SlideShare a Scribd company logo
1 of 45
2.1
Chapter 2
Network Models
Copyright © The McGraw-Hill Companies, Inc. Permission required for reproduction or display.
2.2
2-1 LAYERED TASKS2-1 LAYERED TASKS
We use the concept ofWe use the concept of layerslayers in our daily life. As anin our daily life. As an
example, let us consider two friends who communicateexample, let us consider two friends who communicate
through postal mail. The process of sending a letter to athrough postal mail. The process of sending a letter to a
friend would be complex if there were no servicesfriend would be complex if there were no services
available from the post office.available from the post office.
Sender, Receiver, and Carrier
Hierarchy
Services
Topics discussed in this section:Topics discussed in this section:
2.3
Figure 2.1 Tasks involved in sending a letter
2.4
2-2 THE OSI MODEL2-2 THE OSI MODEL
Established in 1947, the International StandardsEstablished in 1947, the International Standards
Organization (Organization (ISOISO) is a multinational body dedicated to) is a multinational body dedicated to
worldwide agreement on international standards. An ISOworldwide agreement on international standards. An ISO
standard that covers all aspects of networkstandard that covers all aspects of network
communications is the Open Systems Interconnectioncommunications is the Open Systems Interconnection
((OSIOSI) model. It was first introduced in the late 1970s.) model. It was first introduced in the late 1970s.
Layered Architecture
Peer-to-Peer Processes, interfaces
Headers & Trailer
Encapsulation
Topics discussed in this section:Topics discussed in this section:
2.5
ISO is the organization.
OSI is the model.
Note
Organization of the layersOrganization of the layers
3 Subgroups
•Physical, Data Link, Network (network support layers)
•Transport
•Session, Presentation, Application (user support layers)
2.6
Figure 2.2 Seven layers of the OSI model
2.7
Figure 2.3 The interaction between layers in the OSI model
2.8
Figure 2.4 An exchange using the OSI model
2.9
2-3 LAYERS IN THE OSI MODEL2-3 LAYERS IN THE OSI MODEL
In this section we briefly describe the functions of eachIn this section we briefly describe the functions of each
layer in the OSI model.layer in the OSI model.
Physical Layer
Data Link Layer
Network Layer
Transport Layer
Session Layer
Presentation Layer
Application Layer
Topics discussed in this section:Topics discussed in this section:
2.10
Figure 2.5 Physical layer
2.11
The physical layer is responsible for movements of
individual bits from one hop (node) to the next.
• Physical Characteristics of interfaces and medium
• Representation of bits (type of encoding)
• Synchronization of bits
• Line configuration (P2P/Multipoint)
• Physical Topology
• Transmission mode
Physical layer concerns with:Physical layer concerns with:
2.12
Figure 2.6 Data link layer
2.13
The data link layer is responsible for moving
frames from one hop (node) to the next.
• Framing (manageable data units)
• Physical Addressing (MAC address)
• Flow control
• Error control (detect, retransmit, duplication)
• Access Control
Responsibilities of Data Link LayerResponsibilities of Data Link Layer
2.14
Figure 2.7 Hop-to-hop delivery
2.15
Figure 2.8 Network layer
2.16
The network layer is responsible for the
delivery of individual packets from
the source host to the destination host.
2.17
Figure 2.9 Source-to-destination delivery
2.18
Figure 2.10 Transport layer
2.19
The transport layer is responsible for the delivery
of a message from one process to another.
• Port address (service point addressing)
• Segmentation and reassembly (Sequence No.)
• Connectionless & Connection oriented services
• Error Control (retransmission)
• Flow Control
Responsibilities of Transport LayerResponsibilities of Transport Layer
2.20
Figure 2.11 Reliable process-to-process delivery of a message
2.21
Figure 2.12 Session layer
2.22
The session layer is responsible for dialog
control and synchronization.
• Dialog control (full duplex or half duplex)
• Synchronization (check points)
Responsibilities of Session LayerResponsibilities of Session Layer
2.23
Figure 2.13 Presentation layer
2.24
The presentation layer is responsible for translation,
compression, and encryption.
Note
2.25
Figure 2.14 Application layer
2.26
The application layer is responsible for
providing services to the user.
• Network virtual terminal
• File transfer, access, and management
