SlideShare ist ein Scribd-Unternehmen logo
1 von 31
Data and Computer Communications Presentation by  Ihab Ali Original slides by Lawrie Brown Lecture #1
Data Communications, Data Networks, and the Internet ,[object Object]
Communications Tasks Transmission system utilization Addressing Interfacing Routing Signal generation Recovery Synchronization Message formatting Exchange management Security Error detection and correction Network management Flow control
Data Communications Model
Need For  Protocol  Architecture ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
TCP/IP Protocol Architecture ,[object Object],[object Object],[object Object],[object Object]
Simplified Network Architecture
TCP/IP Layers ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
Physical Layer ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
Network Access Layer ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
Internet Layer (IP) ,[object Object],[object Object],[object Object],[object Object],[object Object]
Transmission Medium ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
Networking ,[object Object],[object Object],[object Object],[object Object],[object Object]
Wide Area Networks ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
Local Area Networks ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
The Internet ,[object Object],[object Object],[object Object],[object Object],[object Object]
Internet Elements
Internet Architecture
Example Configuration
Transport Layer (TCP) ,[object Object],[object Object],[object Object],[object Object]
Application Layer ,[object Object],[object Object]
Operation of TCP and IP
Addressing Requirements ,[object Object],[object Object],[object Object],[object Object],[object Object]
Operation of TCP/IP
Transmission Control Protocol ( TCP) ,[object Object],[object Object],[object Object],[object Object]
User Datagram Protocol (UDP) ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
TCP/IP Applications ,[object Object],[object Object],[object Object],[object Object]
OSI ,[object Object],[object Object],[object Object],[object Object],[object Object]
OSI Layers
OSI v TCP/IP
Standardized Protocol Architectures

Weitere ähnliche Inhalte

Was ist angesagt?

TCP/IP and DNS
TCP/IP and DNSTCP/IP and DNS
TCP/IP and DNS
Biswadip Dey
 
53426980 tcp-ip
53426980 tcp-ip53426980 tcp-ip
53426980 tcp-ip
Sharan Huggi
 
Chapter 2 - Protocol Architecture, TCP/IP, and Internet-Based Applications 9e
Chapter 2 - Protocol Architecture, TCP/IP, and Internet-Based Applications 9eChapter 2 - Protocol Architecture, TCP/IP, and Internet-Based Applications 9e
Chapter 2 - Protocol Architecture, TCP/IP, and Internet-Based Applications 9e
adpeer
 
ETE405-lec7.pptx
ETE405-lec7.pptxETE405-lec7.pptx
ETE405-lec7.pptx
mashiur
 
TCP/IP Model
TCP/IP ModelTCP/IP Model
TCP/IP Model
farhan516
 
02 protocols and tcp-ip
02 protocols and tcp-ip02 protocols and tcp-ip
02 protocols and tcp-ip
myl_1116
 
ETE405-lec7.pdf
ETE405-lec7.pdfETE405-lec7.pdf
ETE405-lec7.pdf
mashiur
 

Was ist angesagt? (19)

Tcp ip
Tcp ipTcp ip
Tcp ip
 
TCP/IP model
TCP/IP modelTCP/IP model
TCP/IP model
 
Overview of TCP IP
Overview of TCP IPOverview of TCP IP
Overview of TCP IP
 
Tcp/ip model
Tcp/ip  modelTcp/ip  model
Tcp/ip model
 
TCP/IP and DNS
TCP/IP and DNSTCP/IP and DNS
TCP/IP and DNS
 
| IJMER | ISSN: 2249–6645 | www.ijmer.com | Vol. 4 | Iss. 4 | April 2014 ...
    | IJMER | ISSN: 2249–6645 | www.ijmer.com | Vol. 4 | Iss. 4 | April 2014 ...    | IJMER | ISSN: 2249–6645 | www.ijmer.com | Vol. 4 | Iss. 4 | April 2014 ...
| IJMER | ISSN: 2249–6645 | www.ijmer.com | Vol. 4 | Iss. 4 | April 2014 ...
 
