SlideShare a Scribd company logo
By
Jaji Nekkanti
Network Applications And Protocol Layering
1
Agenda
 Applications
 Need for Multiple Protocols
 The Conceptual Layers of Protocol Software
 Functionality of the Layers
 ISO 7-Layer Reference Model
 X.25 And its Relation to the ISO Model
 The TCP/IP 5-Layer Reference Model
 The Protocol Layering Principle
 The Layering Principle Applied To A Network
 Layering in Mesh Networks
 Two Important Boundaries In The TCP/IP Model
 Cross-Layer Optimizations
 The Basic Idea Behind Multiplexing And Demultiplexing
2
Applications
 The World Wide Web
 Email
 Online social networking
 Streaming audio and video,
 Instant messaging
 File-sharing
 Create the applications-powerful programming platforms and new devices
such as smartphones have created new opportunities to develop applications
quickly and to bring them to a large market.
 Who operate or manage networks—mostly a behind-the-scenes job, but a
critical one and often a very complex one-network operators.
 Finally, there are those who design and build the devices and protocols that
collectively make up the Internet.
3
Classes of Applications
Web
 Presents simple interface
 Users view pages full of textual and graphical objects and click on objects that
they want to learn more about, and a corresponding new page appears.
 Uniform Resource Locator (URL),
For example,
http://www.cs.princeton.edu/˜llp/index.htm.
 Message exchange includes up to six messages to translate the server
name(www.cs.princeton.edu) IP address (128.112.136.35)
 Three messages to set up a Transmission Control Protocol (TCP) connection
between your browser and the server.
 Four messages for your browser to send the HTTP “GET”
request and the server to respond with the requested page.
 Four messages to tear down the TCP connection.
4
Streaming audio and video
 Services such as video on demand and Internet radio use this technology.
 The delivery of audio and video has some important differences from
fetching a simple web page of text and images.
For example, No need to download an entire video file—a process that might
take minutes to hours—before watching the first scene.
 Streaming audio and video implies a more timely transfer of messages from
sender to receiver, and the receiver displays the video or plays the audio
pretty much as it arrives.
 Audio and video streams in a continuous ,skipped sounds or stalled video is
not acceptable.
 By contrast, a page of text can be delivered and read in bits and pieces.
5
Real-time audio and video
 Tighter timing constraints than streaming applications.
 Ex: Skype™ or a videoconferencing application, the interactions among
the participants must be timely.
 Interactive applications usually entail audio and/or video flows in both
directions, while a streaming application is most likely sending video or
audio in only one direction.
 Videoconferencing tools that run over the Internet have since the early
1990s but have achieved much more widespread in the last 2 years.
 Fitting the video content into a relatively low bandwidth network, for
example, making sure that the video and audio remain in sync and arrive in
time.
6
A multimedia application including videoconferencing
7
Protocol layering
The Need For Multiple Protocols
 Protocols allow one to specify or understand communication without
knowing the details of a particular vendor’s network hardware.
 Network communication is a complex problem with many aspects:
 Hardware failure
 Hosts, routers
 Network congestion
 Networks have finite capacity
 Packet delay or Packet loss
 Data corruption
 Electrical, magnetic interferences
 HW failure
 Data duplication or Inverted Arrivals
8
 Program translation has been partitioned into 4 sub problems identified with
software that handles each sub problem.
 Compiler, assembler, link editor and loader.
 Two things are clear here that:
1. It should be clear that pieces of translation software must agree on the exact
format of data passed between them.
2. The four parts of the translator form a linear sequence in which output from
the compiler becomes input to the assembler, and so on.
9
The Conceptual Layers of Protocol
Software
Network
Layer n
…
Layer 2
Layer 1
Layer n
…
Layer 2
Layer 1
Sender Receiver
The modules of
Protocol SW
are on each
machine
stacked
vertically into
layers
10
Functionality of the Layers
 How many layers should be created ?
 What functionality should reside in each layer ?
 The questions are not easy to answer for several reasons:
 Given a set of goals and constraints governing a particular communication
problem.
 Reliable transmission.
 The design of network architecture and the organization of the protocol software
are interrelated.
11
ISO 7-Layer Reference Model
Service –says
what a layer
does.
Interface –says
how to access
the service.
Protocol –says
how the service
is implemented.
12
X.25 And its Relation to the ISO Model
 International Telecommunications Union(ITU).
 In the X.25 view ,a network operates much like a telephone system.
 Layers of the protocol standard specify various aspects of the network as
follows:
 Physical layer:
*physical interconnection between computers and network packet
switches.
*Includes electrical characteristics of voltage and current.
 Data link layer:
*specifies how data travels b/w a computer & packet switch to which it
connects.
*unit of data-frame.
* includes error detection.
* includes timeout mechanism.
13
14
 Network layer:
*Unit of data-Packets.
* includes the concepts of destination addressing and forwarding.
 Transport layer:
* Unit of data-segments.
*provides end-to-end reliability.
 Session layer:
*How protocol software can be organized to handle all the functionality
needed by applications programs.
*Ex: login and passwords, session and connection coordination.
 Presentation layer:
* standardize the format of data that application programs send over a
network.
 Application layer:
* includes application programs.
*Ex: E-mail, File transfer programs.
The TCP/IP 5-Layer Reference Model
 Application
Transport
Internet
Network Interface
Physical
Messages or Streams
Transport Protocol Packets
IP Packets
Network-Specific Frames
Functionality
15
 Layer 5: Application
 Users invoke application programs that access services available across a
TCP/IP.
 Application programs may send,sequence of individual messages or a
continuous stream of data.
 Layer 4: Transport
 Provide communication from one application to another.
 Provides reliable delivery of data.
 Layer 3: Internet
 Handles communication from one computer to another.
 Defines uniform format of packets forwarded across networks of different
technologies and rules for forwarding packets in routers.
 Layer 2: Network Interface
 Responsible for accepting IP packets and transmitting them over a specific
network.
 Defines formats for carrying packets in hardware frames
 Layer 1: Physical
16
17
Protocol 1
Protocol 2
Protocol 3
Interface 1
Interface 2
Interface3
IP Module
A realistic view of protocol software with multiple network interfaces and
multiple protocols
Software Organization
Application
Transport
Internet
Network
interface
Physical
Hardware
app1 app3 app4 app5 app6app2
Network3Network2Network1
Conceptual Layers
 Conceptual layers of protocols needed in computers and routers to
transfer a message from an application on computer A to an application
on computer B.
18
Transpor
t
Internet
Net Iface
Transpor
t
Internet
Net Iface
Net1 Net2 Net3
Internet
Net Iface
Internet
Net Iface
Send
er
Receiv
er
Computer
A
Computer B
Router
1
Router
2
Locus of Intelligence
19
 In the original telephone network , all the intelligence was located in phone
switches. Ex: a microphone , earpiece & a mechanism used to dial.
 By contrast, the TCP/IP protocols require attached computers to run transport
protocols and applications as well as layer 3 and layer2 protocols.
 The fundamental concept is:
* TCP/IP protocols place much of intelligence in hosts – routers in the
Internet forward packets , but do not participate in higher-layer services.
The Protocol Layering Principle
20
 Layered protocols are designed so that layer N at the destination receives
exactly the same object sent by layer N at the source.
 The layering principle offers:
 Protocol design independence:
* A protocol designers can focus on the message exchange for a given layer
with the assurance that lower layers will not alter the message.
* The key idea is that a transport protocol can be designed independent of
other protocols.
 Definition of the end-to-end property:
* We say a protocol is end-to-end if and only if the layering principle applies
between the original source and ultimate destination.
* Other protocols are classified as machine-to-machine.
The Layering Principle Applied To A Network
Application
Transport
Internet
Network Interface
Host A Host B
Application
Transport
Internet
Network Interface
Physical net
Identica
l
messag
e
Identica
l
packet
Identical
IP packet
Identica
l
Frame
21
Layering in a tcp/ip internet environment
Application
Transport
Internet
Network Interface
Host A Host B
Application
Transport
Internet
Network Interface
Physical net1
Identica
l
messag
eIdentica
l
packet
Identical
IP packet
Identica
l
Frame
22 Physical net2
Identica
l
Frame
Network Interface
Internet Identical
IP packet
Router R
Layering in Mesh Networks
23
Protocol 1
Protocol 2
Protocol 3
Interface 1
Interface 2
Interface3
IP Module
Point-To-Point
forwarding
Transport
Internet
Network Interface
Intranet Sublayer
Conceptual Layers Software Organization
Application
Physical hardware
app1 app2
app3 app4 app5 app6
Network1 Network3
Two Important Boundaries In The TCP/IP Model
24
Application
Transport
Internet
Network
interface
Physical
Hardware
Conceptual Layers
Software outside the operating system
Software inside the operating system
Only Internet addresses used
Physical addresses used
 Application programs and all protocol software from the internet layer
upward use only Internet addresses; addresses used by the network hardware
are isolated at lower layers.
Protocol
addresses
boundary
Operating
system
boundary
Cross-Layer Optimizations
25
 Designer divides complex problem into subproblems and solve each one
independently. But the software that results from strict layering can be
extremely inefficient.
 To optimize transfer, the transport layer should choose the largest packet size
that will allow one packet to travel in one network frame.
 Strict layering will prevent the transport layer from optimizing transfers.
 Implementers relax the strict layering scheme when building protocol software.
 When allocating packet buffers, transport layer protocols can use the
information to optimize processing by leaving sufficient space for headers that
will be added by lower-layer protocols.
 Similarly, lower-layer protocols often retain all the headers on an incoming
frame when passing the frame to higher-layer protocols.
The Basic Idea Behind Multiplexing And Demultiplexing
26
Demultiplexing
Based on Frame type
IP Module
ARP Module
RARP Module
Frame arrives
Illustration of frame demultiplexing that uses a type field in the frame
header .Demultiplexing is used with most networks,including Ethernet
and Wi-Fi.
Illustration of demultiplexing incoming IP packets based on the type field
in the IP header
27
IP Module
Datagram arrives
TCP Protocol
UDP Protocol
ICMP Protocol

