Computer Networks Lecture 1 & 2 Introduction and Layer Model Approach Lahore Leads University.

59
Computer Networks Lecture 1 & 2 Introduction and Layer Model Approach Lahore Leads University

Transcript of Computer Networks Lecture 1 & 2 Introduction and Layer Model Approach Lahore Leads University.

Page 1: Computer Networks Lecture 1 & 2 Introduction and Layer Model Approach Lahore Leads University.

Computer NetworksLecture 1 & 2

Introduction and Layer Model Approach

Lahore Leads University

Page 2: Computer Networks Lecture 1 & 2 Introduction and Layer Model Approach Lahore Leads University.

CONTENTS

Introduction Computer Networks OSI & TCP/IP Reference Model

Page 3: Computer Networks Lecture 1 & 2 Introduction and Layer Model Approach Lahore Leads University.

Computer Network

A computer n/w is a group of communicating entities that uses a common network protocol to exchange data and share resources with each other over a communication medium. These communicating entities can be differentiated into end systems or intermediate systems.

End System(Computer, Telephone, Laptop, etc…) Intermediate System(Repeater, Hub, Bridges, Router)

Page 4: Computer Networks Lecture 1 & 2 Introduction and Layer Model Approach Lahore Leads University.

Contt…

Computer Network can be classified into different types on the basis of the….

Geographical Extent(LAN, MAN, WAN). Physical Interconnection of hosts(Network

Topologies(Bus, Ring, Star, Tree, Mesh). Type of communication path used Manner of data transmission among hosts over this

communication path.

Page 5: Computer Networks Lecture 1 & 2 Introduction and Layer Model Approach Lahore Leads University.

Uses of Computer Networks

• Resource Sharing• Communication Medium• Reliability• Scalability• Money Saving• E-Commerce• Online Banking Etc.

Page 6: Computer Networks Lecture 1 & 2 Introduction and Layer Model Approach Lahore Leads University.

Business Applications of Networks

A network with two clients and one server.

Page 7: Computer Networks Lecture 1 & 2 Introduction and Layer Model Approach Lahore Leads University.

Business Applications of Networks (2)

The client-server model involves requests and replies.

Page 8: Computer Networks Lecture 1 & 2 Introduction and Layer Model Approach Lahore Leads University.

Types of Networks

• Local Area Networks• Metropolitan Area Networks• Wide Area Networks• Wireless Networks

Page 9: Computer Networks Lecture 1 & 2 Introduction and Layer Model Approach Lahore Leads University.

Broadcast Networks

Types of transmission technology• Broadcast links• Point-to-point links

Page 10: Computer Networks Lecture 1 & 2 Introduction and Layer Model Approach Lahore Leads University.

Classification of interconnected processors by scale.

Page 11: Computer Networks Lecture 1 & 2 Introduction and Layer Model Approach Lahore Leads University.

Local Area Networks

Two broadcast networks

(a) Bus (b) Ring

Page 12: Computer Networks Lecture 1 & 2 Introduction and Layer Model Approach Lahore Leads University.

Metropolitan Area Networks

A metropolitan area network based on cable TV.

Page 13: Computer Networks Lecture 1 & 2 Introduction and Layer Model Approach Lahore Leads University.

Wide Area Networks

Relation between hosts on LANs and the subnet.

Page 14: Computer Networks Lecture 1 & 2 Introduction and Layer Model Approach Lahore Leads University.

Wide Area Networks (2) A stream of packets from sender to receiver.

Page 15: Computer Networks Lecture 1 & 2 Introduction and Layer Model Approach Lahore Leads University.

Wireless Networks

Categories of wireless networks:• System interconnection• Wireless LANs• Wireless WANs

Page 16: Computer Networks Lecture 1 & 2 Introduction and Layer Model Approach Lahore Leads University.

Wireless Networks (2)

(a) Bluetooth configuration (b) Wireless LAN

Page 17: Computer Networks Lecture 1 & 2 Introduction and Layer Model Approach Lahore Leads University.

Network Software

• Protocol Hierarchies• Design Issues for the Layers• Connection-Oriented and Connectionless

Services• Service Primitives• The Relationship of Services to Protocols

Page 18: Computer Networks Lecture 1 & 2 Introduction and Layer Model Approach Lahore Leads University.

