Chapter 2 Network Models Copyright © The McGraw-Hill Companies, Inc. Permission required for reproduction or display. Components of Communication Sender Receiver Message Transmission medium Protocol Effectiveness of Communication Delivery (confidentiality) Accuracy (integrity) Timeliness (availability) 2.3 Jitter – a subset of timeliness Data Flow 2.4 Simplex Half-Duplex Duplex Connection Types Point-to-Point Multi-point 2.5 A circuit switch creates a point to point connection. Many packet switched networks are multipoint Physical Topologies 2.6 Bus Ring Star Mesh Compound Physical Topology Links Let n=# of nodes. The number of links is: 2.7 Bus Ring Star Mesh n-1 n n-1 (includes the hub) n*(n-1)/2 Network Types 2.8 LAN – nodes belonging to an address space that are part of a well defined domain. WAN – When two or more LANs are linked together. Chapter 2: Outline 2.1 Protocol Layering 2.2 TCP/IP Protocol Suite 2.3 OSI Model 2-1 PROTOCOL LAYERING A protocol defines the rules that the sender, receiver and all intermediate devices must follow to communicate effectively. 2.10 2.1.1 Scenarios Consider two scenarios. Scenario 1: communication is so simple it occurs in one layer. Scenario 2: communication takes place in three layers. 2.11 2-1 PROTOCOL LAYERING When communication is simple, one simple protocol may be enough; When the communication is complex, layers are introduced, and each layer has its own protocol. 2.12 Figure 2.1: A single-layer protocol 2.13 Figure 2.2: A three-layer protocol Postal carrier facility 2.14 2.1.2 Principles of Protocol Layering Consider two principles of protocol layering. 2.15 2.1.2 Principles of Protocol Layering Consider two principles of protocol layering. 1. For half-duplex or full duplex data flow, each layer must perform a forward operation and the corresponding inverse operation. 2.16 2.1.2 Principles of Protocol Layering Consider two principles of protocol layering. 2. The two objects under each logically linked layer at both sites should be identical. 2.17 2.1.2 Principles of Protocol Layering Consider two principles of protocol layering. 1. For half-duplex or full duplex data flow, each layer must perform a forward operation and the corresponding inverse operation. 2. The two objects under each logically linked layer at both sites should be identical. 2.18 Figure 2.2: A three-layer protocol Postal carrier facility 2.19 2.1.3 Logical Connections The principles of protocol layering lead to a logical connection between the layers at sending and receiving ends of the communication. 2.20 Figure 2.3: Logical connection between peer layers 2.21 2-2 TCP/IP PROTOCOL SUITE A protocol defines the rules that both the sender and receiver and all intermediate devices must follow to communicate effectively. 2.22 2-2 TCP/IP PROTOCOL SUITE TCP/IP is a five layer protocol suite. 2.23 2-2 TCP/IP PROTOCOL SUITE TCP/IP is a five layer protocol suite. •Application Layer 2.24 2-2 TCP/IP PROTOCOL SUITE TCP/IP is a five layer protocol suite. •Application Layer •Transport Layer 2.25 2-2 TCP/IP PROTOCOL SUITE TCP/IP is a five layer protocol suite. •Application Layer •Transport Layer •Network Layer 2.26 2-2 TCP/IP PROTOCOL SUITE TCP/IP is a five layer protocol suite. •Application Layer •Transport Layer •Network Layer •Data Link Layer 2.27 2-2 TCP/IP PROTOCOL SUITE TCP/IP is a five layer protocol suite. •Application Layer •Transport Layer •Network Layer •Data Link Layer •Physical Layer 2.28 Figure 2.4: Layers in the TCP/IP protocol suite 2.29 2.2.1 Layered Architecture TCP/IP protocol suite example: Consider three LANs Each LAN has a group of hosts connected to a switch (aka 2-level switch). Each switch is connected to a router (aka 3-level switch) 2.30 Figure 2.5: Communication through an internet 2.31 2.2.2 Layers in the TCP/IP Protocol Suite Draw a diagram with multiple nodes in each LAN Why is it called a 2-level switch? Why is a router is 3-level switch? 2.32 Figure 2.6: Logical connections between layers in TCP/IP Logical connections 2.33 Network Data Objects Data objects: message 2.34 Network Data Objects Data objects: message segment 2.35 Network Data Objects Data objects: message segment datagram 2.36 Network Data Objects Data objects: message segment datagram frame 2.37 Network Data Objects Network data object taxonomy: message segment datagram frame signals representing bits 2.38 Figure 2.7: Identical objects in the TCP/IP protocol suite Identical objects (messages) Identical objects (segment or user datagram) 2.39 Identical objects (datagram) Identical objects (datagram) Identical objects (frame) Identical objects (frame) Identical objects (bits) Identical objects (bits) Network Data Objects Data Object Taxonomy: Application layer - message Transport layer - segment Network layer - datagram Data link layer - frame Physical layer – signals representing bits 2.40 2.2.3 The TCP/IP Layers Descriptions of the TCP/IP layers will come later; next, we will follow a data object through the layers… 2.41 2.2.4 Encapsulation and Decapsulation One of the important concepts in protocol layering in the Internet is encapsulation/ decapsulation. 2.42 2.2.4 Encapsulation and Decapsulation As the object passes through each layer, an information header (and or trailer) is added to the object. The information header is used to assist in any of these tasks: routing of the object, flow control, error detection, error correction, etc. (see next slide) 2.43 Figure 2.8: Encapsulation / Decapsulation 2.44 Encapsulation payload 2.45 Each layer receives an object that is referred to as the payload, and then attaches a data header. Payload can be relative to each layer, or absolute. The absolute case refers to the original object message. Example Encapsulation 2.46 Q: What is the efficiency of the link in figure 2.8, between LANs if each header is 60 bytes and the message is 1000 bytes? Example Encapsulation 2.47 Q: What is the efficiency of the link in figure 2.8, between LANs if each header is 60 bytes and the message is 1000 bytes? A: 84.7% Example Encapsulation 2.48 Q: How does the efficiency change if the message is only 100 bytes? Example Encapsulation 2.49 Q: How does the efficiency change if the message is only 100 bytes? A: 35.7% Figure 2.9: Addressing in the TCP/IP protocol suite 2.50 2-3 OSI MODEL A seven layer protocol model. It never really caught on due to the success of TCP/IP 2.51 Figure 2.11: The OSI model 2.52 Figure 2.12: TCP/IP and OSI model 2.53 2.3.1 OSI versus TCP/IP When we compare the two models, we find that two layers, session and presentation, are missing from the TCP/IP protocol suite. These two layers were not added to the TCP/IP protocol suite after the publication of the OSI model. The application layer in the suite is usually considered to be the combination of three layers in the OSI model, as shown in Figure 2.12. 2.54