chapter 2 network models copyright © the mcgraw-hill companies, inc. permission required for...
TRANSCRIPT
![Page 1: Chapter 2 Network Models Copyright © The McGraw-Hill Companies, Inc. Permission required for reproduction or display](https://reader036.vdocuments.mx/reader036/viewer/2022062304/56649db05503460f94a9d870/html5/thumbnails/1.jpg)
Chapter 2
NetworkModels
Copyright © The McGraw-Hill Companies, Inc. Permission required for reproduction or display.
![Page 2: Chapter 2 Network Models Copyright © The McGraw-Hill Companies, Inc. Permission required for reproduction or display](https://reader036.vdocuments.mx/reader036/viewer/2022062304/56649db05503460f94a9d870/html5/thumbnails/2.jpg)
Components of Communication Sender Receiver Message Transmission medium Protocol
![Page 3: Chapter 2 Network Models Copyright © The McGraw-Hill Companies, Inc. Permission required for reproduction or display](https://reader036.vdocuments.mx/reader036/viewer/2022062304/56649db05503460f94a9d870/html5/thumbnails/3.jpg)
Effectiveness of Communication Delivery (confidentiality) Accuracy (integrity) Timeliness (availability)
Jitter – a subset of timeliness
2.3
![Page 4: Chapter 2 Network Models Copyright © The McGraw-Hill Companies, Inc. Permission required for reproduction or display](https://reader036.vdocuments.mx/reader036/viewer/2022062304/56649db05503460f94a9d870/html5/thumbnails/4.jpg)
Data Flow
Simplex Half-Duplex Duplex
2.4
![Page 5: Chapter 2 Network Models Copyright © The McGraw-Hill Companies, Inc. Permission required for reproduction or display](https://reader036.vdocuments.mx/reader036/viewer/2022062304/56649db05503460f94a9d870/html5/thumbnails/5.jpg)
Connection Types
Point-to-Point A circuit switch creates a point to point
connection. Multi-point
Many packet switched networks are multi-point
2.5
![Page 6: Chapter 2 Network Models Copyright © The McGraw-Hill Companies, Inc. Permission required for reproduction or display](https://reader036.vdocuments.mx/reader036/viewer/2022062304/56649db05503460f94a9d870/html5/thumbnails/6.jpg)
Physical Topologies
Bus Ring Star Mesh Compound
2.6
![Page 7: Chapter 2 Network Models Copyright © The McGraw-Hill Companies, Inc. Permission required for reproduction or display](https://reader036.vdocuments.mx/reader036/viewer/2022062304/56649db05503460f94a9d870/html5/thumbnails/7.jpg)
Physical Topology Links
Let n=# of nodes. The number of links is: Bus n-1 Ring n Star n-1 (includes the hub) Mesh n*(n-1)/2
2.7
![Page 8: Chapter 2 Network Models Copyright © The McGraw-Hill Companies, Inc. Permission required for reproduction or display](https://reader036.vdocuments.mx/reader036/viewer/2022062304/56649db05503460f94a9d870/html5/thumbnails/8.jpg)
Network Types
LAN – nodes belonging to an address space that are part of a well defined domain.
WAN – When two or more LANs are linked together.
2.8
![Page 9: Chapter 2 Network Models Copyright © The McGraw-Hill Companies, Inc. Permission required for reproduction or display](https://reader036.vdocuments.mx/reader036/viewer/2022062304/56649db05503460f94a9d870/html5/thumbnails/9.jpg)
Chapter 2: Outline
2.1 2.1 Protocol LayeringProtocol Layering
2.2 2.2 TCP/IP Protocol SuiteTCP/IP Protocol Suite
2.3 2.3 OSI ModelOSI Model
![Page 10: Chapter 2 Network Models Copyright © The McGraw-Hill Companies, Inc. Permission required for reproduction or display](https://reader036.vdocuments.mx/reader036/viewer/2022062304/56649db05503460f94a9d870/html5/thumbnails/10.jpg)
2.10
2-1 PROTOCOL LAYERING2-1 PROTOCOL LAYERING
A protocol defines the rules that the sender, receiver and all intermediate devices must follow to communicate effectively.
![Page 11: Chapter 2 Network Models Copyright © The McGraw-Hill Companies, Inc. Permission required for reproduction or display](https://reader036.vdocuments.mx/reader036/viewer/2022062304/56649db05503460f94a9d870/html5/thumbnails/11.jpg)
2.11
2.1.1 Scenarios2.1.1 Scenarios
Consider two scenarios.
Scenario 1: communication is so simple it occurs in one layer.
Scenario 2: communication takes place in three layers.
