SlideShare a Scribd company logo
Data and ComputerData and Computer
CommunicationsCommunications
Eighth EditionEighth Edition
by William Stallingsby William Stallings
Lecture slides by Lawrie BrownLecture slides by Lawrie Brown
Chapter 2 – Protocol Architecture,Chapter 2 – Protocol Architecture,
TCP/IP, and Internet-BasedTCP/IP, and Internet-Based
ApplicationsApplications
Protocol Architecture,Protocol Architecture,
TCP/IP, and Internet-BasedTCP/IP, and Internet-Based
ApplicationsApplications
 To destroy communication completely, thereTo destroy communication completely, there
must be no rules in common betweenmust be no rules in common between
transmitter and receiver—neither of alphabettransmitter and receiver—neither of alphabet
nor of syntax —On Human Communicationnor of syntax —On Human Communication,,
Colin CherryColin Cherry
Need ForNeed For ProtocolProtocol
ArchitectureArchitecture
 data exchange can involve complexdata exchange can involve complex
procedures, cf. file transfer exampleprocedures, cf. file transfer example
 better if task broken into subtasksbetter if task broken into subtasks
 implemented separately in layers in stackimplemented separately in layers in stack

each layer provides functions needed toeach layer provides functions needed to
perform comms for layers aboveperform comms for layers above

using functions provided by layers belowusing functions provided by layers below
 peer layers communicate with a protocolpeer layers communicate with a protocol
Key Elements of a ProtocolKey Elements of a Protocol
 syntax - data formatsyntax - data format
 semantics - control info & error handlingsemantics - control info & error handling
 timing - speed matching & sequencingtiming - speed matching & sequencing
TCP/IP Protocol ArchitectureTCP/IP Protocol Architecture
 developed by US Defense Advanceddeveloped by US Defense Advanced
Research Project Agency (DARPA)Research Project Agency (DARPA)
 for ARPANET packet switched networkfor ARPANET packet switched network
 used by the global Internetused by the global Internet
 protocol suite comprises a large collectionprotocol suite comprises a large collection
of standardized protocolsof standardized protocols
Simplified NetworkSimplified Network
ArchitectureArchitecture
TCP/IP LayersTCP/IP Layers
 no official model but a working oneno official model but a working one

Application layerApplication layer

Host-to-host, or transport layerHost-to-host, or transport layer

Internet layerInternet layer

Network access layerNetwork access layer

Physical layerPhysical layer
Physical LayerPhysical Layer
 concerned with physical interface betweenconcerned with physical interface between
computer and networkcomputer and network
 concerned with issues like:concerned with issues like:

characteristics of transmission mediumcharacteristics of transmission medium

signal levelssignal levels

data ratesdata rates

other related mattersother related matters
Network Access LayerNetwork Access Layer
 exchange of data between an end systemexchange of data between an end system
and attached networkand attached network
 concerned with issues like :concerned with issues like :

destination address provisiondestination address provision

invoking specific services like priorityinvoking specific services like priority

access to & routing data across a network linkaccess to & routing data across a network link
between two attached systemsbetween two attached systems
 allows layers above to ignore link specificsallows layers above to ignore link specifics
Internet Layer (IP)Internet Layer (IP)
 routing functions across multiple networksrouting functions across multiple networks
 for systems attached to different networksfor systems attached to different networks
 using IP protocolusing IP protocol
 implemented in end systems and routersimplemented in end systems and routers
 routers connect two networks and relaysrouters connect two networks and relays
data between themdata between them
Transport Layer (TCP)Transport Layer (TCP)
 common layer shared by all applicationscommon layer shared by all applications
 provides reliable delivery of dataprovides reliable delivery of data
 in same order as sentin same order as sent
 commonly uses TCPcommonly uses TCP
Application LayerApplication Layer
 provide support for user applicationsprovide support for user applications
 need a separate module for each type ofneed a separate module for each type of
applicationapplication
Operation of TCP and IPOperation of TCP and IP
Addressing RequirementsAddressing Requirements
 two levels of addressing requiredtwo levels of addressing required
 each host on a subnet needs a uniqueeach host on a subnet needs a unique
global network addressglobal network address

its IP addressits IP address
 each application on a (multi-tasking) hosteach application on a (multi-tasking) host
needs a unique address within the hostneeds a unique address within the host

known as a portknown as a port
Operation of TCP/IPOperation of TCP/IP
Transmission Control ProtocolTransmission Control Protocol
((TCP)TCP)
 usual transport layer is (TCP)usual transport layer is (TCP)
 provides a reliable connection for transfer ofprovides a reliable connection for transfer of
data between applicationsdata between applications
 a TCP segment is the basic protocol unita TCP segment is the basic protocol unit
 TCP tracks segments between entities forTCP tracks segments between entities for
duration of each connectionduration of each connection
TCP HeaderTCP Header
User Datagram ProtocolUser Datagram Protocol
(UDP)(UDP)
 an alternative to TCPan alternative to TCP
 no guaranteed deliveryno guaranteed delivery
 no preservation of sequenceno preservation of sequence
 no protection against duplicationno protection against duplication
 minimum overheadminimum overhead
 adds port addressing to IPadds port addressing to IP
UDP HeaderUDP Header
IP HeaderIP Header
IPv6 HeaderIPv6 Header
TCP/IP ApplicationsTCP/IP Applications
 have a number of standard TCP/IPhave a number of standard TCP/IP
applications such asapplications such as

Simple Mail Transfer Protocol (SMTP)Simple Mail Transfer Protocol (SMTP)

File Transfer Protocol (FTP)File Transfer Protocol (FTP)