More Related Content

What's hot

TCP/IP MODEL
TCP/IP MODEL TCP/IP MODEL
TCP/IP MODEL
VAISHNAVI SHIRPURKAR
 
OSI Model
OSI ModelOSI Model
OSI Model
Rahul Bandhe
 
Computer Network - Network Layer
Computer Network - Network LayerComputer Network - Network Layer
Computer Network - Network Layer
Manoj Kumar
 
Transport layer
Transport layerTransport layer
Transport layer
reshmadayma
 
Computer Networks Unit 2 UNIT II DATA-LINK LAYER & MEDIA ACCESS
Computer Networks Unit 2 UNIT II DATA-LINK LAYER & MEDIA ACCESSComputer Networks Unit 2 UNIT II DATA-LINK LAYER & MEDIA ACCESS
Computer Networks Unit 2 UNIT II DATA-LINK LAYER & MEDIA ACCESS
Dr. SELVAGANESAN S
 
Physical layer ppt
Physical layer pptPhysical layer ppt
Physical layer ppt
Najam Khattak
 
Inter-Process Communication in distributed systems
Inter-Process Communication in distributed systemsInter-Process Communication in distributed systems
Inter-Process Communication in distributed systems
Aya Mahmoud
 
Application Layer
Application Layer Application Layer
Application Layer
Dr Shashikant Athawale
 
OSI and TCPIP Model
OSI and TCPIP ModelOSI and TCPIP Model
OSI and TCPIP Model
Tapan Khilar
 
Routing algorithm
Routing algorithmRouting algorithm
Routing algorithm
Bushra M
 
Packet switching
Packet switchingPacket switching
Packet switchingasimnawaz54
 
Mobile transportlayer
Mobile transportlayerMobile transportlayer
Mobile transportlayerRahul Hada
 
Presentation on arp protocol
Presentation on arp protocolPresentation on arp protocol
Presentation on arp protocol
Mohd. Ahmad Siddiqi
 
Network layer logical addressing
Network layer logical addressingNetwork layer logical addressing
Network layer logical addressing
Sri Manakula Vinayagar Engineering College
 