53426980 tcp-ip
53426980 tcp-ip53426980 tcp-ip
53426980 tcp-ip
 
Chapter 2 - Protocol Architecture, TCP/IP, and Internet-Based Applications 9e
Chapter 2 - Protocol Architecture, TCP/IP, and Internet-Based Applications 9eChapter 2 - Protocol Architecture, TCP/IP, and Internet-Based Applications 9e
Chapter 2 - Protocol Architecture, TCP/IP, and Internet-Based Applications 9e
 
ETE405-lec7.pptx
ETE405-lec7.pptxETE405-lec7.pptx
ETE405-lec7.pptx
 
TCP/IP Model
TCP/IP ModelTCP/IP Model
TCP/IP Model
 
Networking Basics
Networking BasicsNetworking Basics
Networking Basics
 
Tcp IP Model
Tcp IP ModelTcp IP Model
Tcp IP Model
 
02 protocols and tcp-ip
02 protocols and tcp-ip02 protocols and tcp-ip
02 protocols and tcp-ip
 
TCP/IP Protocols With All Layer Description
TCP/IP Protocols With All Layer DescriptionTCP/IP Protocols With All Layer Description
TCP/IP Protocols With All Layer Description
 
Network Protocols
Network ProtocolsNetwork Protocols
Network Protocols
 
Assingment 2
Assingment 2Assingment 2
Assingment 2
 
TCP IP Model | Computer Science
TCP IP Model | Computer ScienceTCP IP Model | Computer Science
TCP IP Model | Computer Science
 
ETE405-lec7.pdf
ETE405-lec7.pdfETE405-lec7.pdf
ETE405-lec7.pdf
 
Protocols and the TCP/IP Protocol Suite
Protocols and the TCP/IP Protocol SuiteProtocols and the TCP/IP Protocol Suite
Protocols and the TCP/IP Protocol Suite
 

Ă„hnlich wie Communication Networks 1

Wmcn ch.4
Wmcn ch.4Wmcn ch.4
Wmcn ch.4
Alaa2
 
Presentation5
Presentation5Presentation5
Presentation5
Mohd Yusak
 
02 protocol architecture
02 protocol architecture02 protocol architecture
02 protocol architecture
Orbay YeĹźil
 
IMD 251 - Networking
IMD 251 - NetworkingIMD 251 - Networking
IMD 251 - Networking
isma ishak
 
Internet basics and Cloud Computing- Manish Jha
Internet basics and Cloud Computing- Manish JhaInternet basics and Cloud Computing- Manish Jha
Internet basics and Cloud Computing- Manish Jha
manish jha
 

Ă„hnlich wie Communication Networks 1 (20)

02 protocol architecture
02 protocol architecture02 protocol architecture
02 protocol architecture
 
02-ProtocolArchitecture.pdf
02-ProtocolArchitecture.pdf02-ProtocolArchitecture.pdf
02-ProtocolArchitecture.pdf
 
nv.ppt
nv.pptnv.ppt
nv.ppt
 
Wmcn ch.4
Wmcn ch.4Wmcn ch.4
Wmcn ch.4
 
Lecture 3- tcp-ip
Lecture  3- tcp-ipLecture  3- tcp-ip
Lecture 3- tcp-ip
 
Presentation5
Presentation5Presentation5
Presentation5
 
02 protocol architecture
02 protocol architecture02 protocol architecture
02 protocol architecture
 
unit-1fon (1).pptx
unit-1fon (1).pptxunit-1fon (1).pptx
unit-1fon (1).pptx
 
01 pengenalan
01 pengenalan01 pengenalan
01 pengenalan
 
Week2 lec1-bscs1
Week2 lec1-bscs1Week2 lec1-bscs1
Week2 lec1-bscs1
 
Ta 104-tcp
Ta 104-tcpTa 104-tcp
Ta 104-tcp
 
IMD 251 - Networking
IMD 251 - NetworkingIMD 251 - Networking
IMD 251 - Networking
 
