Computer Networks�Lecture - 02
2
Protocol Hierarchy
Components for Communication
3
Protocol Hierarchy
Type of connection:
Physical Structure
4
Protocol Hierarchy
Data Flow of Messages
5
Protocol Hierarchy
Network Topology
6
Protocol Hierarchy
Advantages:
Disadvantages:
Bus Topology
7
Protocol Hierarchy
Advantages:
Disadvantages:
Ring Topology
8
Protocol Hierarchy
Advantages:
Disadvantages:
Star Topology
9
Protocol Hierarchy
Advantages:
Disadvantages:
install the network.
Mesh Topology
10
Protocol Hierarchy
Advantages:
Disadvantages:
Tree Topology
11
Protocol Hierarchy
Advantages:
Disadvantages:
Hybrid Topology
12
Protocol Hierarchy
Protocol Hierarchy
13
A five-layer network is illustrated in Fig. below. The entities comprising the corresponding layers on different machines are called peers. The peers may be software processes, hardware devices, or even human beings. In other words, it is the peers that communicate by using the protocol to talk to each other.
Protocol Hierarchy
14
Protocol Hierarchy
15
Protocol Hierarchy
16
OSI and TCP/IP Reference Models
The OSI model is shown in Figure below. The model is called the ISO OSI (Open Systems Interconnection) Reference Model because it deals with connecting open systems—that is, systems that are open for communication with other systems. The OSI model has seven layers.
17
An exchange using OSI Model
An exchange using OSI Model
18
The Physical Layer
The Physical Layer
19
The Physical Layer
The Physical Layer
20
The Data Link Layer
The Data Link Layer
21
The Data Link Layer
Responsibilities of the data link layer include the following:
Framing. The data link layer divides the stream of bits received from the network layer into manageable data units called frames.
Physical addressing: If frames are to be distributed to different systems on the network, the data link layer adds a header to the frame to define the sender and/or receiver of the frame. If the frame is intended for a system outside the sender's network, the receiver address is the address of the device that connects the network to the next one.
Flow control: If the rate at which the data are absorbed by the receiver is less than the rate at which data are produced in the sender, the data link layer imposes a flow control mechanism to avoid overwhelming the receiver.
The Data Link Layer
22
Error control. The data link layer adds reliability to the physical layer by adding mechanisms to detect and retransmit damaged or lost frames. It also uses a mechanism to recognize duplicate frames. Error control is normally achieved through a trailer added to the end of the frame.
Access control. When two or more devices are connected to the same link, data link layer protocols are necessary to determine which device has control over the link at any given time.
Encapsulation = frame
Requires MAC address or physical address
The Data Link Layer
The Data Link Layer
23
The Data Link Layer
24
The Network Layer
25
The Network Layer
26
The Transport Layer
The transport layer is responsible for process-to-process delivery of the entire message. A process is an application program running on a host. Whereas the network layer oversees source-to-destination delivery of individual packets, it does not recognize any relationship between those packets. It treats each one independently, as though each piece belonged to a separate message, whether or not it does. The transport layer, on the other hand, ensures that the whole message arrives intact and in order, overseeing both error control and flow control at the source-to-destination level.
27
The Transport Layer
28
Reliable process-to-process delivery of a message
29
The Transport Layer
Other responsibilities of the transport layer include the following:
30
The Transport Layer
31
The Session Layer
The session layer allows users on different machines to establish sessions between them. Sessions offer various services, including dialog control (keeping track of whose turn it is to transmit) and synchronization (check pointing long transmissions to allow them to pick up from where they left off in the event of a crash and subsequent recovery).
32
The Session Layer
33
The Presentation Layer
Unlike the lower layers, which are mostly concerned with moving bits around, the presentation layer is concerned with the syntax and semantics of the information transmitted.
Specific responsibilities of the presentation layer include the following:
Translation. The processes (running programs) in two systems are usually exchanging information in the form of character strings, numbers, and so on. The information must be changed to bit streams before being transmitted. Because different computers use different encoding systems, the presentation layer is responsible for interoperability between these different encoding methods. The presentation layer at the sender changes the information from its sender-dependent format into a common format. The presentation layer at the receiving machine changes the common format into its receiver-dependent format.
34
The Presentation Layer
Encryption. To carry sensitive information, a system must be able to ensure privacy. Encryption means that the sender transforms the original information to another form and sends the resulting message out over the network. Decryption reverses the original process to transform the message back to its original form.
Compression. Data compression reduces the number of bits contained in the information. Data compression becomes particularly important in the transmission of multimedia such as text, audio, and video.
35
The Application Layer
The application layer enables the user, whether human or software, to access the network. It provides user interfaces and support for services such as electronic mail, remote file access and transfer, shared database management, and other types of distributed information services.
36
The Layers
37
The Layers
38
The Layers
Thanks!
Any questions?
You can find me at:
minhazularefin21@gmail.com
39