Difference between OSI Layer & TCP/IP Layer
Difference between OSI Layer & TCP/IP LayerDifference between OSI Layer & TCP/IP Layer
Difference between OSI Layer & TCP/IP Layer
Netwax Lab
 
Physical Layer
Physical LayerPhysical Layer
Physical Layer
Are-Da Shalan
 
TCP-IP Reference Model
TCP-IP Reference ModelTCP-IP Reference Model
TCP-IP Reference Model
Mukesh Tekwani
 
GFS & HDFS Introduction
GFS & HDFS IntroductionGFS & HDFS Introduction
GFS & HDFS Introduction
Hariharan Ganesan
 
Transport layer (computer networks)
Transport layer (computer networks)Transport layer (computer networks)
Transport layer (computer networks)
Fatbardh Hysa
 

What's hot (20)

TCP/IP MODEL
TCP/IP MODEL TCP/IP MODEL
TCP/IP MODEL
 
OSI Model
OSI ModelOSI Model
OSI Model
 
Computer Network - Network Layer
Computer Network - Network LayerComputer Network - Network Layer
Computer Network - Network Layer
 
Transport layer
Transport layerTransport layer
Transport layer
 
Inter Process Communication
Inter Process CommunicationInter Process Communication
Inter Process Communication
 
Computer Networks Unit 2 UNIT II DATA-LINK LAYER & MEDIA ACCESS
Computer Networks Unit 2 UNIT II DATA-LINK LAYER & MEDIA ACCESSComputer Networks Unit 2 UNIT II DATA-LINK LAYER & MEDIA ACCESS
Computer Networks Unit 2 UNIT II DATA-LINK LAYER & MEDIA ACCESS
 
Physical layer ppt
Physical layer pptPhysical layer ppt
Physical layer ppt
 
Inter-Process Communication in distributed systems
Inter-Process Communication in distributed systemsInter-Process Communication in distributed systems
Inter-Process Communication in distributed systems
 
Application Layer
Application Layer Application Layer
Application Layer
 
OSI and TCPIP Model
OSI and TCPIP ModelOSI and TCPIP Model
OSI and TCPIP Model
 
Routing algorithm
Routing algorithmRouting algorithm
Routing algorithm
 
Packet switching
Packet switchingPacket switching
Packet switching
 
Mobile transportlayer
Mobile transportlayerMobile transportlayer
Mobile transportlayer
 
Presentation on arp protocol
Presentation on arp protocolPresentation on arp protocol
Presentation on arp protocol
 
Network layer logical addressing
Network layer logical addressingNetwork layer logical addressing
Network layer logical addressing
 
Difference between OSI Layer & TCP/IP Layer
Difference between OSI Layer & TCP/IP LayerDifference between OSI Layer & TCP/IP Layer
Difference between OSI Layer & TCP/IP Layer
 
Physical Layer
Physical LayerPhysical Layer
Physical Layer
 
TCP-IP Reference Model
TCP-IP Reference ModelTCP-IP Reference Model
TCP-IP Reference Model
 
GFS & HDFS Introduction
GFS & HDFS IntroductionGFS & HDFS Introduction
GFS & HDFS Introduction
 
Transport layer (computer networks)
Transport layer (computer networks)Transport layer (computer networks)
Transport layer (computer networks)
 

Viewers also liked

Lecture application layer
Lecture application layerLecture application layer
Lecture application layerHasam Panezai
 
Application Layer Functionality and Protocols
Application Layer Functionality and ProtocolsApplication Layer Functionality and Protocols
Application Layer Functionality and Protocols
Sachii Dosti
 
OO Development 6 - Software Design
OO Development 6 - Software DesignOO Development 6 - Software Design
OO Development 6 - Software Design
Randy Connolly
 
Week2 lec2-bscs1
Week2 lec2-bscs1Week2 lec2-bscs1
Week2 lec2-bscs1
syedhaiderraza
 
An Overview of Mobile Ad hoc Network: Application, Challenges and Comparison ...
An Overview of Mobile Ad hoc Network: Application, Challenges and Comparison ...An Overview of Mobile Ad hoc Network: Application, Challenges and Comparison ...
An Overview of Mobile Ad hoc Network: Application, Challenges and Comparison ...
IOSR Journals
 
It application social network twitter
It application social network twitterIt application social network twitter
It application social network twitter
zeref17
 
Social network analysis: an overview
Social network analysis: an overviewSocial network analysis: an overview
Social network analysis: an overview
sociamigo
 
ADhoc- network overview,application,issues.
ADhoc- network overview,application,issues.ADhoc- network overview,application,issues.
ADhoc- network overview,application,issues.
Mangesh Vasu
 
Network in Computer Application in Business
Network in Computer Application in BusinessNetwork in Computer Application in Business
Network in Computer Application in Business
Nethan P
 
Application and Network Orchestration using Heat & Tosca
Application and Network Orchestration using Heat & ToscaApplication and Network Orchestration using Heat & Tosca
Application and Network Orchestration using Heat & Tosca
Nati Shalom
 
Network Application Performance
Network Application PerformanceNetwork Application Performance
Network Application Performance
Shumon Huque
 
Chapter 10 - Application Layer
Chapter 10 - Application LayerChapter 10 - Application Layer
Chapter 10 - Application Layer
Yaser Rahmati
 
Network switches, functions & role in networks
Network switches, functions & role in networksNetwork switches, functions & role in networks
Network switches, functions & role in networks
IT Tech
 
The Application Layer
The Application LayerThe Application Layer
The Application Layer
adil raja
 
application layer protocols
application layer protocolsapplication layer protocols
application layer protocols
bhavanatmithun
 
AWS Executive Overview - June 2016 - Gartner CIO Summit Toronto
AWS Executive Overview - June 2016 - Gartner CIO Summit TorontoAWS Executive Overview - June 2016 - Gartner CIO Summit Toronto
AWS Executive Overview - June 2016 - Gartner CIO Summit Toronto
Amazon Web Services
 
Webservices
WebservicesWebservices
Webservices
Gerard Sylvester
 
Uccn1003 -may10_-_lect01a_-_intro_to_network_applications_services
Uccn1003  -may10_-_lect01a_-_intro_to_network_applications_servicesUccn1003  -may10_-_lect01a_-_intro_to_network_applications_services
Uccn1003 -may10_-_lect01a_-_intro_to_network_applications_servicesShu Shin
 

