hashmi
 
04 Digital Transmission
04 Digital Transmission04 Digital Transmission
04 Digital TransmissionAhmar Hashmi
 

More from Ahmar Hashmi (20)

32 Security in_Internet_IP_SEC_SSL/TLS_PGN_VPN_and_Firewalls
32 Security in_Internet_IP_SEC_SSL/TLS_PGN_VPN_and_Firewalls32 Security in_Internet_IP_SEC_SSL/TLS_PGN_VPN_and_Firewalls
32 Security in_Internet_IP_SEC_SSL/TLS_PGN_VPN_and_Firewalls
 
31 Network Security
31 Network Security31 Network Security
31 Network Security
 
30 Cryptography
30 Cryptography30 Cryptography
30 Cryptography
 
29 Multimedia
29 Multimedia29 Multimedia
29 Multimedia
 
28 Network Management_SNMP
28 Network Management_SNMP28 Network Management_SNMP
28 Network Management_SNMP
 
27 WWW and_HTTP
27 WWW and_HTTP27 WWW and_HTTP
27 WWW and_HTTP
 
26 Remote Logging_Electronic_Mail_and_File_Transfer
26 Remote Logging_Electronic_Mail_and_File_Transfer26 Remote Logging_Electronic_Mail_and_File_Transfer
26 Remote Logging_Electronic_Mail_and_File_Transfer
 
25 DNS
25 DNS25 DNS
25 DNS
 
24 Congestion Control_and_Quality_of_Service
24 Congestion Control_and_Quality_of_Service24 Congestion Control_and_Quality_of_Service
24 Congestion Control_and_Quality_of_Service
 
19 Network Layer_Logical_Addressing
19 Network Layer_Logical_Addressing19 Network Layer_Logical_Addressing
19 Network Layer_Logical_Addressing
 
18 Virtual Circuit_Networks_Frame_Relay_and_ATM
18 Virtual Circuit_Networks_Frame_Relay_and_ATM18 Virtual Circuit_Networks_Frame_Relay_and_ATM
18 Virtual Circuit_Networks_Frame_Relay_and_ATM
 
17 SONET/SDH
17 SONET/SDH17 SONET/SDH
17 SONET/SDH
 
16 Wireless WANs_Cellular_Telephone_and_Satellite_Networks
16 Wireless WANs_Cellular_Telephone_and_Satellite_Networks16 Wireless WANs_Cellular_Telephone_and_Satellite_Networks
16 Wireless WANs_Cellular_Telephone_and_Satellite_Networks
 
15 Connecting LANs_Backbone_Networks_and_Virtual_LAN
15 Connecting LANs_Backbone_Networks_and_Virtual_LAN15 Connecting LANs_Backbone_Networks_and_Virtual_LAN
15 Connecting LANs_Backbone_Networks_and_Virtual_LAN
 
14 Wireless LAN
14 Wireless LAN14 Wireless LAN
14 Wireless LAN
 
10 Error Detection_and_Correction
10 Error Detection_and_Correction10 Error Detection_and_Correction
10 Error Detection_and_Correction
 
07 Transmission Media
07 Transmission Media07 Transmission Media
07 Transmission Media
 
06 Bandwidth Utilization_Multiplexing_and_Spreading
06 Bandwidth Utilization_Multiplexing_and_Spreading06 Bandwidth Utilization_Multiplexing_and_Spreading
06 Bandwidth Utilization_Multiplexing_and_Spreading
 
05 Analog Transmission
05 Analog Transmission05 Analog Transmission
05 Analog Transmission
 
04 Digital Transmission
04 Digital Transmission04 Digital Transmission
04 Digital Transmission
 

Recently uploaded

Science 7 - LAND and SEA BREEZE and its Characteristics
Science 7 - LAND and SEA BREEZE and its CharacteristicsScience 7 - LAND and SEA BREEZE and its Characteristics
Science 7 - LAND and SEA BREEZE and its CharacteristicsKarinaGenton
 
Incoming and Outgoing Shipments in 1 STEP Using Odoo 17
Incoming and Outgoing Shipments in 1 STEP Using Odoo 17Incoming and Outgoing Shipments in 1 STEP Using Odoo 17
Incoming and Outgoing Shipments in 1 STEP Using Odoo 17Celine George
 