• Mail Services
• Directory services.
Services at Application LayerServices at Application Layer
2.27
Figure 2.15 Summary of layers
2.28
2-4 TCP/IP PROTOCOL SUITE2-4 TCP/IP PROTOCOL SUITE
The layers in theThe layers in the TCP/IP protocol suiteTCP/IP protocol suite do not exactlydo not exactly
match those in the OSI model. The original TCP/IPmatch those in the OSI model. The original TCP/IP
protocol suite was defined as having four layers:protocol suite was defined as having four layers: host-to-host-to-
networknetwork,, internetinternet,, transporttransport, and, and applicationapplication. However,. However,
when TCP/IP is compared to OSI, we can say that thewhen TCP/IP is compared to OSI, we can say that the
TCP/IP protocol suite is made of five layers:TCP/IP protocol suite is made of five layers: physicalphysical,,
data linkdata link,, networknetwork,, transporttransport, and, and applicationapplication..
Physical and Data Link Layers
Network Layer
Transport Layer
Application Layer
Topics discussed in this section:Topics discussed in this section:
2.29
Figure 2.16 TCP/IP and OSI model
2.30
• Unreliable & Connectionless—best effort delivery (no
error checking)
• Datagrams
• Different routes, no sequencing
Internetworking Protocol (IP)Internetworking Protocol (IP)
Network Layer Protocols
2.31
Network Layer Protocols
• Association of logical address with physical
Address Resolution Protocol (ARP)Address Resolution Protocol (ARP)
• Used to discover IP address
• First time connection / diskless booting
Reverse Address Resolution Protocol (RARP)Reverse Address Resolution Protocol (RARP)
• Notification of datagram problems by gateways or hosts
• Query and error message
ICMPICMP
IGMPIGMP
2.32
Transport Layer Protocols
• Connectionless
• Adds port addresses, checksum and length information
UDPUDP
• Connection Oriented
• Segments
• Acknowledgment
TCPTCP
SCTPSCTP
2.33
2-5 ADDRESSING2-5 ADDRESSING
Four levels of addresses are used in an internet employingFour levels of addresses are used in an internet employing
the TCP/IP protocols:the TCP/IP protocols: physicalphysical,, logicallogical,, portport, and, and specificspecific..
Physical Addresses
Logical Addresses
Port Addresses
Specific Addresses
Topics discussed in this section:Topics discussed in this section:
2.34
Figure 2.17 Addresses in TCP/IP
2.35
Figure 2.18 Relationship of layers and addresses in TCP/IP
2.36
In Figure 2.19 a node with physical address 10 sends a
frame to a node with physical address 87. The two nodes
are connected by a link (bus topology LAN). As the
figure shows, the computer with physical address 10 is
the sender, and the computer with physical address 87 is
the receiver.
Example 2.1
2.37
Figure 2.19 Physical addresses
2.38
As we will see in Chapter 13, most local-area networks
use a 48-bit (6-byte) physical address written as 12
hexadecimal digits; every byte (2 hexadecimal digits) is
separated by a colon, as shown below:
Example 2.2
07:01:02:01:2C:4B
A 6-byte (12 hexadecimal digits) physical address.
2.39
Figure 2.20 shows a part of an internet with two routers
connecting three LANs. Each device (computer or
router) has a pair of addresses (logical and physical) for
each connection. In this case, each computer is
connected to only one link and therefore has only one
pair of addresses. Each router, however, is connected to
three networks (only two are shown in the figure). So
each router has three pairs of addresses, one for each
connection.
Example 2.3
2.40
Figure 2.20 IP addresses
2.41
Figure 2.21 shows two computers communicating via
the Internet. The sending computer is running three
processes at this time with port addresses a, b, and c. The
receiving computer is running two processes at this time
with port addresses j and k. Process a in the sending
computer needs to communicate with process j in the
receiving computer. Note that although physical
addresses change from hop to hop, logical and port
addresses remain the same from the source to
destination.
Example 2.4
2.42
Figure 2.21 Port addresses
2.43
The physical addresses will change from hop to hop,
but the logical addresses usually remain the same.
Note
2.44
Example 2.5
As we will see in Chapter 23, a port address is a 16-bit
address represented by one decimal number as shown.
753
A 16-bit port address represented
as one single number.
2.45
The physical addresses change from hop to hop,
but the logical and port addresses usually remain the same.
Note

