architectures. many tasks involved in encoding, protecting and transmitting user application data as...

22
Architectures. Many tasks involved in encoding, protecting and transmitting user application data as bit stream. Network Architecture is how tasks are grouped (into layers) e.g, the number of layers and layer functionality.

Upload: florence-jefferson

Post on 28-Dec-2015

218 views

Category:

Documents


0 download

TRANSCRIPT

Page 1: Architectures. Many tasks involved in encoding, protecting and transmitting user application data as bit stream. Network Architecture is how tasks are

Architectures.

• Many tasks involved in encoding, protecting and transmitting user application data as bit stream.

• Network Architecture is how tasks are grouped (into layers) – e.g, the number of layers and

layer functionality.

Page 2: Architectures. Many tasks involved in encoding, protecting and transmitting user application data as bit stream. Network Architecture is how tasks are

• Different architectures (eg. TCP, SNA, Decnet, ISO etc.) have different number, order and composition of layers.

• ISO and TCP/IP most frequently cited

• No ideal architecture - see Tanenbaum

• Also, requirements of architecture change with time

Page 3: Architectures. Many tasks involved in encoding, protecting and transmitting user application data as bit stream. Network Architecture is how tasks are

Terminology

• hosts (terminals, TEs) terminate all layers

• nodes (stations, exchanges, switches, routers or IMPs) lowest two or three.

• Nodes connected by channels (pairs, fibre, solid media, microwave, satellite, mobile links).

Page 4: Architectures. Many tasks involved in encoding, protecting and transmitting user application data as bit stream. Network Architecture is how tasks are

• Standards documents define interface requirements - – not implementation. – interface between layers

(up/down) or across.

• Documents refer to :-– Service Specification - the

services provided by a layer to the layer above (up/down flows)

– Layer Protocols - how entities at the same layer, but in different locations, exchange information (across)

Page 5: Architectures. Many tasks involved in encoding, protecting and transmitting user application data as bit stream. Network Architecture is how tasks are

– Information (data structures) passed between layers (up/down) in form of Service Data Units (SDUs).

– Service provided by lower layers accessed at SAPs; addresses, port numbers, entry points etc.

Page 6: Architectures. Many tasks involved in encoding, protecting and transmitting user application data as bit stream. Network Architecture is how tasks are

• Information passed across network is contained within PDUs (Protocol Data Units.)

• Protocols operate across the network between entities in logically linked peer layers.

• Service user (layer N+1) uses Service Primitives to indicate service required of layer N.

Page 7: Architectures. Many tasks involved in encoding, protecting and transmitting user application data as bit stream. Network Architecture is how tasks are

• The provider (layer N) uses primitives to respond and request services from layer N-1.

• If the layer protocol (across the network) is a Confirmed service there are four basic primitives;

• Confirmed set {request, indication, response, confirm}

• Unconfirmed and there are only two.

Page 8: Architectures. Many tasks involved in encoding, protecting and transmitting user application data as bit stream. Network Architecture is how tasks are

• Primitives (abstract concept) used to communicate up/down stack and go between layers via SAPs.

• The generation of a primitive usually results in the release of a PDU.

• Primitive types dependent on service (CONS/CLNS).

Page 9: Architectures. Many tasks involved in encoding, protecting and transmitting user application data as bit stream. Network Architecture is how tasks are

Applications Layer - (AL)

• Provides communications services to user application processes which are not part of the model.

• Some entities in AL provide specific services (SASEs) – e.g MMS

• Others common services (CASEs). – e.g. ACSE

Page 10: Architectures. Many tasks involved in encoding, protecting and transmitting user application data as bit stream. Network Architecture is how tasks are

• Components of AL are User Element (UE), which is the actual i/f between applications and the stack, CASEs and SASEs.

• AL Services accessed using primitives which are issued and accepted by user application. Issued through A-SAP and tagged as A-SOMETHING.request etc.

Page 11: Architectures. Many tasks involved in encoding, protecting and transmitting user application data as bit stream. Network Architecture is how tasks are

• In AL, CONNECT is ASSOCIATE. ASSOCIATE creates logical link between peer entities in communicating ALs.

• After ASSOCIATE, specific service (SASE) identified as best suiting needs of user application.

