Data Communications & Networking CT101 - Computing Systems Contents • Data Transmission Circuits • Data Communications – Parallel Data Transmission – Serial Data Transmission • Asynchronous Serial Transmission • Synchronous Serial Transmission • Data Multiplexing & Modems • Networks & Topologies (bus, star and ring) • Cabling (coaxial, UTP, fiber optic) • Media Access Methods (CSMA/CD, CSMA/CA, Token Passing) • LAN Architectures (Ethernet, Token Ring) • Networking Devices • OSI Model. OSI layer functions. OSI versus TCP/IP Data Transmission • Data transmission is the transfer of data from point-to-point often represented as an electromagnetic signal over a physical point-to-point or point-to-multipoint communication channel • A communication channel refers to the medium used to convey information from a sender (or transmitter) to a receiver, and it can use fully or partially the medium. • Examples of channels: copper wires, optical fibbers or wireless communication channels. Data Communication Channels • • The following is a discussion on the THREE main types of transmission circuits (channels), simplex, half duplex and full duplex. Simplex – Data in a simplex channel is always one way. Simplex channels are not often used because it is not possible to send back error or control signals to the transmit end. An example of a simplex channel in a computer system is the interface between the keyboard and the computer, in that key codes need only be sent one way from the keyboard to the computer system. • Half Duplex – A half duplex channel can send and receive, but not at the same time. Its like a one-lane bridge where two way traffic must give way in order to cross. Only one end transmits at a time, the other end receives. • Full Duplex – Data can travel in both directions simultaneously. There is no need to switch from transmit to receive mode like in half duplex. Its like a two lane bridge on a two-lane highway. Parallel and Serial Data • Parallel transmission (e.g. 8 bits) – Each bit uses a separate wire – To transfer data on a parallel link, a separate line is used as a clock signal. This serves to inform the receiver when data is available. In addition, another line may be used by the receiver to inform the sender that the data has been used, and its ready for the next data. Parallel and Serial Data • Serial (e.g. 8 bits) – Each bit is sent over a single wire, one after the other – Usually no signal lines are used to convey clock (timing information) – There are two types of serial transmission, essentially having to do with how the clock is embedded into the serial data • Asynchronous serial transmission • Synchronous serial transmission • If no clock information was sent, the receiver would misinterpret the arriving data (due to bits being lost, going too slow). • Parallel transmission is obviously faster, in that all bits are sent at the same time, whereas serial transmission is slower, because only one bit can be sent at a time. Parallel transmission is very costly for anything except short links. • • • • • Asynchronous Serial Transmission (RS232 Example) Because no signal lines are used to convey clock (timing) information, this method groups data together into a sequence of bits (five to eight), then prefixes them with a start bit and a stop bit. This is the method most widely used for PC or simple terminal serial communications. In asynchronous serial communication, the electrical interface is held in the mark position between characters. The start of transmission of a character is signaled by a drop in signal level to the space level. At this point, the receiver starts its clock. After one bit time (the start bit) come 8 bits of true data followed by one or more stop bits at the mark level. The receiver tries to sample the signal in the middle of each bit time. The byte will be read correctly if the line is still in the intended state when the last stop bit is read. Thus the transmitter and receiver only have to have approximately the same clock rate. A little arithmetic will show that for a 10 bit sequence, the last bit will be interpreted correctly even if the sender and receiver clocks differ by as much as 5%. It is relatively simple, and therefore inexpensive. However, it has a high overhead, in that each byte carries at least two extra bits: a 20% loss of line bandwidth. Synchronous Serial Transmission (PS2 Example) • • • The PS/2 mouse and keyboard implement a bidirectional synchronous serial protocol. The bus is "idle" when both lines are high (open-collector). This is the only state where the keyboard/mouse is allowed begin transmitting data. The host has ultimate control over the bus and may inhibit communication at any time by pulling the Clock line low. The device (slave) always generates the clock signal. If the host wants to send data, it must first inhibit communication from the device by pulling Clock low. The host then pulls Data low and