Accessible design: Minimum effort, maximum impact
Accessible design: Minimum effort, maximum impactAccessible design: Minimum effort, maximum impact
Accessible design: Minimum effort, maximum impactdawncurless
 
Q4-W6-Restating Informational Text Grade 3
Q4-W6-Restating Informational Text Grade 3Q4-W6-Restating Informational Text Grade 3
Q4-W6-Restating Informational Text Grade 3JemimahLaneBuaron
 
“Oh GOSH! Reflecting on Hackteria's Collaborative Practices in a Global Do-It...
“Oh GOSH! Reflecting on Hackteria's Collaborative Practices in a Global Do-It...“Oh GOSH! Reflecting on Hackteria's Collaborative Practices in a Global Do-It...
“Oh GOSH! Reflecting on Hackteria's Collaborative Practices in a Global Do-It...Marc Dusseiller Dusjagr
 
Solving Puzzles Benefits Everyone (English).pptx
Solving Puzzles Benefits Everyone (English).pptxSolving Puzzles Benefits Everyone (English).pptx
Solving Puzzles Benefits Everyone (English).pptxOH TEIK BIN
 
Introduction to ArtificiaI Intelligence in Higher Education
Introduction to ArtificiaI Intelligence in Higher EducationIntroduction to ArtificiaI Intelligence in Higher Education
Introduction to ArtificiaI Intelligence in Higher Educationpboyjonauth
 
Separation of Lanthanides/ Lanthanides and Actinides
Separation of Lanthanides/ Lanthanides and ActinidesSeparation of Lanthanides/ Lanthanides and Actinides
Separation of Lanthanides/ Lanthanides and ActinidesFatimaKhan178732
 
BASLIQ CURRENT LOOKBOOK LOOKBOOK(1) (1).pdf
BASLIQ CURRENT LOOKBOOK  LOOKBOOK(1) (1).pdfBASLIQ CURRENT LOOKBOOK  LOOKBOOK(1) (1).pdf
BASLIQ CURRENT LOOKBOOK LOOKBOOK(1) (1).pdfSoniaTolstoy
 
Software Engineering Methodologies (overview)
Software Engineering Methodologies (overview)Software Engineering Methodologies (overview)
Software Engineering Methodologies (overview)eniolaolutunde
 
Presentation by Andreas Schleicher Tackling the School Absenteeism Crisis 30 ...
Presentation by Andreas Schleicher Tackling the School Absenteeism Crisis 30 ...Presentation by Andreas Schleicher Tackling the School Absenteeism Crisis 30 ...
Presentation by Andreas Schleicher Tackling the School Absenteeism Crisis 30 ...EduSkills OECD
 
18-04-UA_REPORT_MEDIALITERAСY_INDEX-DM_23-1-final-eng.pdf
18-04-UA_REPORT_MEDIALITERAСY_INDEX-DM_23-1-final-eng.pdf18-04-UA_REPORT_MEDIALITERAСY_INDEX-DM_23-1-final-eng.pdf
18-04-UA_REPORT_MEDIALITERAСY_INDEX-DM_23-1-final-eng.pdfssuser54595a
 
Industrial Policy - 1948, 1956, 1973, 1977, 1980, 1991
Industrial Policy - 1948, 1956, 1973, 1977, 1980, 1991Industrial Policy - 1948, 1956, 1973, 1977, 1980, 1991
Industrial Policy - 1948, 1956, 1973, 1977, 1980, 1991RKavithamani
 
Measures of Central Tendency: Mean, Median and Mode
Measures of Central Tendency: Mean, Median and ModeMeasures of Central Tendency: Mean, Median and Mode
Measures of Central Tendency: Mean, Median and ModeThiyagu K
 
Grant Readiness 101 TechSoup and Remy Consulting
Grant Readiness 101 TechSoup and Remy ConsultingGrant Readiness 101 TechSoup and Remy Consulting
Grant Readiness 101 TechSoup and Remy ConsultingTechSoup
 