Networking Fundamentals
Networking FundamentalsNetworking Fundamentals
Networking Fundamentals
 
TCP-IP Reference Model
TCP-IP Reference ModelTCP-IP Reference Model
TCP-IP Reference Model
 
section 4.3.pptx
section 4.3.pptxsection 4.3.pptx
section 4.3.pptx
 
Lecture 1 networking & internetworking
Lecture 1 networking & internetworkingLecture 1 networking & internetworking
Lecture 1 networking & internetworking
 
Week2 lec2-bscs1
Week2 lec2-bscs1Week2 lec2-bscs1
Week2 lec2-bscs1
 
Osi model
Osi modelOsi model
Osi model
 
Manish Jha- Research Scholar- Internet Basics Requriement
Manish Jha- Research Scholar- Internet Basics RequriementManish Jha- Research Scholar- Internet Basics Requriement
Manish Jha- Research Scholar- Internet Basics Requriement
 
Internet basics and Cloud Computing- Manish Jha
Internet basics and Cloud Computing- Manish JhaInternet basics and Cloud Computing- Manish Jha
Internet basics and Cloud Computing- Manish Jha
 

KĂĽrzlich hochgeladen

Cloud Frontiers: A Deep Dive into Serverless Spatial Data and FME
Cloud Frontiers:  A Deep Dive into Serverless Spatial Data and FMECloud Frontiers:  A Deep Dive into Serverless Spatial Data and FME
Cloud Frontiers: A Deep Dive into Serverless Spatial Data and FME
Safe Software
 
Modular Monolith - a Practical Alternative to Microservices @ Devoxx UK 2024
Modular Monolith - a Practical Alternative to Microservices @ Devoxx UK 2024Modular Monolith - a Practical Alternative to Microservices @ Devoxx UK 2024
Modular Monolith - a Practical Alternative to Microservices @ Devoxx UK 2024
Victor Rentea
 
Finding Java's Hidden Performance Traps @ DevoxxUK 2024
Finding Java's Hidden Performance Traps @ DevoxxUK 2024Finding Java's Hidden Performance Traps @ DevoxxUK 2024
Finding Java's Hidden Performance Traps @ DevoxxUK 2024
Victor Rentea
 

KĂĽrzlich hochgeladen (20)

How to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerHow to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected Worker
 
Spring Boot vs Quarkus the ultimate battle - DevoxxUK
Spring Boot vs Quarkus the ultimate battle - DevoxxUKSpring Boot vs Quarkus the ultimate battle - DevoxxUK
Spring Boot vs Quarkus the ultimate battle - DevoxxUK
 
Cyberprint. Dark Pink Apt Group [EN].pdf
Cyberprint. Dark Pink Apt Group [EN].pdfCyberprint. Dark Pink Apt Group [EN].pdf
Cyberprint. Dark Pink Apt Group [EN].pdf
 
Apidays New York 2024 - The Good, the Bad and the Governed by David O'Neill, ...
Apidays New York 2024 - The Good, the Bad and the Governed by David O'Neill, ...Apidays New York 2024 - The Good, the Bad and the Governed by David O'Neill, ...
Apidays New York 2024 - The Good, the Bad and the Governed by David O'Neill, ...
 
Cloud Frontiers: A Deep Dive into Serverless Spatial Data and FME
Cloud Frontiers:  A Deep Dive into Serverless Spatial Data and FMECloud Frontiers:  A Deep Dive into Serverless Spatial Data and FME
Cloud Frontiers: A Deep Dive into Serverless Spatial Data and FME
 
Modular Monolith - a Practical Alternative to Microservices @ Devoxx UK 2024
Modular Monolith - a Practical Alternative to Microservices @ Devoxx UK 2024Modular Monolith - a Practical Alternative to Microservices @ Devoxx UK 2024
Modular Monolith - a Practical Alternative to Microservices @ Devoxx UK 2024
 
Apidays New York 2024 - APIs in 2030: The Risk of Technological Sleepwalk by ...
Apidays New York 2024 - APIs in 2030: The Risk of Technological Sleepwalk by ...Apidays New York 2024 - APIs in 2030: The Risk of Technological Sleepwalk by ...
Apidays New York 2024 - APIs in 2030: The Risk of Technological Sleepwalk by ...
 