releases Clock. This is the "Request-to-Send" state and signals the device to start generating clock pulses. – Summary: Bus States Data = high, Clock = high: Idle state. Data = high, Clock = low: Communication Inhibited. Data = low, Clock = high: Host Request-to-Send Data is transmited 1 byte at a time: •1 start bit. This is always 0. •8 data bits, least significant bit first. •1 parity bit (odd parity - The number of 1's in the data bits plus the parity bit always add up to an odd number. This is used for error detection.). •1 stop bit. This is always 1. •1 acknowledge bit (host-to-device communication only) Serial Communication Name Sync Type /Async Duplex Max RS-232 async peer RS-422 async multi-drop Max devices speed (Kbps) Max Pin distance count (not including ground) (feet) full 2 115.2 30 2 (or 4 with HW handshake) half 10 10000 4,000 1 (unidirectional only, additional pins for each bidirectional comm.) RS-485 async multi-point half 32 10000 4,000 2 I2C sync multimaster half Limitation based on bus capacitance and bit rate 3400 <10 2 SPI sync multimaster full Limitation based on bus capacitance and bit rate >1000 <10 3+1(Additional pins needed Limitation based on bus capacitance and bit rate >625 Limitation based on bus capacitance and bit rate 16 Microwire sync 1-Wire async master/slave full master/slave half for every slave if slave count is more than one) <10 3+1(Additional pins needed for every slave if slave count is more than one) 1,000 1 Data Communication Terminology • Channel – A channel is a portion of the communications medium allocated to the sender and receiver for conveying information between them. The communications medium is often subdivided into a number of separate paths, each of which is used by a sender and receiver for communication purposes. • Baud Rate – Baud rate is the same as symbol rate and is a measure of the number of line changes which occur every second. Each symbol can represent or convey one (binary encoded signal) or several bits of data. For a binary signal of 20Hz, this is equivalent to 20 baud (there are 20 changes per second). • Bits Per Second – This is an expression of the number of data bits per second. Where a binary signal is being used, this is the same as the baud rate. When the signal is changed to another form, it will not be equal to the baud rate, as each line change can represent more than one bit (either two or four bits). • Bandwidth – Bandwidth is the frequency range of a channel, measured as the difference between the highest and lowest frequencies that the channel supports. The maximum transmission speed is dependant upon the available bandwidth. The larger the bandwidth, the higher the transmission speed. Data Multiplexing • A multiplexer is a device which shares a communication link between a number of devices (users). • Rather than provide a separate circuit for each device, the multiplexer combines each low speed circuit onto a single high speed link. The cost of the single high speed link is less than the required number of low speed links. • It does this by time or frequency division. Time Division Multiplexing • In time division, the communications link is subdivided in terms of time. • Each sub-circuit is given the channel for a limited amount of time, before it is switched over to the next user, and so on • In the picture bellow it can be seen that each sub-channel occupies the entire bandwidth of the channel, but only for a portion of the time Frequency Division Multiplexing • In frequency division multiplexing, each sub-channel is separated by frequency (each sub-channel is allocated part of the bandwidth of the main channel) • The speed or bandwidth of the main link is the sum of the individual sub-channel speeds or bandwidth. Modems • Modems are devices which allow digital data signals to be transmitted across an analogue link. • Modem stands for modulator/demodulator. A modem changes the digital signal to an analogue frequency, and sends this tone across the analogue link. At the other end, another modem receives the signal and converts it back to digital. Modulation Techniques • Modulation techniques are methods used to encode digital information in an analogue world. • There are three basic modulation techniques – AM (amplitude modulation) – FM (frequency modulation) – PM (phase modulation) • All 3 modulation techniques employ a carrier signal. A carrier signal is a single frequency that is used to carry the intelligence (data). – For digital, the intelligence is either a 1 or 0. – When we modulate the carrier , we are changing its characteristics to correspond to either a 1 or 0. Amplitude Modulation • Modifies the amplitude of the carrier to represent 1s or 0s – a 1 is represented by the presence of the carrier for a predefined period of 3 cycles of carrier. – Absence or no carrier indicates a 0 • Pros – Simple to design and implement • Cons – Noise spikes on transmission medium