TelnetTelnet
Some TCP/IP ProtocolsSome TCP/IP Protocols
OSIOSI
 Open Systems InterconnectionOpen Systems Interconnection
 developed by the Internationaldeveloped by the International
Organization for Standardization (ISO)Organization for Standardization (ISO)
 has seven layershas seven layers
 is a theoretical system delivered too late!is a theoretical system delivered too late!
 TCP/IP is the de facto standardTCP/IP is the de facto standard
OSI LayersOSI Layers
OSI v TCP/IPOSI v TCP/IP
Standardized ProtocolStandardized Protocol
ArchitecturesArchitectures
Layer Specific StandardsLayer Specific Standards
Service Primitives andService Primitives and
ParametersParameters
 define servicesdefine services
between adjacentbetween adjacent
layers using:layers using:
 primitives to specifyprimitives to specify
function performedfunction performed
 parameters to passparameters to pass
data and control infodata and control info
Primitive TypesPrimitive Types
REQUEST A primitive issued by a service user to invoke some
service and to pass the parameters needed to specify
fully the requested service
INDICATION A primitive issued by a service provider either to:
indicate that a procedure has been invoked by the peer
service user on the connection and to provide the
associated parameters, or
notify the service user of a provider-initiated action
RESPONSE A primitive issued by a service user to acknowledge or
complete some procedure previously invoked by an
indication to that user
CONFIRM A primitive issued by a service provider to acknowledge
or complete some procedure previously invoked by a
request by the service user
Traditional vs MultimediaTraditional vs Multimedia
ApplicationsApplications
 traditionally Internet dominated by infotraditionally Internet dominated by info
retrieval applicationsretrieval applications

typically using text and image transfertypically using text and image transfer

eg. email, file transfer, webeg. email, file transfer, web
 see increasing growth in multimediasee increasing growth in multimedia
applicationsapplications

involving massive amounts of datainvolving massive amounts of data

such as streaming audio and videosuch as streaming audio and video
Elastic and Inelastic TrafficElastic and Inelastic Traffic
 elastic trafficelastic traffic

can adjust to delay & throughput changescan adjust to delay & throughput changes
over a wide rangeover a wide range

eg. traditional “data” style TCP/IP trafficeg. traditional “data” style TCP/IP traffic

some applications more sensitive thoughsome applications more sensitive though
 inelastic trafficinelastic traffic

does not adapt to such changesdoes not adapt to such changes

eg. “real-time” voice & video trafficeg. “real-time” voice & video traffic

need minimum requirements on net archneed minimum requirements on net arch
Multimedia TechnologiesMultimedia Technologies
SummarySummary
 introduced need for protocol architectureintroduced need for protocol architecture
 TCP/IP protocol architectureTCP/IP protocol architecture
 OSI Model & protocol architectureOSI Model & protocol architecture
standardizationstandardization
 traditional vs multimedia application needstraditional vs multimedia application needs

More Related Content

What's hot (20)

PPT
Osi reference model
Sagar Gor
 
PPTX
File Transfer Protocol
guest029bcd
 
PPT
Packet switching
asimnawaz54
 
PPTX
Internet address
Shubham Dwivedi
 
PPTX
Network address translation
Varsha Honde
 
PPT
TCP/IP Network ppt
extraganesh
 
PDF
5. protocol layering
JAIGANESH SEKAR
 
PPTX
Computer Network - Network Layer
Manoj Kumar
 
PPT
Osi , tcp/ip protocol and Addressing
marwan aldulaimy
 
PPT
6lowpan
Dwarakanath Tulasi
 
PPTX
Error Detection and Correction - Data link Layer
Abdullaziz Tagawy
 
PPTX
Unicast multicast & broadcast
NetProtocol Xpert
 
PPTX
Network security model.pptx
ssuserd24233
 
PPTX
Point to-point protocol (ppp)
Kongu Engineering College, Perundurai, Erode
 
PPTX
ELEMENTS OF TRANSPORT PROTOCOL
Shashank Rustagi
 
PPTX
TCP- Transmission Control Protocol
Akhil .B
 
PPTX
Ip address presentation
muhammad amir
 
PPTX
IPv4
Dhiraj Mishra
 
PPTX
Protocols and the TCP/IP Protocol Suite
Atharaw Deshmukh
 
PPT
Error Detection And Correction
Renu Kewalramani
 
Osi reference model
Sagar Gor
 
File Transfer Protocol
guest029bcd
 
Packet switching
asimnawaz54
 
Internet address
Shubham Dwivedi
 
Network address translation
Varsha Honde
 
TCP/IP Network ppt
extraganesh
 
5. protocol layering
JAIGANESH SEKAR
 
Computer Network - Network Layer
Manoj Kumar
 
Osi , tcp/ip protocol and Addressing
marwan aldulaimy
 
Error Detection and Correction - Data link Layer
Abdullaziz Tagawy
 
Unicast multicast & broadcast
NetProtocol Xpert
 
Network security model.pptx
ssuserd24233
 
Point to-point protocol (ppp)
Kongu Engineering College, Perundurai, Erode
 
ELEMENTS OF TRANSPORT PROTOCOL
Shashank Rustagi
 
TCP- Transmission Control Protocol
Akhil .B
 
Ip address presentation
muhammad amir
 
Protocols and the TCP/IP Protocol Suite
Atharaw Deshmukh
 
Error Detection And Correction
Renu Kewalramani
 

Similar to protocol architecture (20)