More Related Content

What's hot (20)

Chapter 13
Chapter 13Chapter 13
Chapter 13
 
Network Layer
Network LayerNetwork Layer
Network Layer
 
Circuit and packet_switching
Circuit and packet_switchingCircuit and packet_switching
Circuit and packet_switching
 
Internetworking.49
Internetworking.49Internetworking.49
Internetworking.49
 
Topic: Virtual circuit & message switching
Topic: Virtual circuit & message switchingTopic: Virtual circuit & message switching
Topic: Virtual circuit & message switching
 
Chapter 23
Chapter 23Chapter 23
Chapter 23
 
Chapter 7
Chapter 7Chapter 7
Chapter 7
 
Chapter 6
Chapter 6Chapter 6
Chapter 6
 
Chapter 9
Chapter 9Chapter 9
Chapter 9
 
Chapter 11
Chapter 11Chapter 11
Chapter 11
 
transport layer
transport layertransport layer
transport layer
 
Connecting devices
Connecting devicesConnecting devices
Connecting devices
 
Chapter 3: Data & Signals
Chapter 3: Data & SignalsChapter 3: Data & Signals
Chapter 3: Data & Signals
 
Introduction to Data-Link Layer
Introduction to Data-Link LayerIntroduction to Data-Link Layer
Introduction to Data-Link Layer
 
C04 wireless telecommunication-systems[1]
C04 wireless telecommunication-systems[1]C04 wireless telecommunication-systems[1]
C04 wireless telecommunication-systems[1]
 
FDDI
FDDIFDDI
FDDI
 
5. protocol layering
5. protocol layering5. protocol layering
5. protocol layering
 
Chapter 7: Transmission Media
Chapter 7: Transmission MediaChapter 7: Transmission Media
Chapter 7: Transmission Media
 
Media Access Control
Media Access ControlMedia Access Control
Media Access Control
 
Bandwidth utilization
Bandwidth utilizationBandwidth utilization
Bandwidth utilization
 

Viewers also liked

Chapter 1: Overview of Network Security
Chapter 1: Overview of Network SecurityChapter 1: Overview of Network Security
Chapter 1: Overview of Network SecurityShafaan Khaliq Bhatti
 
Chapter 1: Introduction to Operating System
Chapter 1: Introduction to Operating SystemChapter 1: Introduction to Operating System
Chapter 1: Introduction to Operating SystemShafaan Khaliq Bhatti
 
15 lecture - acl part1, introduction to access control list
15   lecture  - acl part1, introduction to access control list15   lecture  - acl part1, introduction to access control list
15 lecture - acl part1, introduction to access control listShafaan Khaliq Bhatti
 
13 lecture - introduction and configuration of eigrp
13   lecture  - introduction and configuration of eigrp13   lecture  - introduction and configuration of eigrp
13 lecture - introduction and configuration of eigrpShafaan Khaliq Bhatti
 

Viewers also liked (6)

Chapter 20: Internet Protocol
Chapter 20: Internet ProtocolChapter 20: Internet Protocol
Chapter 20: Internet Protocol
 
Chapter 1: Overview of Network Security
Chapter 1: Overview of Network SecurityChapter 1: Overview of Network Security
Chapter 1: Overview of Network Security
 
Chapter 1: Introduction to Operating System
Chapter 1: Introduction to Operating SystemChapter 1: Introduction to Operating System
Chapter 1: Introduction to Operating System
 
Chapter 19: Logical Addressing
Chapter 19: Logical AddressingChapter 19: Logical Addressing
Chapter 19: Logical Addressing
 
15 lecture - acl part1, introduction to access control list
15   lecture  - acl part1, introduction to access control list15   lecture  - acl part1, introduction to access control list
15 lecture - acl part1, introduction to access control list
 
13 lecture - introduction and configuration of eigrp
13   lecture  - introduction and configuration of eigrp13   lecture  - introduction and configuration of eigrp
13 lecture - introduction and configuration of eigrp
 

Similar to Chapter 2: Network Models (20)

Chapter 2 network models -computer_network
Chapter 2   network models -computer_networkChapter 2   network models -computer_network
Chapter 2 network models -computer_network
 
Lec2_CH02.PPT
Lec2_CH02.PPTLec2_CH02.PPT
Lec2_CH02.PPT
 
1
11
1
 
Ch02
Ch02Ch02
Ch02
 
Network Models in Networking.
Network Models in Networking.Network Models in Networking.
Network Models in Networking.
 
1
11
1
 
02 Network Models
02 Network Models02 Network Models
02 Network Models
 
Lecture 1 osi model
Lecture 1 osi modelLecture 1 osi model
Lecture 1 osi model
 
Ch2 v1
Ch2 v1Ch2 v1
Ch2 v1
 
Data Communication And Networking - Network Models
Data Communication And Networking - Network ModelsData Communication And Networking - Network Models
Data Communication And Networking - Network Models
 
Osi model34
Osi model34Osi model34
Osi model34
 
Computer Network - Chapter 2
Computer Network - Chapter 2Computer Network - Chapter 2
Computer Network - Chapter 2
 
Ch2
Ch2Ch2
Ch2
 
Data Communications and Networking ch02
Data Communications and Networking  ch02Data Communications and Networking  ch02
Data Communications and Networking ch02
 
Ch02
Ch02Ch02
Ch02
 
Lecture-2 Data Communication ~www.fida.com.bd
Lecture-2 Data Communication ~www.fida.com.bdLecture-2 Data Communication ~www.fida.com.bd
Lecture-2 Data Communication ~www.fida.com.bd
 
Network_Model. In the field of Computer Networking.ppt
Network_Model. In the field of Computer Networking.pptNetwork_Model. In the field of Computer Networking.ppt
Network_Model. In the field of Computer Networking.ppt
 