interfere with the carrier signal. – Loss of connection is read as 0s. Frequency Modulation • Modifies the frequency of the carrier to represent the 1s or 0s. – a 0 is represented by the original carrier frequency – a 1 by a much higher frequency ( the cycles are spaced closer together) • Pros – Immunity to noise on transmission medium. – Always a signal present. Loss of signal easily detected • Cons – Requires 2 frequencies – Detection circuit needs to recognize both frequencies when signal is lost. Phase Modulation • Phase Modulation modifies the phase of the carrier to represent a 1 or 0. – The carrier phase is switched at every occurrence of a 1 bit but remains unaffected for a 0 bit. – The phase of the signal is measured relative to the phase of the preceding bit. The bits are timed to coincide with a specific number of carrier cycles (3 in this example = 1 bit) • Pros – Only 1 frequency used – Easy to detect loss of carrier • Cons – Complex circuitry required to generate and detect phase changes What is a network • A network as a "group of computers and associated devices that are connected by communications facilities." • A network provides two principle benefits: the ability to communicate and the ability to share. – A network supports communication among users in ways that other media cannot. – Sharing involves not only information (database records, e-mail, graphics, etc.), but also resources (applications, printers, modems, disk space, scanners, etc.) Through its ability to share, a network promotes collaboration • A network can consist of two computers connected together on a desk or it can consist of many Local Area Networks (LANs) connected together to form a Wide Area Network (WAN) across a continent. Network Classifications • Scope – Local area network (LAN) – Metropolitan area (MAN) – Wide area network (WAN) • Ownership – Closed versus open • Topology (configuration) – Bus (Ethernet) – Star (Wireless networks with central Access Point) – Ring Network Topologies • A topology refers to the manner in which the cable is run to individual workstations on the network. – the configurations formed by the connections between devices on a local area network (LAN) or between two or more LANs • There are three basic network topologies (not counting variations thereon): the bus, the star, and the ring. • It is important to make a distinction between a topology and an architecture. – A topology is concerned with the physical arrangement of the network components. – In contrast, an architecture addresses the components themselves and how a system is structured (cable access methods, lower level protocols, topology, etc.). An example of an architecture is 10baseT Ethernet which typically uses the star topology. Bus Topology • A bus topology connects each computer (node) to a single segment trunk. – A ‘trunk’ is a communication line, typically coax cable, that is referred to as the ‘bus.’ The signal travels from one end of the bus to the other. – A terminator is required at each end to absorb the signal so it does not reflect back across the bus. • In a bus topology, signals are broadcast to all stations. Each computer checks the address on the signal (data frame) as it passes along the bus. If the signal’s address matches that of the computer, the computer processes the signal. If the address doesn’t match, the computer takes no action and the signal travels on down the bus. • Only one computer can ‘talk’ on a network at a time. A media access method (protocol) called CSMA/CD is used to handle the collisions that occur when two signals are placed on the wire at the same time. • The bus topology is passive. In other words, the computers on the bus simply ‘listen’ for a signal; they are not responsible for moving the signal along. • A bus topology is normally implemented with coaxial cable. Bus Topology • Advantages of bus topology: – – – – Easy to implement and extend Well suited for temporary networks that must be set up in a hurry Typically the cheapest topology to implement Failure of one station does not affect others • Disadvantages of bus topology: – – – – – Difficult to administer/troubleshoot Limited cable length and number of stations A cable break can disable the entire network; no redundancy Maintenance costs may be higher in the long run Performance degrades as additional computers are added Star Topology • All of the stations in a star topology are connected to a central unit called a hub. – The hub offers a common connection for all stations on the network. Each station has its own direct cable connection to the hub. In most cases, this means more cable is required than for a bus topology. However, this makes adding or moving computers a relatively easy task; simply plug them into a cable outlet on the wall. • If a cable is cut, it only affects the computer that was attached to it. This eliminates the single point of failure problem associated with the