Communicating over the Network Network Fundamentals Chapter 2 Objectives Describe the structure of a network, including the devices and media that are necessary for successful communications. Explain the function of protocols in network communications. Explain the advantages of using a layered model to describe network functionality. Describe the role of each layer in two recognized network models: The TCP/IP model and the OSI model. Describe the importance of addressing and naming schemes in network communications. Outline The platform for communications The elements of communication Communicating the messages Component of the network End devices and their role on the network Intermediary devices and their role on the network Network media LANs, WANs and internetworks Local are networks Wide area networks The Internet: a network of networks Network representation Outline Protocols Rules that govern communication Network protocols Protocol suite and industry standards Interaction of protocols Technology-independent protocols Using layered models The benefits of layered model Protocol and reference models TCP/IP model Outline Communicating process Protocol data units and encapsulation Sending and receiving process OSI model Comparing OSI model to the TCP/IP model Network addressing Addressing in the network Getting data to the end device Getting data through the internetwork Getting data to the right application The Elements of Communication Three elements of communication: Message source / sender Destination / receiver A channel Communicating the Messages Data is divided into smaller pieces during transmission. The process of dividing data into smaller pieces is called segmentation. Benefits of segmentation: Multiplexing Enable transmission medium to be shared. Reliability Different packets can use different paths. If path fails or congested, alternate paths can be used. If part of the message fails to make it to destination, only the missing parts need to be retransmitted. Communicating the Messages Communicating the Messages Communicating the Messages Disadvantages of segmentation: added level of complexity. Must ensure each segment can: Get to the correct destination. Be reassembled back into the content of the original message. Example: similar like sending a 100-page letter one page at a time. Each letter needs separate envelop Need to label the envelopes with a sequence number Communicating the Messages Components of the Network Devices (hardware) Media End devices: PCs, printers, PDAs, mobile phones Intermediary devices: router, switch, hub, firewall Can be wired or wireless Service (software) Network applications Routing protocols Processes Algorithms End Devices and Their Roles End Devices and Their Roles End devices are also referred to as hosts. A host device is either the source or destination of a message. Examples: Computers (workstations, laptops, file servers, Web servers) Network printers VoIP phones Cameras on a network Mobile handheld devices (PDAs, wireless barcode scanners) End Devices and Their Roles End device forms an interface between human and communication network. Each host on a network is identified by an address. People access the network through an end device. In the Internet, this address is called an IP address. A host can act as a client, server or both. Client: request and display information obtained from server. Server: provide information and services. Role is determined based on software installed on the host. Intermediary Devices and Their Roles switch or hub switch or hub routers Intermediary Devices and Their Roles Provide connectivity to the network. Connect individual network. Connect segments (links) within the same network. Examples: Network access devices: hubs, switches, wireless access points. Interconnecting devices: routers. Communication servers and modems. Security devices: firewalls Intermediary Devices and Their Roles Processes running on intermediary devices perform the following functions: Regenerate and retransmit data signals Maintain information about what pathways exist through the network and internetwork Notify other devices of errors and communication failures Direct data along alternate pathways when there is a link failure Classify and direct messages according to QoS priorities Permit or deny the flow of data, based on security settings Network Media Network media provides the channel over which message travels from source to destination. There are three types of network media: Metallic wires Fiber optics Wireless Each media has different physical properties and uses different methods to encode message. Encoding refers to the way data is converted to patterns of electrical, light or electromagnetic energy and carried on the medium. Network Media Media Copper Fiber-optic Wireless Example Twisted-pair cable Glass or plastic fibers Connect local user through air Encoding Electrical pulses Light pulses Electromagnetic waves Network Media Network Media Criteria of choosing a network media: The distance the media can carry the signal The environment in which the media works The bandwidth The cost of medium and installation The cost of connector and compatible equipment LANs, WANs and Internetwork Networks come in many sizes and serve a wide variety of functions. Three basic differences: The size of the area covered The number of users connected The number and types of services available Based on these differences, networks can be divided into three types: Local area network (LAN) Wide area network (WAN) Internetwork Local Area Network (LAN) A network serving a home, building or campus. A more formal definition: An individual network that usually spans a single geographical area, providing services and applications to people within a common organizational structure such as a single business, campus or region. LAN devices: Switches / hubs Routers Multilayer switches Wide Area Network (WAN) LANs separated by geographic distance are connected by a network known as the wide area network (WAN). A WAN is owned by a telecommunication service provider (TSP). Internetworks An internetwork is a global mesh of interconnected networks for communication. Example: The Internet. The Internet is created by the interconnection of networks belonging to Internet Service Providers (ISPs). ISPs connect customers to the Internet. ISPs cooperate with other ISPs and TSPs to make sure their customers have access to all Internet networks. Internetworks Network Representations Network Representations Network Interface Card (NIC) – Provides the physical connection to the network at the PC or other host device. Physical Port – A connector or an outlet on a networking device where the media is connected to a host or other networking device. Interface – Specialized ports on an internetworking device that connect to individual networks. Because routers are used to interconnect networks, the ports on a router are referred to as network interfaces. Network Representations Protocols: Rules that Govern Communication Communication in networks is governed by pre-defined rules called protocol. A protocol suite is a group of inter-related protocols that are necessary to perform communication. Protocols are implemented in software or hardware that is loaded on each host and network device. Protocols: Rules that Govern Communication Network protocol suites describe processes such as: The format or structure of the message. The process