SlideShare a Scribd company logo
1 of 31
Layering and Network Architecture
Network Architecture
Requirements of computer network,
– Connectivity
– Cost effective resource sharing
– Support for common services
– Reliability
Network Architecture – framework that guide the
design and implementation of networks.
widely used architectures,
– OSI architecture
– Internet architecture (TCP/IP Model)
Layering and Protocols
– Services offered by the underlying hardware, and then add
a sequence of layers, each providing a higher level of
services.
– These services are implemented in terms of services
provided by the lower layers.
Features of Layering,
– Decomposes the problem of building a network into more
manageable components.
• Each layer solves one part of the problem
– Modular design
• Easy to add a new service
• Only need to modify the functionality at one layer
Network Architecture Contd…
• The above layered system having two layers of
abstraction sandwiched between the underlying
hardware and the application program.
Network Architecture Contd…
Layered Network System
• The above layered system having multiple abstractions
provided at any level of the system.
• Two types of channel,
– request/reply service
– Message stream service
Layered system with alternate abstraction
Network Architecture Contd…
Protocol
– defines the interfaces between the layers in the same
system and with the layers of peer system.
– Protocol defines two interfaces.
• Service interfaces – interface between objects in the same machine
• Peer interfaces - messages exchanged with peer
Network Architecture Contd…
Protocol Graph
– Nodes of the graph corresponds to protocol.
– Edges represent “depends on” relation
Network Architecture Contd…
Protocol Specification
– Combination of prose, pseudo code, state transition
diagrams, packet formats and abstract notations.
Encapsulation
– when application program sends a message to its peer by
passing the message to protocol,
• Protocol must communicate control information to its peers by
attaching a “Header” to the message.
• Header – small piece of information used among peers to
communicate each other.
• Format of the header is defined by protocol specification.
• Payload – data being transmitted by the application
– Encapsulation is adding a applications data into the new
message created by the protocol.
Network Architecture Contd…
– When a message arrives at the destination host, it is
processed in the reverse order.
• Removes the header attached by its peer, takes the action indicated
by that header and passes the body of the message to the
application.
Network Architecture Contd…
High level messages are encapsulated into the low level messages
Network Architecture Contd…
Multiplexing and Demultiplexing
– Multiplexing – multiple flows of data over a single
physical link.
OSI ARCHITECTURE
Network Architecture Contd…
The OSI 7-layer Model
OSI – Open Systems Interconnection
Exchange of Data in OSI Model
Network Architecture Contd…
Functions of the OSI Layers:
Physical Layer
 The physical layer defines the characteristics of the
interface between the devices and the transmission
medium. It also defines the type of transmission medium.
 Representation of bits - defines the type of encoding (how
0’s and 1’s are changed to signals).
 Transmission rate (Number of bits sent per second) is
defines by the physical layer.
 Synchronization – sender and receiver clock is
synchronized by physical layer.
 It defines how the machines are connected to make a
network
Network Architecture Contd…
Transmission of bits in Physical Layer
Data Link Layer
 Framing - divides the stream of bits received from the
network layer into manageable data units called frames.
Network Architecture Contd…
 Physical Addressing - If frames are to be distributed to
different systems on the network, the data link layer adds a
header to the frame to define the sender and/or receiver of the
frame. If the frame is intended for a system outside the sender's
network, the receiver address is the address of the device that
connects the network to the next one.
 Flow Control - If the rate at which the data are absorbed by the
receiver is less than the rate at which data are produced in the
sender, the data link layer imposes a flow control mechanism to
avoid overwhelming the receiver.
 Error Control - The data link layer adds reliability to the
physical layer by adding mechanisms to detect and retransmit
damaged or lost frames. It also uses a mechanism to recognize
duplicate frames. Error control is normally achieved through a
trailer added to the end of the frame.
Network Architecture Contd…
 Access Control - When two or more devices are connected to
the same link, data link layer protocols are necessary to
determine which device has control over the link at any given
time.
Network Architecture Contd…
Network Architecture Contd…
Network Layer
 Responsible for the source to destination delivery of the
packets across multiple networks. If two systems are
connected to the same link, there is usually no need for a
network layer.
 Logical Addressing - If a packet passes the network boundary,
we need to distinguish the source and destination systems. The
network layer adds a header to the packet that includes the
logical addresses of the sender and receiver.
 Routing - When independent networks or links are connected
to create internetworks (network of networks) or a large
network, the connecting devices (called routers or switches)
route or switch the packets to their final destination. One of the
functions of the network layer is to provide this mechanism.
Network Architecture Contd…
Packet Transfer in Network Layer
Transport Layer
 Responsible for process-to-process delivery of the entire