bus topology. (Unless, of course, the hub itself goes down.) • Star topologies are normally implemented using twisted pair cable, specifically unshielded twisted pair (UTP). The star topology is probably the most common form of network topology currently in use. Star Topology • Advantages of star topology: – Easy to add new stations – Easy to monitor and troubleshoot – Can accommodate different wiring • Disadvantages of star topology: – Failure of hub cripples attached stations – More cable required (more expensive to wire a building for networking) Ring Topology • • • • A ring topology consists of a set of stations connected serially by cable. In other words, it’s a circle or ring of computers. There are no terminated ends to the cable; the signal travels around the circle in a clockwise (or anticlockwise) direction. Note that while this topology functions logically as ring, it is physically wired as a star. The central connector is not called a hub but a Multistation Access Unit or MAU. (Don’t confuse a Token Ring MAU with a ‘Media Adapter Unit’ which is actually a transceiver.) Under the ring concept, a signal is transferred sequentially via a "token" from one station to the next. When a station wants to transmit, it "grabs" the token, attaches data and an address to it, and then sends it around the ring. The token travels along the ring until it reaches the destination address. The receiving computer acknowledges receipt with a return message to the sender. The sender then releases the token for use by another computer. Each station on the ring has equal access but only one station can talk at a time. Ring Topology • In contrast to the ‘passive’ topology of the bus, the ring employs an ‘active’ topology. Each station repeats or ’boosts’ the signal before passing it on to the next station. • Rings are normally implemented using twisted pair or fiber-optic cable • Advantages of ring topology: – Growth of system has minimal impact on performance – All stations have equal access • Disadvantages of ring topology: – Most expensive topology – Failure of one computer may impact others – Complex Choosing a Topology • The following factors should be considered when choosing a topology: – – – – – – Installation Maintenance and troubleshooting Expected growth Distances Infrastructure Existing network • As a general rule, a bus topology is the cheapest to install, but may be more expensive to maintain because it does not provide for redundancy. • Various topologies can be mixed on the same network. • One very common example is a large Ethernet network with multiple hubs. Usually the hubs are located on different floors in a building or perhaps outside in another building. Each hub is wired in the typical star configuration. However, the hubs are connected together along a bus, typically referred to as a ‘backbone.’ • The backbone between hubs might consist of fiber optic cable while the workstations are wired to each individual hub with UTP (unshielded twisted pair) cable. Cabling • Coaxial Cable – Thinnet looks like regular TV cable. It is about 1/4 inch in diameter and is very flexible and easy to work with. – Thicknet is about 1/2 inch in diameter and not very flexible. Thicknet is older and not very common anymore except as a backbone within and between buildings. Coax transmits at 10 Mbps.. • Twisted Pair. Twisted pair looks like telephone wire and consists of insulated strands of copper wire twisted together. There are two versions of twisted pair cable: – Shielded Twisted Pair (STP). STP is commonly used in Token Ring networks – Unshielded Twisted Pair (UTP). UTP is used in Ethernet networks. Transmission rates vary between 10-100-1000-10000 Mbps. • Fiber-Optic Cable. Fiber-optic cable consists of a thin cylinder of glass surrounded by glass cladding, encased in protective outer sheath. Fiber-optic cable is very fast (over 1Gbps). It can transmit over long distances (2 km +) but is expensive. Cabling • Top: Unshielded Twisted Pair and Shielded Twisted Pair Cable • Bottom: Coaxial and Optical Fiber Cable Media Access Methods • A media access method refers to the manner in which a computer gains and controls access to the network’s physical medium (e.g., cable). • Common media access methods include the following: – CSMA/CD – CSMA/CA – Token Passing • One of the primary concerns with media access is how to prevent packets from colliding when two or more computers try to transmit simultaneously. Each of the methods listed above takes a different approach to this problem. • Data transmitted over a network is sent one bit at a time. A bit is either a 1 or a 0 represented by a voltage change (on or off) or a light pulse. If two stations are transmitting at the same time, it is possible that the signals may overlap, resulting in garbled data. Such overlapping is referred to as a "collision." CSMA/CD • CSMA/CD stands for Carrier-Sense Multiple Access with Collision