کامپیوتر و IT و اینترنت

(protocols and architecture (chapter 2

صفحه 1:
William Stallings Data and Computer Communications Chapter 2 Protocols and Architecture

صفحه 2:
Characteristics I Direct or indirect 0 Monolithic or structured 0 Symmetric or asymmetric 0 Standard or nonstandard

صفحه 3:
Direct or Indirect 0 Direct I Systems share a point to point link or I Systems share a multi-point link ! Data can pass without intervening active agent O Indirect I Switched networks or I Internetworks or internets | Data transfer depend on other entities

صفحه 4:
Monolithic or Structured 0 Communications is a complex task 1 To complex for single unit 0 Structured design breaks down problem into smaller units 0 Layered structure

صفحه 5:
Symmetric or Asymmetric 0 Symmetric 1 Communication between peer entities 0 Asymmetric ! Client/server

صفحه 6:
Standard or Nonstandard Nonstandard protocols built for specific computers and tasks K sources and L receivers leads to K*L protocols and 2*K*L implementations If common protocol used, K + L implementations needed ص ص ص

صفحه 7:
Use of Standard Protocols

صفحه 8:
Functions Encapsulation Segmentation and reassmebly Connection control Ordered delivery Flow control Error control Addressing Multiplexing Transmission services SS Se oS eyo ea

صفحه 9:
Encapsulation 0 Addition of control information to data I Address information I Error-detecting code I Protocol control

صفحه 10:
Segmentation (Fragmentation) I Data blocks are of bounded size 0 Application layer messages may be large 0 Network packets may be smaller 0 Splitting larger blocks into smaller ones is segmentation (or fragmentation in TCP/IP) 1 ATM blocks (cells) are 53 octets long ! Ethernet blocks (frames) are up to 1526 octets long 0 Checkpoints and restart/recovery

صفحه 11:
Why Fragment? 0 Advantages | More efficient error control I More equitable access to network facilities I Shorter delays 1 Smaller buffers needed 0 Disadvantages ! Overheads I Increased interrupts at receiver I More processing time

صفحه 12:
Connection Control 0 Connection Establishment 0 Data transfer 0 Connection termination 0 May be connection interruption and recovery 0 Sequence numbers used for ! Ordered delivery | Flow control ! Error control

صفحه 13:
Connection Oriented Data Transfer Connection request 4 Connection accept Data Acknowledgement Tertainia Stminate-connection request 4 ‘Terminate-connection, accept Multiple exchanges Time

صفحه 14:
Ordered Delivery 0 PDUs may traverse different paths through network PDUs may arrive out of order Sequentially number PDUs to allow for ordering oo

صفحه 15:
Flow Control Done by receiving entity Limit amount or rate of data Stop and wait Credit systems I Sliding window Needed at application as well as network layers Sy mo eis ص

صفحه 16:
Error Control 0 Guard against loss or damage 0 Error detection I Sender inserts error detecting bits I Receiver checks these bits I If OK, acknowledge I If error, discard packet 0 Retransmission I If no acknowledge in given time, re-transmit 0 Performed at various levels

صفحه 17:
Addressing 0 Addressing level 0 Addressing scope 0 Connection identifiers 0 Addressing mode

صفحه 18:
Addressing level 0 Level in architecture at which entity is named 0 Unique address for each end system (computer) and router 0 Network level address I IP or internet address (TCP/IP) I Network service access point or NSAP (OSI) 0 Process within the system Port number (TCP/IP) I Service access point or SAP (OSI)

صفحه 19:
Host B Physical Network 2 Logical comseetion ‏ب‎ Address Concepts Host A Porto Logical connection ton) Gobat network, IP ge aires Network Access Protocol #1 Physical Ce vital ee point adres Router J ۳ Network 1 NaP1| NAP2

صفحه 20:
Addressing Scope 0 Global nonambiguity ! Global address identifies unique system I There is only one system with address X 0 Global applicability I It is possible at any system (any address) to identify any other system (address) by the global address of the other system I Address X identifies that system from anywhere on the network 0 e.g. MAC address on IEEE 802 networks

صفحه 21:
Connection Identifiers 0 Connection oriented data transfer (virtual circuits) J Allocate a connection name during the transfer phase | Reduced overhead as connection identifiers are shorter than global addresses I Routing may be fixed and identified by connection name I Entities may want multiple connections - multiplexing I State information

صفحه 22:
Addressing Mode [| Usually an address refers to a single system I Unicast address I Sent to one machine or person 0 May address all entities within a domain I Broadcast I Sent to all machines or users U May address a subset of the entities in a domain I Multicast I Sent to some machines or a group of users