message.
Process – application program running on a host.
 Service point Addressing - Computers often run several
programs at the same time. For this reason, source-to-
destination delivery means delivery not only from one computer
to the next but also from a specific process (running program)
on one computer to a specific process (running program) on the
other. The transport layer header must therefore include a type
of address called a service-point address (or port address). The
network layer gets each packet to the correct computer; the
transport layer gets the entire message to the correct process on
that computer.
Network Architecture Contd…
 Segmentation and Reassembly - A message is divided into
transmittable segments, with each segment containing a
sequence number. These numbers enable the transport layer to
reassemble the message correctly upon arriving at the
destination and to identify and replace packets that were lost in
transmission.
 Connection Control - The transport layer can be either
connectionless or connection oriented. A connectionless
transport layer treats each segment as an independent packet
and delivers it to the transport layer at the destination machine.
A connection oriented transport layer makes a connection with
the transport layer at the destination machine first before
delivering the packets. After all the data are transferred, the
connection is terminated.
Network Architecture Contd…
 Flow Control – similar to flow control in data link layer,
however, transport layer performing end to end flow control.
 Error Control – Transport layer provides end to end error
control. The sending transport layer makes sure that the entire
message arrives at the receiving transport layer without error
(damage, loss, or duplication). Error correction is usually
achieved through retransmission.
Network Architecture Contd…
Network Architecture Contd…
Transport Layer
Session Layer
 Provides a name space that is used to tie together the
potentially different transport streams that are part of a
single application.
Presentation Layer
 Concerned with syntax and semantic information's
exchanged between two systems.
 Responsible for Encryption and compression.
Application Layer
 Enable the user(human or software) to access the network.
 Provides the user interface for services such as E-Mail,
File transfer, etc…
Network Architecture Contd…
Network Architecture Contd…
Summary of OSI Layer Functions
Merits of OSI Reference Model
– It distinguishes very clearly between the services, interfaces
and protocols.
– The protocols in OSI model are better hidden. So they can
be easily replaced by new protocols as the technology
changes.
– OSI model is truly a general model.
– It supports both connection oriented and connectionless
services.
Demerits
– Sessions and presentation layer are not of much use.
– This model was devised before the protocols were invented.
So in real life there is a problem of fitting protocol into a
model.
Network Architecture Contd…
INTERNET ARCHITECTURE
 Also called as “TCP/IP architecture”.
 Alternative view of the Internet architecture. The
“Network” layer shown here is sometimes referred to as the
“sub-network” or “link” layer or “Host to Network Layer”.
Network Architecture Contd…
Host to Network layer
 Wide variety of protocols denoted NET1, NET2, …. NETn
implemented by a combination of hardware (eg. Network
Adapter) and software (Eg. Network Device Driver).
 Eg. Ethernet, FDDI
Internet Layer
 Consist of a single protocol called “Internet Protocol” (IP),
that supports the interconnection of multiple networking
technologies into a single, logical network.
 Supporting protocols,
 ARP (Address Resolution Protocol)
- Associates the logical address (IP) with a physical address.
 RARP (Reverse Address Resolution Protocol)
- Allows host to discover the logical address when it knows the physical address.
ICMP (Internet Control Message Protocol)
- Querying and Error reporting protocol.
Network Architecture Contd…
IGMP (Internet Group Message Protocol)
- Facilitate the simultaneous transmission of a message to a multiple recipients.
Transport Layer
 Contains two main end to end protocols,
 TCP – provides a reliable byte stream channel (Connection oriented)
 UDP – provides a unreliable datagram channel (Connectionless)
Application Layer
 Provides wide range of protocols for different applications.
 Protocols provided by this layer are,
 FTP (File Transport Protocol)
 TFTP (Trivial File Transport Protocol)
 SMTP (Simple Message Transfer Protocol)
 Telnet (Remote Login)
 HTTP (Hyper Text Transfer Protocol), etc…
Network Architecture Contd…
Network Architecture Contd…
Internet Protocol Graph
Three Features of Internet Architecture
 Does not imply strict layering
- The application is free to bypass the transport layer and to directly use
IP or one of the underlying layer.
 Hour glass shape protocol graph
- Wide at top, narrow in middle and wide at bottom.
- IP serves as the focal point fir architecture
• It defines a common method for exchanging packets among a different
networks.
- Above IP can be arbitrarily many transport protocols offering a
different channel abstraction to application layer.
• It separates the Host to Host delivery with Process to Process delivery
- Below IP, the architecture allows for different network technologies,
ranges from Ethernet to wireless.
Network Architecture Contd…
 In order to add a new protocol to the architecture, it needs to
be a protocol specification and at least one representative
implementations of the specification.
- The application is free to bypass the transport layer and to directly use
IP or one of the underlying layer.
Network Architecture Contd…

