صفحه 1:
William Stallings
Data and Computer
Communications
Chapter 2
Protocols and Architecture
صفحه 2:
Characteristics
I Direct or indirect
0 Monolithic or structured
0 Symmetric or asymmetric
0 Standard or nonstandard
صفحه 3:
Direct or Indirect
0 Direct
I Systems share a point to point link or
I Systems share a multi-point link
! Data can pass without intervening active
agent
O Indirect
I Switched networks or
I Internetworks or internets
| Data transfer depend on other entities
صفحه 4:
Monolithic or Structured
0 Communications is a complex task
1 To complex for single unit
0 Structured design breaks down problem
into smaller units
0 Layered structure
صفحه 5:
Symmetric or Asymmetric
0 Symmetric
1 Communication between peer entities
0 Asymmetric
! Client/server
صفحه 6:
Standard or Nonstandard
Nonstandard protocols built for specific
computers and tasks
K sources and L receivers leads to K*L
protocols and 2*K*L implementations
If common protocol used, K + L
implementations needed
ص
ص
ص
صفحه 7:
Use of Standard Protocols
صفحه 8:
Functions
Encapsulation
Segmentation and reassmebly
Connection control
Ordered delivery
Flow control
Error control
Addressing
Multiplexing
Transmission services
SS Se oS eyo ea
صفحه 9:
Encapsulation
0 Addition of control information to data
I Address information
I Error-detecting code
I Protocol control
صفحه 10:
Segmentation (Fragmentation)
I Data blocks are of bounded size
0 Application layer messages may be large
0 Network packets may be smaller
0 Splitting larger blocks into smaller ones is
segmentation (or fragmentation in TCP/IP)
1 ATM blocks (cells) are 53 octets long
! Ethernet blocks (frames) are up to 1526 octets
long
0 Checkpoints and restart/recovery
صفحه 11:
Why Fragment?
0 Advantages
| More efficient error control
I More equitable access to network facilities
I Shorter delays
1 Smaller buffers needed
0 Disadvantages
! Overheads
I Increased interrupts at receiver
I More processing time
صفحه 12:
Connection Control
0 Connection Establishment
0 Data transfer
0 Connection termination
0
May be connection interruption and
recovery
0 Sequence numbers used for
! Ordered delivery
| Flow control
! Error control
صفحه 13:
Connection Oriented Data Transfer
Connection request
4 Connection accept
Data
Acknowledgement
Tertainia
Stminate-connection request
4 ‘Terminate-connection, accept
Multiple
exchanges
Time
صفحه 14:
Ordered Delivery
0 PDUs may traverse different paths
through network
PDUs may arrive out of order
Sequentially number PDUs to allow for
ordering
oo
صفحه 15:
Flow Control
Done by receiving entity
Limit amount or rate of data
Stop and wait
Credit systems
I Sliding window
Needed at application as well as network
layers
Sy mo eis
ص
صفحه 16:
Error Control
0 Guard against loss or damage
0 Error detection
I Sender inserts error detecting bits
I Receiver checks these bits
I If OK, acknowledge
I If error, discard packet
0 Retransmission
I If no acknowledge in given time, re-transmit
0 Performed at various levels
صفحه 17:
Addressing
0 Addressing level
0 Addressing scope
0 Connection identifiers
0 Addressing mode
صفحه 18:
Addressing level
0 Level in architecture at which entity is
named
0 Unique address for each end system
(computer) and router
0 Network level address
I IP or internet address (TCP/IP)
I Network service access point or NSAP (OSI)
0 Process within the system
Port number (TCP/IP)
I Service access point or SAP (OSI)
صفحه 19:
Host B
Physical
Network 2
Logical comseetion ب
Address Concepts
Host A
Porto
Logical connection
ton)
Gobat network,
IP ge aires
Network Access
Protocol #1
Physical
Ce vital ee
point adres
Router J
۳
Network 1
NaP1| NAP2
صفحه 20:
Addressing Scope
0 Global nonambiguity
! Global address identifies unique system
I There is only one system with address X
0 Global applicability
I It is possible at any system (any address) to
identify any other system (address) by the
global address of the other system
I Address X identifies that system from
anywhere on the network
0 e.g. MAC address on IEEE 802 networks
صفحه 21:
Connection Identifiers
0 Connection oriented data transfer (virtual
circuits)
J Allocate a connection name during the
transfer phase
| Reduced overhead as connection identifiers are
