CH 02
CH 02
CH 02
Layered Architecture
Peer-to-Peer Processes
Encapsulation
2-2 THE OSI MODEL
Note
Layered Architecture
The OSI model is built of seven ordered layers: physical
(layer 1), data link (layer 2), network (layer 3), transport
(layer 4), session (layer 5), presentation (layer 6), and
application(layer 7). Figure shows the layers involved
when a message is sent from device A to device B. As the
message travels from A to B, it may pass through many
intermediate nodes. These intermediate nodes usually
involve only the first three layers of the OSI model.
2-2 THE OSI MODEL
Peer-to-Peer Processes
Within a single machine, each layer calls upon the
services of the layer just below it.
Between machines, layer x on one machine communicates
with layer x on another machine. This communication is
governed by an agreed-upon series of rules and
conventions called protocols. The processes on each
machine that communicate at a given layer are called peer-
to-peer processes. Communication between machines is
therefore a peer-to-peer process using the protocols
appropriate to a given layer.
2-2 THE OSI MODEL
two concepts
actual communication
virtual communication
2-2 THE OSI MODEL
Physical Layer
The physical layer coordinates the functions required to
transmit a bit stream over a physical medium. It deals with the
mechanical and electrical specifications of the primary
connections, such as cables, connectors, and signaling options
that physically link two nodes on a network.
This first layer receives a data unit from the second layer and
puts it into a format capable of being carried by a
communications link. It oversees the changing of a bit stream
into electromagnetic signals, and their transmission onto and
across a medium.
2-3 LAYERS IN THE OSI MODEL
Note
Synchronization of bits The sender and receiver not only must use
the same bit rate but also must be synchronized at the bit level.
Line configuration. How can two or more devices be linked
physically? Are transmission lines to be shared or limited to use
between two devices? Is the line available or not?
Data transmission mode. It does transmission flow one way or
both ways between two connected devices? Or does it alternate?
Topology. How are network devices arranged? Do they pass data
directly to each other or through an intermediary? And by what
paths?
2-3 LAYERS IN THE OSI MODEL
Note
Network Layer
The network layer is responsible for the source-to-
destination delivery of a packet across multiple
network links. Whereas the data link layer oversees
the delivery of the packet between two systems on
the same network (links), the network layer ensures
that each packet gets from its point of origin to its
final destination successfully and efficiently.
2-3 LAYERS IN THE OSI MODEL
Note
Transport Layer
• The transport layer is responsible for process–to-process
delivery of the entire message. Whereas the network
layer oversees source-to-destination delivery of
individual packets, it does not recognize any
relationship between those packets. It treats each one
independently, as though each piece belonged to a
separate message, whether or not it does. The transport
layer, on the other hand, ensures that the whole
message arrives intact and in order, overseeing both
error control and flow control at the source -to-
destination level.
2-3 LAYERS IN THE OSI MODEL
Transport Layer
Transport Layer
Connection control The transport layer can be either
connectionless or connection-oriented. A connectionless
transport layer treats each segment as an independent packet
and delivers it to the transport layer at the destination machine.
For added security, the transport layer may create a connection
between the two end ports. Creating a connection involves three
steps: connection establishment, data transfer, and connection
release. By confining transmission of all packets to a single
pathway, the transport layer has more control over sequencing,
flow, and error detection and correction.
2-3 LAYERS IN THE OSI MODEL
Transport Layer
Note
Session Layer
Specific responsibilities of the session layer include the
following:
Dialog control The session layer allows two systems to
enter into a dialog. It allows the communication between
two process to take place either half-duplex or full-
duplex mode.
Synchronization. The session layer allows a process to
add checkpoints, or synchronization points, to a stream
of data.
2-3 LAYERS IN THE OSI MODEL
Note
Presentation Layer
Specific responsibilities of the presentation layer
include the following:
Translation. Changing the format of a message from
that used by the sender into one mutually acceptable
for transmission. Then, at the destination, changing
that format into the one understood by the receiver.
2-3 LAYERS IN THE OSI MODEL
Presentation Layer
Encryption. Encryption and decryption of data for
security purposes.
Compression. Compressing and decompressing data to
make transmission more efficient.
2-3 LAYERS IN THE OSI MODEL
Note
Application Layer
Specific services provided by the application layer include
the following:
Network virtual terminal A software version of a
physical terminal. A virtual terminal allows you to log on
to a remote host. To do so, the application creates a
software emulation of a terminal at the remote host. Your
computer talks to the software terminal, which in turn
talks to the host. The remote host believes it is
communicating with one of its own terminals and allows
you to log on.
2-3 LAYERS IN THE OSI MODEL
Application Layer
File transfer, access, and management. Allows a user at
a remote computer to access files in another host (to make
changes or read data ); to retrieve files from a remote
computer for use in the local computer; and to manage or
control files in a remote computer at that computer.
Mail services. Provides the basis for electronic mail
forwarding and storage.
Directory services. Provides distributed database sources
and access for global information about various objects
and services.
2-3 LAYERS IN THE OSI MODEL
Note
Network layer
Internetwork Protocol (IP)
Address Resolution Protocol (ARP) ARP is used to find the
physical address of the node when its Internet address is known.
Reverse Address Resolution Protocol (RARP)
Internet Control Message Protocol (ICMP) is a mechanism used
by hosts and gateways to send notification of datagram problem
back to the sender.
Internet Group Message Protocol (IGMP) is used to facilitate
the simultaneous transmission of a message to a group of
recipients.
2-4 TCP/IP PROTOCOL SUITE
Transport layer
User Datagram Protocol (UDP)
Transmission Control Protocol (TCP)
Stream Control Transmission Protocol(SCTP) provides
support for newer application such as voice over the
Internet.
2-5 ADDRESSING
Example 2.1
In Figure 2.19 a node with physical address 10 sends a
frame to a node with physical address 87. The two nodes
are connected by a link (bus topology LAN). As the
figure shows, the computer with physical address 10 is
the sender, and the computer with physical address 87 is
the receiver.
2-5 ADDRESSING
Example 2.2
As we will see in Chapter 13, most local-area networks
use a 48-bit (6-byte) physical address written as 12
hexadecimal digits; every byte (2 hexadecimal digits) is
separated by a colon, as shown below:
07:01:02:01:2C:4B
Example 2.3
Figure 2.20 shows a part of an internet with two routers
connecting three LANs. Each device (computer or
router) has a pair of addresses (logical and physical) for
each connection. In this case, each computer is
connected to only one link and therefore has only one
pair of addresses. Each router, however, is connected to
three networks (only two are shown in the figure). So
each router has three pairs of addresses, one for each
connection.
2-5 ADDRESSING
Example 2.4
Figure 2.21 shows two computers communicating via
the Internet. The sending computer is running three
processes at this time with port addresses a, b, and c. The
receiving computer is running two processes at this time
with port addresses j and k. Process a in the sending
computer needs to communicate with process j in the
receiving computer. Note that although physical
addresses change from hop to hop, logical and port
addresses remain the same from the source to
destination.
2-5 ADDRESSING
Note
Example 2.5
As we will see in Chapter 23, a port address is a 16-bit
address represented by one decimal number as shown.
753
Note
Specific Address
Back
2-5 ADDRESSING
Back
2-5 ADDRESSING