Chapter 2
Chapter 2
Chapter 2
Network Models
2-1 LAYERED TASKS
2.2
Figure 2.1 Tasks involved in sending a letter
2.3
2-2 THE OSI MODEL
The International Standards Organization (ISO) is a
multinational body dedicated to worldwide agreement. An
ISO standard that coven international standards all
aspects of network communications is the Open
Systems Interconnection (OSI) model. It was first
introduced in the late 1970s.
2.4
Why do we need the OSI Model?
To address the problem of networks increasing in size and in number, the
International Organization for Standardization (ISO) researched many network
schemes and recognized that there was a need to create a network model
This would help network builders implement networks that could communicate
and work together
2.5
Figure 2.2 Seven layers of the OSI model
2.6
Figure 2.3 The interaction between layers in the OSI model
2.7
Figure 2.4 An exchange using the OSI model
2.8
2-3 LAYERS IN THE OSI MODEL
OSI Layers:
Application Layer
Presentation Layer
Session Layer
Transport Layer
Network Layer
Data Link Layer
Physical Layer
2.9
Figure 2.14 Application layer
2.10
Note
2.11
Figure 2.13 Presentation layer
2.12
Note
1) Translation.
2) Encryption.
3) Compression.
2.13
Figure 2.12 Session layer
2.14
Note
2.15
Figure 2.10 Transport layer
2.16
Note
1) Service-point addressing.
2) Segmentation and reassembly.
3) Connection control.
4) Flow control.
5) Error control.
2.17
Figure 2.11 Reliable process-to-process delivery of a message
2.18
Figure 2.8 Network layer
2.19
Note
1) Logical addressing.
2) Routing.
2.20
Figure 2.9 Source-to-destination delivery
2.21
Figure 2.6 Data link layer
2.22
-The data link layer is responsible for moving
frames from one hop (node) to the next.
- PDU - Frames
1) Framing.
2) Physical addressing.
3) Flow control.
4) Error control.
5) Access control.
2.23
Figure 2.7 Hop-to-hop delivery
2.24
Figure 2.5 Physical layer
2.25
-The physical layer is responsible for movements of individual bits from one
hop (node) to the next.
-PDU - Bits
2.26
Figure 2.15 Summary of layers
2.27
Example: Draw the data flow through a network ?
2.28
Data Flow and Encapsulation
Data flow occurs when two devices are connected in a network with some kind of shared
transmission medium.
1) An application running on the source device creates some kind of data. This happens
at the Application layer.
2) The application needs to add encryption to that data. This will be done at
the Presentation layer.
3) At the Session layer it appends the Session ID.
4) The Transport layer breaks the data into blocks of data which we call Segments .
Every Segment also gets the Port number to identify which upper layer application
needs to receive the data on the destination device
5) The Network layer takes the Segment, and appends the source and destination IP
address. At that point the Segment becomes a Packet.
6) At Data Link layer the source and destination MAC address and the CRC is added. At
this point we have a Frame.
7) The Frame then is sent to the physical device where it is translated into some kind of a
signal (often call it Bits)
2.29
Decapsulation at the Destination Device
1) The destination device receives series of bits and interprets them as a Frame.
2) It removes MAC addresses and the CRC, and passes the data up to the Network layer.
3) IP addresses are removed and the Packet is forwarded up to the Transport layer .
4) The Port number is looked at and the Segment gets forwarded up the to the appropriate
application specified by the Port number.
5) The Session ID is used.
6) Encryption will be removed.
7) The data in its original form is presented to the application that needs to interpret it.
2.30
2-4 TCP/IP PROTOCOL SUITE
2.31
Figure 2.16 TCP/IP and OSI model
2.32
2-5 ADDRESSING
2.33
Figure 2.18 Relationship of layers and addresses in TCP/IP
2.34
Physical address (MAC address):
2.35
Structure of MAC address
2.36
Physical address (MAC address):
2.37
Example 2.2
2.38
Logical address (IP):
2.39
Port Address:
There are many application running on the computer.
Each application run with a port no.(logically) on the computer.
753
A 16-bit port address represented
as one single number.
Specific Address:
- User-friendly addresses
- Examples include the e-mail address (for example, [email protected]) defines
the recipient of an e-mail
2.40
Example 2.1
For the network shown below, show the contents of the message
for each hop interface.
Solution:
2.41
Example 2.3 :For the network shown below, show the contents of the message for
each hop interface.
2.42
Example 2.4 :For the network shown below, show the contents of the message for
each hop interface.