Ch02
Ch02Ch02
Ch02
 
ch2_v1.ppt
ch2_v1.pptch2_v1.ppt
ch2_v1.ppt
 
dcn 2.ppt
dcn 2.pptdcn 2.ppt
dcn 2.ppt
 

More from Shafaan Khaliq Bhatti

10 lecture - ospf part1 , introduction to ospf , areas and abr
10   lecture  - ospf part1 , introduction to ospf , areas and abr10   lecture  - ospf part1 , introduction to ospf , areas and abr
10 lecture - ospf part1 , introduction to ospf , areas and abrShafaan Khaliq Bhatti
 
Chapter 3: Block Ciphers and the Data Encryption Standard
Chapter 3: Block Ciphers and the Data Encryption StandardChapter 3: Block Ciphers and the Data Encryption Standard
Chapter 3: Block Ciphers and the Data Encryption StandardShafaan Khaliq Bhatti
 
Chapter 2: Operating System Structures
Chapter 2: Operating System StructuresChapter 2: Operating System Structures
Chapter 2: Operating System StructuresShafaan Khaliq Bhatti
 

More from Shafaan Khaliq Bhatti (20)

1- Introduction to Red Hat
1- Introduction to Red Hat1- Introduction to Red Hat
1- Introduction to Red Hat
 
Linux Servers
Linux ServersLinux Servers
Linux Servers
 
5 - Networking in Red Hat
5 - Networking in Red Hat5 - Networking in Red Hat
5 - Networking in Red Hat
 
2- System Initialization in Red Hat
2- System Initialization in Red Hat2- System Initialization in Red Hat
2- System Initialization in Red Hat
 
3 - Disk Partitioning in Red Hat
3 - Disk Partitioning in Red Hat3 - Disk Partitioning in Red Hat
3 - Disk Partitioning in Red Hat
 
6 - Package Management in Red Hat
6 - Package Management in Red Hat6 - Package Management in Red Hat
6 - Package Management in Red Hat
 
11 - SELinux in Red Hat
11 - SELinux in Red Hat11 - SELinux in Red Hat
11 - SELinux in Red Hat
 
7 - User Administration in Red Hat
7 - User Administration in Red Hat7 - User Administration in Red Hat
7 - User Administration in Red Hat
 
12 - System Security in Red Hat
12 - System Security in Red Hat12 - System Security in Red Hat
12 - System Security in Red Hat
 
10 lecture - ospf part1 , introduction to ospf , areas and abr
10   lecture  - ospf part1 , introduction to ospf , areas and abr10   lecture  - ospf part1 , introduction to ospf , areas and abr
10 lecture - ospf part1 , introduction to ospf , areas and abr
 
Message Authentication: MAC, Hashes
Message Authentication: MAC, HashesMessage Authentication: MAC, Hashes
Message Authentication: MAC, Hashes
 
Protocols for Public Key Management
Protocols for Public Key ManagementProtocols for Public Key Management
Protocols for Public Key Management
 
Authentication: keys, MAC
Authentication: keys, MACAuthentication: keys, MAC
Authentication: keys, MAC
 
Public key cryptography and RSA
Public key cryptography and RSAPublic key cryptography and RSA
Public key cryptography and RSA
 
Block Ciphers Modes of Operation
Block Ciphers Modes of OperationBlock Ciphers Modes of Operation
Block Ciphers Modes of Operation
 
Chapter 3: Block Ciphers and the Data Encryption Standard
Chapter 3: Block Ciphers and the Data Encryption StandardChapter 3: Block Ciphers and the Data Encryption Standard
Chapter 3: Block Ciphers and the Data Encryption Standard
 
Chapter 3: Processes
Chapter 3: ProcessesChapter 3: Processes
Chapter 3: Processes
 
Chapter 2: Operating System Structures
Chapter 2: Operating System StructuresChapter 2: Operating System Structures
Chapter 2: Operating System Structures
 
Classical Encryption
Classical EncryptionClassical Encryption
Classical Encryption
 
Chapter 01 (Discovering Computers)
Chapter 01 (Discovering Computers)Chapter 01 (Discovering Computers)
Chapter 01 (Discovering Computers)
 

Recently uploaded

Basic Civil Engineering first year Notes- Chapter 4 Building.pptx
Basic Civil Engineering first year Notes- Chapter 4 Building.pptxBasic Civil Engineering first year Notes- Chapter 4 Building.pptx
Basic Civil Engineering first year Notes- Chapter 4 Building.pptxDenish Jangid
 
General Principles of Intellectual Property: Concepts of Intellectual Proper...
General Principles of Intellectual Property: Concepts of Intellectual  Proper...General Principles of Intellectual Property: Concepts of Intellectual  Proper...
General Principles of Intellectual Property: Concepts of Intellectual Proper...Poonam Aher Patil
 