The basics of sentences session 2pptx copy.pptx
The basics of sentences session 2pptx copy.pptxThe basics of sentences session 2pptx copy.pptx
The basics of sentences session 2pptx copy.pptxheathfieldcps1
 
microwave assisted reaction. General introduction
microwave assisted reaction. General introductionmicrowave assisted reaction. General introduction
microwave assisted reaction. General introductionMaksud Ahmed
 
Employee wellbeing at the workplace.pptx
Employee wellbeing at the workplace.pptxEmployee wellbeing at the workplace.pptx
Employee wellbeing at the workplace.pptxNirmalaLoungPoorunde1
 

Recently uploaded (20)

Science 7 - LAND and SEA BREEZE and its Characteristics
Science 7 - LAND and SEA BREEZE and its CharacteristicsScience 7 - LAND and SEA BREEZE and its Characteristics
Science 7 - LAND and SEA BREEZE and its Characteristics
 
Incoming and Outgoing Shipments in 1 STEP Using Odoo 17
Incoming and Outgoing Shipments in 1 STEP Using Odoo 17Incoming and Outgoing Shipments in 1 STEP Using Odoo 17
Incoming and Outgoing Shipments in 1 STEP Using Odoo 17
 
Accessible design: Minimum effort, maximum impact
Accessible design: Minimum effort, maximum impactAccessible design: Minimum effort, maximum impact
Accessible design: Minimum effort, maximum impact
 
Q4-W6-Restating Informational Text Grade 3
Q4-W6-Restating Informational Text Grade 3Q4-W6-Restating Informational Text Grade 3
Q4-W6-Restating Informational Text Grade 3
 
“Oh GOSH! Reflecting on Hackteria's Collaborative Practices in a Global Do-It...
“Oh GOSH! Reflecting on Hackteria's Collaborative Practices in a Global Do-It...“Oh GOSH! Reflecting on Hackteria's Collaborative Practices in a Global Do-It...
“Oh GOSH! Reflecting on Hackteria's Collaborative Practices in a Global Do-It...
 
Solving Puzzles Benefits Everyone (English).pptx
Solving Puzzles Benefits Everyone (English).pptxSolving Puzzles Benefits Everyone (English).pptx
Solving Puzzles Benefits Everyone (English).pptx
 
Introduction to ArtificiaI Intelligence in Higher Education
Introduction to ArtificiaI Intelligence in Higher EducationIntroduction to ArtificiaI Intelligence in Higher Education
Introduction to ArtificiaI Intelligence in Higher Education
 
Separation of Lanthanides/ Lanthanides and Actinides
Separation of Lanthanides/ Lanthanides and ActinidesSeparation of Lanthanides/ Lanthanides and Actinides
Separation of Lanthanides/ Lanthanides and Actinides
 
TataKelola dan KamSiber Kecerdasan Buatan v022.pdf
TataKelola dan KamSiber Kecerdasan Buatan v022.pdfTataKelola dan KamSiber Kecerdasan Buatan v022.pdf
TataKelola dan KamSiber Kecerdasan Buatan v022.pdf
 
BASLIQ CURRENT LOOKBOOK LOOKBOOK(1) (1).pdf
BASLIQ CURRENT LOOKBOOK  LOOKBOOK(1) (1).pdfBASLIQ CURRENT LOOKBOOK  LOOKBOOK(1) (1).pdf
BASLIQ CURRENT LOOKBOOK LOOKBOOK(1) (1).pdf
 
Software Engineering Methodologies (overview)
Software Engineering Methodologies (overview)Software Engineering Methodologies (overview)
Software Engineering Methodologies (overview)
 
Presentation by Andreas Schleicher Tackling the School Absenteeism Crisis 30 ...
Presentation by Andreas Schleicher Tackling the School Absenteeism Crisis 30 ...Presentation by Andreas Schleicher Tackling the School Absenteeism Crisis 30 ...
Presentation by Andreas Schleicher Tackling the School Absenteeism Crisis 30 ...
 