![Page 12: Chapter 2 Network Models Copyright © The McGraw-Hill Companies, Inc. Permission required for reproduction or display](https://reader036.vdocuments.mx/reader036/viewer/2022062304/56649db05503460f94a9d870/html5/thumbnails/12.jpg)
2.12
2-1 PROTOCOL LAYERING2-1 PROTOCOL LAYERING
When communication is simple, one simple protocol may be enough;
When the communication is complex, layers are introduced, and each layer has its own protocol.
![Page 13: Chapter 2 Network Models Copyright © The McGraw-Hill Companies, Inc. Permission required for reproduction or display](https://reader036.vdocuments.mx/reader036/viewer/2022062304/56649db05503460f94a9d870/html5/thumbnails/13.jpg)
2.13
Figure 2.1: A single-layer protocol
![Page 14: Chapter 2 Network Models Copyright © The McGraw-Hill Companies, Inc. Permission required for reproduction or display](https://reader036.vdocuments.mx/reader036/viewer/2022062304/56649db05503460f94a9d870/html5/thumbnails/14.jpg)
2.14
Figure 2.2: A three-layer protocol
Postal carrier facility
![Page 15: Chapter 2 Network Models Copyright © The McGraw-Hill Companies, Inc. Permission required for reproduction or display](https://reader036.vdocuments.mx/reader036/viewer/2022062304/56649db05503460f94a9d870/html5/thumbnails/15.jpg)
2.15
2.1.2 Principles of Protocol Layering2.1.2 Principles of Protocol Layering
Consider two principles of protocol layering.
![Page 16: Chapter 2 Network Models Copyright © The McGraw-Hill Companies, Inc. Permission required for reproduction or display](https://reader036.vdocuments.mx/reader036/viewer/2022062304/56649db05503460f94a9d870/html5/thumbnails/16.jpg)
2.16
2.1.2 Principles of Protocol Layering2.1.2 Principles of Protocol Layering
Consider two principles of protocol layering.
1. For half-duplex or full duplex data flow, each layer must perform a forward operation and the corresponding inverse operation.
![Page 17: Chapter 2 Network Models Copyright © The McGraw-Hill Companies, Inc. Permission required for reproduction or display](https://reader036.vdocuments.mx/reader036/viewer/2022062304/56649db05503460f94a9d870/html5/thumbnails/17.jpg)
2.17
2.1.2 Principles of Protocol Layering2.1.2 Principles of Protocol Layering
Consider two principles of protocol layering.
2. The two objects under each logically linked layer at both sites should be identical.
![Page 18: Chapter 2 Network Models Copyright © The McGraw-Hill Companies, Inc. Permission required for reproduction or display](https://reader036.vdocuments.mx/reader036/viewer/2022062304/56649db05503460f94a9d870/html5/thumbnails/18.jpg)
2.18
2.1.2 Principles of Protocol Layering2.1.2 Principles of Protocol Layering
Consider two principles of protocol layering.
1. For half-duplex or full duplex data flow, each layer must perform a forward operation and the corresponding inverse operation.
2. The two objects under each logically linked layer at both sites should be identical.
![Page 19: Chapter 2 Network Models Copyright © The McGraw-Hill Companies, Inc. Permission required for reproduction or display](https://reader036.vdocuments.mx/reader036/viewer/2022062304/56649db05503460f94a9d870/html5/thumbnails/19.jpg)
2.19
Figure 2.2: A three-layer protocol
Postal carrier facility
![Page 20: Chapter 2 Network Models Copyright © The McGraw-Hill Companies, Inc. Permission required for reproduction or display](https://reader036.vdocuments.mx/reader036/viewer/2022062304/56649db05503460f94a9d870/html5/thumbnails/20.jpg)
2.20
2.1.3 Logical Connections2.1.3 Logical Connections
The principles of protocol layering lead to a logical connection between the layers at sending and receiving ends of the communication.
![Page 21: Chapter 2 Network Models Copyright © The McGraw-Hill Companies, Inc. Permission required for reproduction or display](https://reader036.vdocuments.mx/reader036/viewer/2022062304/56649db05503460f94a9d870/html5/thumbnails/21.jpg)
2.21
Figure 2.3: Logical connection between peer layers
![Page 22: Chapter 2 Network Models Copyright © The McGraw-Hill Companies, Inc. Permission required for reproduction or display](https://reader036.vdocuments.mx/reader036/viewer/2022062304/56649db05503460f94a9d870/html5/thumbnails/22.jpg)
2.22
2-2 TCP/IP PROTOCOL SUITE2-2 TCP/IP PROTOCOL SUITE
A protocol defines the rules that both the sender and receiver and all intermediate devices must follow to communicate effectively.