More Related Content

What's hot (20)

Lan technologies
Lan technologiesLan technologies
Lan technologies
 
Quality of Service
Quality of ServiceQuality of Service
Quality of Service
 
Arp and rarp
Arp and rarpArp and rarp
Arp and rarp
 
Internet control message protocol
Internet control message protocolInternet control message protocol
Internet control message protocol
 
ELEMENTS OF TRANSPORT PROTOCOL
ELEMENTS OF TRANSPORT PROTOCOLELEMENTS OF TRANSPORT PROTOCOL
ELEMENTS OF TRANSPORT PROTOCOL
 
Chapter 4 data link layer
Chapter 4 data link layerChapter 4 data link layer
Chapter 4 data link layer
 
Multiple Access Protocal
Multiple Access ProtocalMultiple Access Protocal
Multiple Access Protocal
 
Tcp
TcpTcp
Tcp
 
IPv4 Addressing
 IPv4 Addressing   IPv4 Addressing
IPv4 Addressing
 
Address resolution protocol (ARP)
Address resolution protocol (ARP)Address resolution protocol (ARP)
Address resolution protocol (ARP)
 
Domain name system
Domain name systemDomain name system
Domain name system
 
Routing
RoutingRouting
Routing
 
Link state routing protocol
Link state routing protocolLink state routing protocol
Link state routing protocol
 
Network layer tanenbaum
Network layer tanenbaumNetwork layer tanenbaum
Network layer tanenbaum
 
Transport layer protocol
Transport layer protocolTransport layer protocol
Transport layer protocol
 
Routing Protocols
Routing ProtocolsRouting Protocols
Routing Protocols
 
transport layer
transport layertransport layer
transport layer
 
Chapter 8: Switching
Chapter 8: SwitchingChapter 8: Switching
Chapter 8: Switching
 
OSI Model
OSI ModelOSI Model
OSI Model
 
Ip addressing classful
Ip addressing classfulIp addressing classful
Ip addressing classful
 

Viewers also liked

Layered architecture style
Layered architecture styleLayered architecture style
Layered architecture styleBegench Suhanov
 
layering-protocol-verif
layering-protocol-veriflayering-protocol-verif
layering-protocol-verifRavindra Ganti
 
H.323: Packet Network Protocol
H.323: Packet Network ProtocolH.323: Packet Network Protocol
H.323: Packet Network ProtocolYatish Bathla
 
Unit i packet switching networks
Unit i  packet switching networksUnit i  packet switching networks
Unit i packet switching networkssangusajjan
 
Network Packet Analysis with Wireshark
Network Packet Analysis with WiresharkNetwork Packet Analysis with Wireshark
Network Packet Analysis with WiresharkJim Gilsinn
 

Viewers also liked (6)

Layered architecture style
Layered architecture styleLayered architecture style
Layered architecture style
 
layering-protocol-verif
layering-protocol-veriflayering-protocol-verif
layering-protocol-verif
 
H.323: Packet Network Protocol
H.323: Packet Network ProtocolH.323: Packet Network Protocol
H.323: Packet Network Protocol
 
Unit i packet switching networks
Unit i  packet switching networksUnit i  packet switching networks
Unit i packet switching networks
 
Network Packet Analysis with Wireshark
Network Packet Analysis with WiresharkNetwork Packet Analysis with Wireshark
Network Packet Analysis with Wireshark
 
Layered Software Architecture
Layered Software ArchitectureLayered Software Architecture
Layered Software Architecture
 

Similar to Layering and Architecture

Ccna exploration network fundamentals
Ccna exploration  network fundamentalsCcna exploration  network fundamentals
Ccna exploration network fundamentalsIT Tech
 
CN unit 1 part 2 2023.ppt
CN unit 1 part 2 2023.pptCN unit 1 part 2 2023.ppt
CN unit 1 part 2 2023.pptmohanravi1986
 
OSI Model.It was created in 1983 by osi.
OSI Model.It was created in 1983 by osi.OSI Model.It was created in 1983 by osi.
OSI Model.It was created in 1983 by osi.muhammadsaudm19a
 
OSI Model of Networking
OSI Model of NetworkingOSI Model of Networking
OSI Model of NetworkingMukesh Tekwani
 
TCP/IP Protocols With All Layer Description
TCP/IP Protocols With All Layer DescriptionTCP/IP Protocols With All Layer Description
TCP/IP Protocols With All Layer DescriptionShubham Khedekar
 
Skr+3200+chapter+2+(kweh)
Skr+3200+chapter+2+(kweh)Skr+3200+chapter+2+(kweh)
Skr+3200+chapter+2+(kweh)Ammar Shafiq
 
unit1 network model osi and tcpip.pptx
unit1  network model osi and tcpip.pptxunit1  network model osi and tcpip.pptx
unit1 network model osi and tcpip.pptx183JAIDEEP
 
OSI and TCP/IP reference models in networking
OSI and TCP/IP reference models in networkingOSI and TCP/IP reference models in networking
OSI and TCP/IP reference models in networkingMeenakshiGupta233101
 
Manish Jha- Research Scholar- Internet Basics Requriement
Manish Jha- Research Scholar- Internet Basics RequriementManish Jha- Research Scholar- Internet Basics Requriement
Manish Jha- Research Scholar- Internet Basics RequriementManish Jha
 
Internet basics and Cloud Computing- Manish Jha
Internet basics and Cloud Computing- Manish JhaInternet basics and Cloud Computing- Manish Jha
Internet basics and Cloud Computing- Manish Jhamanish jha
 