Detection. It is a media access method which means it defines how the network places data on the cable and how it takes it off. • CSMA/CD specifies how bus topologies such as Ethernet handle transmission collisions. A collision occurs when two or more computers transmit signals at the same time. – "Carrier Sense" means that each station on the LAN continually listens to (tests) the cable for the presence of a signal prior to transmitting. – "Multiple Access" means that there are many computers attempting to transmit and compete for the opportunity to send data (i.e., they are in contention). – "Collision Detection" means that when a collision is detected, the stations will stop transmitting and wait a random length of time before retransmitting. • CSMA/CD works best in an environment where relatively fewer, longer data frames are transmitted. This is in contrast to token passing which works best with a relatively large amount of short data frames. • Because CSMA/CD works to control or manage collisions rather than prevent them, network performance can be degraded with heavy traffic. The greater the traffic, the greater the number of collisions and retransmissions. • CSMA/CD is used on Ethernet networks. CSMA/CD Operation • In its most simple form it operates as follows: – A station that wishes to transmit on the network checks to see if the cable is free. – If the cable is free, the station starts transmitting. – However, another station may have detected a free cable at the same instant and also start transmitting. The result is a "collision." – Once the collision is detected, all stations immediately stop transmitting. – Stations then wait a random length of time before checking the cable and then retransmit CSMA/CA • CSMA/CA stands for Carrier-Sense Multiple Access with Collision Avoidance and is a media access method very similar to CSMA/CD. • The difference is that the CD (collision detection) is changed to CA (collision avoidance). Instead of detecting and reacting to collisions, CSMA/CA tries to avoid them by having each computer signal its intention to transmit before actually transmitting. In effect, the transmitting computer gives a 'heads up' prior to transmitting. • Although CSMA/CA can prevent collisions, it comes with a cost in the form of the additional overhead incurred by having each workstation broadcast it's intention prior to transmitting. Thus, CSMA/CA is slower than CSMA/CD. • CSMA/CA is used on Apple networks and on WiFi (IEEE 802.11) networks. The hidden terminal problem Token Passing • Token passing is a media access method by which collisions are prevented. • Collisions are eliminated under token passing because only a computer that possesses a free token (a small data frame) is allowed to transmit. The token passing method also allows different priorities to be assigned to different stations on the ring. Transmissions from a stations with higher priority take precedence over stations with lower priority. • Token passing works best in an environment where a relatively large number of shorter data frames are being transmitted. (As opposed to CSMA/CD which works best in an environment where relatively fewer, longer data frames are being transmitted.) • Token passing is used on Token Ring networks Token Passing Operation • In its most simple form it operates as follows: – A station that wishes to transmit on the network waits until it will receive a free token. – The sending station transmits its data with the token. – The data travels to the recipient without stopping at other stations (it is just relayed). – The receiving station receives the data and returns the token to the sender as an acknowledgment. – The sender receives acknowledgment and releases the token to next station. – The token continues being passed along the ring until it is “seized" by the next station that wants to transmit. LAN Architectures • Network architecture refers to the manner in which the hardware and software is structured. The architecture includes the cable access method (transmission), topology, and lower level protocols. • The most common type of LAN architecture is Ethernet. Token Ring was also used in the past. • These architectures are sometimes referred to as "lower-level protocols" because they represent the specifications for the IEEE802 model which encompasses the physical (1st) and data link (2nd) layers of the OSI model (to be discussed latter) Ethernet • Ethernet is a popular, relatively inexpensive, easy-to-install LAN architecture with the following characteristics: – Uses the CSMA/CD media access control. – Data transmission normally occurs at 100 Mbps (10Mbps in the early forms and 10Gbps in the most recent forms). – Typically implemented in a star topology (early versions used bus topology as well). – Ethernet LANs are normally distinguished by the type of cable they use Twisted Pair (Thinnet or Thicknet were also used in the past). • The Ethernet