![Page 23: Chapter 2 Network Models Copyright © The McGraw-Hill Companies, Inc. Permission required for reproduction or display](https://reader036.vdocuments.mx/reader036/viewer/2022062304/56649db05503460f94a9d870/html5/thumbnails/23.jpg)
2.23
2-2 TCP/IP PROTOCOL SUITE2-2 TCP/IP PROTOCOL SUITE
TCP/IP is a five layer protocol suite.
![Page 24: Chapter 2 Network Models Copyright © The McGraw-Hill Companies, Inc. Permission required for reproduction or display](https://reader036.vdocuments.mx/reader036/viewer/2022062304/56649db05503460f94a9d870/html5/thumbnails/24.jpg)
2.24
2-2 TCP/IP PROTOCOL SUITE2-2 TCP/IP PROTOCOL SUITE
TCP/IP is a five layer protocol suite.•Application Layer
![Page 25: Chapter 2 Network Models Copyright © The McGraw-Hill Companies, Inc. Permission required for reproduction or display](https://reader036.vdocuments.mx/reader036/viewer/2022062304/56649db05503460f94a9d870/html5/thumbnails/25.jpg)
2.25
2-2 TCP/IP PROTOCOL SUITE2-2 TCP/IP PROTOCOL SUITE
TCP/IP is a five layer protocol suite.•Application Layer•Transport Layer
![Page 26: Chapter 2 Network Models Copyright © The McGraw-Hill Companies, Inc. Permission required for reproduction or display](https://reader036.vdocuments.mx/reader036/viewer/2022062304/56649db05503460f94a9d870/html5/thumbnails/26.jpg)
2.26
2-2 TCP/IP PROTOCOL SUITE2-2 TCP/IP PROTOCOL SUITE
TCP/IP is a five layer protocol suite.•Application Layer•Transport Layer•Network Layer
![Page 27: Chapter 2 Network Models Copyright © The McGraw-Hill Companies, Inc. Permission required for reproduction or display](https://reader036.vdocuments.mx/reader036/viewer/2022062304/56649db05503460f94a9d870/html5/thumbnails/27.jpg)
2.27
2-2 TCP/IP PROTOCOL SUITE2-2 TCP/IP PROTOCOL SUITE
TCP/IP is a five layer protocol suite.•Application Layer•Transport Layer•Network Layer•Data Link Layer
![Page 28: Chapter 2 Network Models Copyright © The McGraw-Hill Companies, Inc. Permission required for reproduction or display](https://reader036.vdocuments.mx/reader036/viewer/2022062304/56649db05503460f94a9d870/html5/thumbnails/28.jpg)
2.28
2-2 TCP/IP PROTOCOL SUITE2-2 TCP/IP PROTOCOL SUITE
TCP/IP is a five layer protocol suite.•Application Layer•Transport Layer•Network Layer•Data Link Layer•Physical Layer
![Page 29: Chapter 2 Network Models Copyright © The McGraw-Hill Companies, Inc. Permission required for reproduction or display](https://reader036.vdocuments.mx/reader036/viewer/2022062304/56649db05503460f94a9d870/html5/thumbnails/29.jpg)
2.29
Figure 2.4: Layers in the TCP/IP protocol suite
![Page 30: Chapter 2 Network Models Copyright © The McGraw-Hill Companies, Inc. Permission required for reproduction or display](https://reader036.vdocuments.mx/reader036/viewer/2022062304/56649db05503460f94a9d870/html5/thumbnails/30.jpg)
2.30
2.2.1 Layered Architecture2.2.1 Layered Architecture
TCP/IP protocol suite example:
Consider three LANs
Each LAN has a group of hosts connected to a switch (aka 2-level switch).
Each switch is connected to a router (aka 3-level switch)
![Page 31: Chapter 2 Network Models Copyright © The McGraw-Hill Companies, Inc. Permission required for reproduction or display](https://reader036.vdocuments.mx/reader036/viewer/2022062304/56649db05503460f94a9d870/html5/thumbnails/31.jpg)
2.31
Figure 2.5: Communication through an internet
![Page 32: Chapter 2 Network Models Copyright © The McGraw-Hill Companies, Inc. Permission required for reproduction or display](https://reader036.vdocuments.mx/reader036/viewer/2022062304/56649db05503460f94a9d870/html5/thumbnails/32.jpg)
2.32
2.2.2 Layers in the TCP/IP Protocol Suite2.2.2 Layers in the TCP/IP Protocol Suite
Draw a diagram with multiple nodes in each LANWhy is it called a 2-level switch?Why is a router is 3-level switch?