by which networking devices share information about pathways to other networks. How and when error or system messages are passed between devices. The setting up and termination of data transfer sessions. A protocol can either be open standard or proprietary (vendor-specific). Protocol Suite and Industry Standard Many of the protocols in a protocol suite are actually widely utilized protocols or industry standards. Networking protocols are standardized by organizations such as: Institute of Electrical and Electronics Engineers (IEEE) Internet Engineering Task Force (IETF) The use of standard protocols ensures that networking devices from different manufacturers can work together. Interaction of Protocols A successful communication can only be achieved with the use of a number of protocols in a protocol suite. The different protocols work together to ensure that the message are received and understood by both parties. Different protocols take care of different communication tasks. Example: Interaction between a Web server and Web browser. Interaction of Protocols Interaction of Protocols Application protocol – HTTP Governs communication between a Web server and Web client. Defines the content and format of the request and response messages between client and server. Implemented in the Web server and Web client application. Need to rely on other protocols for other communication tasks: transport data to the correct receiver, taking care of errors and losses, etc. Interaction of Protocols Transport protocol – TCP Manages the individual conversation betweens servers and clients (not just between Web servers and Web clients). Divide HTTP message (or any application message) into smaller messages called segments. Responsible for controlling the information exchanged between the server and the client. Size of data in a segment Flow control – how much data can be sent and received Reliability – what to do when packet is lost / missing Interaction of Protocols Internet protocol – IP Responsible for making sure data can travel the network to the correct receiver. Takes TCP segments and encapsulate them into a packet. The packet header will contain information to carry the packet to the receiver over the network. This information includes the source and destination addresses. The destination address will be used by the routers to find the best path to the receiver. Interaction of Protocols Network access protocol (e.g. Ethernet) Controls physical transmission of data on the media. Takes packet from IP and format them to be transmitted over the media. Responsible for data transmission between two devices on the same network. Host to router Router to router Router to host Also responsible for converting the data (bits) into signals used by the media. Technology-independent Protocol Protocols are not dependent on any specific technology. Protocols specifies the tasks that need to be done to perform communication, not how the tasks are implemented. It is up to the programmer / device manufacturer to decide on the best way to implement the protocol. As long as the same protocol is followed, network software / hardware developed by different parties should be able to work with each other. Using Layered Model A layered model is used to visualize the interaction between various protocols. Benefits of using layered model: Break network communication into smaller, more manageable parts. Provide a common language to describe networking functions and capabilities. Assist in protocol design because the functions of the protocol at a specific layer is clearly specified. Prevent changes in one layer from affecting the other layers. Allow products from different vendors that adhere to the specified protocol to work with each other. TCP/IP Model The protocol model used in the Internet. Protocols in the TCP/IP model are cooperatively developed by researchers and members of the industry. A protocol model is a model that closely matches the structure of a particular protocol suite. The documents describing the protocols are called RFCs (Request for Comments). Protocols described in RFCs are open standards. RFC documents are publicly available. The RFC documents are maintained by IETF. TCP/IP Model Communication Process – On Sending Side Data originates from application layer of the source host. Segmentation and encapsulation is performed as it is passed down the protocol stack. Encapsulation: process of adding control information to the data. At the network access layer, data is converted to signals to be transmitted by the transmission media. Data is transmitted through the internetwork, which consists of media and any intermediary device. Communication Process – On Sending Side Communication Process – On Receiving Side Data is received at the network access layer of the destination host. Decapsulation and reassembly is performed as it is passed up the protocol stack. Decapsulation: process of removing control information of the data. Reassembly: process of combining the received data to produce the original data. Data is passed to the receiving application at the application layer of the destination host. Communication Process – On Receiving Side Protocol Data Units and Data Encapsulation As data is passed down the protocol stack, various control information is added. This process is referred to as encapsulation. This happens at every layer of the protocol stack. The combination of data and control information is referred to as protocol data unit (PDU). At each layer, PDU received from upper layer is encapsulated with control information of that layer to form a new PDU. To distinguish between PDUs of different layers, they are given different names. Protocol Data Units and Data Encapsulation OSI Model OSI is a reference model. A reference model provides a common reference for maintaining consistency within all types of network protocols and services. It divides network communication into smaller parts to make it easier to understand. OSI Model OSI Model vs. TCP/IP Model Addressing in the Network To ensure successful data delivery, various types of addresses are used when sending data. Address to identify physical device / network interface Address to identify host Address to identify application Getting Data to the End Device The host physical address is contained in Layer 2 PDU. Layer 2 is concerned with the delivery of messages on a single local network. Layer 2 address is unique on the local network and represents the address of the end device on the physical media. In a LAN using Ethernet, this address is called the Media Access Control (MAC) address. Getting Data through the Internetwork Layer 3 protocols are primarily designed to move data from one LAN to another LAN through an internetwork. Intermediary network devices (routers) use Layer 3 address to locate hosts on different networks. Routers read the Layer 3 header of the packet and determine to which outgoing link the packet should be forwarded to. In the Internet, the Layer 3 address is called the IP address. Getting Data through the Internetwork Getting Data to the Right Application At the receiving end device, the data must be sent to the correct network application. The end device may be running multiple network applications. Information regarding the receiving application is contained in Layer 4 PDU. In the Internet, the network applications are identified using port numbers. Getting Data to the Right Application