BCE L-1 networking fundamentals 111.pptx
BCE L-1  networking fundamentals 111.pptxBCE L-1  networking fundamentals 111.pptx
BCE L-1 networking fundamentals 111.pptxKirti Verma
 
Pwani notes-Network Essentials.pp for Internet Protocoltx
Pwani notes-Network Essentials.pp  for Internet ProtocoltxPwani notes-Network Essentials.pp  for Internet Protocoltx
Pwani notes-Network Essentials.pp for Internet ProtocoltxMosesOkumu4
 

Similar to Layering and Architecture (20)

PC 106 PPT-06
PC 106 PPT-06PC 106 PPT-06
PC 106 PPT-06
 
Ccna exploration network fundamentals
Ccna exploration  network fundamentalsCcna exploration  network fundamentals
Ccna exploration network fundamentals
 
OSI MODEL
OSI MODEL OSI MODEL
OSI MODEL
 
CN unit 1 part 2 2023.ppt
CN unit 1 part 2 2023.pptCN unit 1 part 2 2023.ppt
CN unit 1 part 2 2023.ppt
 
OSI Model.It was created in 1983 by osi.
OSI Model.It was created in 1983 by osi.OSI Model.It was created in 1983 by osi.
OSI Model.It was created in 1983 by osi.
 
OSI Model of Networking
OSI Model of NetworkingOSI Model of Networking
OSI Model of Networking
 
Osi model
Osi modelOsi model
Osi model
 
The Osi Model
The Osi ModelThe Osi Model
The Osi Model
 
TCP/IP Protocols With All Layer Description
TCP/IP Protocols With All Layer DescriptionTCP/IP Protocols With All Layer Description
TCP/IP Protocols With All Layer Description
 
Skr+3200+chapter+2+(kweh)
Skr+3200+chapter+2+(kweh)Skr+3200+chapter+2+(kweh)
Skr+3200+chapter+2+(kweh)
 
unit1 network model osi and tcpip.pptx
unit1  network model osi and tcpip.pptxunit1  network model osi and tcpip.pptx
unit1 network model osi and tcpip.pptx
 
OSI Layering
OSI Layering OSI Layering
OSI Layering
 
The OSI model
 The OSI model The OSI model
The OSI model
 
OSI and TCP/IP reference models in networking
OSI and TCP/IP reference models in networkingOSI and TCP/IP reference models in networking
OSI and TCP/IP reference models in networking
 
Manish Jha- Research Scholar- Internet Basics Requriement
Manish Jha- Research Scholar- Internet Basics RequriementManish Jha- Research Scholar- Internet Basics Requriement
Manish Jha- Research Scholar- Internet Basics Requriement
 
Internet basics and Cloud Computing- Manish Jha
Internet basics and Cloud Computing- Manish JhaInternet basics and Cloud Computing- Manish Jha
Internet basics and Cloud Computing- Manish Jha
 
Network Connectivity and Protocols and OSI Model
Network Connectivity and Protocols and OSI ModelNetwork Connectivity and Protocols and OSI Model
Network Connectivity and Protocols and OSI Model
 
BCE L-1 networking fundamentals 111.pptx
BCE L-1  networking fundamentals 111.pptxBCE L-1  networking fundamentals 111.pptx
BCE L-1 networking fundamentals 111.pptx
 
Dc2 t1
Dc2 t1Dc2 t1
Dc2 t1
 
Pwani notes-Network Essentials.pp for Internet Protocoltx
Pwani notes-Network Essentials.pp  for Internet ProtocoltxPwani notes-Network Essentials.pp  for Internet Protocoltx
Pwani notes-Network Essentials.pp for Internet Protocoltx
 

More from selvakumar_b1985 (20)

Triggering transmission
Triggering transmissionTriggering transmission
Triggering transmission
 
Token ring
Token ringToken ring
Token ring
 
Subnetting
SubnettingSubnetting
Subnetting
 
Email Security
Email SecurityEmail Security
Email Security
 
RIP - Routing Information Protocol
RIP - Routing Information ProtocolRIP - Routing Information Protocol
RIP - Routing Information Protocol
 
Physical Mediums
Physical MediumsPhysical Mediums
Physical Mediums
 
OSPF - Routing Protocol
OSPF - Routing ProtocolOSPF - Routing Protocol
OSPF - Routing Protocol
 
Issues in Data Link Layer
Issues in Data Link LayerIssues in Data Link Layer
Issues in Data Link Layer
 
Internetworking - IP
Internetworking - IPInternetworking - IP
Internetworking - IP
 
ICMP
ICMPICMP
ICMP
 
Hybrid Channel Access Link
Hybrid Channel Access LinkHybrid Channel Access Link
Hybrid Channel Access Link
 
Hypertext Transfer Protocol
Hypertext Transfer ProtocolHypertext Transfer Protocol
Hypertext Transfer Protocol
 
Addressing Scheme IPv4
Addressing Scheme IPv4Addressing Scheme IPv4
Addressing Scheme IPv4
 