18-04-UA_REPORT_MEDIALITERAСY_INDEX-DM_23-1-final-eng.pdf
18-04-UA_REPORT_MEDIALITERAСY_INDEX-DM_23-1-final-eng.pdf18-04-UA_REPORT_MEDIALITERAСY_INDEX-DM_23-1-final-eng.pdf
18-04-UA_REPORT_MEDIALITERAСY_INDEX-DM_23-1-final-eng.pdf
 
Model Call Girl in Bikash Puri Delhi reach out to us at 🔝9953056974🔝
Model Call Girl in Bikash Puri  Delhi reach out to us at 🔝9953056974🔝Model Call Girl in Bikash Puri  Delhi reach out to us at 🔝9953056974🔝
Model Call Girl in Bikash Puri Delhi reach out to us at 🔝9953056974🔝
 
Industrial Policy - 1948, 1956, 1973, 1977, 1980, 1991
Industrial Policy - 1948, 1956, 1973, 1977, 1980, 1991Industrial Policy - 1948, 1956, 1973, 1977, 1980, 1991
Industrial Policy - 1948, 1956, 1973, 1977, 1980, 1991
 
Measures of Central Tendency: Mean, Median and Mode
Measures of Central Tendency: Mean, Median and ModeMeasures of Central Tendency: Mean, Median and Mode
Measures of Central Tendency: Mean, Median and Mode
 
Grant Readiness 101 TechSoup and Remy Consulting
Grant Readiness 101 TechSoup and Remy ConsultingGrant Readiness 101 TechSoup and Remy Consulting
Grant Readiness 101 TechSoup and Remy Consulting
 
The basics of sentences session 2pptx copy.pptx
The basics of sentences session 2pptx copy.pptxThe basics of sentences session 2pptx copy.pptx
The basics of sentences session 2pptx copy.pptx
 
microwave assisted reaction. General introduction
microwave assisted reaction. General introductionmicrowave assisted reaction. General introduction
microwave assisted reaction. General introduction
 
Employee wellbeing at the workplace.pptx
Employee wellbeing at the workplace.pptxEmployee wellbeing at the workplace.pptx
Employee wellbeing at the workplace.pptx
 