Viewers also liked (20)

Lecture application layer
Lecture application layerLecture application layer
Lecture application layer
 
Application Layer Functionality and Protocols
Application Layer Functionality and ProtocolsApplication Layer Functionality and Protocols
Application Layer Functionality and Protocols
 
OO Development 6 - Software Design
OO Development 6 - Software DesignOO Development 6 - Software Design
OO Development 6 - Software Design
 
Week2 lec2-bscs1
Week2 lec2-bscs1Week2 lec2-bscs1
Week2 lec2-bscs1
 
Chap 1 introduction
Chap 1 introductionChap 1 introduction
Chap 1 introduction
 
An Overview of Mobile Ad hoc Network: Application, Challenges and Comparison ...
An Overview of Mobile Ad hoc Network: Application, Challenges and Comparison ...An Overview of Mobile Ad hoc Network: Application, Challenges and Comparison ...
An Overview of Mobile Ad hoc Network: Application, Challenges and Comparison ...
 
It application social network twitter
It application social network twitterIt application social network twitter
It application social network twitter
 
Social network analysis: an overview
Social network analysis: an overviewSocial network analysis: an overview
Social network analysis: an overview
 
ADhoc- network overview,application,issues.
ADhoc- network overview,application,issues.ADhoc- network overview,application,issues.
ADhoc- network overview,application,issues.
 
Network in Computer Application in Business
Network in Computer Application in BusinessNetwork in Computer Application in Business
Network in Computer Application in Business
 
Application and Network Orchestration using Heat & Tosca
Application and Network Orchestration using Heat & ToscaApplication and Network Orchestration using Heat & Tosca
Application and Network Orchestration using Heat & Tosca
 
Network Application Performance
Network Application PerformanceNetwork Application Performance
Network Application Performance
 
Ecommerce Chap 07
Ecommerce Chap 07Ecommerce Chap 07
Ecommerce Chap 07
 
Chapter 10 - Application Layer
Chapter 10 - Application LayerChapter 10 - Application Layer
Chapter 10 - Application Layer
 
Network switches, functions & role in networks
Network switches, functions & role in networksNetwork switches, functions & role in networks
Network switches, functions & role in networks
 
The Application Layer
The Application LayerThe Application Layer
The Application Layer
 
application layer protocols
application layer protocolsapplication layer protocols
application layer protocols
 
AWS Executive Overview - June 2016 - Gartner CIO Summit Toronto
AWS Executive Overview - June 2016 - Gartner CIO Summit TorontoAWS Executive Overview - June 2016 - Gartner CIO Summit Toronto
AWS Executive Overview - June 2016 - Gartner CIO Summit Toronto
 
Webservices
WebservicesWebservices
Webservices
 
Uccn1003 -may10_-_lect01a_-_intro_to_network_applications_services
Uccn1003  -may10_-_lect01a_-_intro_to_network_applications_servicesUccn1003  -may10_-_lect01a_-_intro_to_network_applications_services
Uccn1003 -may10_-_lect01a_-_intro_to_network_applications_services
 

Similar to Slides for protocol layering and network applications

Introduction to Computer Networking
Introduction to Computer NetworkingIntroduction to Computer Networking
Introduction to Computer Networking
shankars73
 
CSC1202_3_The_OSI_Reference_Model_-_V2.pptx
CSC1202_3_The_OSI_Reference_Model_-_V2.pptxCSC1202_3_The_OSI_Reference_Model_-_V2.pptx
CSC1202_3_The_OSI_Reference_Model_-_V2.pptx
Muhammad Sohail
 
Comparison of DOD and OSI Model in the Internet Communication
Comparison of DOD and OSI Model in the Internet CommunicationComparison of DOD and OSI Model in the Internet Communication
Comparison of DOD and OSI Model in the Internet Communication
ijtsrd
 
Ex 1 chapter03-appliation-layer-tony_chen
Ex 1 chapter03-appliation-layer-tony_chenEx 1 chapter03-appliation-layer-tony_chen
Ex 1 chapter03-appliation-layer-tony_chenĐô GiẢn
 
Ex 1 chapter03-appliation-layer-tony_chen
Ex 1 chapter03-appliation-layer-tony_chenEx 1 chapter03-appliation-layer-tony_chen
Ex 1 chapter03-appliation-layer-tony_chenĐô GiẢn
 
3G Wireless Access, Abstract
3G Wireless Access, Abstract3G Wireless Access, Abstract
3G Wireless Access, Abstract
Victoria Burke
 
CSC1202_3_The_OSI_Reference_Model_-_V2.pdf
CSC1202_3_The_OSI_Reference_Model_-_V2.pdfCSC1202_3_The_OSI_Reference_Model_-_V2.pdf
CSC1202_3_The_OSI_Reference_Model_-_V2.pdf
BoostHub
 
Internet basics and Cloud Computing- Manish Jha
Internet basics and Cloud Computing- Manish JhaInternet basics and Cloud Computing- Manish Jha
Internet basics and Cloud Computing- Manish Jha
manish jha
 
Manish Jha- Research Scholar- Internet Basics Requriement
Manish Jha- Research Scholar- Internet Basics RequriementManish Jha- Research Scholar- Internet Basics Requriement
Manish Jha- Research Scholar- Internet Basics Requriement
Manish Jha
 
Network layers
Network layersNetwork layers
Network layers
GermaineGenove
 
Basics of Computer Networks
Basics of Computer NetworksBasics of Computer Networks
Basics of Computer Networks
IndrajaMeghavathula
 
OSI model.pptx
OSI model.pptxOSI model.pptx
OSI model.pptx
SmtArunaAsafAliGovtP
 
pppppppppppppppppjjjjjjjjjjjpppppppp.pptx
pppppppppppppppppjjjjjjjjjjjpppppppp.pptxpppppppppppppppppjjjjjjjjjjjpppppppp.pptx
pppppppppppppppppjjjjjjjjjjjpppppppp.pptx
zeyadosama505
 
chapter 4.pptx
chapter 4.pptxchapter 4.pptx
chapter 4.pptx
shucaybcabdi
 
Thesis Statement On Digital Security
Thesis Statement On Digital SecurityThesis Statement On Digital Security
Thesis Statement On Digital Security
Lindsey Jones
 
