IT351 - Module2 - Network Models - Ch2
IT351 - Module2 - Network Models - Ch2
IT351
Computer Networks
Chapter 2
Outline
2.1 Protocol Layering
2.2 TCP/IP Protocol Suite
2.3 OSI Model
2-1 PROTOCOL LAYERING
2.3
2.1.1 Scenarios
2.4
Figure 2.1: A single-layer protocol
• Assume Maria and Ann are neighbors with a lot of common ideas.
• Communication between Maria and Ann takes place in one layer, face
to face, in the same language.
• Set of rules needs to be followed.
1. Maria and Ann should greet each other when they meet.
2. They should restrict their vocabulary to the level of their friendship.
3. They should refrain from speaking when the other party is speaking.
They should know that both should have the opportunity to talk about
the issue.
4. They should exchange some nice words when they leave.
2.5
Figure 2.2: A three-layer protocol
• In the second scenario, we assume that Ann is offered a higher-level position
in her company, but needs to move to another branch located in a city very far
from Maria.
• They do not want their ideas to be revealed by other people if the letters are
intercepted.
• We assume that Ann and Maria each have three machines (or robots) that can
perform the task at each layer.
• Protocol layering enables us to divide a complex task into several smaller
and simpler tasks.
2.11
2.2.2 Layers in the TCP/IP Protocol Suite
2.12
Figure 2.6: Logical connections between layers in TCP/IP
Logical connections
2.13
Figure 2.7: Identical objects in the TCP/IP protocol suite
• Figure 2.7 shows the second principle discussed previously for
protocol layering.
• We show the identical objects below each layer related to each device.
2.14
2.2.3 Description of Each Layer
2.15
2.2.4 Encapsulation and Decapsulation
• One of the important concepts in protocol layering in the Internet is
encapsulation/ decapsulation.
• When the data is moving from upper layer to the lower layer according
to a network model, each layer includes a bundle of information called a
header along with the actual data.
• This packing of data in each layer is known as the encapsulation.
• This unpacking of data in each layer is known as the decapsulation.
• Figure 2.8 shows this concept for the small Internet in Figure 2.5.
2.16
2.2.5 Addressing
• It is worth mentioning another concept related to protocol layering in the
Internet, addressing.
• *As we discussed before, we have logical communication between pairs of
layers in this model.
• Any communication that involves two parties needs two addresses: source
address and destination address.
• *Although it looks as if we need five pairs of addresses, one pair per layer, we
normally have only four because the physical layer does not need addresses;
the unit of data exchange at the physical layer is a bit, which definitely cannot
have an address.
2.17
2.2.6 Multiplexing and Demultiplexing (1/2)
• Since the TCP/IP protocol suite uses several protocols at
some layers, we can say that we have multiplexing at the
source and demultiplexing at the destination.
• Figure 2.10 shows the concept of multiplexing and
demultiplexing at the three upper layers.
2.20
Figure 2.11: The OSI model
2-3 OSI MODEL
1. Physical Layer
The physical layer is responsible for the physical cable or
wireless connection between network nodes.
It defines the connector, the electrical cable or wireless
technology connecting the devices, and is responsible for
transmission of the raw data, which is simply a series of 0s and
1s, while taking care of bit rate control.
3. Network Layer
The network layer has the main function to route packets by
discovering the best path across a physical network.
The network layer uses network addresses (typically Internet
Protocol addresses) to route packets to a destination node.
2.23
Figure 2.11: The OSI model
2-3 OSI MODEL
4. Transport Layer
The transport layer carries out flow control, sending data at a
rate that matches the connection speed of the receiving device,
and error control, checking if data was received incorrectly and
if not, requesting it again.
2.24
Figure 2.11: The OSI model
2-3 OSI MODEL
5. Session Layer
The session layer creates communication channels, called
sessions, between devices.
It is responsible for opening sessions, ensuring they remain
open and functional while data is being transferred, and closing
them when communication ends.
2.25
Figure 2.11: The OSI model
2-3 OSI MODEL
6. Presentation Layer
The presentation layer prepares data for the application layer.
It defines how two devices should encode, encrypt, and
compress data so it is received correctly on the other end.
The presentation layer takes any data transmitted by the
application layer and prepares it for transmission over the
session layer.
2.26
Figure 2.11: The OSI model
2-3 OSI MODEL
7. Application Layer
The application layer is used by end-user software such as web
browsers and email clients. It provides protocols that allow software to
send and receive information and present meaningful data to users. A
few examples of application layer protocols are the
Hypertext Transfer Protocol (HTTP), File Transfer Protocol (FTP),
Post Office Protocol (POP), Simple Mail Transfer Protocol (SMTP),
and Domain Name System (DNS).
2.27
Figure 2.11: The OSI model
2.3.1 OSI versus TCP/IP
• When we compare the two models, we find that two layers, session and
presentation, are missing from the TCP/IP protocol suite.
• These two layers were not added to the TCP/IP protocol suite after the
publication of the OSI model.
• The application layer in the suite is usually considered to be the
combination of three layers in the OSI model, as shown in Figure 2.12.
2.29
Thank You