How to Create and Manage Wizard in Odoo 17
How to Create and Manage Wizard in Odoo 17How to Create and Manage Wizard in Odoo 17
How to Create and Manage Wizard in Odoo 17Celine George
 
How to Give a Domain for a Field in Odoo 17
How to Give a Domain for a Field in Odoo 17How to Give a Domain for a Field in Odoo 17
How to Give a Domain for a Field in Odoo 17Celine George
 
Understanding Accommodations and Modifications
Understanding  Accommodations and ModificationsUnderstanding  Accommodations and Modifications
Understanding Accommodations and ModificationsMJDuyan
 
TỔNG ÔN TẬP THI VÀO LỚP 10 MÔN TIẾNG ANH NĂM HỌC 2023 - 2024 CÓ ĐÁP ÁN (NGỮ Â...
TỔNG ÔN TẬP THI VÀO LỚP 10 MÔN TIẾNG ANH NĂM HỌC 2023 - 2024 CÓ ĐÁP ÁN (NGỮ Â...TỔNG ÔN TẬP THI VÀO LỚP 10 MÔN TIẾNG ANH NĂM HỌC 2023 - 2024 CÓ ĐÁP ÁN (NGỮ Â...
TỔNG ÔN TẬP THI VÀO LỚP 10 MÔN TIẾNG ANH NĂM HỌC 2023 - 2024 CÓ ĐÁP ÁN (NGỮ Â...Nguyen Thanh Tu Collection
 
Food safety_Challenges food safety laboratories_.pdf
Food safety_Challenges food safety laboratories_.pdfFood safety_Challenges food safety laboratories_.pdf
Food safety_Challenges food safety laboratories_.pdfSherif Taha
 
Accessible Digital Futures project (20/03/2024)
Accessible Digital Futures project (20/03/2024)Accessible Digital Futures project (20/03/2024)
Accessible Digital Futures project (20/03/2024)Jisc
 
2024-NATIONAL-LEARNING-CAMP-AND-OTHER.pptx
2024-NATIONAL-LEARNING-CAMP-AND-OTHER.pptx2024-NATIONAL-LEARNING-CAMP-AND-OTHER.pptx
2024-NATIONAL-LEARNING-CAMP-AND-OTHER.pptxMaritesTamaniVerdade
 
Kodo Millet PPT made by Ghanshyam bairwa college of Agriculture kumher bhara...
Kodo Millet  PPT made by Ghanshyam bairwa college of Agriculture kumher bhara...Kodo Millet  PPT made by Ghanshyam bairwa college of Agriculture kumher bhara...
Kodo Millet PPT made by Ghanshyam bairwa college of Agriculture kumher bhara...pradhanghanshyam7136
 
PROCESS RECORDING FORMAT.docx
PROCESS      RECORDING        FORMAT.docxPROCESS      RECORDING        FORMAT.docx
PROCESS RECORDING FORMAT.docxPoojaSen20
 
Activity 01 - Artificial Culture (1).pdf
Activity 01 - Artificial Culture (1).pdfActivity 01 - Artificial Culture (1).pdf
Activity 01 - Artificial Culture (1).pdfciinovamais
 
UGC NET Paper 1 Mathematical Reasoning & Aptitude.pdf
UGC NET Paper 1 Mathematical Reasoning & Aptitude.pdfUGC NET Paper 1 Mathematical Reasoning & Aptitude.pdf
UGC NET Paper 1 Mathematical Reasoning & Aptitude.pdfNirmal Dwivedi
 
ComPTIA Overview | Comptia Security+ Book SY0-701
ComPTIA Overview | Comptia Security+ Book SY0-701ComPTIA Overview | Comptia Security+ Book SY0-701
ComPTIA Overview | Comptia Security+ Book SY0-701bronxfugly43
 
ICT Role in 21st Century Education & its Challenges.pptx
ICT Role in 21st Century Education & its Challenges.pptxICT Role in 21st Century Education & its Challenges.pptx
ICT Role in 21st Century Education & its Challenges.pptxAreebaZafar22
 
Holdier Curriculum Vitae (April 2024).pdf
Holdier Curriculum Vitae (April 2024).pdfHoldier Curriculum Vitae (April 2024).pdf
Holdier Curriculum Vitae (April 2024).pdfagholdier
 
Seal of Good Local Governance (SGLG) 2024Final.pptx
Seal of Good Local Governance (SGLG) 2024Final.pptxSeal of Good Local Governance (SGLG) 2024Final.pptx
Seal of Good Local Governance (SGLG) 2024Final.pptxnegromaestrong
 
Unit-IV; Professional Sales Representative (PSR).pptx
Unit-IV; Professional Sales Representative (PSR).pptxUnit-IV; Professional Sales Representative (PSR).pptx
Unit-IV; Professional Sales Representative (PSR).pptxVishalSingh1417
 
