B227_L2 - Murdoch University

advertisement
Your objectives :
be able to discuss:
 the basic tasks of network software
 layering in a theoretical sense
 the functions of the layers in the OSI Reference Model
 the functions of the layers in the TCP/IP Reference
Model
 Modes of communication
B227 Data Communications Lecture 2-1
Peter Cole 2001
Network Software
We have taken a look at network hardware. That is the
physical layout of networks and their topologies and
classification. We will look in finer detail at some of the
aspects of the physical installation of networks in the
next topic.
Network software is required to facilitate the simple use
of networks. Not all the software is actually software as
some of the lower level software has its algorithms
actually incorporated in circuitry and firmware.
When designing complex software we teach (and
hopefully practice) divide-and-conquer techniques such
as the Top-down Design methodology.
The creators of network software have also chosen this
approach to reduce the complexity of designing network
software by breaking the task down into Layers.
B227 Data Communications Lecture 2-2
Peter Cole 2001
Layering
 called Protocol Hierarchies
 names and purpose of layers differ between
networks
 Each entity has a corresponding Peer
 virtual communication through a layer n protocol
 combined called a network architecture
B227 Data Communications Lecture 2-3
Peter Cole 2001
Why layer ?
 Reduce the complexity of the problem
 divide & conquer
 achieve translations therefore communication
between differing network architectures
B227 Data Communications Lecture 2-4
Peter Cole 2001
How it works!
A message, M, is produced by an application process
running in layer 5 and given to layer 4 for transmission.
Layer 4 puts a header in front of the message to identify
the message and passes the result to layer 3.
B227 Data Communications Lecture 2-5
Peter Cole 2001
The header includes control information, such as
sequence numbers, to allow layer 4 on the destination
machine to deliver messages in the right order if the
lower layers do not maintain sequence. In some layers,
headers also contain sizes, times, and other control
fields.
In many networks, there is no limit to the size of
messages transmitted in the layer 4 protocol, but there is
nearly always a limit imposed by the layer 3 protocol.
Consequently, layer 3 must break up the incoming
messages into smaller units, packets, pre-pending a layer
3 header to each packet. In this example, M is split into
two parts, M1 and M2.
Layer 3 decides which of the outgoing lines to use and
passes the packets to layer 2. Layer 2 adds not only a
header to each piece, but also a trailer, and gives the
resulting unit to layer 1 for physical transmission.
At the receiving machine the message moves upward,
from layer to layer, with headers being stripped off as it
progresses. None of the headers for layers below n are
passed up to layer n.
B227 Data Communications Lecture 2-6
Peter Cole 2001
The important thing to understand is the relation
between the virtual and actual communication and the
difference between protocols and interfaces. The peer
processes in layer 4, for example, conceptually think of
their communication as being "horizontal," using the
layer 4 protocol. Each one is likely to have a procedure
called something like SendToOtherSide and
GetFromOtherSide, even though these procedures
actually communicate with lower layers across the 3/4
interface, not with the other side.
The peer process abstraction is crucial to all network
design. Using it, the unmanageable task of designing
the complete network can be broken into several
smaller, manageable, design problems, namely the
design of the individual layers.
B227 Data Communications Lecture 2-7
Peter Cole 2001
Communication Modes
Simplex
half-duplex
XOR
full-duplex
B227 Data Communications Lecture 2-8
Peter Cole 2001
OSI
ISO (International Standards Office) developed a seven-layer
model known as the OSI (Open Systems Interconnection)
Reference Model.
B227 Data Communications Lecture 2-9
Peter Cole 2001
We will discuss each layer of the model in turn, starting
at the bottom layer. Note that the OSI model itself is not
a network architecture because it does not specify the
exact services and protocols to be used in each layer. It
just tells what each layer should do. However, ISO has
also produced standards for all the layers, although these
are not part of the reference model itself. Each one has
been published as a separate international standard.
The physical layer is concerned with transmitting raw
bits over a communication channel. The design issues
have to do with making sure that when one side sends a
1 bit, it is received by the other side as a 1 bit, not as a 0
bit. Typical questions here are:
how many volts should be used to represent a 1 and how
many for a 0
how many microseconds a bit lasts
full-duplex or not
how connection is made
how many pins the network connector has and what
each pin is used for
B227 Data Communications Lecture 2-10
Peter Cole 2001
The design issues here largely deal with mechanical,
electrical, and procedural interfaces, and the physical
transmission medium, which lies below the physical
layer.