The TCP/IP and OSI models
The TCP/IP and OSI modelsThe TCP/IP and OSI models
The TCP/IP and OSI modelsJake Weaver
 
Osi model
Osi modelOsi model
Osi model
dhawal mehta
 
computer network and chapter 7 OSI layers.pptx
computer network and chapter 7 OSI layers.pptxcomputer network and chapter 7 OSI layers.pptx
computer network and chapter 7 OSI layers.pptx
gadisaAdamu
 
Unit 3 Assignment 1 Osi Model
Unit 3 Assignment 1 Osi ModelUnit 3 Assignment 1 Osi Model
Unit 3 Assignment 1 Osi Model
Jacqueline Thomas
 
computer network NCC l4dc assingment
computer network NCC l4dc assingment computer network NCC l4dc assingment
computer network NCC l4dc assingment
David Parker
 

Similar to Slides for protocol layering and network applications (20)

Introduction to Computer Networking
Introduction to Computer NetworkingIntroduction to Computer Networking
Introduction to Computer Networking
 
CSC1202_3_The_OSI_Reference_Model_-_V2.pptx
CSC1202_3_The_OSI_Reference_Model_-_V2.pptxCSC1202_3_The_OSI_Reference_Model_-_V2.pptx
CSC1202_3_The_OSI_Reference_Model_-_V2.pptx
 
Comparison of DOD and OSI Model in the Internet Communication
Comparison of DOD and OSI Model in the Internet CommunicationComparison of DOD and OSI Model in the Internet Communication
Comparison of DOD and OSI Model in the Internet Communication
 
Ex 1 chapter03-appliation-layer-tony_chen
Ex 1 chapter03-appliation-layer-tony_chenEx 1 chapter03-appliation-layer-tony_chen
Ex 1 chapter03-appliation-layer-tony_chen
 
Ex 1 chapter03-appliation-layer-tony_chen
Ex 1 chapter03-appliation-layer-tony_chenEx 1 chapter03-appliation-layer-tony_chen
Ex 1 chapter03-appliation-layer-tony_chen
 
3G Wireless Access, Abstract
3G Wireless Access, Abstract3G Wireless Access, Abstract
3G Wireless Access, Abstract
 
CSC1202_3_The_OSI_Reference_Model_-_V2.pdf
CSC1202_3_The_OSI_Reference_Model_-_V2.pdfCSC1202_3_The_OSI_Reference_Model_-_V2.pdf
CSC1202_3_The_OSI_Reference_Model_-_V2.pdf
 
Internet basics and Cloud Computing- Manish Jha
Internet basics and Cloud Computing- Manish JhaInternet basics and Cloud Computing- Manish Jha
Internet basics and Cloud Computing- Manish Jha
 
Manish Jha- Research Scholar- Internet Basics Requriement
Manish Jha- Research Scholar- Internet Basics RequriementManish Jha- Research Scholar- Internet Basics Requriement
Manish Jha- Research Scholar- Internet Basics Requriement
 
Network layers
Network layersNetwork layers
Network layers
 
Basics of Computer Networks
Basics of Computer NetworksBasics of Computer Networks
Basics of Computer Networks
 
OSI model.pptx
OSI model.pptxOSI model.pptx
OSI model.pptx
 
pppppppppppppppppjjjjjjjjjjjpppppppp.pptx
pppppppppppppppppjjjjjjjjjjjpppppppp.pptxpppppppppppppppppjjjjjjjjjjjpppppppp.pptx
pppppppppppppppppjjjjjjjjjjjpppppppp.pptx
 
chapter 4.pptx
chapter 4.pptxchapter 4.pptx
chapter 4.pptx
 
Thesis Statement On Digital Security
Thesis Statement On Digital SecurityThesis Statement On Digital Security
Thesis Statement On Digital Security
 
The TCP/IP and OSI models
The TCP/IP and OSI modelsThe TCP/IP and OSI models
The TCP/IP and OSI models
 
Osi model
Osi modelOsi model
Osi model
 
computer network and chapter 7 OSI layers.pptx
computer network and chapter 7 OSI layers.pptxcomputer network and chapter 7 OSI layers.pptx
computer network and chapter 7 OSI layers.pptx
 
Unit 3 Assignment 1 Osi Model
Unit 3 Assignment 1 Osi ModelUnit 3 Assignment 1 Osi Model
Unit 3 Assignment 1 Osi Model
 
computer network NCC l4dc assingment
computer network NCC l4dc assingment computer network NCC l4dc assingment
computer network NCC l4dc assingment
 

Recently uploaded

Top 10 Oil and Gas Projects in Saudi Arabia 2024.pdf
Top 10 Oil and Gas Projects in Saudi Arabia 2024.pdfTop 10 Oil and Gas Projects in Saudi Arabia 2024.pdf
Top 10 Oil and Gas Projects in Saudi Arabia 2024.pdf
Teleport Manpower Consultant
 
Vaccine management system project report documentation..pdf
Vaccine management system project report documentation..pdfVaccine management system project report documentation..pdf
Vaccine management system project report documentation..pdf
Kamal Acharya
 
Railway Signalling Principles Edition 3.pdf
Railway Signalling Principles Edition 3.pdfRailway Signalling Principles Edition 3.pdf
Railway Signalling Principles Edition 3.pdf
TeeVichai
 
TECHNICAL TRAINING MANUAL GENERAL FAMILIARIZATION COURSE
TECHNICAL TRAINING MANUAL   GENERAL FAMILIARIZATION COURSETECHNICAL TRAINING MANUAL   GENERAL FAMILIARIZATION COURSE
TECHNICAL TRAINING MANUAL GENERAL FAMILIARIZATION COURSE
DuvanRamosGarzon1
 
WATER CRISIS and its solutions-pptx 1234
WATER CRISIS and its solutions-pptx 1234WATER CRISIS and its solutions-pptx 1234
WATER CRISIS and its solutions-pptx 1234
AafreenAbuthahir2
 