![Page 33: Chapter 2 Network Models Copyright © The McGraw-Hill Companies, Inc. Permission required for reproduction or display](https://reader036.vdocuments.mx/reader036/viewer/2022062304/56649db05503460f94a9d870/html5/thumbnails/33.jpg)
2.33
Figure 2.6: Logical connections between layers in TCP/IP
Logical connections
![Page 34: Chapter 2 Network Models Copyright © The McGraw-Hill Companies, Inc. Permission required for reproduction or display](https://reader036.vdocuments.mx/reader036/viewer/2022062304/56649db05503460f94a9d870/html5/thumbnails/34.jpg)
2.34
Network Data ObjectsNetwork Data Objects
Data objects:message
![Page 35: Chapter 2 Network Models Copyright © The McGraw-Hill Companies, Inc. Permission required for reproduction or display](https://reader036.vdocuments.mx/reader036/viewer/2022062304/56649db05503460f94a9d870/html5/thumbnails/35.jpg)
2.35
Network Data ObjectsNetwork Data Objects
Data objects:messagesegment
![Page 36: Chapter 2 Network Models Copyright © The McGraw-Hill Companies, Inc. Permission required for reproduction or display](https://reader036.vdocuments.mx/reader036/viewer/2022062304/56649db05503460f94a9d870/html5/thumbnails/36.jpg)
2.36
Network Data ObjectsNetwork Data Objects
Data objects:messagesegmentdatagram
![Page 37: Chapter 2 Network Models Copyright © The McGraw-Hill Companies, Inc. Permission required for reproduction or display](https://reader036.vdocuments.mx/reader036/viewer/2022062304/56649db05503460f94a9d870/html5/thumbnails/37.jpg)
2.37
Network Data ObjectsNetwork Data Objects
Data objects:messagesegmentdatagramframe
![Page 38: Chapter 2 Network Models Copyright © The McGraw-Hill Companies, Inc. Permission required for reproduction or display](https://reader036.vdocuments.mx/reader036/viewer/2022062304/56649db05503460f94a9d870/html5/thumbnails/38.jpg)
2.38
Network Data ObjectsNetwork Data Objects
Network data object taxonomy:messagesegmentdatagramframesignals representing bits
![Page 39: Chapter 2 Network Models Copyright © The McGraw-Hill Companies, Inc. Permission required for reproduction or display](https://reader036.vdocuments.mx/reader036/viewer/2022062304/56649db05503460f94a9d870/html5/thumbnails/39.jpg)
2.39
Figure 2.7: Identical objects in the TCP/IP protocol suite
Identical objects (messages)
Identical objects (segment or user datagram)
Identical objects (datagram)
Identical objects (frame)
Identical objects (bits)
Identical objects (datagram)
Identical objects (frame)
Identical objects (bits)
![Page 40: Chapter 2 Network Models Copyright © The McGraw-Hill Companies, Inc. Permission required for reproduction or display](https://reader036.vdocuments.mx/reader036/viewer/2022062304/56649db05503460f94a9d870/html5/thumbnails/40.jpg)
2.40
Network Data ObjectsNetwork Data Objects
Data Object Taxonomy:Application layer - messageTransport layer - segmentNetwork layer - datagramData link layer - framePhysical layer – signals representing bits
![Page 41: Chapter 2 Network Models Copyright © The McGraw-Hill Companies, Inc. Permission required for reproduction or display](https://reader036.vdocuments.mx/reader036/viewer/2022062304/56649db05503460f94a9d870/html5/thumbnails/41.jpg)
2.41
2.2.3 The TCP/IP Layers2.2.3 The TCP/IP Layers
Descriptions of the TCP/IP layers will come later; next, we will follow a data object through the layers…
![Page 42: Chapter 2 Network Models Copyright © The McGraw-Hill Companies, Inc. Permission required for reproduction or display](https://reader036.vdocuments.mx/reader036/viewer/2022062304/56649db05503460f94a9d870/html5/thumbnails/42.jpg)
2.42
2.2.4 Encapsulation and Decapsulation2.2.4 Encapsulation and Decapsulation
One of the important concepts in protocol layering in the Internet is encapsulation/ decapsulation.
![Page 43: Chapter 2 Network Models Copyright © The McGraw-Hill Companies, Inc. Permission required for reproduction or display](https://reader036.vdocuments.mx/reader036/viewer/2022062304/56649db05503460f94a9d870/html5/thumbnails/43.jpg)
2.43
2.2.4 Encapsulation and Decapsulation2.2.4 Encapsulation and Decapsulation
As the object passes through each layer, an information header (and or trailer) is added to the object.