PPT
02 protocol architecture
chameli devi group of institutions
 
PDF
02-ProtocolArchitecture.pdf
MiftaNurFarid2
 
PPTX
02 protocol architecture
Orbay Yeşil
 
PPTX
TCP/IP Protocols
Danial Mirza
 
PPT
lecture1.ppt
ssuser9e1626
 
PPT
Data Communication-1.ppt
ssusere16bd9
 
PPT
lecture1.ppt
harun kamau
 
PPT
lecture1 (1).ppt
ssuserb73103
 
PPT
Computer design and Architechure and Algorithm
mirzaahmadali
 
PPT
02-ProtocolArchitecture william stellings.ppt
striker78669
 
PDF
Chapter 2 - Protocol Architecture, TCP/IP, and Internet-Based Applications 9e
adpeer
 
PPTX
Reference models in Networks: OSI & TCP/IP
Mukesh Chinta
 
PDF
Unit_I_Computer Networks 4.pdf
Arumugam90
 
PPT
Data Communication and Networking
UtkarshaManpiya1
 
PPTX
Automation Networking By Shivam Singh
Shivam Singh
 
PPT
02 protocols and tcp-ip
kashish0313
 
PPTX
Presentation5
Mohd Yusak
 
PPT
cn1.ppt
aslalitha
 
PPT
presentation on TCP/IP protocols data comunications
AnyapuPranav
 
PPTX
CISSP - Chapter 4 - Network Fundamental
Karthikeyan Dhayalan
 
02 protocol architecture
chameli devi group of institutions
 
02-ProtocolArchitecture.pdf
MiftaNurFarid2
 
02 protocol architecture
Orbay Yeşil
 
TCP/IP Protocols
Danial Mirza
 
lecture1.ppt
ssuser9e1626
 
Data Communication-1.ppt
ssusere16bd9
 
lecture1.ppt
harun kamau
 
lecture1 (1).ppt
ssuserb73103
 
Computer design and Architechure and Algorithm
mirzaahmadali
 
02-ProtocolArchitecture william stellings.ppt
striker78669
 
Chapter 2 - Protocol Architecture, TCP/IP, and Internet-Based Applications 9e
adpeer
 
Reference models in Networks: OSI & TCP/IP
Mukesh Chinta
 
Unit_I_Computer Networks 4.pdf
Arumugam90
 
Data Communication and Networking
UtkarshaManpiya1
 
Automation Networking By Shivam Singh
Shivam Singh
 
02 protocols and tcp-ip
kashish0313
 
Presentation5
Mohd Yusak
 
cn1.ppt
aslalitha
 
presentation on TCP/IP protocols data comunications
AnyapuPranav
 
CISSP - Chapter 4 - Network Fundamental
Karthikeyan Dhayalan
 
Ad

More from Srinivasa Rao (20)

PPT
Denisty Viscocity and Humidity Measurement
Srinivasa Rao
 
PDF
Sensor and Transducer-Manual-Print-engg-lab.pdf
Srinivasa Rao
 
PPTX
Torque Measurement transducers-Torque, torque measurement
Srinivasa Rao
 
PPT
Oscillators
Srinivasa Rao
 
PPT
power amplifiers
Srinivasa Rao
 
PPT
Amplifiers
Srinivasa Rao
 
PPT
Transistors
Srinivasa Rao
 
PPT
Rectifiers
Srinivasa Rao
 
PPT
Process control 3 chapter
Srinivasa Rao
 
PPT
Process control 5 chapter
Srinivasa Rao
 
PPT
Process control 2 chapter
Srinivasa Rao
 
PPT
Process control 4 chapter
Srinivasa Rao
 
PPT
Process control 3 chapter
Srinivasa Rao
 
PPT
Process control
Srinivasa Rao
 
PPT
Weight measurement
Srinivasa Rao
 
PPT
Density and viscocity
Srinivasa Rao
 
PPT
Flow measurement
Srinivasa Rao
 
PPT
Level measurement
Srinivasa Rao
 
PDF
C14 ee-105-electrical engineering materials
Srinivasa Rao
 
PDF
C14 ee-106-basic electrical engineering
Srinivasa Rao
 
Denisty Viscocity and Humidity Measurement
Srinivasa Rao
 
Sensor and Transducer-Manual-Print-engg-lab.pdf
Srinivasa Rao
 
Torque Measurement transducers-Torque, torque measurement
Srinivasa Rao
 
Oscillators
Srinivasa Rao
 
power amplifiers
Srinivasa Rao
 
Amplifiers
Srinivasa Rao
 
Transistors
Srinivasa Rao
 
Rectifiers
Srinivasa Rao
 
Process control 3 chapter
Srinivasa Rao
 
Process control 5 chapter
Srinivasa Rao
 
Process control 2 chapter
Srinivasa Rao
 
Process control 4 chapter
Srinivasa Rao
 
Process control 3 chapter
Srinivasa Rao
 
Process control
Srinivasa Rao
 
Weight measurement
Srinivasa Rao
 
Density and viscocity
Srinivasa Rao
 
Flow measurement
Srinivasa Rao
 
Level measurement
Srinivasa Rao
 
C14 ee-105-electrical engineering materials
Srinivasa Rao
 
C14 ee-106-basic electrical engineering
Srinivasa Rao
 
Ad

Recently uploaded (20)

PPTX
ENSA_Module_7.pptx_wide_area_network_concepts
RanaMukherjee24
 
PDF
4 Tier Teamcenter Installation part1.pdf
VnyKumar1
 
PDF
SG1-ALM-MS-EL-30-0008 (00) MS - Isolators and disconnecting switches.pdf
djiceramil
 
PPTX
MT Chapter 1.pptx- Magnetic particle testing
ABCAnyBodyCanRelax
 
PPTX
Precedence and Associativity in C prog. language
Mahendra Dheer
 
PPTX
sunil mishra pptmmmmmmmmmmmmmmmmmmmmmmmmm
singhamit111
 
PPTX
Introduction to Fluid and Thermal Engineering
Avesahemad Husainy
 
PPTX
MULTI LEVEL DATA TRACKING USING COOJA.pptx
dollysharma12ab
 
PDF
Biodegradable Plastics: Innovations and Market Potential (www.kiu.ac.ug)
publication11
 
