Switching
Wednesday, 21 September 2022
Wednesday, 14 September 2022
LAYERED TASKS : Open System Interconnection & TCP/IP Model
LAYERED TASKS
We use the concept of layers in our daily
life. As an example, let us consider two friends who communicate through postal
mail the process of sending a letter to a friend would be complex if there were
no services available from the post office.
Sender, Receiver, and Carrier
At the Sender Site
Let us first describe, in order, the
activities that take place at the sender site.
• Higher layer. The sender writes the letter,
inserts the letter in an envelope, writes the sender and receiver addresses,
and drops the letter in a mailbox.
• Middle layer. The letter is picked up by a
letter carrier and delivered to the post office.
• Lower layer. The letter is sorted at the
post office; a carrier transports the letter.
0n the Way: The letter is then on its way to
the recipient. On the way to the recipient's local post office, the letter may
actually go through a central office. In addition, it may be transported by
truck, train, airplane, boat, or a combination of these.
At the Receiver Site
• Lower layer. The carrier transports the
letter to the post office.
• Middle layer. The letter is sorted and
delivered to the recipient's mailbox.
• Higher layer. The receiver picks up the
letter, opens the envelope, and reads it.
Reference Models:
In computer networks, reference models give a conceptual framework that standardizes communication between heterogeneous networks.
•OSI Model
•TCP/IP Protocol Suite
- OSI stands for Open Systems Interconnection
- Created by International Standards Organization (ISO)
- Was created as a framework and reference model to explain how different networking technologies work together and interact
- It is not a standard that networking protocols must follow
- Each layer has specific functions it is responsible for
- All layers work together in the correct order to move data around a network
Application Layer: Contains all services or protocols needed by application software or operating system to communicate on the network
Examples
–Firefox web browser uses HTTP (Hyper-Text Transport Protocol)
–E-mail program may use POP3 (Post Office Protocol version 3) to read e-mails and SMTP (Simple Mail Transport Protocol) to send e-mails
•Handles three primary tasks:
Translation , Compression , Encryption
Session Layer
- Responsible for managing the dialog between networked devices
- Establishes, manages, and terminates connections
- Provides duplex, half-duplex, or simplex communications between devices
- Provides procedures for establishing checkpoints, adjournment, termination, and restart or recovery procedures
- Takes data from higher levels of OSI Model and breaks it into segments that can be sent to lower-level layers for data transmission
- Conversely, reassembles data segments into data that higher-level protocols and applications can use
- Also puts segments in correct order (called sequencing ) so they can be reassembled in correct order at destination
- Concerned with the reliability of the transport of sent data
- May use a connection-oriented protocol such as TCP to ensure destination received segments
- May use a connectionless protocol such as UDP to send segments without assurance of delivery
- Uses port addressing
- Responsible for moving packets (data) from one end of the network to the other, called end-to-end communications
- Requires logical addresses such as IP addresses
- Device example: Router
- Routing is the ability of various network devices and their related software to move data packets from source to destination
- Is responsible for moving frames from node to node or computer to computer
- Can move frames from one adjacent computer to another, cannot move frames across routers
- Encapsulation = frame
- Requires MAC address or physical address
- Protocols defined include Ethernet Protocol and Point-to-Point Protocol (PPP)
- Device example: Switch,Bridge
- Two sublayers: Logical Link Control (LLC) and the Media Access Control (MAC)
- Data Link layer addressing, flow control, address notification, error control
- Determines which computer has access to the network media at any given time
- Determines where one frame ends and the next one starts, called frame
- synchronization
- Deals with all aspects of physically moving data from one computer to the next
- Converts data from the upper layers into 1s and 0s for transmission over media
- Defines how data is encoded onto the media to transmit the data
- Defined on this layer: Cable standards, wireless standards, and fiber optic standards.
- Copper wiring, fiber optic cable, radio frequencies, anything that can be used to transmit data is defined on the Physical layer of the OSI Model
- Device example: Hub, Repeater
- Used to transmit data
An exchange using the OSI model
A protocol suite is a large number of related protocols that work together to allow networked computers to communicate
Typical protocols:
- FTP – File Transfer Protocol
- For file transfer
- Telnet – Remote terminal protocol
- For remote login on any other computer on the network
- SMTP – Simple Mail Transfer Protocol
- For mail transfer
- HTTP – Hypertext Transfer Protocol
- For Web browsing
•TCP is a connection-oriented protocol
- Does not mean it has a physical connection between sender and receiver
- TCP provides the function to allow a connection virtually exists – also called virtual circuit
- Dividing a chunk of data into segments
- Reassembly segments into the original chunk
- Provide further the functions such as reordering and data resend
- Offering a reliable byte-stream delivery service
- Functions the same as the Transport layer in OSI
- Synchronize source and destination computers to set up the session between the respective computers
Host-to-network layer
The Host-to-network layer is the lowest layer of the TCP/IP reference model. It combines the link layer and the physical layer of the ISO/OSI model. At this layer, data is transferred between adjacent network nodes in a WAN or between nodes on the same LAN.
OSI Model Vs TCP/IP Model:
Introduction to Computer Networks
A network is a set of devices (often referred to as nodes) connected by communication links. A node can be a computer, printer, or any other device capable of sending and/or receiving data generated by other nodes on the network.