Nuclear Power Economics and Structuring 2024
Nuclear Power Economics and Structuring 2024Nuclear Power Economics and Structuring 2024
Nuclear Power Economics and Structuring 2024
Massimo Talia
 
NO1 Uk best vashikaran specialist in delhi vashikaran baba near me online vas...
NO1 Uk best vashikaran specialist in delhi vashikaran baba near me online vas...NO1 Uk best vashikaran specialist in delhi vashikaran baba near me online vas...
NO1 Uk best vashikaran specialist in delhi vashikaran baba near me online vas...
Amil Baba Dawood bangali
 
power quality voltage fluctuation UNIT - I.pptx
power quality voltage fluctuation UNIT - I.pptxpower quality voltage fluctuation UNIT - I.pptx
power quality voltage fluctuation UNIT - I.pptx
ViniHema
 
Architectural Portfolio Sean Lockwood
Architectural Portfolio Sean LockwoodArchitectural Portfolio Sean Lockwood
Architectural Portfolio Sean Lockwood
seandesed
 
Democratizing Fuzzing at Scale by Abhishek Arya
Democratizing Fuzzing at Scale by Abhishek AryaDemocratizing Fuzzing at Scale by Abhishek Arya
Democratizing Fuzzing at Scale by Abhishek Arya
abh.arya
 
Event Management System Vb Net Project Report.pdf
Event Management System Vb Net  Project Report.pdfEvent Management System Vb Net  Project Report.pdf
Event Management System Vb Net Project Report.pdf
Kamal Acharya
 
Hybrid optimization of pumped hydro system and solar- Engr. Abdul-Azeez.pdf
Hybrid optimization of pumped hydro system and solar- Engr. Abdul-Azeez.pdfHybrid optimization of pumped hydro system and solar- Engr. Abdul-Azeez.pdf
Hybrid optimization of pumped hydro system and solar- Engr. Abdul-Azeez.pdf
fxintegritypublishin
 
Standard Reomte Control Interface - Neometrix
Standard Reomte Control Interface - NeometrixStandard Reomte Control Interface - Neometrix
Standard Reomte Control Interface - Neometrix
Neometrix_Engineering_Pvt_Ltd
 
The Benefits and Techniques of Trenchless Pipe Repair.pdf
The Benefits and Techniques of Trenchless Pipe Repair.pdfThe Benefits and Techniques of Trenchless Pipe Repair.pdf
The Benefits and Techniques of Trenchless Pipe Repair.pdf
Pipe Restoration Solutions
 
Halogenation process of chemical process industries
Halogenation process of chemical process industriesHalogenation process of chemical process industries
Halogenation process of chemical process industries
MuhammadTufail242431
 
H.Seo, ICLR 2024, MLILAB, KAIST AI.pdf
H.Seo,  ICLR 2024, MLILAB,  KAIST AI.pdfH.Seo,  ICLR 2024, MLILAB,  KAIST AI.pdf
H.Seo, ICLR 2024, MLILAB, KAIST AI.pdf
MLILAB
 
Final project report on grocery store management system..pdf
Final project report on grocery store management system..pdfFinal project report on grocery store management system..pdf
Final project report on grocery store management system..pdf
Kamal Acharya
 
block diagram and signal flow graph representation
block diagram and signal flow graph representationblock diagram and signal flow graph representation
block diagram and signal flow graph representation
Divya Somashekar
 
Courier management system project report.pdf
Courier management system project report.pdfCourier management system project report.pdf
Courier management system project report.pdf
Kamal Acharya
 
Sachpazis:Terzaghi Bearing Capacity Estimation in simple terms with Calculati...
Sachpazis:Terzaghi Bearing Capacity Estimation in simple terms with Calculati...Sachpazis:Terzaghi Bearing Capacity Estimation in simple terms with Calculati...
Sachpazis:Terzaghi Bearing Capacity Estimation in simple terms with Calculati...
Dr.Costas Sachpazis
 

Recently uploaded (20)

Top 10 Oil and Gas Projects in Saudi Arabia 2024.pdf
Top 10 Oil and Gas Projects in Saudi Arabia 2024.pdfTop 10 Oil and Gas Projects in Saudi Arabia 2024.pdf
Top 10 Oil and Gas Projects in Saudi Arabia 2024.pdf
 
Vaccine management system project report documentation..pdf
Vaccine management system project report documentation..pdfVaccine management system project report documentation..pdf
Vaccine management system project report documentation..pdf
 
Railway Signalling Principles Edition 3.pdf
Railway Signalling Principles Edition 3.pdfRailway Signalling Principles Edition 3.pdf
Railway Signalling Principles Edition 3.pdf
 
TECHNICAL TRAINING MANUAL GENERAL FAMILIARIZATION COURSE
TECHNICAL TRAINING MANUAL   GENERAL FAMILIARIZATION COURSETECHNICAL TRAINING MANUAL   GENERAL FAMILIARIZATION COURSE
TECHNICAL TRAINING MANUAL GENERAL FAMILIARIZATION COURSE
 
WATER CRISIS and its solutions-pptx 1234
WATER CRISIS and its solutions-pptx 1234WATER CRISIS and its solutions-pptx 1234
WATER CRISIS and its solutions-pptx 1234
 
Nuclear Power Economics and Structuring 2024
Nuclear Power Economics and Structuring 2024Nuclear Power Economics and Structuring 2024
Nuclear Power Economics and Structuring 2024
 
NO1 Uk best vashikaran specialist in delhi vashikaran baba near me online vas...
NO1 Uk best vashikaran specialist in delhi vashikaran baba near me online vas...NO1 Uk best vashikaran specialist in delhi vashikaran baba near me online vas...
NO1 Uk best vashikaran specialist in delhi vashikaran baba near me online vas...
 
power quality voltage fluctuation UNIT - I.pptx
power quality voltage fluctuation UNIT - I.pptxpower quality voltage fluctuation UNIT - I.pptx
power quality voltage fluctuation UNIT - I.pptx
 
Architectural Portfolio Sean Lockwood
Architectural Portfolio Sean LockwoodArchitectural Portfolio Sean Lockwood
Architectural Portfolio Sean Lockwood
 