Strategies for Landing an Oracle DBA Job as a Fresher
Strategies for Landing an Oracle DBA Job as a FresherStrategies for Landing an Oracle DBA Job as a Fresher
Strategies for Landing an Oracle DBA Job as a Fresher
 
DEV meet-up UiPath Document Understanding May 7 2024 Amsterdam
DEV meet-up UiPath Document Understanding May 7 2024 AmsterdamDEV meet-up UiPath Document Understanding May 7 2024 Amsterdam
DEV meet-up UiPath Document Understanding May 7 2024 Amsterdam
 
ICT role in 21st century education and its challenges
ICT role in 21st century education and its challengesICT role in 21st century education and its challenges
ICT role in 21st century education and its challenges
 
Emergent Methods: Multi-lingual narrative tracking in the news - real-time ex...
Emergent Methods: Multi-lingual narrative tracking in the news - real-time ex...Emergent Methods: Multi-lingual narrative tracking in the news - real-time ex...
Emergent Methods: Multi-lingual narrative tracking in the news - real-time ex...
 
MS Copilot expands with MS Graph connectors
MS Copilot expands with MS Graph connectorsMS Copilot expands with MS Graph connectors
MS Copilot expands with MS Graph connectors
 
Artificial Intelligence Chap.5 : Uncertainty
Artificial Intelligence Chap.5 : UncertaintyArtificial Intelligence Chap.5 : Uncertainty
Artificial Intelligence Chap.5 : Uncertainty
 
Repurposing LNG terminals for Hydrogen Ammonia: Feasibility and Cost Saving
Repurposing LNG terminals for Hydrogen Ammonia: Feasibility and Cost SavingRepurposing LNG terminals for Hydrogen Ammonia: Feasibility and Cost Saving
Repurposing LNG terminals for Hydrogen Ammonia: Feasibility and Cost Saving
 
Apidays New York 2024 - Accelerating FinTech Innovation by Vasa Krishnan, Fin...
Apidays New York 2024 - Accelerating FinTech Innovation by Vasa Krishnan, Fin...Apidays New York 2024 - Accelerating FinTech Innovation by Vasa Krishnan, Fin...
Apidays New York 2024 - Accelerating FinTech Innovation by Vasa Krishnan, Fin...
 
Finding Java's Hidden Performance Traps @ DevoxxUK 2024
Finding Java's Hidden Performance Traps @ DevoxxUK 2024Finding Java's Hidden Performance Traps @ DevoxxUK 2024
Finding Java's Hidden Performance Traps @ DevoxxUK 2024
 
Apidays New York 2024 - Passkeys: Developing APIs to enable passwordless auth...
Apidays New York 2024 - Passkeys: Developing APIs to enable passwordless auth...Apidays New York 2024 - Passkeys: Developing APIs to enable passwordless auth...
Apidays New York 2024 - Passkeys: Developing APIs to enable passwordless auth...
 
ProductAnonymous-April2024-WinProductDiscovery-MelissaKlemke
ProductAnonymous-April2024-WinProductDiscovery-MelissaKlemkeProductAnonymous-April2024-WinProductDiscovery-MelissaKlemke
ProductAnonymous-April2024-WinProductDiscovery-MelissaKlemke
 
Apidays New York 2024 - The value of a flexible API Management solution for O...
Apidays New York 2024 - The value of a flexible API Management solution for O...Apidays New York 2024 - The value of a flexible API Management solution for O...
Apidays New York 2024 - The value of a flexible API Management solution for O...
 