PDF
STUDY OF NOVEL CHANNEL MATERIALS USING III-V COMPOUNDS WITH VARIOUS GATE DIEL...
ijoejnl
 
PPTX
00-ClimateChangeImpactCIAProcess_PPTon23.12.2024-ByDr.VijayanGurumurthyIyer1....
praz3
 
PDF
Natural_Language_processing_Unit_I_notes.pdf
sanguleumeshit
 
PDF
Jual GPS Geodetik CHCNAV i93 IMU-RTK Lanjutan dengan Survei Visual
Budi Minds
 
PPTX
UNIT III CONTROL OF PARTICULATE CONTAMINANTS
sundharamm
 
PPTX
Basics of Auto Computer Aided Drafting .pptx
Krunal Thanki
 
PDF
勉強会資料_An Image is Worth More Than 16x16 Patches
NABLAS株式会社
 
PPTX
Unit II: Meteorology of Air Pollution and Control Engineering:
sundharamm
 
PDF
Zero carbon Building Design Guidelines V4
BassemOsman1
 
PPTX
Unit 2 Theodolite and Tachometric surveying p.pptx
satheeshkumarcivil
 
PPTX
FUNDAMENTALS OF ELECTRIC VEHICLES UNIT-1
MikkiliSuresh
 
ENSA_Module_7.pptx_wide_area_network_concepts
RanaMukherjee24
 
4 Tier Teamcenter Installation part1.pdf
VnyKumar1
 
SG1-ALM-MS-EL-30-0008 (00) MS - Isolators and disconnecting switches.pdf
djiceramil
 
MT Chapter 1.pptx- Magnetic particle testing
ABCAnyBodyCanRelax
 
Precedence and Associativity in C prog. language
Mahendra Dheer
 
sunil mishra pptmmmmmmmmmmmmmmmmmmmmmmmmm
singhamit111
 
Introduction to Fluid and Thermal Engineering
Avesahemad Husainy
 
MULTI LEVEL DATA TRACKING USING COOJA.pptx
dollysharma12ab
 
Biodegradable Plastics: Innovations and Market Potential (www.kiu.ac.ug)
publication11
 
STUDY OF NOVEL CHANNEL MATERIALS USING III-V COMPOUNDS WITH VARIOUS GATE DIEL...
ijoejnl
 
00-ClimateChangeImpactCIAProcess_PPTon23.12.2024-ByDr.VijayanGurumurthyIyer1....
praz3
 