architecture conforms to most but not all of the IEEE 802.3 specification (the physical layers are identical but the MAC layers are somewhat different). • An Ethernet LAN is often described in terms of three parameters: transmission rate, transmission type, and segment distance or cable type. – "100baseT" means: • 100 - transmission rate or through put of 100Mbps • base - transmission type is baseband rather than broadband network (i.e., the signal is placed directly on the cable, one signal at a time) • T – the cable type (e.g. Twisted pair) • Few types of Ethernet: 10Base2, 10Base5, 10BaseT and 10BaseF, 100BaseT, 100BaseF, etc.. Token Ring • Token ring is a relatively expensive LAN architecture that was strongly influenced by IBM. It is very stable and can be expanded without a significant degradation in network performance. • Token ring uses the token passing media access control. Data transmission normally occurs at 4 or 16 Mbps depending on the cable. • Token ring is normally implemented in a logical ring/physical star topology with a MAU (Multistation Access Unit) as the hub. The maximum number of stations on one ring is 260 for shielded twisted pair and 72 for unshielded twisted pair (UTP). There can be up to 33 MAUs per ring. • Token Ring LANs normally use shielded twisted pair (STP) but may also use unshielded twisted pair (UTP) or fiber-optic cable. The maximum distance to the MAU from the workstation depends on the cable and varies from 45 meters for UTP to 100 meters for STP. • The Token Ring architecture conforms generally to the IEEE’s 802.5 specification Ethernet vs. Token Ring • Ethernet is generally less expensive and easier to install than Token Ring. • Token Ring is generally more secure and more stable than Ethernet, but not used anymore in typical LAN configurations. • It is usually more difficult to add more computers on a Token Ring LAN than it is to an Ethernet LAN. However, as additional computers are added, performance degradation will be less pronounced on the Token Ring LAN than it will be on the Ethernet LAN. • Ethernet uses CSMA/CD media access control and Token Ring uses token passing. This makes Ethernet better suited in a situation where there are a large number of computers sending fewer, larger data frames. Token Ring is better suited for small to medium size LANs sending many, Connecting Networks • Repeater: Extends a network • Bridge: Connects two compatible networks, doesn’t necessarily pass all the messages across the connection • Switch: Connect several compatible networks, allowing it to connect several busses rather than two. 4-42 Building a large bus network from smaller ones Connecting Networks • When networks are connected via repeaters, bridges or switches, the result is a single large network. • The entire system operates in the same way as the original smaller networks • Sometimes the networks to be connected have incompatible characteristics (e.g. WiFi network to be connected with Ethernet network, etc..). • When building networks of networks, the system is known as internet (note the small “i”, term that is distinct from the Internet – which refers to a particular world wide internet). • Router: Connects two incompatible networks resulting in a network of networks - internet Routers connecting two WiFi networks and an Ethernet network to form an internet Routers and internet addressing • Routers purpose is to route (forward messages) in their proper directions. • The forwarding process is based on an internet wide addressing system which all the machines in the internet (including the machines in the original networks as well as the routers) are assigned unique addresses. – Thus each machine in an internet has two addresses: its original local address within its own network and the internet address • A machine wanting to send a message to a machine in a distant network, it will attach the internet address of the destination and will direct the message to its local router. From there it is forwarded to the proper direction (based on a forwarding table maintained by the router). Client and Server • The terms "client" and "server" are used to describe individual computers that are part of a network where computing resources and workload are shared. • A server is a computer that makes its resources available to the network and responds to the commands of a client. The server’s shared resources can be files (a file server); printers (a print server); processing power (an application server); etc… • A client is a computer that uses the resources made available by a server. The client must have sufficient processing power on its own to run applications that interact with the resources on the server. • It is possible, and quite common, for an individual computer to function as both a client and a server. – For example, if Bill queries a SQL Server database from his workstation for the data he needs to create an Excel