"I see eyes in my soup": How Delivery Hero implemented the safety system for ...
"I see eyes in my soup": How Delivery Hero implemented the safety system for ..."I see eyes in my soup": How Delivery Hero implemented the safety system for ...
"I see eyes in my soup": How Delivery Hero implemented the safety system for ...
 

Communication Networks 1

Hinweis der Redaktion

  1. This quote from the start of Stallings DCC8e Ch1 raises the key issue which we wish to study. The scope of this book is broad, covering three general areas: data communications, networking, and protocols. Data communications deals with the transmission of signals in a reliable and efficient manner. Networking deals with the technology and architecture of the communications networks used to interconnect communicating devices.
  2. This simple narrative conceals a wealth of technical complexity. To get some idea of the scope of this complexity, Stallings DCC8e Table 1.1 lists a selection of the key tasks that must be performed in a data communications system. transmission system utilization - need to make efficient use of transmission facilities typically shared among a number of communicating devices a device must interface with the transmission system once an interface is established, signal generation is required for communication there must be synchronization between transmitter and receiver, to determine when a signal begins to arrive and when it ends there is a variety of requirements for communication between two parties that might be collected under the term exchange management Error detection and correction are required in circumstances where errors cannot be tolerated Flow control is required to assure that the source does not overwhelm the destination by sending data faster than they can be processed and absorbed addressing and routing , so a source system can indicate the identity of the intended destination, and can choose a specific route through this network Recovery allows an interrupted transaction to resume activity at the point of interruption or to condition prior to the beginning of the exchange Message formatting has to do with an agreement between two parties as to the form of the data to be exchanged or transmitted Frequently need to provide some measure of security in a data communications system Network management capabilities are needed to configure the system, monitor its status, react to failures and overloads, and plan intelligently for future growth See have gone from the simple idea of data communication between source and destination to a rather formidable list of data communications tasks.
  3. The next section of the text on "Data Communications”, deals with the most fundamental aspects of the communications function, focusing on the transmission of signals in a reliable and efficient manner. Stallings DCC8e Figure 1.3 provides a new perspective on the communications model of Figure 1.2a. We trace the details of this figure using electronic mail as an example. Assume a PC user wants to send an email message m to another user. The process is modeled as follows: user keys in message m comprising bits g buffered in source PC memory input data is transferred to I/O device (transmitter) as sequence of bits g(t) using voltage shifts transmitter converts these into a signal s(t) suitable for transmission media being used whilst transiting media signal may be impaired so received signal r(t) may differ from s(t) receiver decodes signal recovering g’(t) as estimate of original g(t) which is buffered in destination PC memory as bits g’ being the received message m’
  4. When computers, terminals, and/or other data processing devices exchange data, the procedures involved can be quite complex. eg. file transfer. There must be a data path between the two computers. But also need: Source to activate communications Path or inform network of destination Source must check destination is prepared to receive File transfer application on source must check destination file management system will accept and store file for his user May need file format translation Instead of implementing the complex logic for this as a single module, the task is broken up into subtasks, implemented separately. In a protocol architecture, the modules are arranged in a vertical stack, each layer in the stack performs a related subset of the functions. It relies on the next lower layer to perform more primitive functions. It provides services to the next higher layer. The peer layers communicate using a set of rules or conventions known as a protocol.
  5. The TCP/IP protocol architecture is a result of protocol research and development conducted on the experimental packet-switched network, ARPANET, funded by the Defense Advanced Research Projects Agency (DARPA), and is generally referred to as the TCP/IP protocol suite. This protocol suite consists of a large collection of protocols that have been issued as Internet standards by the Internet Activities Board (IAB).