File Transfer Protocol
File Transfer ProtocolFile Transfer Protocol
File Transfer Protocol
 
Framing Protocols
Framing ProtocolsFraming Protocols
Framing Protocols
 
Flow Control
Flow ControlFlow Control
Flow Control
 
FDDI
FDDIFDDI
FDDI
 
Ethernet
EthernetEthernet
Ethernet
 
DNS
DNS DNS
DNS
 
DHCP
DHCPDHCP
DHCP
 

Recently uploaded

Booking open Available Pune Call Girls Koregaon Park 6297143586 Call Hot Ind...
Booking open Available Pune Call Girls Koregaon Park  6297143586 Call Hot Ind...Booking open Available Pune Call Girls Koregaon Park  6297143586 Call Hot Ind...
Booking open Available Pune Call Girls Koregaon Park 6297143586 Call Hot Ind...Call Girls in Nagpur High Profile
 
Intze Overhead Water Tank Design by Working Stress - IS Method.pdf
Intze Overhead Water Tank  Design by Working Stress - IS Method.pdfIntze Overhead Water Tank  Design by Working Stress - IS Method.pdf
Intze Overhead Water Tank Design by Working Stress - IS Method.pdfSuman Jyoti
 
VIP Model Call Girls Kothrud ( Pune ) Call ON 8005736733 Starting From 5K to ...
VIP Model Call Girls Kothrud ( Pune ) Call ON 8005736733 Starting From 5K to ...VIP Model Call Girls Kothrud ( Pune ) Call ON 8005736733 Starting From 5K to ...
VIP Model Call Girls Kothrud ( Pune ) Call ON 8005736733 Starting From 5K to ...SUHANI PANDEY
 
Online banking management system project.pdf
Online banking management system project.pdfOnline banking management system project.pdf
Online banking management system project.pdfKamal Acharya
 
chapter 5.pptx: drainage and irrigation engineering
chapter 5.pptx: drainage and irrigation engineeringchapter 5.pptx: drainage and irrigation engineering
chapter 5.pptx: drainage and irrigation engineeringmulugeta48
 
Thermal Engineering -unit - III & IV.ppt
Thermal Engineering -unit - III & IV.pptThermal Engineering -unit - III & IV.ppt
Thermal Engineering -unit - III & IV.pptDineshKumar4165
 
AKTU Computer Networks notes --- Unit 3.pdf
AKTU Computer Networks notes ---  Unit 3.pdfAKTU Computer Networks notes ---  Unit 3.pdf
AKTU Computer Networks notes --- Unit 3.pdfankushspencer015
 
FULL ENJOY Call Girls In Mahipalpur Delhi Contact Us 8377877756
FULL ENJOY Call Girls In Mahipalpur Delhi Contact Us 8377877756FULL ENJOY Call Girls In Mahipalpur Delhi Contact Us 8377877756
FULL ENJOY Call Girls In Mahipalpur Delhi Contact Us 8377877756dollysharma2066
 
Work-Permit-Receiver-in-Saudi-Aramco.pptx
Work-Permit-Receiver-in-Saudi-Aramco.pptxWork-Permit-Receiver-in-Saudi-Aramco.pptx
Work-Permit-Receiver-in-Saudi-Aramco.pptxJuliansyahHarahap1
 
Double rodded leveling 1 pdf activity 01
Double rodded leveling 1 pdf activity 01Double rodded leveling 1 pdf activity 01
Double rodded leveling 1 pdf activity 01KreezheaRecto
 
Top Rated Pune Call Girls Budhwar Peth ⟟ 6297143586 ⟟ Call Me For Genuine Se...
Top Rated  Pune Call Girls Budhwar Peth ⟟ 6297143586 ⟟ Call Me For Genuine Se...Top Rated  Pune Call Girls Budhwar Peth ⟟ 6297143586 ⟟ Call Me For Genuine Se...
Top Rated Pune Call Girls Budhwar Peth ⟟ 6297143586 ⟟ Call Me For Genuine Se...Call Girls in Nagpur High Profile
 
data_management_and _data_science_cheat_sheet.pdf
data_management_and _data_science_cheat_sheet.pdfdata_management_and _data_science_cheat_sheet.pdf
data_management_and _data_science_cheat_sheet.pdfJiananWang21
 
Double Revolving field theory-how the rotor develops torque
Double Revolving field theory-how the rotor develops torqueDouble Revolving field theory-how the rotor develops torque
Double Revolving field theory-how the rotor develops torqueBhangaleSonal
 
Bhosari ( Call Girls ) Pune 6297143586 Hot Model With Sexy Bhabi Ready For ...
Bhosari ( Call Girls ) Pune  6297143586  Hot Model With Sexy Bhabi Ready For ...Bhosari ( Call Girls ) Pune  6297143586  Hot Model With Sexy Bhabi Ready For ...
Bhosari ( Call Girls ) Pune 6297143586 Hot Model With Sexy Bhabi Ready For ...tanu pandey
 