shorter than global addresses
I Routing may be fixed and identified by
connection name
I Entities may want multiple connections -
multiplexing
I State information
صفحه 22:
Addressing Mode
[| Usually an address refers to a single system
I Unicast address
I Sent to one machine or person
0 May address all entities within a domain
I Broadcast
I Sent to all machines or users
U May address a subset of the entities in a
domain
I Multicast
I Sent to some machines or a group of users
صفحه 23:
Multiplexing
0 Supporting multiple connections on one
machine
0 Mapping of multiple connections at one
level to a single connection at another
! Carrying a number of connections on one fiber
optic cable
۱ Aggregating or bonding ISDN lines to gain
bandwidth
صفحه 24:
Transmission Services
0 Priority
! e.g. control messages
0 Quality of service
۱ Minimum acceptable throughput
I Maximum acceptable delay
0 Security
I Access restrictions
صفحه 25:
OSI - The Model
0 A layer model
0 Each layer performs a subset of the
required communication functions
0 Each layer relies on the next lower layer
to perform more primitive functions
0 Each layer provides services to the next
higher layer
0 Changes in one layer should not require
changes in other layers
صفحه 26:
The OSI Environment
صفحه 27:
OSI as Framework for
Standardization
صفحه 28:
Layer Specific Standards
صفحه 29:
Elements of Standardization
I Protocol specification
| Operates between the same layer on two systems
I May involve different operating system
I Protocol specification must be precise
| Format of data units
Semantics of all fields
5 allowable sequence of PCUs
U Service definition
I Functional description of what is provided
0 Addressing
I Referenced by SAPs
صفحه 30:
OSI Layers (1)
0 Physical
I Physical interface between devices
۲ Mechanical
5 Electrical
Functional
Procedural
0 Data Link
1 Means of activating, maintaining and deactivating
a reliable link
! Error detection and control
I Higher layers may assume error free transmission
صفحه 31:
OSI Layers (2)
I Network
| Transport of information
I Higher layers do not need to know about underlying
technology
! Not needed on direct links
0 Transport
Exchange of data between end systems
Error free
In sequence
No losses
No duplicates
Quality of service
صفحه 32:
OSI Layers (3)
I Session
! Control of dialogues between applications
! Dialogue discipline
1 Grouping
1 Recovery
0 Presentation
1 Data formats and coding
! Data compression
! Encryption
0 Application
| Means for applications to access OSI environment
صفحه 33:
Use of a Relay
END. RELAY END.
sysTEM SYSTEM system
صفحه 34:
TCP/IP Protocol Suite
Dominant commercial protocol
architecture
Specified and extensively used before OSI
Developed by research funded US
Department of Defense
Used by the Internet
ص
oo
ص
صفحه 35:
TCP/IP Protocol Architecture(1)
0 Application Layer
1 Communication between processes or
applications
0 End to end or transport layer (TCP/UDP/...)
I End to end transfer of data
I May include reliability mechanism (TCP)
| Hides detail of underlying network
0 Internet Layer (IP)
I Routing of data
صفحه 36:
TCP/IP Protocol Architecture(2)
0 Network Layer
I Logical interface between end system and
network
0 Physical Layer
! Transmission medium
I Signal rate and encoding
صفحه 37:
PDUs in TCP/IP
Application
User data byte stream
TCP TCP
header segment
2 IP
header datagram
Network Network-level
header packet
صفحه 38:
RSVP
Some Protocols in TCP/IP Suite
OSPF
ICMP | | IGMP.
OSPF = Open Shortest Path Fest
RSVP = Resource ReSerVation Protocol
SMTP = Simple Mail Transfer Pro
SNMP = Simple Network Manegenca
TCP. = Transmision Control Protoce
UDP) = User Datagram Protocol
MIME
FTP | | HTTP] |SMTP| |reinet| | SNMP}
TCP
Border Gateway Protocol
File Transfer Protocol
Hypertext Transfer Pratocal
act Control Message Protoeal
ernet Group Management Provocol
fact Protocol
Multi-Purpose Internet Mail Extension
BGP
صفحه 39:
Required Reading
I Stallings chapter 2
Comer,D. Internetworking with TCP/IP
volume |
Comer,D. and Stevens,D. Internetworking
with TCP/IP volume II and volume III,
Prentice Hall
Halsall, F> Data Communications,
Computer Networks and Open Systems,
Addison Wesley
RFCs
a
a
a
oa