  6. In general terms, communications can be said to involve three agents: applications (eg. file transfer), computers (eg. PCs & servers), and networks. These applications, and others, execute on computers that can often support multiple simultaneous applications. Computers are connected to networks, and the data to be exchanged are transferred by the network from one computer to another. Thus, data transfer involves first getting the data to the computer in which the application resides and then getting the data to the intended application within the computer. Can think of partitioning these tasks into 3 layers as shown.
  7. TCP/IP doesn’t have an “official” layer model (& it predates the OSI Reference Model we’ll introduce later), but it does have a “working” layer model, as shown.
  8. The physical layer covers the physical interface between a data transmission device (e.g., workstation, computer) and a transmission medium or network. This layer is concerned with specifying the characteristics of the transmission medium, the nature of the signals, the data rate, and related matters.
  9. The network access layer is concerned with the exchange of data between an end system (server, workstation, etc.) and the network to which it is attached. The sending computer must provide the network with the address of the destination computer, so that the network may route the data to the appropriate destination. The sending computer may wish to invoke certain services, such as priority, that might be provided by the network. The specific software used at this layer depends on the type of network to be used; different standards have been developed for circuit switching, packet switching (e.g., frame relay), LANs (e.g., Ethernet), and others. Thus it makes sense to separate those functions having to do with network access into a separate layer.
  10. The internet layer provides procedures used to allow data to traverse multiple interconnected networks, to provide communications between devices are attached to different networks. The Internet Protocol (IP) is used at this layer to provide the routing function across multiple networks. This protocol is implemented not only in the end systems but also in routers. A router is a processor that connects two networks and whose primary function is to relay data from one network to the other on its route from the source to the destination end system.
  11. The basic building block of any communications facility is the transmission line. One of the basic choices facing a business user is the transmission medium. For use within the business premises, this choice is generally completely up to the business. For long-distance communications, the choice is generally but not always made by the long-distance carrier. In either case, changes in technology are rapidly changing the mix of media used. The ever-increasing capacity of fiber optic channels is making channel capacity a virtually free resource. However, switching is now becoming the bottleneck. The growing use of wireless transmission, is a result of the trend toward universal personal telecommunications and universal access to communications. Despite the growth in the capacity and the drop in cost of transmission facilities, transmission services remain the most costly component of a communications budget for most businesses. Thus, the manager needs to be aware of techniques that increase the efficiency of the use of these facilities, such as multiplexing and compression.
  12. The number of computers in use worldwide is in the hundreds of millions, with pressure from users of these systems for ways to communicate among all these machines being irresistible. Advances in technology have led to greatly increased capacity and the concept of integration, allowing equipment and networks to deal simultaneously with voice, data, image, and even video. Have two broad categories of networks: Local Area Networks (LAN) and Wide Area Networks (WAN).
  13. Wide area networks generally cover a large geographical area, require the crossing of public right-of-ways, and rely at least in part on circuits provided by a common carrier. Typically, a WAN consists of a number of interconnected switching nodes. Traditionally, WANs have been implemented using one of two technologies: circuit switching and packet switching. More recently, frame relay and ATM networks have assumed major roles.
  14. A LAN is a communications network that interconnects a variety of devices and provides a means for information exchange among those devices. The scope of the LAN is small, typically a single building or a cluster of buildings. It is usually the case that the LAN is owned by the same organization that owns the attached devices. The internal data rates of LANs are typically much greater than those of WANs. LANs come in a number of different configurations. The most common are switched LANs and wireless LANs. The most common switched LAN is a switched Ethernet LAN, others are ATM & Fibre Channel LANs. Wireless networks provide advantages in the areas of mobility and ease of installation and configuration.
  15. The Internet evolved from the ARPANET, developed in 1969 by the Advanced Research Projects Agency (ARPA) of the U.S. Department of Defense. It was the first operational packet-switching network. The network was so successful that ARPA applied the same packet-switching technology to tactical radio communication (packet radio) and to satellite communication (SATNET). The need for interworking between these led to Vint Cerf and Bob Kahn of ARPA developing methods and protocols for such internetworking , which led eventually to the development of TCP/IP.