1029-Danh muc Sach Giao Khoa khoi 6.pdf
1029-Danh muc Sach Giao Khoa khoi  6.pdf1029-Danh muc Sach Giao Khoa khoi  6.pdf
1029-Danh muc Sach Giao Khoa khoi 6.pdfQucHHunhnh
 
Grant Readiness 101 TechSoup and Remy Consulting
Grant Readiness 101 TechSoup and Remy ConsultingGrant Readiness 101 TechSoup and Remy Consulting
Grant Readiness 101 TechSoup and Remy ConsultingTechSoup
 

Recently uploaded (20)

Basic Civil Engineering first year Notes- Chapter 4 Building.pptx
Basic Civil Engineering first year Notes- Chapter 4 Building.pptxBasic Civil Engineering first year Notes- Chapter 4 Building.pptx
Basic Civil Engineering first year Notes- Chapter 4 Building.pptx
 
General Principles of Intellectual Property: Concepts of Intellectual Proper...
General Principles of Intellectual Property: Concepts of Intellectual  Proper...General Principles of Intellectual Property: Concepts of Intellectual  Proper...
General Principles of Intellectual Property: Concepts of Intellectual Proper...
 
How to Create and Manage Wizard in Odoo 17
How to Create and Manage Wizard in Odoo 17How to Create and Manage Wizard in Odoo 17
How to Create and Manage Wizard in Odoo 17
 
How to Give a Domain for a Field in Odoo 17
How to Give a Domain for a Field in Odoo 17How to Give a Domain for a Field in Odoo 17
How to Give a Domain for a Field in Odoo 17
 
Understanding Accommodations and Modifications
Understanding  Accommodations and ModificationsUnderstanding  Accommodations and Modifications
Understanding Accommodations and Modifications
 
TỔNG ÔN TẬP THI VÀO LỚP 10 MÔN TIẾNG ANH NĂM HỌC 2023 - 2024 CÓ ĐÁP ÁN (NGỮ Â...
TỔNG ÔN TẬP THI VÀO LỚP 10 MÔN TIẾNG ANH NĂM HỌC 2023 - 2024 CÓ ĐÁP ÁN (NGỮ Â...TỔNG ÔN TẬP THI VÀO LỚP 10 MÔN TIẾNG ANH NĂM HỌC 2023 - 2024 CÓ ĐÁP ÁN (NGỮ Â...
TỔNG ÔN TẬP THI VÀO LỚP 10 MÔN TIẾNG ANH NĂM HỌC 2023 - 2024 CÓ ĐÁP ÁN (NGỮ Â...
 
Food safety_Challenges food safety laboratories_.pdf
Food safety_Challenges food safety laboratories_.pdfFood safety_Challenges food safety laboratories_.pdf
Food safety_Challenges food safety laboratories_.pdf
 
Accessible Digital Futures project (20/03/2024)
Accessible Digital Futures project (20/03/2024)Accessible Digital Futures project (20/03/2024)
Accessible Digital Futures project (20/03/2024)
 
2024-NATIONAL-LEARNING-CAMP-AND-OTHER.pptx
2024-NATIONAL-LEARNING-CAMP-AND-OTHER.pptx2024-NATIONAL-LEARNING-CAMP-AND-OTHER.pptx
2024-NATIONAL-LEARNING-CAMP-AND-OTHER.pptx
 
Kodo Millet PPT made by Ghanshyam bairwa college of Agriculture kumher bhara...
Kodo Millet  PPT made by Ghanshyam bairwa college of Agriculture kumher bhara...Kodo Millet  PPT made by Ghanshyam bairwa college of Agriculture kumher bhara...
Kodo Millet PPT made by Ghanshyam bairwa college of Agriculture kumher bhara...
 
PROCESS RECORDING FORMAT.docx
PROCESS      RECORDING        FORMAT.docxPROCESS      RECORDING        FORMAT.docx
PROCESS RECORDING FORMAT.docx
 
Activity 01 - Artificial Culture (1).pdf
Activity 01 - Artificial Culture (1).pdfActivity 01 - Artificial Culture (1).pdf
Activity 01 - Artificial Culture (1).pdf
 
UGC NET Paper 1 Mathematical Reasoning & Aptitude.pdf
UGC NET Paper 1 Mathematical Reasoning & Aptitude.pdfUGC NET Paper 1 Mathematical Reasoning & Aptitude.pdf
UGC NET Paper 1 Mathematical Reasoning & Aptitude.pdf
 
ComPTIA Overview | Comptia Security+ Book SY0-701
ComPTIA Overview | Comptia Security+ Book SY0-701ComPTIA Overview | Comptia Security+ Book SY0-701
ComPTIA Overview | Comptia Security+ Book SY0-701
 