صفحه 23:
Multiplexing 0 Supporting multiple connections on one machine 0 Mapping of multiple connections at one level to a single connection at another ! Carrying a number of connections on one fiber optic cable ۱ Aggregating or bonding ISDN lines to gain bandwidth

صفحه 24:
Transmission Services 0 Priority ! e.g. control messages 0 Quality of service ۱ Minimum acceptable throughput I Maximum acceptable delay 0 Security I Access restrictions

صفحه 25:
OSI - The Model 0 A layer model 0 Each layer performs a subset of the required communication functions 0 Each layer relies on the next lower layer to perform more primitive functions 0 Each layer provides services to the next higher layer 0 Changes in one layer should not require changes in other layers

صفحه 26:
The OSI Environment

صفحه 27:
OSI as Framework for Standardization

صفحه 28:
Layer Specific Standards

صفحه 29:
Elements of Standardization I Protocol specification | Operates between the same layer on two systems I May involve different operating system I Protocol specification must be precise | Format of data units Semantics of all fields 5 allowable sequence of PCUs U Service definition I Functional description of what is provided 0 Addressing I Referenced by SAPs

صفحه 30:
OSI Layers (1) 0 Physical I Physical interface between devices ۲ Mechanical 5 Electrical Functional Procedural 0 Data Link 1 Means of activating, maintaining and deactivating a reliable link ! Error detection and control I Higher layers may assume error free transmission

صفحه 31:
OSI Layers (2) I Network | Transport of information I Higher layers do not need to know about underlying technology ! Not needed on direct links 0 Transport Exchange of data between end systems Error free In sequence No losses No duplicates Quality of service

صفحه 32:
OSI Layers (3) I Session ! Control of dialogues between applications ! Dialogue discipline 1 Grouping 1 Recovery 0 Presentation 1 Data formats and coding ! Data compression ! Encryption 0 Application | Means for applications to access OSI environment

صفحه 33:
Use of a Relay END. RELAY END. sysTEM SYSTEM system

صفحه 34:
TCP/IP Protocol Suite Dominant commercial protocol architecture Specified and extensively used before OSI Developed by research funded US Department of Defense Used by the Internet ص oo ص

صفحه 35:
TCP/IP Protocol Architecture(1) 0 Application Layer 1 Communication between processes or applications 0 End to end or transport layer (TCP/UDP/...) I End to end transfer of data I May include reliability mechanism (TCP) | Hides detail of underlying network 0 Internet Layer (IP) I Routing of data

صفحه 36:
TCP/IP Protocol Architecture(2) 0 Network Layer I Logical interface between end system and network 0 Physical Layer ! Transmission medium I Signal rate and encoding

صفحه 37:
PDUs in TCP/IP Application User data byte stream TCP TCP header segment 2 IP header datagram Network Network-level header packet

صفحه 38:
RSVP Some Protocols in TCP/IP Suite OSPF ICMP | | IGMP. OSPF = Open Shortest Path Fest RSVP = Resource ReSerVation Protocol SMTP = Simple Mail Transfer Pro SNMP = Simple Network Manegenca TCP. = Transmision Control Protoce UDP) = User Datagram Protocol MIME FTP | | HTTP] |SMTP| |reinet| | SNMP} TCP Border Gateway Protocol File Transfer Protocol Hypertext Transfer Pratocal act Control Message Protoeal ernet Group Management Provocol fact Protocol Multi-Purpose Internet Mail Extension BGP

صفحه 39:
Required Reading I Stallings chapter 2 Comer,D. Internetworking with TCP/IP volume | Comer,D. and Stevens,D. Internetworking with TCP/IP volume II and volume III, Prentice Hall Halsall, F> Data Communications, Computer Networks and Open Systems, Addison Wesley RFCs a a a oa