Natural_Language_processing_Unit_I_notes.pdf
sanguleumeshit
 
Jual GPS Geodetik CHCNAV i93 IMU-RTK Lanjutan dengan Survei Visual
Budi Minds
 
UNIT III CONTROL OF PARTICULATE CONTAMINANTS
sundharamm
 
Basics of Auto Computer Aided Drafting .pptx
Krunal Thanki
 
勉強会資料_An Image is Worth More Than 16x16 Patches
NABLAS株式会社
 
Unit II: Meteorology of Air Pollution and Control Engineering:
sundharamm
 
Zero carbon Building Design Guidelines V4
BassemOsman1
 
Unit 2 Theodolite and Tachometric surveying p.pptx
satheeshkumarcivil
 
FUNDAMENTALS OF ELECTRIC VEHICLES UNIT-1
MikkiliSuresh
 

protocol architecture

  • 1. Data and ComputerData and Computer CommunicationsCommunications Eighth EditionEighth Edition by William Stallingsby William Stallings Lecture slides by Lawrie BrownLecture slides by Lawrie Brown Chapter 2 – Protocol Architecture,Chapter 2 – Protocol Architecture, TCP/IP, and Internet-BasedTCP/IP, and Internet-Based ApplicationsApplications
  • 2. Protocol Architecture,Protocol Architecture, TCP/IP, and Internet-BasedTCP/IP, and Internet-Based ApplicationsApplications  To destroy communication completely, thereTo destroy communication completely, there must be no rules in common betweenmust be no rules in common between transmitter and receiver—neither of alphabettransmitter and receiver—neither of alphabet nor of syntax —On Human Communicationnor of syntax —On Human Communication,, Colin CherryColin Cherry
  • 3. Need ForNeed For ProtocolProtocol ArchitectureArchitecture  data exchange can involve complexdata exchange can involve complex procedures, cf. file transfer exampleprocedures, cf. file transfer example  better if task broken into subtasksbetter if task broken into subtasks  implemented separately in layers in stackimplemented separately in layers in stack  each layer provides functions needed toeach layer provides functions needed to perform comms for layers aboveperform comms for layers above  using functions provided by layers belowusing functions provided by layers below  peer layers communicate with a protocolpeer layers communicate with a protocol
  • 4. Key Elements of a ProtocolKey Elements of a Protocol  syntax - data formatsyntax - data format  semantics - control info & error handlingsemantics - control info & error handling  timing - speed matching & sequencingtiming - speed matching & sequencing
  • 5. TCP/IP Protocol ArchitectureTCP/IP Protocol Architecture  developed by US Defense Advanceddeveloped by US Defense Advanced Research Project Agency (DARPA)Research Project Agency (DARPA)  for ARPANET packet switched networkfor ARPANET packet switched network  used by the global Internetused by the global Internet  protocol suite comprises a large collectionprotocol suite comprises a large collection of standardized protocolsof standardized protocols
  • 7. TCP/IP LayersTCP/IP Layers  no official model but a working oneno official model but a working one  Application layerApplication layer  Host-to-host, or transport layerHost-to-host, or transport layer  Internet layerInternet layer  Network access layerNetwork access layer  Physical layerPhysical layer
  • 8. Physical LayerPhysical Layer  concerned with physical interface betweenconcerned with physical interface between computer and networkcomputer and network  concerned with issues like:concerned with issues like:  characteristics of transmission mediumcharacteristics of transmission medium  signal levelssignal levels  data ratesdata rates  other related mattersother related matters
  • 9. Network Access LayerNetwork Access Layer  exchange of data between an end systemexchange of data between an end system and attached networkand attached network  concerned with issues like :concerned with issues like :  destination address provisiondestination address provision  invoking specific services like priorityinvoking specific services like priority  access to & routing data across a network linkaccess to & routing data across a network link between two attached systemsbetween two attached systems  allows layers above to ignore link specificsallows layers above to ignore link specifics
  • 10. Internet Layer (IP)Internet Layer (IP)  routing functions across multiple networksrouting functions across multiple networks  for systems attached to different networksfor systems attached to different networks  using IP protocolusing IP protocol  implemented in end systems and routersimplemented in end systems and routers  routers connect two networks and relaysrouters connect two networks and relays data between themdata between them
  • 11. Transport Layer (TCP)Transport Layer (TCP)  common layer shared by all applicationscommon layer shared by all applications  provides reliable delivery of dataprovides reliable delivery of data  in same order as sentin same order as sent  commonly uses TCPcommonly uses TCP
  • 12. Application LayerApplication Layer  provide support for user applicationsprovide support for user applications  need a separate module for each type ofneed a separate module for each type of applicationapplication
  • 13. Operation of TCP and IPOperation of TCP and IP
  • 14. Addressing RequirementsAddressing Requirements  two levels of addressing requiredtwo levels of addressing required  each host on a subnet needs a uniqueeach host on a subnet needs a unique global network addressglobal network address  its IP addressits IP address  each application on a (multi-tasking) hosteach application on a (multi-tasking) host needs a unique address within the hostneeds a unique address within the host  known as a portknown as a port
  • 16. Transmission Control ProtocolTransmission Control Protocol ((TCP)TCP)  usual transport layer is (TCP)usual transport layer is (TCP)  provides a reliable connection for transfer ofprovides a reliable connection for transfer of data between applicationsdata between applications  a TCP segment is the basic protocol unita TCP segment is the basic protocol unit  TCP tracks segments between entities forTCP tracks segments between entities for duration of each connectionduration of each connection
  • 18. User Datagram ProtocolUser Datagram Protocol (UDP)(UDP)  an alternative to TCPan alternative to TCP  no guaranteed deliveryno guaranteed delivery  no preservation of sequenceno preservation of sequence  no protection against duplicationno protection against duplication  minimum overheadminimum overhead  adds port addressing to IPadds port addressing to IP
  • 22. TCP/IP ApplicationsTCP/IP Applications  have a number of standard TCP/IPhave a number of standard TCP/IP applications such asapplications such as  Simple Mail Transfer Protocol (SMTP)Simple Mail Transfer Protocol (SMTP)  File Transfer Protocol (FTP)File Transfer Protocol (FTP)  TelnetTelnet
  • 23. Some TCP/IP ProtocolsSome TCP/IP Protocols
  • 24. OSIOSI  Open Systems InterconnectionOpen Systems Interconnection  developed by the Internationaldeveloped by the International Organization for Standardization (ISO)Organization for Standardization (ISO)  has seven layershas seven layers  is a theoretical system delivered too late!is a theoretical system delivered too late!  TCP/IP is the de facto standardTCP/IP is the de facto standard
  • 26. OSI v TCP/IPOSI v TCP/IP
  • 28. Layer Specific StandardsLayer Specific Standards
  • 29. Service Primitives andService Primitives and ParametersParameters  define servicesdefine services between adjacentbetween adjacent layers using:layers using:  primitives to specifyprimitives to specify function performedfunction performed  parameters to passparameters to pass data and control infodata and control info
  • 30. Primitive TypesPrimitive Types REQUEST A primitive issued by a service user to invoke some service and to pass the parameters needed to specify fully the requested service INDICATION A primitive issued by a service provider either to: indicate that a procedure has been invoked by the peer service user on the connection and to provide the associated parameters, or notify the service user of a provider-initiated action RESPONSE A primitive issued by a service user to acknowledge or complete some procedure previously invoked by an indication to that user CONFIRM A primitive issued by a service provider to acknowledge or complete some procedure previously invoked by a request by the service user
  • 31. Traditional vs MultimediaTraditional vs Multimedia ApplicationsApplications  traditionally Internet dominated by infotraditionally Internet dominated by info retrieval applicationsretrieval applications  typically using text and image transfertypically using text and image transfer  eg. email, file transfer, webeg. email, file transfer, web  see increasing growth in multimediasee increasing growth in multimedia applicationsapplications  involving massive amounts of datainvolving massive amounts of data  such as streaming audio and videosuch as streaming audio and video
  • 32. Elastic and Inelastic TrafficElastic and Inelastic Traffic  elastic trafficelastic traffic  can adjust to delay & throughput changescan adjust to delay & throughput changes over a wide rangeover a wide range  eg. traditional “data” style TCP/IP trafficeg. traditional “data” style TCP/IP traffic  some applications more sensitive thoughsome applications more sensitive though  inelastic trafficinelastic traffic  does not adapt to such changesdoes not adapt to such changes  eg. “real-time” voice & video trafficeg. “real-time” voice & video traffic  need minimum requirements on net archneed minimum requirements on net arch
  • 34. SummarySummary  introduced need for protocol architectureintroduced need for protocol architecture  TCP/IP protocol architectureTCP/IP protocol architecture  OSI Model & protocol architectureOSI Model & protocol architecture standardizationstandardization  traditional vs multimedia application needstraditional vs multimedia application needs