B227 Data Communications Lecture 2-11
Peter Cole 2001
The Data Link Layer
The main task of the data link layer is to take a raw
transmission facility and transform it into a line that
appears free of undetected transmission errors to the
network layer.
accomplished by having the sender break the input data
up into data frames (typically a few hundred or a few
thousand bytes)
transmit the frames sequentially
process the acknowledgment frames sent back by the,
receiver
Therefore, the Data-link layer is responsible for data
integrity
It is split into two sublayers
at the top
The Logical Link Control Sub-layer (LLC)
And below the Medium-Access Control Sub-layer (MAC)
B227 Data Communications Lecture 2-12
Peter Cole 2001
B227 Data Communications Lecture 2-13
Peter Cole 2001
The Network Layer
The network layer is concerned with controlling the operation
of the subnet
A key design issue is determining how packets are
routed from source to destination
Routes can be based on static tables that are "wired into"
the network and rarely changed
They can also be determined at the start of each
conversation, for example a terminal session
they can be highly dynamic, being determined anew for
each packet, to reflect the current network load
If too many packets are present in the subnet at the same
time, they will get in each other's way, forming
bottlenecks. The control of such congestion also
belongs to the network layer.
there is often some accounting function built into the
network layer
B227 Data Communications Lecture 2-14
Peter Cole 2001
The Transport Layer
The transport layer is a true end-to-end layer, from source to
destination. In other words, a program on the source machine
carries on a conversation with a similar program on the
destination machine, using the message headers and control
messages
 The basic function of the transport layer is to accept data
from the session layer, split it up into smaller units if need be,
pass these to the network layer, and ensure that the pieces all
arrive correctly at the other end
 Furthermore, all this must be done efficiently, and in a way
that isolates the upper layers from the inevitable changes in
the hardware technology
 Under normal conditions, the transport layer creates a distinct
network connection for each transport connection required by
the session layer.
 If the transport connection requires a high throughput,
however, the transport layer might create multiple network
connections, dividing the data among the network
connections to improve throughput.
 In all cases, the transport layer is required to make the
multiplexing transparent to the session layer.
B227 Data Communications Lecture 2-15
Peter Cole 2001
The Session Layer
 The session layer allows users on different machines to
establish sessions between them.
 A session allows ordinary data transport, as does the transport
layer, but it also provides enhanced services useful in some
applications. A session might be used to allow a user to log
into a remote time-sharing system or to transfer a file between
two machines.
 One of the services of the session layer is to manage dialogue
control. Sessions can allow traffic to go in both directions at
the same time, or in only one direction at a time. If traffic can
only go one way at a time (analogous to a single railroad
track), the session layer can help keep track of whose turn it
is.
 Another session service is synchronisation. Consider the
problems that might occur when trying to do a 2-hour file
transfer between two machines with a 1-hour mean time
between crashes. After each transfer was aborted, the whole
transfer would have to start over again and would probably
fail again the next time as well. To eliminate this problem,
the session layer provides a way to insert checkpoints into the
data stream, so that after a crash, only the data transferred
after the last checkpoint have to be repeated.
B227 Data Communications Lecture 2-16
Peter Cole 2001
The Presentation Layer
The presentation layer performs certain functions that are
requested sufficiently often to warrant finding a general
solution for them.
A typical example of a presentation service is encoding data
in a standard agreed upon way. Most user programs do not
exchange random binary bit strings. They exchange things
such as people's names, dates, amounts of money, and invoices.
These items are represented as character strings, integers,
floating-point numbers, and data structures composed of several
simpler items.
Different computers have different codes for representing
character strings (eg., ASCII and Unicode), integers (eg., one's
complement and two's complement), and so on. In order to
make it possible for computers with different representations to
communicate, the data structures to be exchanged can be
defined in an abstract way, along with a standard encoding to
be used "on the wire." The presentation layer manages these
abstract data structures and converts from the representation
used inside the computer to the network standard representation
and back
B227 Data Communications Lecture 2-17
Peter Cole 2001
The Application Layer
 The application layer contains a variety of protocols that are
commonly needed.