02 Network Models

  • 1. 2.1 Chapter 2 Network Models Copyright © The McGraw-Hill Companies, Inc. Permission required for reproduction or display.
  • 2. 2.2 2-1 LAYERED TASKS2-1 LAYERED TASKS We use the concept ofWe use the concept of layerslayers in our daily life. As anin our daily life. As an example, let us consider two friends who communicateexample, let us consider two friends who communicate through postal mail. The process of sending a letter to athrough postal mail. The process of sending a letter to a friend would be complex if there were no servicesfriend would be complex if there were no services available from the post office.available from the post office. Sender, Receiver, and Carrier Hierarchy Topics discussed in this section:Topics discussed in this section:
  • 3. 2.3 Figure 2.1 Tasks involved in sending a letter
  • 4. 2.4 2-2 THE OSI MODEL2-2 THE OSI MODEL Established in 1947, the International StandardsEstablished in 1947, the International Standards Organization (Organization (ISOISO) is a multinational body dedicated to) is a multinational body dedicated to worldwide agreement on international standards. An ISOworldwide agreement on international standards. An ISO standard that covers all aspects of networkstandard that covers all aspects of network communications is the Open Systems Interconnectioncommunications is the Open Systems Interconnection ((OSIOSI) model. It was first introduced in the late 1970s.) model. It was first introduced in the late 1970s. Layered Architecture Peer-to-Peer Processes Encapsulation Topics discussed in this section:Topics discussed in this section:
  • 5. 2.5 ISO is the organization. OSI is the model. Note
  • 6. 2.6 Figure 2.2 Seven layers of the OSI model
  • 7. 2.7 Figure 2.3 The interaction between layers in the OSI model
  • 8. 2.8 Figure 2.4 An exchange using the OSI model
  • 9. 2.9 2-3 LAYERS IN THE OSI MODEL2-3 LAYERS IN THE OSI MODEL In this section we briefly describe the functions of eachIn this section we briefly describe the functions of each layer in the OSI model.layer in the OSI model. Physical Layer Data Link Layer Network Layer Transport Layer Session Layer Presentation Layer Application Layer Topics discussed in this section:Topics discussed in this section:
  • 11. 2.11 The physical layer is responsible for movements of individual bits from one hop (node) to the next. Note
  • 12. 2.12 Figure 2.6 Data link layer
  • 13. 2.13 The data link layer is responsible for moving frames from one hop (node) to the next. Note
  • 16. 2.16 The network layer is responsible for the delivery of individual packets from the source host to the destination host. Note
  • 19. 2.19 The transport layer is responsible for the delivery of a message from one process to another. Note
  • 20. 2.20 Figure 2.11 Reliable process-to-process delivery of a message
  • 22. 2.22 The session layer is responsible for dialog control and synchronization. Note
  • 24. 2.24 The presentation layer is responsible for translation, compression, and encryption. Note
  • 26. 2.26 The application layer is responsible for providing services to the user. Note
  • 28. 2.28 2-4 TCP/IP PROTOCOL SUITE2-4 TCP/IP PROTOCOL SUITE The layers in theThe layers in the TCP/IP protocol suiteTCP/IP protocol suite do not exactlydo not exactly match those in the OSI model. The original TCP/IPmatch those in the OSI model. The original TCP/IP protocol suite was defined as having four layers:protocol suite was defined as having four layers: host-to-host-to- networknetwork,, internetinternet,, transporttransport, and, and applicationapplication. However,. However, when TCP/IP is compared to OSI, we can say that thewhen TCP/IP is compared to OSI, we can say that the TCP/IP protocol suite is made of five layers:TCP/IP protocol suite is made of five layers: physicalphysical,, data linkdata link,, networknetwork,, transporttransport, and, and applicationapplication.. Physical and Data Link Layers Network Layer Transport Layer Application Layer Topics discussed in this section:Topics discussed in this section:
  • 29. 2.29 Figure 2.16 TCP/IP and OSI model
  • 30. 2.30 2-5 ADDRESSING2-5 ADDRESSING Four levels of addresses are used in an internet employingFour levels of addresses are used in an internet employing the TCP/IP protocols:the TCP/IP protocols: physicalphysical,, logicallogical,, portport, and, and specificspecific.. Physical Addresses Logical Addresses Port Addresses Specific Addresses Topics discussed in this section:Topics discussed in this section:
  • 32. 2.32 Figure 2.18 Relationship of layers and addresses in TCP/IP
  • 33. 2.33 In Figure 2.19 a node with physical address 10 sends a frame to a node with physical address 87. The two nodes are connected by a link (bus topology LAN). As the figure shows, the computer with physical address 10 is the sender, and the computer with physical address 87 is the receiver. Example 2.1
  • 35. 2.35 As we will see in Chapter 13, most local-area networks use a 48-bit (6-byte) physical address written as 12 hexadecimal digits; every byte (2 hexadecimal digits) is separated by a colon, as shown below: Example 2.2 07:01:02:01:2C:4B A 6-byte (12 hexadecimal digits) physical address.
  • 36. 2.36 Figure 2.20 shows a part of an internet with two routers connecting three LANs. Each device (computer or router) has a pair of addresses (logical and physical) for each connection. In this case, each computer is connected to only one link and therefore has only one pair of addresses. Each router, however, is connected to three networks (only two are shown in the figure). So each router has three pairs of addresses, one for each connection. Example 2.3
  • 37. 2.37 Figure 2.20 IP addresses
  • 38. 2.38 Figure 2.21 shows two computers communicating via the Internet. The sending computer is running three processes at this time with port addresses a, b, and c. The receiving computer is running two processes at this time with port addresses j and k. Process a in the sending computer needs to communicate with process j in the receiving computer. Note that although physical addresses change from hop to hop, logical and port addresses remain the same from the source to destination. Example 2.4
  • 40. 2.40 The physical addresses will change from hop to hop, but the logical addresses usually remain the same. Note
  • 41. 2.41 Example 2.5 As we will see in Chapter 23, a port address is a 16-bit address represented by one decimal number as shown. 753 A 16-bit port address represented as one single number.
  • 42. 2.42 The physical addresses change from hop to hop, but the logical and port addresses usually remain the same. Note