Editor's Notes

  • #2: Lecture slides prepared by Dr Lawrie Brown (UNSW@ADFA) for “Data and Computer Communications”, 8/e, by William Stallings, Chapter 2 “Protocol Architecture, TCP/IP, and Internet-Based Applications”.
  • #3: <number> This quote from the start of Stallings DCC8e Ch2 illustrates a key issue which this chapter explores, providing a context for the detailed material in the following parts of the text.
  • #4: When computers, terminals, and/or other data processing devices exchange data, the procedures involved can be quite complex. eg. file transfer. There must be a data path between the two computers. But also need: Source to activate communications Path or inform network of destination Source must check destination is prepared to receive File transfer application on source must check destination file management system will accept and store file for his user May need file format translation Instead of implementing the complex logic for this as a single module, the task is broken up into subtasks, implemented separately. In a protocol architecture, the modules are arranged in a vertical stack, each layer in the stack performs a related subset of the functions. It relies on the next lower layer to perform more primitive functions. It provides services to the next higher layer. The peer layers communicate using a set of rules or conventions known as a protocol.
  • #5: Communication is achieved by having the corresponding, or peer, layers in two systems communicate. The peer layers communicate by means of formatted blocks of data that obey a set of rules or conventions known as a protocol. The key features of a protocol are: • Syntax: Concerns the format of the data blocks • Semantics: Includes control information for coordination and error handling • Timing: Includes speed matching and sequencing
  • #6: The TCP/IP protocol architecture is a result of protocol research and development conducted on the experimental packet-switched network, ARPANET, funded by the Defense Advanced Research Projects Agency (DARPA), and is generally referred to as the TCP/IP protocol suite. This protocol suite consists of a large collection of protocols that have been issued as Internet standards by the Internet Activities Board (IAB).
  • #7: In general terms, communications can be said to involve three agents: applications (eg. file transfer), computers (eg. PCs & servers), and networks. These applications, and others, execute on computers that can often support multiple simultaneous applications. Computers are connected to networks, and the data to be exchanged are transferred by the network from one computer to another. Thus, data transfer involves first getting the data to the computer in which the application resides and then getting the data to the intended application within the computer. Can think of partitioning these tasks into 3 layers as shown.
  • #8: TCP/IP doesn’t have an “official” layer model (& it predates the OSI Reference Model we’ll introduce later), but it does have a “working” layer model, as shown.
  • #9: The physical layer covers the physical interface between a data transmission device (e.g., workstation, computer) and a transmission medium or network. This layer is concerned with specifying the characteristics of the transmission medium, the nature of the signals, the data rate, and related matters.
  • #10: The network access layer is concerned with the exchange of data between an end system (server, workstation, etc.) and the network to which it is attached. The sending computer must provide the network with the address of the destination computer, so that the network may route the data to the appropriate destination. The sending computer may wish to invoke certain services, such as priority, that might be provided by the network. The specific software used at this layer depends on the type of network to be used; different standards have been developed for circuit switching, packet switching (e.g., frame relay), LANs (e.g., Ethernet), and others. Thus it makes sense to separate those functions having to do with network access into a separate layer.
  • #11: The internet layer provides procedures used to allow data to traverse multiple interconnected networks, to provide communications between devices are attached to different networks. The Internet Protocol (IP) is used at this layer to provide the routing function across multiple networks. This protocol is implemented not only in the end systems but also in routers. A router is a processor that connects two networks and whose primary function is to relay data from one network to the other on its route from the source to the destination end system.
  • #12: The host-to-host layer, or transport layer, collects mechanisms in a common layer shared by all applications to provide reliable delivery of data. Regardless of the nature of the applications, there is usually a requirement that data be exchanged reliably, ensuring that all of the data arrives at the destination application and that the data arrives in the same order in which they were sent. These mechanisms for providing reliability are essentially independent of the nature of the applications. The Transmission Control Protocol (TCP) is the most commonly used protocol to provide this functionality.
  • #13: Finally, the application layer contains the logic needed to support the various user applications. For each different type of application, such as file transfer, a separate module is needed that is peculiar to that application.
  • #14: Stallings DCC8e Figure 2.1 indicates how these protocols are configured for communications. To make clear that the total communications facility may consist of multiple networks, the constituent networks are usually referred to as subnetworks. Some sort of network access protocol, such as the Ethernet logic, is used to connect a computer to a subnetwork. This protocol enables the host to send data across the subnetwork to another host or, if the target host is on another subnetwork, to a router that will forward the data. IP is implemented in all of the end systems and the routers. It acts as a relay to move a block of data from one host, through one or more routers, to another host. TCP is implemented only in the end systems; it keeps track of the blocks of data to assure that all are delivered reliably to the appropriate application.
  • #15: For successful communication, every entity in the overall system must have a unique address. Actually, two levels of addressing are needed. Each host on a subnetwork must have a unique global internet address; this allows the data to be delivered to the proper host. Each process with a host must have an address that is unique within the host; this allows the host-to-host protocol (TCP) to deliver data to the proper process. These latter addresses are known as ports.