 For example, there are hundreds of incompatible terminal
types in the world. Consider the plight of a full screen editor
that is supposed to work over a network with many different
terminal types, each with different screen layouts, escape
sequences for inserting and deleting text, moving the cursor,
etc.
 One way to solve this problem is to define an abstract
network virtual terminal that editors and other programs
can be written to deal with.
 To handle each terminal type, a piece of software must be
written to map the functions of the network virtual terminal
onto the real terminal. For example, when the editor moves
the virtual terminal's cursor to the upper left-hand corner of
the screen, this software must issue the proper command
sequence to the real terminal to get its cursor there too. All
the virtual terminal software is in the application layer.
 Another application layer function is file transfer, Email, and
users applications
B227 Data Communications Lecture 2-18
Peter Cole 2001
B227 Data Communications Lecture 2-19
Peter Cole 2001
B227 Data Communications Lecture 2-20
Peter Cole 2001
TCP/IP
Probably the single most important network architecture
Unlike OSI, some of the TCP/IP protocols were in use
before the reference model was laid down
The TCP/IP model has only 4 layers as opposed to the
OSI model
B227 Data Communications Lecture 2-21
Peter Cole 2001
Layer 1, the application
layer
exists in both models.
In TCP/IP it will hold, among others,
the following Telnet : Virtual Terminal (VT100)
FTP
: File transfer Protocol
SMTP : Simple Mail Transfer Protocol
DNS
: Domain Name Service
NNTP : Network New Transfer Protocol
HTTP : HyperText Transmission Protocol
The Session and application layers of the OSI are
missing in TCP/IP
Not really required and consequently became redundant
for this model
B227 Data Communications Lecture 2-22
Peter Cole 2001
Layer 2, the transport layer
holds two protocols TCP (Transmission Control Protocol)
 provides reliable data delivery service with end-toend error detection and correction (connection
oriented service)
 handshake required before data is sent
UDP(User Datagram Protocol)
 provides low-overhead unreliable (connectionless)
datagram delivery service
 no method in UDP to determine if datagram
was delivered correctly
both TCP and UDP deliver data to both the Application
layer and the Internet layer
B227 Data Communications Lecture 2-23
Peter Cole 2001
Layer 3 The Internet Layer
This layer holds the Internet protocol (IP) and defines
the IP datagram format (packet), the basic building
block of The Interenet. It  defines the data packet (unit of transmission in the
Internet)
 defines the Internet addressing scheme
 routes datagrams to remote hosts
 fragments and reassembles datagrams
 moves data between the transport layer and the
Host-to-network layer
B227 Data Communications Lecture 2-24
Peter Cole 2001
Layer 4, The Host-Tonetwork layer
Tanebaum states that there is not much anyone,
including the TCP/IP model, has to say about what
happens in the Host-to-network layer. He refers to it as a
“.. great void”
However, Hunt (see Overview of TCP/IP), who refers to
the Host-to-network layer as the “Network Access
Layer” states that this layer
 provides the means for the system to deliver data to
the other devices on a directly connected network
 defines how to use the network to transmit an IP
datagram
Basically, this layer holds all the protocols necessary
for the source host machine to connect to the
destination host.
There will be one protocol for each physical network
standard eg.
RFC 826 -Address Resolution Protocol (Maps IP
address to Ethernet addresses)
RFC 894 - A standard for the Transmission of IP
Datagrams over Ethernet Networks (how to
encapsulate a datagram for transmission on Ethernet)
B227 Data Communications Lecture 2-25
Peter Cole 2001
Networks
Many networks exist in either government or private
hands
Novell NetWare
 predates OSI
 LAN (most popular ? Tanenbaum)
Very similar architecture to TCP/IP (Or the structure
of the text)
B227 Data Communications Lecture 2-26
Peter Cole 2001
The Internet
Grew out of the US DoD ARPANET
ARPANET was available to Universities with research
grants from DARPA.