“Computer network’’ means a collection of autonomous computers interconnected by a single technology. Two computers are said to be interconnected if they are able to exchange information.
The connection need not be via a copper wire; fiber optics, microwaves, infrared, and communication satellites can also be used, with the Internet being the most well-known example of a network of networks.
There is considerable confusion in the literature between a computer network and a distributed system. The key distinction is that in a distributed system, a collection of independent computers appears to its users as a single coherent system. Usually, it has a single model or paradigm that it presents to the users. Often a layer of software on top of the operating system, called middleware, is responsible for implementing this model. A well-known example of a distributed system is the World Wide Web. It runs on top of the Internet and presents a model in which everything looks like a document (Web page).
A network must be able to meet certain criterias, these are mentioned below:
Reliability
Scalability
Performance: It can be measured in the following ways:
Transit time : It is the time taken to travel a message from one device to another.
Response time : It is defined as the time elapsed between enquiry and response.
Other ways to measure performance are :
· Efficiency of software
· Number of users
· Capability of connected hardware
Reliability: It decides the frequency at which network failure take place. More the failures are, less is the network's reliability.
Security: It refers to the protection of data from any unauthorized user or access. While travelling through network, data passes many layers of network, and data can be traced if attempted. Hence security is also a very important characteristic for Networks.
USES OF COMPUTER NETWORKS
1. Business Applications
• To distribute information throughout the company (resource sharing). sharing physical resources such as printers, and tape backup systems, is sharing information
• client-server model. It is widely used and forms the basis of much network usage.
• communication medium among employees. email (electronic mail), which employees generally use for a great deal of daily communication.
• Telephone calls between employees may be carried by the computer network instead of by the phone company. This technology is called IP telephony or Voice over IP (VoIP) when Internet technology is used.
• Desktop sharing lets remote workers see and interact with a graphical computer screen
• Doing business electronically, especially with customers and suppliers. This new model is called e-commerce (electronic commerce) and it has grown rapidly in recent years.
2.Home Applications
• peer-to-peer communication
• person-to-person communication
• electronic commerce
• entertainment.(game playing,)
3.Mobile Users
• Text messaging or texting
• Smart phones,
• GPS (Global Positioning System)
• m-commerce
• NFC (Near Field Communication)
4.Social Issues
With the good comes the bad, as this new-found freedom brings with it many unsolved social, political, and ethical issues.
Social networks, message boards, content sharing sites, and a host of other applications allow people to share their views with like-minded individuals. As long as the subjects are restricted to technical topics or hobbies like gardening, not too many problems will arise.
The trouble comes with topics that people actually care about, like politics, religion, or sex. Views that are publicly posted may be deeply offensive to some people. Worse yet, they may not be politically correct. Furthermore, opinions need not be limited to text; high-resolution color photographs and video clips are easily shared over computer networks. Some people take a live-and-let-live view, but others feel that posting certain material (e.g., verbal attacks on particular countries or religions, pornography, etc.) is simply unacceptable and that such content must be censored. Different countries have different and conflicting laws in this area. Thus, the debate rages.
Computer networks make it very easy to communicate. They also make it easy for the people who run the network to snoop on the traffic. This sets up conflicts over issues such as employee rights versus employer rights. Many people read and write email at work. Many employers have claimed the right to read and possibly censor employee messages, including messages sent from a home computer outside working hours. Not all employees agree with this, especially the latter part.
Another conflict is centered around government versus citizen’s rights.A new twist with mobile devices is location privacy. As part of the process of providing service to your mobile device the network operators learn where you are at different times of day. This allows them to track your movements. They may know which nightclub you frequent and which medical center you visit.
Phishing ATTACK: Phishing is a type of social engineering attack often used to steal user data, including login credentials and credit card numbers. It occurs when an attacker, masquerading as a trusted entity, dupes a victim into opening an email, instant message, or text message.
BOTNET ATTACK: Botnets can be used to perform distributed denial-of-service attack (DDoS attack), steal data, send spam, and allows the attacker to access the device and its connection.
Data Communications System :
The effectiveness of a data communications system depends on four fundamental characteristics: delivery, accuracy, timeliness, and jitter.
I. Delivery. The system must deliver data to the correct destination. Data must be received by the intended device or user and only by that device or user.
2 Accuracy. The system must deliver the data accurately. Data that have been altered in transmission and left uncorrected are unusable.
3.Timeliness. The system must deliver data in a timely manner. Data delivered late are useless. In the case of video and audio, timely delivery means delivering data as they are produced, in the same order that they are produced, and without significant delay. This kind of delivery is called real-time transmission.
4.Jitter. Jitter refers to the variation in the packet arrival time. It is the uneven delay in the delivery of audio or video packets. For example, let us assume that video packets are sent every 30 ms. If some of the packets arrive with 30-ms delay and others with 40-ms delay, an uneven quality in the video is the result.
Peer-to-Peer Networks
Peer-to-Peer (P2P) networks are a decentralized type of network architecture where each device (or node) on the network can act as both a...
-
Peer-to-Peer (P2P) networks are a decentralized type of network architecture where each device (or node) on the network can act as both a...
-
TCP (Transmission Control Protocol) and UDP (User Datagram Protocol) are two fundamental transport layer protocols that define how data is t...
-
Delay-Tolerant Networking (DTN) is a network architecture designed to handle communications in environments where traditional networking pr...