  • #16: Consider a simple operation where a process on host A, wishes to send a message to another process on host B. The process at A hands the message down to TCP with instructions to send it to host B. TCP hands the message down to IP with instructions to send it to host B. Note that IP need not be told the identity of the destination port. Next, IP hands the message down to the network access layer (e.g., Ethernet logic) with instructions to send it to router J (the first hop on the way to B). To control this operation, control information as well as user data must be transmitted, as suggested in Stallings DCC8e Figure 2.2. The sending process generates a block of data and passes this to TCP. TCP may break this block into smaller pieces to make it more manageable. To each of these pieces, TCP appends control information known as the TCP header, forming a TCP segment. Next, TCP hands each segment over to IP, with instructions to transmit it to B. These segments must be transmitted across one or more subnetworks and relayed through one or more intermediate routers. This operation, too, requires the use of control information. Thus IP appends a header of control information to each segment to form an IP datagram. Finally, each IP datagram is presented to the network access layer for transmission across the first subnetwork in its journey to the destination. The network access layer appends its own header, creating a packet, or frame. The packet is transmitted across the subnetwork to router J.
  • #17: For most applications running as part of the TCP/IP protocol architecture, the transport layer protocol is TCP. TCP provides a reliable connection for the transfer of data between applications. A connection is simply a temporary logical association between two entities in different systems. A logical connection refers to a given pair of port values. For the duration of the connection each entity keeps track of TCP segments coming and going to the other entity, in order to regulate the flow of segments and to recover from lost or damaged segments.
  • #18: TCP segments include a header. Stallings DCC8e Figure 2.3a shows the header format for TCP, which is a minimum of 20 octets, or 160 bits. The Source Port and Destination Port fields identify the applications at the source and destination systems that are using this connection. The Sequence Number, Acknowledgment Number, and Window fields provide flow control and error control. The checksum is a 16-bit frame check sequence used to detect errors in the TCP segment. Chapter 20 provides more details.
  • #19: In addition to TCP, there is one other transport-level protocol that is in common use as part of the TCP/IP protocol suite: the User Datagram Protocol (UDP). UDP does not guarantee delivery, preservation of sequence, or protection against duplication. UDP enables a procedure to send messages to other procedures with a minimum of protocol mechanism. Some transaction-oriented applications make use of UDP; eg SNMP (Simple Network Management Protocol). Because it is connectionless, UDP has very little to do. Essentially, it adds a port addressing capability to IP.
  • #20: Because it is connectionless, UDP has very little to do. just adding a port addressing capability to IP. This is best seen by examining the UDP header, shown in Stallings DCC8e Figure 2.3b. The UDP header also includes a checksum to verify that no error occurs in the data; the use of the checksum is optional.
  • #21: For decades, the keystone of the TCP/IP protocol architecture has been IP. Stallings DCC8e Figure 2.4a shows the IP header format, which is a minimum of 20 octets, or 160 bits. The header, together with the segment from the transport layer, forms an IP-level PDU referred to as an IP datagram or an IP packet. The header includes 32-bit source and destination addresses. The Header Checksum field is used to detect errors in the header to avoid misdelivery. The Protocol field indicates which higher-layer protocol is using IP. The ID, Flags, and Fragment Offset fields are used in the fragmentation and reassembly process. Chapter 18 provides more detail.
  • #22: In 1995, the Internet Engineering Task Force (IETF), which develops protocol standards for the Internet, issued a specification for a next-generation IP, known then as IPng. This specification was turned into a standard in 1996 known as IPv6. IPv6 provides a number of functional enhancements over the existing IP, designed to accommodate the higher speeds of today's networks and the mix of data streams, including graphic and video, that are becoming more prevalent. But the driving force behind the development of the new protocol was the need for more addresses. The current IP uses a 32-bit address to specify a source or destination. With the explosive growth of the Internet and of private networks attached to the Internet, this address length became insufficient to accommodate all systems needing addresses. As Stallings DCC8e Figure 2.4b shows, IPv6 includes 128-bit source and destination address fields. Ultimately, all installations using TCP/IP are expected to migrate from the current IP to IPv6, but this process will take many years, if not decades.
  • #23: A number of applications have been standardized to operate on top of TCP. We mention three of the most common here. The Simple Mail Transfer Protocol (SMTP) provides a basic electronic mail transport facility for transferring messages among separate hosts. The SMTP protocol does not specify the way in which messages are to be created; some local editing or native electronic mail facility is required. The target SMTP module will store the incoming message in a user's mailbox. The File Transfer Protocol (FTP) is used to send files from one system to another under user command. Both text and binary files are accommodated. FTP sets up a TCP connection to the target system for the exchange of control messages. Once a file transfer is approved, a second TCP data connection is set up for the data transfer, without the overhead of any headers or control information at the application level. When the transfer is complete, the control connection is used to signal the completion and to accept new file transfer commands. TELNET provides a remote logon capability, which enables a user at a terminal or personal computer to logon to a remote computer and function as if directly connected to that computer. The protocol was designed to work with simple scroll-mode terminals. Terminal traffic between User and Server TELNET is carried on a TCP connection.
  • #24: Each layer in the TCP/IP protocol suite interacts with its immediate adjacent layers. This use of each individual layer is not required by the architecture. As Stallings DCC8e Figure 2.5 suggests, it is possible to develop applications that directly invoke the services of any one of the layers. Most applications require a reliable end-to-end protocol and thus make use of TCP. Some special-purpose applications do not need the services of TCP. Some of these applications, such as the Simple Network Management Protocol (SNMP), use an alternative end-to-end protocol known as the User Datagram Protocol (UDP); others may make use of IP directly. Applications that do not involve internetworking and that do not need TCP have been developed to invoke the network access layer directly.
  • #25: The Open Systems Interconnection (OSI) reference model was developed by the International Organization for Standardization (ISO - which is not an acronym but a word, derived from the Greek isos, meaning equal) as a model for a computer protocol architecture and as a framework for developing protocol standards. The OSI model consists of seven layers. The designers of OSI assumed that this model and the protocols developed within this model would come to dominate computer communications, eventually replacing proprietary protocol implementations and rival multivendor models such as TCP/IP. This has not happened. Although many useful protocols have been developed in the context of OSI, the overall seven-layer model has not flourished. Instead, the TCP/IP architecture has come to dominate.
