Computer Networks and OSI Reference Model
Computer Networks and OSI Reference Model
Networks.
A network is a set of device (normally called nodes) connected by communication links. A node can be computer, printer or any other device capable of sending and receiving data generated by other nodes on the network. A network must be able to meet a certain number of criteria:
Performance:
Performance can be measured in many ways, including transmit time and response time:
Transmit time is the amount of time required for a message to travel from of device to another. Response time is the elapsed time between an inquiry and a response
The performance of network depends on a number of factors including the number of users, the type of transmission medium, the capabilities of the connected hardware and the efficiency of the software.
Networks.
Reliability:
In addition to accuracy of delivery, guaranteed delivery, network reliability is measured by the frequency of failure, the time it takes a link to recover from a failure and the networks robustness in a catastrophe.
Security:
Network security issues include protecting the data from unauthorized access.
Access control. Integrity. Authentication. Confidentiality. Non-repudiation.
Type of Connection.
A network is two or more devices connected through links.
A link is the physical communication path way that transfers data from one device to another.
For communication to occur, two devices must be connected in some way to the same link at the same time. There are two possible types of connections:
Point-to-point. Multipoint.
Point-to-Point.
A point-to-point connection provides a dedicated link between two devices. The entire capacity of the link is reserved for transmission between those two devices. A point-to-point connection can be established by using both cable or wireless like microwave or satellite links.
Link Node Node
Multipoint.
A multipoint (also called multidrop) connection is one in which more than two specific devices share a single link. In a multipoint environment, the capacity of the channel is shared either permanently or temporally.
Node
Node
Node
Categories of Network.
Three categories of network.
Local Area Network. Metropolitan Area Network. Wide Area Network.
Categories of Network.
Metropolitan Area Network: A MAN is designed to extend over an entire city. It may be a single network such as a cable television network or it may be a means of connecting a number of LANs into a larger network so that resources may be shared LAN to LAN. For example, a company can use a MAN to connect the LANs in all its offices throughout a city. A MAN may be wholly owned and operated by a private company, or it may be a service provided by a public company such as local telephone company.
Categories of Network.
Wide Area Network: A WAN provides long-distance transmission of data, voice, image and video information over larger geographic areas that may comprise a country, a continent or even the whole world. Internet is an example of WAN.
Protocols.
Two communicating entities cannot simply send bit streams to each other and expect to understand. For communication to occur, the entities must agree on a protocol. A protocol is a set of rules that governs data communication. A protocol defines what is communicated, how it is communicated and when it is communicated. The key elements of a protocol are Syntax, Semantics and Timing.
Protocols.
Syntax:
Syntax refers to the format of the data, meaning the order in which they are presented. For example, a simple protocol might expect the first 8-bits of data to be the address of the sender, the second 8-bits to be the address of the receiver and the rest of the stream to be the message itself.
Semantics:
Semantics refers to the meaning of each section of bits. How a particular pattern to interpreted and what action to be taken based on the interpretation. For example, an address identify the route to be take or the final destination of the message.
Protocols.
Timing:
Timing refers to two characteristics: when data should be sent and how fast they can be sent. For example, if a sender produces data at 100Mbps but he receiver can process data at only 1Mbps, the transmission will overload the receiver and data will be largely lost.
The companies involved in networks development realized that they needed to move from proprietary networking system into open system. Proprietary systems are privately developed, owned and controlled.
Disadvantages are:
Leads to monopolistic environment. Slows down the development of networking products.
Layered Tasks.
We use the concept of layers in our daily life. As an example, let us consider two friends who communicate through postal mail.
The process of sending a letter to a friend would be complex if there were no services available from the post office. This process of sending mail can be divided into several phases/activities and each phase/activities is called layer.
Hierarchy.
In the previous mail communication example, we saw that three activities were performed at the sender side and another three activities were preformed at the receiver side. The task of transporting the mail between the sender and receiver is done by the carrier. On important thing is that tasks must be done in the order given in the hierarchy.
At the sender side, the letter must be written and dropped into the mailbox before being picked up by the mail carrier and delivered to the post office. At the receiver side, the letter must be dropped in the recipient mailbox before being picked up and read by the recipient.
Encapsulation.
As the data flows down through the layers in the hierarchy, each layer adds some extra information to the data in the form of headers or tailors. This process of wrapping data with headers and tailors is called encapsulation. These extra information are added for:
To enable the opposite corresponding layer to take the right operation on the data (to facilitate his work). To enable the network to transfer the data accurately from the source to the destination.
Through these information each layer actually communicates with the opposite corresponding layer and this is called peerto-peer communication. At the receiver side De-Encapsulation take place.
Encapsulation.
Physical Layer.
The physical layer performs the functions required to transmit a bit stream over a physical medium. It deals with the mechanical and electrical specification of the transmission media. The major duties performed by physical layer are: Physical characteristics of interface and media.