ICT Role in 21st Century Education & its Challenges.pptx
ICT Role in 21st Century Education & its Challenges.pptxICT Role in 21st Century Education & its Challenges.pptx
ICT Role in 21st Century Education & its Challenges.pptx
 
Holdier Curriculum Vitae (April 2024).pdf
Holdier Curriculum Vitae (April 2024).pdfHoldier Curriculum Vitae (April 2024).pdf
Holdier Curriculum Vitae (April 2024).pdf
 
Seal of Good Local Governance (SGLG) 2024Final.pptx
Seal of Good Local Governance (SGLG) 2024Final.pptxSeal of Good Local Governance (SGLG) 2024Final.pptx
Seal of Good Local Governance (SGLG) 2024Final.pptx
 
Unit-IV; Professional Sales Representative (PSR).pptx
Unit-IV; Professional Sales Representative (PSR).pptxUnit-IV; Professional Sales Representative (PSR).pptx
Unit-IV; Professional Sales Representative (PSR).pptx
 
1029-Danh muc Sach Giao Khoa khoi 6.pdf
1029-Danh muc Sach Giao Khoa khoi  6.pdf1029-Danh muc Sach Giao Khoa khoi  6.pdf
1029-Danh muc Sach Giao Khoa khoi 6.pdf
 
Grant Readiness 101 TechSoup and Remy Consulting
Grant Readiness 101 TechSoup and Remy ConsultingGrant Readiness 101 TechSoup and Remy Consulting
Grant Readiness 101 TechSoup and Remy Consulting
 