William Stallings Data and Computer Communications Chapter 2 Protocols and Architecture Characteristics  Direct or indirect  Monolithic or structured  Symmetric or asymmetric  Standard or nonstandard Direct or Indirect  Direct  Systems share a point to point link or  Systems share a multi-point link  Data can pass without intervening active agent  Indirect  Switched networks or  Internetworks or internets  Data transfer depend on other entities Monolithic or Structured  Communications is a complex task  To complex for single unit  Structured design breaks down problem into smaller units  Layered structure Symmetric or Asymmetric  Symmetric  Communication between peer entities  Asymmetric  Client/server Standard or Nonstandard  Nonstandard protocols built for specific computers and tasks  K sources and L receivers leads to K*L protocols and 2*K*L implementations  If common protocol used, K + L implementations needed Use of Standard Protocols Functions          Encapsulation Segmentation and reassmebly Connection control Ordered delivery Flow control Error control Addressing Multiplexing Transmission services Encapsulation  Addition of control information to data  Address information  Error-detecting code  Protocol control Segmentation (Fragmentation)  Data blocks are of bounded size  Application layer messages may be large  Network packets may be smaller  Splitting larger blocks into smaller ones is segmentation (or fragmentation in TCP/IP)  ATM blocks (cells) are 53 octets long  Ethernet blocks (frames) are up to 1526 octets long  Checkpoints and restart/recovery Why Fragment?  Advantages     More efficient error control More equitable access to network facilities Shorter delays Smaller buffers needed  Disadvantages  Overheads  Increased interrupts at receiver  More processing time Connection Control Connection Establishment Data transfer Connection termination May be connection interruption and recovery  Sequence numbers used for      Ordered delivery  Flow control  Error control Connection Oriented Data Transfer Ordered Delivery  PDUs may traverse different paths through network  PDUs may arrive out of order  Sequentially number PDUs to allow for ordering Flow Control     Done by receiving entity Limit amount or rate of data Stop and wait Credit systems  Sliding window  Needed at application as well as network layers Error Control  Guard against loss or damage  Error detection     Sender inserts error detecting bits Receiver checks these bits If OK, acknowledge If error, discard packet  Retransmission  If no acknowledge in given time, re-transmit  Performed at various levels Addressing     Addressing level Addressing scope Connection identifiers Addressing mode Addressing level  Level in architecture at which entity is named  Unique address for each end system (computer) and router  Network level address  IP or internet address (TCP/IP)  Network service access point or NSAP (OSI)  Process within the system  Port number (TCP/IP)  Service access point or SAP (OSI) Address Concepts Addressing Scope  Global nonambiguity  Global address identifies unique system  There is only one system with address X  Global applicability  It is possible at any system (any address) to identify any other system (address) by the global address of the other system  Address X identifies that system from anywhere on the network  e.g. MAC address on IEEE 802 networks Connection Identifiers  Connection oriented data transfer (virtual circuits)  Allocate a connection name during the transfer phase  Reduced overhead as connection identifiers are shorter than global addresses  Routing may be fixed and identified by connection name  Entities may want multiple connections multiplexing  State information Addressing Mode  Usually an address refers to a single system  Unicast address  Sent to one machine or person  May address all entities within a domain  Broadcast  Sent to all machines or users  May address a subset of the entities in a domain  Multicast  Sent to some machines or a group of users Multiplexing  Supporting multiple connections on one machine  Mapping of multiple connections at one level to a single connection at another  Carrying a number of connections on one fiber optic cable  Aggregating or bonding ISDN lines to gain bandwidth Transmission Services  Priority  e.g. control messages  Quality of service  Minimum acceptable throughput  Maximum acceptable delay  Security  Access restrictions OSI - The Model  A layer model  Each layer performs a subset of the required communication functions  Each layer relies on the next lower layer to perform more primitive functions  Each layer provides services to the next higher layer  Changes in one layer should not require changes in other layers The OSI Environment OSI as Framework for Standardization Layer Specific Standards Elements of Standardization  Protocol specification  Operates between the same layer on two systems  May involve different operating system  Protocol specification must be precise  Format of data units  Semantics of all fields  allowable sequence of PCUs  Service definition  Functional description of what is provided  Addressing  Referenced by SAPs OSI Layers (1)  Physical  Physical interface between devices     Mechanical Electrical Functional Procedural  Data Link  Means of activating, maintaining and deactivating a reliable link  Error detection and control  Higher layers may assume error free transmission OSI Layers (2)  Network  Transport of information  Higher layers do not need to know about underlying technology  Not needed on direct links  Transport       Exchange of data between end systems Error free In sequence No losses No duplicates Quality of service OSI Layers (3)  Session     Control of dialogues between applications Dialogue discipline Grouping Recovery  Presentation  Data formats and coding  Data compression  Encryption  Application  Means for applications to access OSI environment Use of a Relay TCP/IP Protocol Suite  Dominant commercial protocol architecture  Specified and extensively used before OSI  Developed by research funded US Department of Defense  Used by the Internet TCP/IP Protocol Architecture(1)  Application Layer  Communication between processes or applications  End to end or transport layer (TCP/UDP/…)  End to end transfer of data  May include reliability mechanism (TCP)  Hides detail of underlying network  Internet Layer (IP)  Routing of data TCP/IP Protocol Architecture(2)  Network Layer  Logical interface between end system and network  Physical Layer  Transmission medium  Signal rate and encoding PDUs in TCP/IP Some Protocols in TCP/IP Suite Required Reading  Stallings chapter 2  Comer,D. Internetworking with TCP/IP volume I  Comer,D. and Stevens,D. Internetworking with TCP/IP volume II and volume III, Prentice Hall  Halsall, F> Data Communications, Computer Networks and Open Systems, Addison Wesley  RFCs

51,000 تومان