Defines the characteristics of the interface between the devices and the transmission media. It also defines the type of transmission medium.
Representation of bits:
Physical layer receives a steam of bits (sequence of 0s and 1s) without any interruption. To be transmitted, bits must be encoded into a signals electrical or optical. The physical layer defined the type of representation ( how 0s and 1s are changed into signals).
Data rate:
The transmission rate the number of bit per second- is also defined by the physical layer.
Repeater is a device of the physical layer. Physical layer protocols are encoding techniques (RZ, NRZ, Manchester etc).
Physical Layer.
Physical addressing:
If frame is to be distributed to different systems on the network, the data link layer adds a header to the frame to define the sender and receiver of the frame. Physical address is the MAC address, which is hard coded into NIC and is of 48-bit represented by Hexadecimal format.
Flow control:
If the rate at which the data are absorbed by the receiver is less than the rate produced in the sender, the data link layer imposes a flow control mechanism to prevent overwhelming the receiver.
Access control:
The data link layer protocol has to determine that how to get access to the link in case when two or more devices are connected to the same link.
The PDU of the data link layer is called frame. Data Link layer protocols are CSMA/CD, CSMA/CA, Token Passing etc.
Node-to-Node Delivery.
Network Layer.
The network layer is responsible for the source -todestination delivery of a packet possibly across multiple networks.
It two systems are connected to the same link, there is usually no need for a network layer. However, if the two systems are attached to different networks with connecting devices between the networks, there is need for the network layer to accomplish the delivery.
Network Layer.
Logical addressing:
The physical addressing implemented by the data link layer handles the addressing problem locally. If a packet passes the network boundary, we need another addressing system to perform the source and destination delivery. The network layer adds a header to the segment received from the session containing the logical addresses of the sender and receiver. Logical address is also called IP address which is of 32-bits and represented in decimal format.
Routing:
To route the packets from the source to destination in an internetwork, the router uses network layer information.
The PDU of network layer is packet. Network layer protocols are IP, IPX, AppleTalk.
Network Layer.
Source-to-Destination Delivery.
Transport Layer.
The transport layer is responsible for process-to-process delivery of the entire message. The major duties performed by the transport layer are:
Port address:
Computers often running several processes (running programs) at the same time: Each running process open a logical port on the computer. The transport layer header must therefore include a type of address called port address. The network layer gets each packet to the correct computer, the transport layer get the entire message to the correct process on that computer.
Transport Layer.
Connection Control:
The transport layer can be either connectionless or connection oriented. A connection oriented transport layer makes a logical connection with the transport layer at the destination machine first before delivering the packets. After all the data are transferred, the connection is terminated.
Flow control:
Like data link layer, the transport layer is resposnsible for flow control. However, flow control at this layer is performed end to end rather than across a single link.
Error control:
Like data link layer, the transport layer is responsible for error control. However, error control at this layer is performed end to end rather than across a single link.
Transport layer 4 protocols include TCP (Transmission Control Protocol) and UDP (User Datagram Protocol).
Transport Layer.
Session Layer.
The session layer defines how to establish, maintaining and terminates session between two communication hosts. The major duties of the session layer are:
Synchronization:
For lengthy transaction (file transfer), the user may choose to establish synchronization points associated with the transfer. If a fault develops during a transaction, the dialog may be restarted at an agreed synchronization point.
Dialog control:
Session layer determines that which role is to be played at any given time by a host. Duplex: Two-way simultaneous. Half-Duplex: Two-way alternate. Simplex: One-way.
Session layer protocols are SQL, ASP(AppleTalk Session Protocol), Remote Procedure Call (RPC), X Window System.
Session Layer.
Presentation Layer.
The presentation layer ensures that the information that the application layer of one system sends out is readable by the application layer of another system. The major duties of the presentation layer are:
Format conversion:
Convert message from one format into another format .i.e. for ASCII to EBCEDIC or vice versa.
Compression.
Compress the message to take less bandwidth on the transmission media and less time for transmission.
Encryption:
Convert the message into a form that will not be readable by others. Provides security to the message.
Protocols of the presentation layer are JPEG, MPEG, ASCII, EBCDIC etc.
Presentation Layer.
Application Layer.
The application layer is the OSI layer that is closest to the user. It provides network services to the users applications (.i.e. spreadsheet etc). The major duties are:
Mail service:
It provides network services for the email application.
Application Layer.
Summary.
There was no standard for networks in the early days and as a result it was difficult for networks to communicate with each other. The International Organisation for Standardisation (ISO) recognised this. and researched various network schemes, and in 1984 introduced the Open Systems Interconnection (OSI) reference model. The OSI reference model has standards which ensure vendors greater compatibility and interoperability between various types of network technologies. The OSI reference model organizes network functions into seven numbered layers. Each layer provides a service to the layer above it in the protocol specification and communicates with the same layers software or hardware on other computers.