  16. Stallings DCC8e Figure 1.4 illustrates the key elements that comprise the Internet, whose purpose is to interconnect end systems, called hosts ; including PCs, workstations, servers, mainframes, and so on. Most hosts that use the Internet are connected to a network , such as a local area network (LAN) or a wide area network (WAN). These networks are in turn connected by routers .
  17. The Internet today is made up of thousands of overlapping hierarchical networks, an overview of the common, general characteristics can be made. Stallings DCC8e Figure 1.5 illustrates this. See hosts grouped into LANs, linked to an an Internet service provider (ISP) through a point of presence (POP) . The connection is made in a series of steps starting with the customer premises equipment (CPE) . ISPs can be classified as regional or backbone, with peering links between.
  18. Stallings DCC8e Figure 1.6 illustrates some of the typical communications and network elements in use today. In the upper-left-hand portion of the figure, we see an individual residential user connected to an Internet service provider (ISP) through some sort of subscriber connection. The Internet consists of a number of interconnected routers that span the globe. The routers forward packets of data from source to destination through the Internet. The lower portion shows a LAN implemented using a single Ethernet switch. This is a common configuration at a small business or other small organization.
  19. The host-to-host layer, or transport layer , collects mechanisms in a common layer shared by all applications to provide reliable delivery of data. Regardless of the nature of the applications, there is usually a requirement that data be exchanged reliably, ensuring that all of the data arrives at the destination application and that the data arrives in the same order in which they were sent. These mechanisms for providing reliability are essentially independent of the nature of the applications. The Transmission Control Protocol (TCP) is the most commonly used protocol to provide this functionality.
  20. Finally, the application layer contains the logic needed to support the various user applications. For each different type of application, such as file transfer, a separate module is needed that is peculiar to that application.
  21. Stallings DCC8e Figure 2.1 indicates how these protocols are configured for communications. To make clear that the total communications facility may consist of multiple networks, the constituent networks are usually referred to as subnetworks . Some sort of network access protocol, such as the Ethernet logic, is used to connect a computer to a subnetwork. This protocol enables the host to send data across the subnetwork to another host or, if the target host is on another subnetwork, to a router that will forward the data. IP is implemented in all of the end systems and the routers. It acts as a relay to move a block of data from one host, through one or more routers, to another host. TCP is implemented only in the end systems; it keeps track of the blocks of data to assure that all are delivered reliably to the appropriate application.
  22. For successful communication, every entity in the overall system must have a unique address. Actually, two levels of addressing are needed. Each host on a subnetwork must have a unique global internet address; this allows the data to be delivered to the proper host. Each process with a host must have an address that is unique within the host; this allows the host-to-host protocol (TCP) to deliver data to the proper process. These latter addresses are known as ports .
  23. Consider a simple operation where a process on host A, wishes to send a message to another process on host B. The process at A hands the message down to TCP with instructions to send it to host B. TCP hands the message down to IP with instructions to send it to host B. Note that IP need not be told the identity of the destination port. Next, IP hands the message down to the network access layer (e.g., Ethernet logic) with instructions to send it to router J (the first hop on the way to B). To control this operation, control information as well as user data must be transmitted, as suggested in Stallings DCC8e Figure 2.2. The sending process generates a block of data and passes this to TCP. TCP may break this block into smaller pieces to make it more manageable. To each of these pieces, TCP appends control information known as the TCP header, forming a TCP segment . Next, TCP hands each segment over to IP, with instructions to transmit it to B. These segments must be transmitted across one or more subnetworks and relayed through one or more intermediate routers. This operation, too, requires the use of control information. Thus IP appends a header of control information to each segment to form an IP datagram . Finally, each IP datagram is presented to the network access layer for transmission across the first subnetwork in its journey to the destination. The network access layer appends its own header, creating a packet, or frame. The packet is transmitted across the subnetwork to router J.