Democratizing Fuzzing at Scale by Abhishek Arya
Democratizing Fuzzing at Scale by Abhishek AryaDemocratizing Fuzzing at Scale by Abhishek Arya
Democratizing Fuzzing at Scale by Abhishek Arya
 
Event Management System Vb Net Project Report.pdf
Event Management System Vb Net  Project Report.pdfEvent Management System Vb Net  Project Report.pdf
Event Management System Vb Net Project Report.pdf
 
Hybrid optimization of pumped hydro system and solar- Engr. Abdul-Azeez.pdf
Hybrid optimization of pumped hydro system and solar- Engr. Abdul-Azeez.pdfHybrid optimization of pumped hydro system and solar- Engr. Abdul-Azeez.pdf
Hybrid optimization of pumped hydro system and solar- Engr. Abdul-Azeez.pdf
 
Standard Reomte Control Interface - Neometrix
Standard Reomte Control Interface - NeometrixStandard Reomte Control Interface - Neometrix
Standard Reomte Control Interface - Neometrix
 
The Benefits and Techniques of Trenchless Pipe Repair.pdf
The Benefits and Techniques of Trenchless Pipe Repair.pdfThe Benefits and Techniques of Trenchless Pipe Repair.pdf
The Benefits and Techniques of Trenchless Pipe Repair.pdf
 
Halogenation process of chemical process industries
Halogenation process of chemical process industriesHalogenation process of chemical process industries
Halogenation process of chemical process industries
 
H.Seo, ICLR 2024, MLILAB, KAIST AI.pdf
H.Seo,  ICLR 2024, MLILAB,  KAIST AI.pdfH.Seo,  ICLR 2024, MLILAB,  KAIST AI.pdf
H.Seo, ICLR 2024, MLILAB, KAIST AI.pdf
 
Final project report on grocery store management system..pdf
Final project report on grocery store management system..pdfFinal project report on grocery store management system..pdf
Final project report on grocery store management system..pdf
 
block diagram and signal flow graph representation
block diagram and signal flow graph representationblock diagram and signal flow graph representation
block diagram and signal flow graph representation
 
Courier management system project report.pdf
Courier management system project report.pdfCourier management system project report.pdf
Courier management system project report.pdf
 
Sachpazis:Terzaghi Bearing Capacity Estimation in simple terms with Calculati...
Sachpazis:Terzaghi Bearing Capacity Estimation in simple terms with Calculati...Sachpazis:Terzaghi Bearing Capacity Estimation in simple terms with Calculati...
Sachpazis:Terzaghi Bearing Capacity Estimation in simple terms with Calculati...
 