In an attempt to bring universal networking capabilities
to academics the NFS formed its own network
(CSNET) and later still commissioned the NFSNet
backbone
subnet
Fuzzballs
(TCP/IP)
supercomputers
When ARPANET and the NFSNet were interconnected
the speed of additional networks becoming
interconnected grew exponentially
year
nwrks
hosts
1990
3000
200,000
1992
1,000,000
B227 Data Communications Lecture 2-27
Peter Cole 2001
B227 Data Communications Lecture 2-28
Peter Cole 2001
B227 Data Communications Lecture 2-29
Peter Cole 2001
B227 Data Communications Lecture 2-30
Peter Cole 2001
Data Comm. Services
Switched Multimegabit Data Service - SMDS
 intended to connect multiple LANS in same company
scenario
 uses local lines to nearest SMDS router
 alternative leased lines
 connectionless packet delivery service
 can broadcast to several telephone numbers
B227 Data Communications Lecture 2-31
Peter Cole 2001
X.25
 Connection oriented service
 telephone standard - analogue
 X.21 - physical layer protocol requires digital input
therefore not highly supported
 Switched and permanent virtual circuits
Frame Relay
 cheaper & faster than X.25
 can use actual leased lines or permanent virtual circuits
actual leased lines - go full speed all of the time
permanent virtual circuit is bursty but cheaper
B227 Data Communications Lecture 2-32
Peter Cole 2001
N- ISDN & B-ISDN
 ISDN = Integrated Services Digital network
 N = Narrowband
 B = Broadband
 This system offers high speed multimedia data
exchange
 currently being installed in most Australian capital
cities
 relies on Asynchronous Transfer Mode - ATM
 uses small fixed sized “cells” to transmit data
containing a 5byte header and 48 bytes of payload
ATM promises to be the service of the future.
We will look at ATM a little later in the course in
greater detail
B227 Data Communications Lecture 2-33
Peter Cole 2001
B227 Data Communications Lecture 2-34
Peter Cole 2001
Topic 2 The Physical layer
The Physical layer, the lowest level of the OSI,
physically dispatches and receives the bit streams
between two or more machines
We will start off this section by looking at the
physical limitations of differing transmission
media taking note of the theoretical basis which
supports it.
There are three different types of media
 Wire ( copper or other highly conductive material)
 Glass Fiber
 air or atmosphere
these require respectively power in terms of
 electricity
 light
 radio waves
B227 Data Communications Lecture 2-35
Peter Cole 2001
The Theories
Fourier Analysis :
Jean-Baptise Fourier - early 19th century
tells us that we can determine the amplitude of a
harmonic in a known frequency an
With each term in a Fourier series or expansion we
can calculate an and with each new term in the
series an becomes smaller
This phenomenon is called Attenuation
Attenuation is the reduction of signal amplitude due
to the physical properties of the media
B227 Data Communications Lecture 2-36
Peter Cole 2001
differing media have differing attenuation properties
CURE :
amplify the diminished signal using a REPEATER of
some sort
Distortion results if the attenuation is not uniform
across the frequency spectrum - signal does not distort
uniformly
Amplification may cause a loss of data because the
distortion is also amplified
Bandwidth limitation :
a transmission medium carries signals lying within a
spectrum or range of frequencies; the absolute width
of the spectrum is called the bandwidth
therefore if a signal has components that lay outside
the bandwidth they are totally attenuated, that is,
chopped off
CURE:
filter and reconstruct the signal before re-transmission
or use a transmission medium with qualities more
suited to the job
B227 Data Communications Lecture 2-37
Peter Cole 2001
B227 Data Communications Lecture 2-38
Peter Cole 2001
Maximum data Rate of a
transmission channel
Nyquist
assists in the calculation of the Maximum data Rate of
a transmission channel If you pass a signal through a low-pass filter of
bandwidth H then the signal can be completely
recovered using only 2H samples per second
Therefore no point to looking at (sampling) faster than
2H per second as the higher frequency signals have
been filtered out
Shannon
Add noise to the equation and the maximum data rate
of a channel is reduced further
B227 Data Communications Lecture 2-39
Peter Cole 2001
Transmission Media
B227 Data Communications Lecture 2-40
Peter Cole 2001
B227 Data Communications Lecture 2-41
Peter Cole 2001
B227 Data Communications Lecture 2-42
Peter Cole 2001
Download