The information header is used to assist in any of these tasks: routing of the object, flow control, error detection, error correction, etc.
(see next slide)
![Page 44: Chapter 2 Network Models Copyright © The McGraw-Hill Companies, Inc. Permission required for reproduction or display](https://reader036.vdocuments.mx/reader036/viewer/2022062304/56649db05503460f94a9d870/html5/thumbnails/44.jpg)
2.44
Figure 2.8: Encapsulation / Decapsulation
![Page 45: Chapter 2 Network Models Copyright © The McGraw-Hill Companies, Inc. Permission required for reproduction or display](https://reader036.vdocuments.mx/reader036/viewer/2022062304/56649db05503460f94a9d870/html5/thumbnails/45.jpg)
Encapsulation payload
Each layer receives an object that is referred to as the payload, and then attaches a data header.
Payload can be relative to each layer, or absolute.
The absolute case refers to the original object message.
2.45
![Page 46: Chapter 2 Network Models Copyright © The McGraw-Hill Companies, Inc. Permission required for reproduction or display](https://reader036.vdocuments.mx/reader036/viewer/2022062304/56649db05503460f94a9d870/html5/thumbnails/46.jpg)
Example Encapsulation
Q: What is the efficiency of the link in figure 2.8, between LANs if each header is 60 bytes and the message is 1000 bytes?
2.46
![Page 47: Chapter 2 Network Models Copyright © The McGraw-Hill Companies, Inc. Permission required for reproduction or display](https://reader036.vdocuments.mx/reader036/viewer/2022062304/56649db05503460f94a9d870/html5/thumbnails/47.jpg)
Example Encapsulation
Q: What is the efficiency of the link in figure 2.8, between LANs if each header is 60 bytes and the message is 1000 bytes?
A: 84.7%
2.47
![Page 48: Chapter 2 Network Models Copyright © The McGraw-Hill Companies, Inc. Permission required for reproduction or display](https://reader036.vdocuments.mx/reader036/viewer/2022062304/56649db05503460f94a9d870/html5/thumbnails/48.jpg)
Example Encapsulation
Q: How does the efficiency change if the message is only 100 bytes?
2.48
![Page 49: Chapter 2 Network Models Copyright © The McGraw-Hill Companies, Inc. Permission required for reproduction or display](https://reader036.vdocuments.mx/reader036/viewer/2022062304/56649db05503460f94a9d870/html5/thumbnails/49.jpg)
Example Encapsulation
Q: How does the efficiency change if the message is only 100 bytes?
A: 35.7%
2.49
![Page 50: Chapter 2 Network Models Copyright © The McGraw-Hill Companies, Inc. Permission required for reproduction or display](https://reader036.vdocuments.mx/reader036/viewer/2022062304/56649db05503460f94a9d870/html5/thumbnails/50.jpg)
2.50
Figure 2.9: Addressing in the TCP/IP protocol suite
![Page 51: Chapter 2 Network Models Copyright © The McGraw-Hill Companies, Inc. Permission required for reproduction or display](https://reader036.vdocuments.mx/reader036/viewer/2022062304/56649db05503460f94a9d870/html5/thumbnails/51.jpg)
2.51
2-3 OSI MODEL2-3 OSI MODEL
A seven layer protocol model.It never really caught on due to the success of TCP/IP
![Page 52: Chapter 2 Network Models Copyright © The McGraw-Hill Companies, Inc. Permission required for reproduction or display](https://reader036.vdocuments.mx/reader036/viewer/2022062304/56649db05503460f94a9d870/html5/thumbnails/52.jpg)
2.52
Figure 2.11: The OSI model
![Page 53: Chapter 2 Network Models Copyright © The McGraw-Hill Companies, Inc. Permission required for reproduction or display](https://reader036.vdocuments.mx/reader036/viewer/2022062304/56649db05503460f94a9d870/html5/thumbnails/53.jpg)
2.53
Figure 2.12: TCP/IP and OSI model
![Page 54: Chapter 2 Network Models Copyright © The McGraw-Hill Companies, Inc. Permission required for reproduction or display](https://reader036.vdocuments.mx/reader036/viewer/2022062304/56649db05503460f94a9d870/html5/thumbnails/54.jpg)
2.54
2.3.1 OSI versus TCP/IP2.3.1 OSI versus TCP/IP
When we compare the two models, we find that two layers, session and presentation, are missing from the TCP/IP protocol suite. These two layers were not added to the TCP/IP protocol suite after the publication of the OSI model. The application layer in the suite is usually considered to be the combination of three layers in the OSI model, as shown in Figure 2.12.