Network SoftwareProtocol Hierarchies

Layers, protocols, and interfaces.

Page 19: Computer Networks Lecture 1 & 2 Introduction and Layer Model Approach Lahore Leads University.

Design Issues for the Layers

• Addressing• Error Control• Flow Control• Multiplexing• Routing

Page 20: Computer Networks Lecture 1 & 2 Introduction and Layer Model Approach Lahore Leads University.

LAYERED Approach

• We use the concept of layers in our daily life. As an example, let us consider two friends who communicate through postal mail.

• The process of sending a letter to a friend would be complex if there were no services available from the post office.

Page 21: Computer Networks Lecture 1 & 2 Introduction and Layer Model Approach Lahore Leads University.

Figure Tasks involved in sending a letter

Page 22: Computer Networks Lecture 1 & 2 Introduction and Layer Model Approach Lahore Leads University.

THE OSI MODEL

• Established in 1947, the International Standards Organization (ISO) is a multinational body dedicated to worldwide agreement on international standards.

• An ISO standard that covers all aspects of network communications is the Open Systems Interconnection (OSI) model. It was first introduced in the late 1970s.

Page 23: Computer Networks Lecture 1 & 2 Introduction and Layer Model Approach Lahore Leads University.

ISO is the organization.OSI is the model.

Note

Page 24: Computer Networks Lecture 1 & 2 Introduction and Layer Model Approach Lahore Leads University.

Figure Seven layers of the OSI model

Page 25: Computer Networks Lecture 1 & 2 Introduction and Layer Model Approach Lahore Leads University.

Figure OSI Layers and Locations

Switch RouterHost Host

Application

Transport

Network

Data Link

Presentation

Session

Physical

Page 26: Computer Networks Lecture 1 & 2 Introduction and Layer Model Approach Lahore Leads University.

Figure The interaction between layers in the OSI model

Page 27: Computer Networks Lecture 1 & 2 Introduction and Layer Model Approach Lahore Leads University.

Figure An exchange using the OSI model

Page 28: Computer Networks Lecture 1 & 2 Introduction and Layer Model Approach Lahore Leads University.

LAYERS IN THE OSI MODEL

In this section we briefly describe the functions of each layer in the OSI model.

Physical LayerData Link LayerNetwork LayerTransport LayerSession LayerPresentation LayerApplication Layer

Topics discussed in this section:

Page 29: Computer Networks Lecture 1 & 2 Introduction and Layer Model Approach Lahore Leads University.

Physical layer

Page 30: Computer Networks Lecture 1 & 2 Introduction and Layer Model Approach Lahore Leads University.

The physical layer is responsible for movements ofindividual bits from one hop (node) to the next.

Note

Page 31: Computer Networks Lecture 1 & 2 Introduction and Layer Model Approach Lahore Leads University.

Figure Data link layer

Page 32: Computer Networks Lecture 1 & 2 Introduction and Layer Model Approach Lahore Leads University.

The data link layer is responsible for moving frames from one hop (node) to the next.

Note

Page 33: Computer Networks Lecture 1 & 2 Introduction and Layer Model Approach Lahore Leads University.

Figure Hop-to-hop delivery

Page 34: Computer Networks Lecture 1 & 2 Introduction and Layer Model Approach Lahore Leads University.

Figure Network layer

Page 35: Computer Networks Lecture 1 & 2 Introduction and Layer Model Approach Lahore Leads University.

The network layer is responsible for the delivery of individual packets from

the source host to the destination host.

Note

Page 36: Computer Networks Lecture 1 & 2 Introduction and Layer Model Approach Lahore Leads University.

Figure Source-to-destination delivery

Page 37: Computer Networks Lecture 1 & 2 Introduction and Layer Model Approach Lahore Leads University.

Figure Transport layer

Page 38: Computer Networks Lecture 1 & 2 Introduction and Layer Model Approach Lahore Leads University.

The transport layer is responsible for the delivery of a message from one process to another.

Note

Page 39: Computer Networks Lecture 1 & 2 Introduction and Layer Model Approach Lahore Leads University.

Figure Reliable process-to-process delivery of a message

Page 40: Computer Networks Lecture 1 & 2 Introduction and Layer Model Approach Lahore Leads University.