Chapter 2: Network Models

  • 1. 2.1 Chapter 2 Network Models Copyright © The McGraw-Hill Companies, Inc. Permission required for reproduction or display.
  • 2. 2.2 2-1 LAYERED TASKS2-1 LAYERED TASKS We use the concept ofWe use the concept of layerslayers in our daily life. As anin our daily life. As an example, let us consider two friends who communicateexample, let us consider two friends who communicate through postal mail. The process of sending a letter to athrough postal mail. The process of sending a letter to a friend would be complex if there were no servicesfriend would be complex if there were no services available from the post office.available from the post office. Sender, Receiver, and Carrier Hierarchy Services Topics discussed in this section:Topics discussed in this section:
  • 3. 2.3 Figure 2.1 Tasks involved in sending a letter
  • 4. 2.4 2-2 THE OSI MODEL2-2 THE OSI MODEL Established in 1947, the International StandardsEstablished in 1947, the International Standards Organization (Organization (ISOISO) is a multinational body dedicated to) is a multinational body dedicated to worldwide agreement on international standards. An ISOworldwide agreement on international standards. An ISO standard that covers all aspects of networkstandard that covers all aspects of network communications is the Open Systems Interconnectioncommunications is the Open Systems Interconnection ((OSIOSI) model. It was first introduced in the late 1970s.) model. It was first introduced in the late 1970s. Layered Architecture Peer-to-Peer Processes, interfaces Headers & Trailer Encapsulation Topics discussed in this section:Topics discussed in this section:
  • 5. 2.5 ISO is the organization. OSI is the model. Note Organization of the layersOrganization of the layers 3 Subgroups •Physical, Data Link, Network (network support layers) •Transport •Session, Presentation, Application (user support layers)
  • 6. 2.6 Figure 2.2 Seven layers of the OSI model
  • 7. 2.7 Figure 2.3 The interaction between layers in the OSI model
  • 8. 2.8 Figure 2.4 An exchange using the OSI model
  • 9. 2.9 2-3 LAYERS IN THE OSI MODEL2-3 LAYERS IN THE OSI MODEL In this section we briefly describe the functions of eachIn this section we briefly describe the functions of each layer in the OSI model.layer in the OSI model. Physical Layer Data Link Layer Network Layer Transport Layer Session Layer Presentation Layer Application Layer Topics discussed in this section:Topics discussed in this section:
  • 11. 2.11 The physical layer is responsible for movements of individual bits from one hop (node) to the next. • Physical Characteristics of interfaces and medium • Representation of bits (type of encoding) • Synchronization of bits • Line configuration (P2P/Multipoint) • Physical Topology • Transmission mode Physical layer concerns with:Physical layer concerns with:
  • 12. 2.12 Figure 2.6 Data link layer
  • 13. 2.13 The data link layer is responsible for moving frames from one hop (node) to the next. • Framing (manageable data units) • Physical Addressing (MAC address) • Flow control • Error control (detect, retransmit, duplication) • Access Control Responsibilities of Data Link LayerResponsibilities of Data Link Layer
  • 16. 2.16 The network layer is responsible for the delivery of individual packets from the source host to the destination host.
  • 19. 2.19 The transport layer is responsible for the delivery of a message from one process to another. • Port address (service point addressing) • Segmentation and reassembly (Sequence No.) • Connectionless & Connection oriented services • Error Control (retransmission) • Flow Control Responsibilities of Transport LayerResponsibilities of Transport Layer
  • 20. 2.20 Figure 2.11 Reliable process-to-process delivery of a message
  • 22. 2.22 The session layer is responsible for dialog control and synchronization. • Dialog control (full duplex or half duplex) • Synchronization (check points) Responsibilities of Session LayerResponsibilities of Session Layer
  • 24. 2.24 The presentation layer is responsible for translation, compression, and encryption. Note
  • 26. 2.26 The application layer is responsible for providing services to the user. • Network virtual terminal • File transfer, access, and management • Mail Services • Directory services. Services at Application LayerServices at Application Layer
  • 28. 2.28 2-4 TCP/IP PROTOCOL SUITE2-4 TCP/IP PROTOCOL SUITE The layers in theThe layers in the TCP/IP protocol suiteTCP/IP protocol suite do not exactlydo not exactly match those in the OSI model. The original TCP/IPmatch those in the OSI model. The original TCP/IP protocol suite was defined as having four layers:protocol suite was defined as having four layers: host-to-host-to- networknetwork,, internetinternet,, transporttransport, and, and applicationapplication. However,. However, when TCP/IP is compared to OSI, we can say that thewhen TCP/IP is compared to OSI, we can say that the TCP/IP protocol suite is made of five layers:TCP/IP protocol suite is made of five layers: physicalphysical,, data linkdata link,, networknetwork,, transporttransport, and, and applicationapplication.. Physical and Data Link Layers Network Layer Transport Layer Application Layer Topics discussed in this section:Topics discussed in this section:
  • 29. 2.29 Figure 2.16 TCP/IP and OSI model
  • 30. 2.30 • Unreliable & Connectionless—best effort delivery (no error checking) • Datagrams • Different routes, no sequencing Internetworking Protocol (IP)Internetworking Protocol (IP) Network Layer Protocols
  • 31. 2.31 Network Layer Protocols • Association of logical address with physical Address Resolution Protocol (ARP)Address Resolution Protocol (ARP) • Used to discover IP address • First time connection / diskless booting Reverse Address Resolution Protocol (RARP)Reverse Address Resolution Protocol (RARP) • Notification of datagram problems by gateways or hosts • Query and error message ICMPICMP IGMPIGMP
  • 32. 2.32 Transport Layer Protocols • Connectionless • Adds port addresses, checksum and length information UDPUDP • Connection Oriented • Segments • Acknowledgment TCPTCP SCTPSCTP
  • 33. 2.33 2-5 ADDRESSING2-5 ADDRESSING Four levels of addresses are used in an internet employingFour levels of addresses are used in an internet employing the TCP/IP protocols:the TCP/IP protocols: physicalphysical,, logicallogical,, portport, and, and specificspecific.. Physical Addresses Logical Addresses Port Addresses Specific Addresses Topics discussed in this section:Topics discussed in this section:
  • 35. 2.35 Figure 2.18 Relationship of layers and addresses in TCP/IP
  • 36. 2.36 In Figure 2.19 a node with physical address 10 sends a frame to a node with physical address 87. The two nodes are connected by a link (bus topology LAN). As the figure shows, the computer with physical address 10 is the sender, and the computer with physical address 87 is the receiver. Example 2.1
  • 38. 2.38 As we will see in Chapter 13, most local-area networks use a 48-bit (6-byte) physical address written as 12 hexadecimal digits; every byte (2 hexadecimal digits) is separated by a colon, as shown below: Example 2.2 07:01:02:01:2C:4B A 6-byte (12 hexadecimal digits) physical address.
  • 39. 2.39 Figure 2.20 shows a part of an internet with two routers connecting three LANs. Each device (computer or router) has a pair of addresses (logical and physical) for each connection. In this case, each computer is connected to only one link and therefore has only one pair of addresses. Each router, however, is connected to three networks (only two are shown in the figure). So each router has three pairs of addresses, one for each connection. Example 2.3
  • 40. 2.40 Figure 2.20 IP addresses
  • 41. 2.41 Figure 2.21 shows two computers communicating via the Internet. The sending computer is running three processes at this time with port addresses a, b, and c. The receiving computer is running two processes at this time with port addresses j and k. Process a in the sending computer needs to communicate with process j in the receiving computer. Note that although physical addresses change from hop to hop, logical and port addresses remain the same from the source to destination. Example 2.4
  • 43. 2.43 The physical addresses will change from hop to hop, but the logical addresses usually remain the same. Note
  • 44. 2.44 Example 2.5 As we will see in Chapter 23, a port address is a 16-bit address represented by one decimal number as shown. 753 A 16-bit port address represented as one single number.
  • 45. 2.45 The physical addresses change from hop to hop, but the logical and port addresses usually remain the same. Note