  24. For most applications running as part of the TCP/IP protocol architecture, the transport layer protocol is TCP. TCP provides a reliable connection for the transfer of data between applications. A connection is simply a temporary logical association between two entities in different systems. A logical connection refers to a given pair of port values. For the duration of the connection each entity keeps track of TCP segments coming and going to the other entity, in order to regulate the flow of segments and to recover from lost or damaged segments.
  25. In addition to TCP, there is one other transport-level protocol that is in common use as part of the TCP/IP protocol suite: the User Datagram Protocol (UDP). UDP does not guarantee delivery, preservation of sequence, or protection against duplication. UDP enables a procedure to send messages to other procedures with a minimum of protocol mechanism. Some transaction-oriented applications make use of UDP; eg SNMP (Simple Network Management Protocol). Because it is connectionless, UDP has very little to do. Essentially, it adds a port addressing capability to IP.
  26. A number of applications have been standardized to operate on top of TCP. We mention three of the most common here. The Simple Mail Transfer Protocol (SMTP) provides a basic electronic mail transport facility for transferring messages among separate hosts. The SMTP protocol does not specify the way in which messages are to be created; some local editing or native electronic mail facility is required. The target SMTP module will store the incoming message in a user's mailbox. The File Transfer Protocol (FTP) is used to send files from one system to another under user command. Both text and binary files are accommodated. FTP sets up a TCP connection to the target system for the exchange of control messages. Once a file transfer is approved, a second TCP data connection is set up for the data transfer, without the overhead of any headers or control information at the application level. When the transfer is complete, the control connection is used to signal the completion and to accept new file transfer commands. TELNET provides a remote logon capability, which enables a user at a terminal or personal computer to logon to a remote computer and function as if directly connected to that computer. The protocol was designed to work with simple scroll-mode terminals. Terminal traffic between User and Server TELNET is carried on a TCP connection.
  27. The Open Systems Interconnection (OSI) reference model was developed by the International Organization for Standardization (ISO - which is not an acronym but a word, derived from the Greek isos, meaning equal ) as a model for a computer protocol architecture and as a framework for developing protocol standards. The OSI model consists of seven layers. The designers of OSI assumed that this model and the protocols developed within this model would come to dominate computer communications, eventually replacing proprietary protocol implementations and rival multivendor models such as TCP/IP. This has not happened. Although many useful protocols have been developed in the context of OSI, the overall seven-layer model has not flourished. Instead, the TCP/IP architecture has come to dominate.
  28. Stallings DCC8e Figure 2.6 illustrates the OSI model and provides a brief definition of the functions performed at each layer. The intent of the OSI model is that protocols be developed to perform the functions of each layer.
  29. There are a number of reasons why the TCP/IP architecture has come to dominate. Perhaps the most important is that the key TCP/IP protocols were mature and well tested at a time when similar OSI protocols were in the development stage. When businesses began to recognize the need for interoperability across networks, only TCP/IP was available and ready to go. Another reason is that the OSI model is unnecessarily complex, with seven layers to accomplish what TCP/IP does with fewer layers. Stallings DCC8e Figure 2.7 illustrates the layers of the TCP/IP and OSI architectures, showing roughly the correspondence in functionality between the two.
  30. The principal motivation for the development of the OSI model was to provide a framework for standardization. Within the model, one or more protocol standards can be developed at each layer. The model defines in general terms the functions to be performed at that layer and facilitates the standards-making process in two ways by allowing standards to be developed independently and simultaneously for each layer, and because changes in standards in one layer need not affect already existing software in another layer. Stallings DCC8e Figure 2.8 illustrates the use of the OSI model as such a framework. The overall communications function is decomposed into seven distinct layers, making the interfaces between modules as simple as possible. In addition, the design principle of information hiding is used: Lower layers are concerned with greater levels of detail; upper layers are independent of these details. Each layer provides services to the next higher layer and implements a protocol to the peer layer in other systems.