Figure 2.12 Session layer

Page 41: Computer Networks Lecture 1 & 2 Introduction and Layer Model Approach Lahore Leads University.

The session layer is responsible for dialog control and synchronization.

Note

Page 42: Computer Networks Lecture 1 & 2 Introduction and Layer Model Approach Lahore Leads University.

Figure 2.13 Presentation layer

Page 43: Computer Networks Lecture 1 & 2 Introduction and Layer Model Approach Lahore Leads University.

The presentation layer is responsible for translation, compression, and encryption.

Note

Page 44: Computer Networks Lecture 1 & 2 Introduction and Layer Model Approach Lahore Leads University.

Figure Application layer

Page 45: Computer Networks Lecture 1 & 2 Introduction and Layer Model Approach Lahore Leads University.

The application layer is responsible for providing services to the user.

Note

Page 46: Computer Networks Lecture 1 & 2 Introduction and Layer Model Approach Lahore Leads University.

Figure Summary of layers

Page 47: Computer Networks Lecture 1 & 2 Introduction and Layer Model Approach Lahore Leads University.

TCP/IP PROTOCOL SUITE

The layers in the TCP/IP protocol suite do not exactly match those in the OSI model. The original TCP/IP protocol suite was defined as having four layers: host-to-network, internet, transport, and application. However, when TCP/IP is compared to OSI, we can say that the TCP/IP protocol suite is made of five layers: physical, data link, network, transport, and application.

Physical and Data Link LayersNetwork LayerTransport LayerApplication Layer

Topics discussed in this section:

Page 48: Computer Networks Lecture 1 & 2 Introduction and Layer Model Approach Lahore Leads University.

Figure 2.16 TCP/IP and OSI model

Page 49: Computer Networks Lecture 1 & 2 Introduction and Layer Model Approach Lahore Leads University.

ADDRESSING

Four levels of addresses are used in an internet employing the TCP/IP protocols: physical, logical, port, and specific.

Physical AddressesLogical AddressesPort AddressesSpecific Addresses

Topics discussed in this section:

Page 50: Computer Networks Lecture 1 & 2 Introduction and Layer Model Approach Lahore Leads University.

Figure Addresses in TCP/IP

Page 51: Computer Networks Lecture 1 & 2 Introduction and Layer Model Approach Lahore Leads University.

Figure Relationship of layers and addresses in TCP/IP

Page 52: Computer Networks Lecture 1 & 2 Introduction and Layer Model Approach Lahore Leads University.

In Figure a node with physical address 10 sends a frame to a node with physical address 87. The two nodes are connected by a link (bus topology LAN). As the figure shows, the computer with physical address 10 is the sender, and the computer with physical address 87 is the receiver.

Example

Page 53: Computer Networks Lecture 1 & 2 Introduction and Layer Model Approach Lahore Leads University.

Figure Physical addresses

Page 54: Computer Networks Lecture 1 & 2 Introduction and Layer Model Approach Lahore Leads University.

Most local-area networks use a 48-bit (6-byte) physical address written as 12 hexadecimal digits; every byte (2 hexadecimal digits) is separated by a colon, as shown below:

Example

07:01:02:01:2C:4B

A 6-byte (12 hexadecimal digits) physical address.

Page 55: Computer Networks Lecture 1 & 2 Introduction and Layer Model Approach Lahore Leads University.

Figure shows two computers communicating via the Internet. The sending computer is running three processes at this time with port addresses a, b, and c. The receiving computer is running two processes at this time with port addresses j and k. Process a in the sending computer needs to communicate with process j in the receiving computer. Note that although physical addresses change from hop to hop, logical and port addresses remain the same from the source to destination.

Example

Page 56: Computer Networks Lecture 1 & 2 Introduction and Layer Model Approach Lahore Leads University.

Figure Port addresses

Page 57: Computer Networks Lecture 1 & 2 Introduction and Layer Model Approach Lahore Leads University.

The physical addresses will change from hop to hop,but the logical addresses usually remain the same.

Note

Page 58: Computer Networks Lecture 1 & 2 Introduction and Layer Model Approach Lahore Leads University.

Example

A port address is a 16-bit address represented by one decimal number as shown.

753

A 16-bit port address represented as one single number.

Page 59: Computer Networks Lecture 1 & 2 Introduction and Layer Model Approach Lahore Leads University.

Thank You