Slides for protocol layering and network applications

  • 1. By Jaji Nekkanti Network Applications And Protocol Layering 1
  • 2. Agenda  Applications  Need for Multiple Protocols  The Conceptual Layers of Protocol Software  Functionality of the Layers  ISO 7-Layer Reference Model  X.25 And its Relation to the ISO Model  The TCP/IP 5-Layer Reference Model  The Protocol Layering Principle  The Layering Principle Applied To A Network  Layering in Mesh Networks  Two Important Boundaries In The TCP/IP Model  Cross-Layer Optimizations  The Basic Idea Behind Multiplexing And Demultiplexing 2
  • 3. Applications  The World Wide Web  Email  Online social networking  Streaming audio and video,  Instant messaging  File-sharing  Create the applications-powerful programming platforms and new devices such as smartphones have created new opportunities to develop applications quickly and to bring them to a large market.  Who operate or manage networks—mostly a behind-the-scenes job, but a critical one and often a very complex one-network operators.  Finally, there are those who design and build the devices and protocols that collectively make up the Internet. 3
  • 4. Classes of Applications Web  Presents simple interface  Users view pages full of textual and graphical objects and click on objects that they want to learn more about, and a corresponding new page appears.  Uniform Resource Locator (URL), For example, http://www.cs.princeton.edu/˜llp/index.htm.  Message exchange includes up to six messages to translate the server name(www.cs.princeton.edu) IP address (128.112.136.35)  Three messages to set up a Transmission Control Protocol (TCP) connection between your browser and the server.  Four messages for your browser to send the HTTP “GET” request and the server to respond with the requested page.  Four messages to tear down the TCP connection. 4
  • 5. Streaming audio and video  Services such as video on demand and Internet radio use this technology.  The delivery of audio and video has some important differences from fetching a simple web page of text and images. For example, No need to download an entire video file—a process that might take minutes to hours—before watching the first scene.  Streaming audio and video implies a more timely transfer of messages from sender to receiver, and the receiver displays the video or plays the audio pretty much as it arrives.  Audio and video streams in a continuous ,skipped sounds or stalled video is not acceptable.  By contrast, a page of text can be delivered and read in bits and pieces. 5
  • 6. Real-time audio and video  Tighter timing constraints than streaming applications.  Ex: Skype™ or a videoconferencing application, the interactions among the participants must be timely.  Interactive applications usually entail audio and/or video flows in both directions, while a streaming application is most likely sending video or audio in only one direction.  Videoconferencing tools that run over the Internet have since the early 1990s but have achieved much more widespread in the last 2 years.  Fitting the video content into a relatively low bandwidth network, for example, making sure that the video and audio remain in sync and arrive in time. 6
  • 7. A multimedia application including videoconferencing 7
  • 8. Protocol layering The Need For Multiple Protocols  Protocols allow one to specify or understand communication without knowing the details of a particular vendor’s network hardware.  Network communication is a complex problem with many aspects:  Hardware failure  Hosts, routers  Network congestion  Networks have finite capacity  Packet delay or Packet loss  Data corruption  Electrical, magnetic interferences  HW failure  Data duplication or Inverted Arrivals 8
  • 9.  Program translation has been partitioned into 4 sub problems identified with software that handles each sub problem.  Compiler, assembler, link editor and loader.  Two things are clear here that: 1. It should be clear that pieces of translation software must agree on the exact format of data passed between them. 2. The four parts of the translator form a linear sequence in which output from the compiler becomes input to the assembler, and so on. 9
  • 10. The Conceptual Layers of Protocol Software Network Layer n … Layer 2 Layer 1 Layer n … Layer 2 Layer 1 Sender Receiver The modules of Protocol SW are on each machine stacked vertically into layers 10
  • 11. Functionality of the Layers  How many layers should be created ?  What functionality should reside in each layer ?  The questions are not easy to answer for several reasons:  Given a set of goals and constraints governing a particular communication problem.  Reliable transmission.  The design of network architecture and the organization of the protocol software are interrelated. 11
  • 12. ISO 7-Layer Reference Model Service –says what a layer does. Interface –says how to access the service. Protocol –says how the service is implemented. 12
  • 13. X.25 And its Relation to the ISO Model  International Telecommunications Union(ITU).  In the X.25 view ,a network operates much like a telephone system.  Layers of the protocol standard specify various aspects of the network as follows:  Physical layer: *physical interconnection between computers and network packet switches. *Includes electrical characteristics of voltage and current.  Data link layer: *specifies how data travels b/w a computer & packet switch to which it connects. *unit of data-frame. * includes error detection. * includes timeout mechanism. 13
  • 14. 14  Network layer: *Unit of data-Packets. * includes the concepts of destination addressing and forwarding.  Transport layer: * Unit of data-segments. *provides end-to-end reliability.  Session layer: *How protocol software can be organized to handle all the functionality needed by applications programs. *Ex: login and passwords, session and connection coordination.  Presentation layer: * standardize the format of data that application programs send over a network.  Application layer: * includes application programs. *Ex: E-mail, File transfer programs.
  • 15. The TCP/IP 5-Layer Reference Model  Application Transport Internet Network Interface Physical Messages or Streams Transport Protocol Packets IP Packets Network-Specific Frames Functionality 15
  • 16.  Layer 5: Application  Users invoke application programs that access services available across a TCP/IP.  Application programs may send,sequence of individual messages or a continuous stream of data.  Layer 4: Transport  Provide communication from one application to another.  Provides reliable delivery of data.  Layer 3: Internet  Handles communication from one computer to another.  Defines uniform format of packets forwarded across networks of different technologies and rules for forwarding packets in routers.  Layer 2: Network Interface  Responsible for accepting IP packets and transmitting them over a specific network.  Defines formats for carrying packets in hardware frames  Layer 1: Physical 16
  • 17. 17 Protocol 1 Protocol 2 Protocol 3 Interface 1 Interface 2 Interface3 IP Module A realistic view of protocol software with multiple network interfaces and multiple protocols Software Organization Application Transport Internet Network interface Physical Hardware app1 app3 app4 app5 app6app2 Network3Network2Network1 Conceptual Layers
  • 18.  Conceptual layers of protocols needed in computers and routers to transfer a message from an application on computer A to an application on computer B. 18 Transpor t Internet Net Iface Transpor t Internet Net Iface Net1 Net2 Net3 Internet Net Iface Internet Net Iface Send er Receiv er Computer A Computer B Router 1 Router 2
  • 19. Locus of Intelligence 19  In the original telephone network , all the intelligence was located in phone switches. Ex: a microphone , earpiece & a mechanism used to dial.  By contrast, the TCP/IP protocols require attached computers to run transport protocols and applications as well as layer 3 and layer2 protocols.  The fundamental concept is: * TCP/IP protocols place much of intelligence in hosts – routers in the Internet forward packets , but do not participate in higher-layer services.
  • 20. The Protocol Layering Principle 20  Layered protocols are designed so that layer N at the destination receives exactly the same object sent by layer N at the source.  The layering principle offers:  Protocol design independence: * A protocol designers can focus on the message exchange for a given layer with the assurance that lower layers will not alter the message. * The key idea is that a transport protocol can be designed independent of other protocols.  Definition of the end-to-end property: * We say a protocol is end-to-end if and only if the layering principle applies between the original source and ultimate destination. * Other protocols are classified as machine-to-machine.
  • 21. The Layering Principle Applied To A Network Application Transport Internet Network Interface Host A Host B Application Transport Internet Network Interface Physical net Identica l messag e Identica l packet Identical IP packet Identica l Frame 21
  • 22. Layering in a tcp/ip internet environment Application Transport Internet Network Interface Host A Host B Application Transport Internet Network Interface Physical net1 Identica l messag eIdentica l packet Identical IP packet Identica l Frame 22 Physical net2 Identica l Frame Network Interface Internet Identical IP packet Router R
  • 23. Layering in Mesh Networks 23 Protocol 1 Protocol 2 Protocol 3 Interface 1 Interface 2 Interface3 IP Module Point-To-Point forwarding Transport Internet Network Interface Intranet Sublayer Conceptual Layers Software Organization Application Physical hardware app1 app2 app3 app4 app5 app6 Network1 Network3
  • 24. Two Important Boundaries In The TCP/IP Model 24 Application Transport Internet Network interface Physical Hardware Conceptual Layers Software outside the operating system Software inside the operating system Only Internet addresses used Physical addresses used  Application programs and all protocol software from the internet layer upward use only Internet addresses; addresses used by the network hardware are isolated at lower layers. Protocol addresses boundary Operating system boundary
  • 25. Cross-Layer Optimizations 25  Designer divides complex problem into subproblems and solve each one independently. But the software that results from strict layering can be extremely inefficient.  To optimize transfer, the transport layer should choose the largest packet size that will allow one packet to travel in one network frame.  Strict layering will prevent the transport layer from optimizing transfers.  Implementers relax the strict layering scheme when building protocol software.  When allocating packet buffers, transport layer protocols can use the information to optimize processing by leaving sufficient space for headers that will be added by lower-layer protocols.  Similarly, lower-layer protocols often retain all the headers on an incoming frame when passing the frame to higher-layer protocols.
  • 26. The Basic Idea Behind Multiplexing And Demultiplexing 26 Demultiplexing Based on Frame type IP Module ARP Module RARP Module Frame arrives Illustration of frame demultiplexing that uses a type field in the frame header .Demultiplexing is used with most networks,including Ethernet and Wi-Fi.
  • 27. Illustration of demultiplexing incoming IP packets based on the type field in the IP header 27 IP Module Datagram arrives TCP Protocol UDP Protocol ICMP Protocol