Unit 2- Effective stress & Permeability.pdf
Unit 2- Effective stress & Permeability.pdfUnit 2- Effective stress & Permeability.pdf
Unit 2- Effective stress & Permeability.pdfRagavanV2
 
Block diagram reduction techniques in control systems.ppt
Block diagram reduction techniques in control systems.pptBlock diagram reduction techniques in control systems.ppt
Block diagram reduction techniques in control systems.pptNANDHAKUMARA10
 

Recently uploaded (20)

Booking open Available Pune Call Girls Koregaon Park 6297143586 Call Hot Ind...
Booking open Available Pune Call Girls Koregaon Park  6297143586 Call Hot Ind...Booking open Available Pune Call Girls Koregaon Park  6297143586 Call Hot Ind...
Booking open Available Pune Call Girls Koregaon Park 6297143586 Call Hot Ind...
 
Intze Overhead Water Tank Design by Working Stress - IS Method.pdf
Intze Overhead Water Tank  Design by Working Stress - IS Method.pdfIntze Overhead Water Tank  Design by Working Stress - IS Method.pdf
Intze Overhead Water Tank Design by Working Stress - IS Method.pdf
 
VIP Model Call Girls Kothrud ( Pune ) Call ON 8005736733 Starting From 5K to ...
VIP Model Call Girls Kothrud ( Pune ) Call ON 8005736733 Starting From 5K to ...VIP Model Call Girls Kothrud ( Pune ) Call ON 8005736733 Starting From 5K to ...
VIP Model Call Girls Kothrud ( Pune ) Call ON 8005736733 Starting From 5K to ...
 
Cara Menggugurkan Sperma Yang Masuk Rahim Biyar Tidak Hamil
Cara Menggugurkan Sperma Yang Masuk Rahim Biyar Tidak HamilCara Menggugurkan Sperma Yang Masuk Rahim Biyar Tidak Hamil
Cara Menggugurkan Sperma Yang Masuk Rahim Biyar Tidak Hamil
 
Online banking management system project.pdf
Online banking management system project.pdfOnline banking management system project.pdf
Online banking management system project.pdf
 
chapter 5.pptx: drainage and irrigation engineering
chapter 5.pptx: drainage and irrigation engineeringchapter 5.pptx: drainage and irrigation engineering
chapter 5.pptx: drainage and irrigation engineering
 
Thermal Engineering -unit - III & IV.ppt
Thermal Engineering -unit - III & IV.pptThermal Engineering -unit - III & IV.ppt
Thermal Engineering -unit - III & IV.ppt
 
Water Industry Process Automation & Control Monthly - April 2024
Water Industry Process Automation & Control Monthly - April 2024Water Industry Process Automation & Control Monthly - April 2024
Water Industry Process Automation & Control Monthly - April 2024
 
AKTU Computer Networks notes --- Unit 3.pdf
AKTU Computer Networks notes ---  Unit 3.pdfAKTU Computer Networks notes ---  Unit 3.pdf
AKTU Computer Networks notes --- Unit 3.pdf
 
FULL ENJOY Call Girls In Mahipalpur Delhi Contact Us 8377877756
FULL ENJOY Call Girls In Mahipalpur Delhi Contact Us 8377877756FULL ENJOY Call Girls In Mahipalpur Delhi Contact Us 8377877756
FULL ENJOY Call Girls In Mahipalpur Delhi Contact Us 8377877756
 
Work-Permit-Receiver-in-Saudi-Aramco.pptx
Work-Permit-Receiver-in-Saudi-Aramco.pptxWork-Permit-Receiver-in-Saudi-Aramco.pptx
Work-Permit-Receiver-in-Saudi-Aramco.pptx
 
Double rodded leveling 1 pdf activity 01
Double rodded leveling 1 pdf activity 01Double rodded leveling 1 pdf activity 01
Double rodded leveling 1 pdf activity 01
 
Top Rated Pune Call Girls Budhwar Peth ⟟ 6297143586 ⟟ Call Me For Genuine Se...
Top Rated  Pune Call Girls Budhwar Peth ⟟ 6297143586 ⟟ Call Me For Genuine Se...Top Rated  Pune Call Girls Budhwar Peth ⟟ 6297143586 ⟟ Call Me For Genuine Se...
Top Rated Pune Call Girls Budhwar Peth ⟟ 6297143586 ⟟ Call Me For Genuine Se...
 