• ASSOCIATE indicates e-mail, FTAM or whatever.

Page 12: Architectures. Many tasks involved in encoding, protecting and transmitting user application data as bit stream. Network Architecture is how tasks are

• SASEs attempt to make individual properties of host machine OPEN - accessible to all not just similar marks.

• Files Systems : FTAM makes irrelevant the fact that accesses could be to Unix m/c, PC, IBM or whatever. ftp for UNIX m/cs only.

• FTAM makes all real file structures look like a standard (virtual) filestore; all remote file systems now look the same.

Page 13: Architectures. Many tasks involved in encoding, protecting and transmitting user application data as bit stream. Network Architecture is how tasks are

• Machine Tools : MMS for communication within manufacturing environment (cells). All manufacturing devices are made to look the same (Virtual Manufacturing Devices, VMDs).

• Dialogue between them is standardised - MMS. Eg. Puma robot could talk MMS with any brand of remote machine tool. CIM

Page 14: Architectures. Many tasks involved in encoding, protecting and transmitting user application data as bit stream. Network Architecture is how tasks are

• Terminals : With VT emulation all terminals/keyboards look the same.

• Thus 'Break' key made to look as though it works the same on every machine; 'cursor home' code sequence is the same, and so on

• Key word when referring to SASEs is VIRTUAL; key concept is OPEN - anything to anything.

Page 15: Architectures. Many tasks involved in encoding, protecting and transmitting user application data as bit stream. Network Architecture is how tasks are

• The standardised descriptions of (virtually) everything are passed to the PL which codes them into a standard (transfer) syntax for transmission across the network.

• The coding may include compression etc but always includes ASN.1 type conversions.

Page 16: Architectures. Many tasks involved in encoding, protecting and transmitting user application data as bit stream. Network Architecture is how tasks are

Presentation Layer.

• Concerned with syntax (bit encoding) not semantics (L7)

• Usual topics, compression, encryption, fec etc - all about changing bit patterns.

• Main element of L6 however is ASN.1 - crops up "everywhere" - OSI, TCP/IP, GSM, INs, CIM etc.

• A standard (efficient?) way of encoding user messages into bits.

Page 17: Architectures. Many tasks involved in encoding, protecting and transmitting user application data as bit stream. Network Architecture is how tasks are

• In OSI-RM, ASN.1 split between L7 and L6 - L7 parses user data into standard ASN.1 data structures.

• L6 encodes data structures.

• L6 takes in (at PSAP) HL descriptions of user data and outputs (as SSAP) an encoded bit stream.

Page 18: Architectures. Many tasks involved in encoding, protecting and transmitting user application data as bit stream. Network Architecture is how tasks are

• The other presentation layer services to mention are,– Compression - frequency depended

coding (Huffman), run length encoding and string encoding (Ziv Lempel).

– Be aware of type differences and overall aim - ie. producing a reduced length bit stream.

– Encryption - why needed, overview of principle but not detail. Result - indecipherable bit stream.

– Fec - Add bits to bit stream in strategic places so that errors can be corrected not just detected.

Page 19: Architectures. Many tasks involved in encoding, protecting and transmitting user application data as bit stream. Network Architecture is how tasks are

• Most common technique is Hamming - described in all the references.

• Any future encoding operations will be here, in L6

Page 20: Architectures. Many tasks involved in encoding, protecting and transmitting user application data as bit stream. Network Architecture is how tasks are

Session layer.

• Very controversial

• Many think it is not needed

• See notes for details– e.g. no session layer in TCP/IP

architecture

Page 21: Architectures. Many tasks involved in encoding, protecting and transmitting user application data as bit stream. Network Architecture is how tasks are

Summary - L7-L5

• Application Layer analyses user input - what does it mean? (semantics).

• Passes a description of user input to PL.

• Presentation Layer takes standardised descriptions and encodes it into bit stream (syntax) - abstract syntax (compressed, encrypted?) results.

Page 22: Architectures. Many tasks involved in encoding, protecting and transmitting user application data as bit stream. Network Architecture is how tasks are

• Session Layer takes encoded bit stream and manages bit flow between “application processes”.

• The three layers are about data processing.

• Transport Layer (just above the network) now takes bit stream (modified by L5) and gets it ready for transmission.