  • #26: Stallings DCC8e Figure 2.6 illustrates the OSI model and provides a brief definition of the functions performed at each layer. The intent of the OSI model is that protocols be developed to perform the functions of each layer.
  • #27: There are a number of reasons why the TCP/IP architecture has come to dominate. Perhaps the most important is that the key TCP/IP protocols were mature and well tested at a time when similar OSI protocols were in the development stage. When businesses began to recognize the need for interoperability across networks, only TCP/IP was available and ready to go. Another reason is that the OSI model is unnecessarily complex, with seven layers to accomplish what TCP/IP does with fewer layers. Stallings DCC8e Figure 2.7 illustrates the layers of the TCP/IP and OSI architectures, showing roughly the correspondence in functionality between the two.
  • #28: The principal motivation for the development of the OSI model was to provide a framework for standardization. Within the model, one or more protocol standards can be developed at each layer. The model defines in general terms the functions to be performed at that layer and facilitates the standards-making process in two ways by allowing standards to be developed independently and simultaneously for each layer, and because changes in standards in one layer need not affect already existing software in another layer. Stallings DCC8e Figure 2.8 illustrates the use of the OSI model as such a framework. The overall communications function is decomposed into seven distinct layers, making the interfaces between modules as simple as possible. In addition, the design principle of information hiding is used: Lower layers are concerned with greater levels of detail; upper layers are independent of these details. Each layer provides services to the next higher layer and implements a protocol to the peer layer in other systems.
  • #29: Stallings DCC8e Figure 2.9 shows more specifically the nature of the standardization required at each layer. Three elements are key: • Protocol specification: Two entities at the same layer in different systems cooperate and interact by means of a protocol. Because two different open systems are involved, the protocol must be specified precisely. This includes the format of the protocol data units exchanged, the semantics of all fields, and the allowable sequence of PDUs. • Service definition: In addition to the protocol or protocols that operate at a given layer, standards are needed for the services that each layer provides to the next higher layer. Typically, the definition of services is equivalent to a functional description that defines what services are provided, but not how the services are to be provided. • Addressing: Each layer provides services to entities at the next higher layer. These entities are referenced by means of a service access point (SAP). Thus, a network service access point (NSAP) indicates a transport entity that is a user of the network service.
  • #30: The services between adjacent layers in the OSI architecture are expressed in terms of primitives and parameters. A primitive specifies the function to be performed, and the parameters are used to pass data and control information. The actual form of a primitive is implementation dependent. An example is a procedure call. The layout of Stallings DCC8e Figure 2.10a suggests the time ordering of these events. For example, consider the transfer of data from an (N) entity to a peer (N) entity in another system. The following steps occur: The source (N) entity invokes its (N –1) entity with a request primitive including needed parameters,such as the data to be transmitted and the destination address. The source (N –1) entity prepares an (N –1) PDU to be sent to its peer (N –1) entity. The destination (N –1) entity delivers the data to the appropriate destination (N) entity via an indication primitive, which includes the data and source address as parameters. If an ack needed, destination (N) entity issues a response primitive to its (N –1) entity. The (N –1) entity conveys the acknowledgment in an (N –1) PDU. The acknowledgment is delivered to the (N) entity as a confirm primitive. This sequence of events is referred to as a confirmed service, as the initiator receives confirmation that the requested service has had the desired effect at the other end.
  • #31: Stallings DCC8e Table 2.1 defines the four types of primitives are used in standards to define the interaction between adjacent layers in the architecture (X.210)
  • #32: The Internet, until recently, has been dominated by information retrieval applications, e-mail, and file transfer, plus Web interfaces that emphasized text and images. Increasingly, the Internet is being used for multimedia applications that involve massive amounts of data for visualization and support of real-time interactivity. Streaming audio and video are perhaps the best known of such applications. Although traditionally the term multimedia has connoted the simultaneous use of multiple media types (e.g., video annotation of a text document), the term has also come to refer to applications that require real-time processing or communication of video or audio alone. Thus, voice over IP (VoIP), streaming audio, and streaming video are considered multimedia applications even though each involves a single media type.
  • #33: Traffic on a network or internet can be divided into two broad categories: elastic and inelastic.Elastic traffic can adjust, over wide ranges, to changes in delay and throughput across an internet and still meet the needs of its applications. This is the traditional type of traffic supported on TCP/IP-based internets and is the type of traffic for which internets were designed. Elastic applications include common Internet-based applications, such as file transfer, electronic mail, remote logon, network management, and Web access. But there are differences among the requirements of these applications. Inelastic traffic does not easily adapt, if at all, to changes in delay and throughput across an internet. The prime example is real-time traffic, such as voice and video. The requirements for inelastic traffic may include the following: minimum throughput may be required, may be delay-sensitive, may require a reasonable upper bound on delay variation, may vary in the amount of packet loss, if any, that they can sustain. These requirements are difficult to meet in an environment with variable queuing delays and congestion losses. Accordingly, inelastic traffic introduces two new requirements into the internet architecture.
  • #34: Stallings DCC8e Figure 2.11 looks at multimedia from the perspective of three different dimensions: type of media, applications, and the technology required to support the applications. Consider the list of technologies relevant to the support of multimedia applications. As can be seen, a wide range is involved. The lowest four items on the list are beyond the scope of this book. The other items represent only a partial list of communications and networking technologies for multimedia. These technologies and others are explored throughout the book.
  • #35: <number> Stallings DCC8e Chapter 2 summary.