spreadsheet, then his workstation is functioning as a client. However, if Sue then connects to Bill’s workstation from her computer and copies the spreadsheet, then Bill’s workstation is functioning as a server. ISO/OSI Model • The International Standards Organization (ISO) Open Systems Interconnect (OSI) is a standard set of rules describing the transfer of data between each layer in a network operating system. Each layer has a specific function (i.e. the physical layer deals with the electrical and cable specifications) • The OSI Model clearly defines the interfaces between each layer. This allows different network operating systems and protocols to work together by having each manufacturer adhere to the standard interfaces. The application of the ISO OSI model has allowed the modern networks that exist today. There are seven layers in the OSI model. OSI Model • The Physical Layer – Establishes the physical characteristics of the network (e.g., the type of cable, connectors, length of cable, etc.) – Defines the electrical characteristics of the signals used to transmit the data (e.g. signal voltage swing, duration of voltages, etc.) – Transmits the binary data (bits) as electrical or optical signals depending on the medium. • The Data Link Layer – Defines how the signal will be placed on or taken off the NIC. The data frames are broken down into individual bits that can be translated into electric signals and sent over the network. On the receiving side, the bits are reassembled into frames for processing by upper levels. – Error detection and correction is also performed at the data link layer. If an acknowledgement is expected and not received, the frame will be resent. Corrupt data is also identified at the data link layer. – Because the Data-Link Layer is very complex, it is sometimes divided into sublayers (as defined by the IEEE 802 model). The lower sublayer provides network access. The upper sublayer is concerned with sending and receiving packets and error checking. OSI Model • The Network Layer – Primarily concerned with addressing and routing. Logical addresses (e.g., an IP address) are translated into physical addresses (i.e., the MAC address) for transmission at the network layer. On the receiving side, the translation process is reversed. – It is at the network layer where the route from the source to destination computer is determined. Routes are determined based on packet addresses and network conditions. Traffic control measures are also implemented at the network layer. • The Transport Layer – On the sending side, messages are packaged for efficient transmission and assigned a tracking number so they can be reassembled in proper order. On the receiving side, the packets are reassembled, checked for errors and acknowledged. – Performs error handling in that it ensures all data is received in the proper sequence and without errors. If there are errors, the data is retransmitted. OSI Model • The Session Layer – Is responsible for establishing, maintaining, and terminating a connection called a 'session'. – A session is an exchange of messages between computers (a dialog). Managing the session involves synchronization of user tasks and dialog control (e.g., who transmits and for how long). Synchronization involves the use of checkpoints in the data stream. In the event of a failure, only the data from the last checkpoint has to be resent. – Logon, name recognition and security functions take place at the Session Layer. • The Presentation Layer – It is responsible for data translation (formatting), compression, and encryption. – The Presentation Layer is primarily concerned with translation; interpreting and converting the data from various formats. For example, EBCIDIC characters might be converted into ASCII. It is also where data is compressed for transmission and uncompressed on receipt. Encryption techniques are implemented at the Presentation Layer. – The redirector operates at the presentation layer by redirecting I/O operations across the network. • The Application Layer – Provides the operating system with direct access to network services. – It serves as the interface between the user and the network by providing services that directly support user applications. OSI Model OSI Model • Each layer may add a Header and a Trailer to its Data (which consists of the next higher layer's Header, Trailer and Data as it moves through the layers). The Headers contain information that specifically addresses layer-to-layer communication. For example, the Transport Header (TH) contains information that only the Transport layer sees. All other layers below the Transport layer pass the Transport Header as part of their Data. OSI vs. TCP/IP References • Andrew S. Tanenbaum – Computer Networks, ISBN: 0-13066102-3 • J Glenn Brookshear “Computer Science – An Overview”, ISBN: 0-321-54428-5 • Eugene Blanchard “Introduction to Networking and Data Communications”