Call Now ≽ 9953056974 ≼🔝 Call Girls In New Ashok Nagar ≼🔝 Delhi door step de...
Call Now ≽ 9953056974 ≼🔝 Call Girls In New Ashok Nagar  ≼🔝 Delhi door step de...Call Now ≽ 9953056974 ≼🔝 Call Girls In New Ashok Nagar  ≼🔝 Delhi door step de...
Call Now ≽ 9953056974 ≼🔝 Call Girls In New Ashok Nagar ≼🔝 Delhi door step de...
 
data_management_and _data_science_cheat_sheet.pdf
data_management_and _data_science_cheat_sheet.pdfdata_management_and _data_science_cheat_sheet.pdf
data_management_and _data_science_cheat_sheet.pdf
 
Call Girls in Ramesh Nagar Delhi 💯 Call Us 🔝9953056974 🔝 Escort Service
Call Girls in Ramesh Nagar Delhi 💯 Call Us 🔝9953056974 🔝 Escort ServiceCall Girls in Ramesh Nagar Delhi 💯 Call Us 🔝9953056974 🔝 Escort Service
Call Girls in Ramesh Nagar Delhi 💯 Call Us 🔝9953056974 🔝 Escort Service
 
Double Revolving field theory-how the rotor develops torque
Double Revolving field theory-how the rotor develops torqueDouble Revolving field theory-how the rotor develops torque
Double Revolving field theory-how the rotor develops torque
 
Bhosari ( Call Girls ) Pune 6297143586 Hot Model With Sexy Bhabi Ready For ...
Bhosari ( Call Girls ) Pune  6297143586  Hot Model With Sexy Bhabi Ready For ...Bhosari ( Call Girls ) Pune  6297143586  Hot Model With Sexy Bhabi Ready For ...
Bhosari ( Call Girls ) Pune 6297143586 Hot Model With Sexy Bhabi Ready For ...
 
Unit 2- Effective stress & Permeability.pdf
Unit 2- Effective stress & Permeability.pdfUnit 2- Effective stress & Permeability.pdf
Unit 2- Effective stress & Permeability.pdf
 
Block diagram reduction techniques in control systems.ppt
Block diagram reduction techniques in control systems.pptBlock diagram reduction techniques in control systems.ppt
Block diagram reduction techniques in control systems.ppt
 

Layering and Architecture

  • 1. Layering and Network Architecture
  • 2. Network Architecture Requirements of computer network, – Connectivity – Cost effective resource sharing – Support for common services – Reliability Network Architecture – framework that guide the design and implementation of networks. widely used architectures, – OSI architecture – Internet architecture (TCP/IP Model)
  • 3. Layering and Protocols – Services offered by the underlying hardware, and then add a sequence of layers, each providing a higher level of services. – These services are implemented in terms of services provided by the lower layers. Features of Layering, – Decomposes the problem of building a network into more manageable components. • Each layer solves one part of the problem – Modular design • Easy to add a new service • Only need to modify the functionality at one layer Network Architecture Contd…
  • 4. • The above layered system having two layers of abstraction sandwiched between the underlying hardware and the application program. Network Architecture Contd… Layered Network System
  • 5. • The above layered system having multiple abstractions provided at any level of the system. • Two types of channel, – request/reply service – Message stream service Layered system with alternate abstraction Network Architecture Contd…
  • 6. Protocol – defines the interfaces between the layers in the same system and with the layers of peer system. – Protocol defines two interfaces. • Service interfaces – interface between objects in the same machine • Peer interfaces - messages exchanged with peer Network Architecture Contd…
  • 7. Protocol Graph – Nodes of the graph corresponds to protocol. – Edges represent “depends on” relation Network Architecture Contd…
  • 8. Protocol Specification – Combination of prose, pseudo code, state transition diagrams, packet formats and abstract notations. Encapsulation – when application program sends a message to its peer by passing the message to protocol, • Protocol must communicate control information to its peers by attaching a “Header” to the message. • Header – small piece of information used among peers to communicate each other. • Format of the header is defined by protocol specification. • Payload – data being transmitted by the application – Encapsulation is adding a applications data into the new message created by the protocol. Network Architecture Contd…
  • 9. – When a message arrives at the destination host, it is processed in the reverse order. • Removes the header attached by its peer, takes the action indicated by that header and passes the body of the message to the application. Network Architecture Contd… High level messages are encapsulated into the low level messages
  • 10. Network Architecture Contd… Multiplexing and Demultiplexing – Multiplexing – multiple flows of data over a single physical link.
  • 11. OSI ARCHITECTURE Network Architecture Contd… The OSI 7-layer Model OSI – Open Systems Interconnection
  • 12. Exchange of Data in OSI Model Network Architecture Contd…
  • 13. Functions of the OSI Layers: Physical Layer  The physical layer defines the characteristics of the interface between the devices and the transmission medium. It also defines the type of transmission medium.  Representation of bits - defines the type of encoding (how 0’s and 1’s are changed to signals).  Transmission rate (Number of bits sent per second) is defines by the physical layer.  Synchronization – sender and receiver clock is synchronized by physical layer.  It defines how the machines are connected to make a network Network Architecture Contd…
  • 14. Transmission of bits in Physical Layer Data Link Layer  Framing - divides the stream of bits received from the network layer into manageable data units called frames. Network Architecture Contd…
  • 15.  Physical Addressing - If frames are to be distributed to different systems on the network, the data link layer adds a header to the frame to define the sender and/or receiver of the frame. If the frame is intended for a system outside the sender's network, the receiver address is the address of the device that connects the network to the next one.  Flow Control - If the rate at which the data are absorbed by the receiver is less than the rate at which data are produced in the sender, the data link layer imposes a flow control mechanism to avoid overwhelming the receiver.  Error Control - The data link layer adds reliability to the physical layer by adding mechanisms to detect and retransmit damaged or lost frames. It also uses a mechanism to recognize duplicate frames. Error control is normally achieved through a trailer added to the end of the frame. Network Architecture Contd…
  • 16.  Access Control - When two or more devices are connected to the same link, data link layer protocols are necessary to determine which device has control over the link at any given time. Network Architecture Contd…
  • 17. Network Architecture Contd… Network Layer  Responsible for the source to destination delivery of the packets across multiple networks. If two systems are connected to the same link, there is usually no need for a network layer.  Logical Addressing - If a packet passes the network boundary, we need to distinguish the source and destination systems. The network layer adds a header to the packet that includes the logical addresses of the sender and receiver.  Routing - When independent networks or links are connected to create internetworks (network of networks) or a large network, the connecting devices (called routers or switches) route or switch the packets to their final destination. One of the functions of the network layer is to provide this mechanism.
  • 18. Network Architecture Contd… Packet Transfer in Network Layer
  • 19. Transport Layer  Responsible for process-to-process delivery of the entire message. Process – application program running on a host.  Service point Addressing - Computers often run several programs at the same time. For this reason, source-to- destination delivery means delivery not only from one computer to the next but also from a specific process (running program) on one computer to a specific process (running program) on the other. The transport layer header must therefore include a type of address called a service-point address (or port address). The network layer gets each packet to the correct computer; the transport layer gets the entire message to the correct process on that computer. Network Architecture Contd…
  • 20.  Segmentation and Reassembly - A message is divided into transmittable segments, with each segment containing a sequence number. These numbers enable the transport layer to reassemble the message correctly upon arriving at the destination and to identify and replace packets that were lost in transmission.  Connection Control - The transport layer can be either connectionless or connection oriented. A connectionless transport layer treats each segment as an independent packet and delivers it to the transport layer at the destination machine. A connection oriented transport layer makes a connection with the transport layer at the destination machine first before delivering the packets. After all the data are transferred, the connection is terminated. Network Architecture Contd…
  • 21.  Flow Control – similar to flow control in data link layer, however, transport layer performing end to end flow control.  Error Control – Transport layer provides end to end error control. The sending transport layer makes sure that the entire message arrives at the receiving transport layer without error (damage, loss, or duplication). Error correction is usually achieved through retransmission. Network Architecture Contd…
  • 23. Session Layer  Provides a name space that is used to tie together the potentially different transport streams that are part of a single application. Presentation Layer  Concerned with syntax and semantic information's exchanged between two systems.  Responsible for Encryption and compression. Application Layer  Enable the user(human or software) to access the network.  Provides the user interface for services such as E-Mail, File transfer, etc… Network Architecture Contd…
  • 24. Network Architecture Contd… Summary of OSI Layer Functions
  • 25. Merits of OSI Reference Model – It distinguishes very clearly between the services, interfaces and protocols. – The protocols in OSI model are better hidden. So they can be easily replaced by new protocols as the technology changes. – OSI model is truly a general model. – It supports both connection oriented and connectionless services. Demerits – Sessions and presentation layer are not of much use. – This model was devised before the protocols were invented. So in real life there is a problem of fitting protocol into a model. Network Architecture Contd…
  • 26. INTERNET ARCHITECTURE  Also called as “TCP/IP architecture”.  Alternative view of the Internet architecture. The “Network” layer shown here is sometimes referred to as the “sub-network” or “link” layer or “Host to Network Layer”. Network Architecture Contd…
  • 27. Host to Network layer  Wide variety of protocols denoted NET1, NET2, …. NETn implemented by a combination of hardware (eg. Network Adapter) and software (Eg. Network Device Driver).  Eg. Ethernet, FDDI Internet Layer  Consist of a single protocol called “Internet Protocol” (IP), that supports the interconnection of multiple networking technologies into a single, logical network.  Supporting protocols,  ARP (Address Resolution Protocol) - Associates the logical address (IP) with a physical address.  RARP (Reverse Address Resolution Protocol) - Allows host to discover the logical address when it knows the physical address. ICMP (Internet Control Message Protocol) - Querying and Error reporting protocol. Network Architecture Contd…
  • 28. IGMP (Internet Group Message Protocol) - Facilitate the simultaneous transmission of a message to a multiple recipients. Transport Layer  Contains two main end to end protocols,  TCP – provides a reliable byte stream channel (Connection oriented)  UDP – provides a unreliable datagram channel (Connectionless) Application Layer  Provides wide range of protocols for different applications.  Protocols provided by this layer are,  FTP (File Transport Protocol)  TFTP (Trivial File Transport Protocol)  SMTP (Simple Message Transfer Protocol)  Telnet (Remote Login)  HTTP (Hyper Text Transfer Protocol), etc… Network Architecture Contd…
  • 30. Three Features of Internet Architecture  Does not imply strict layering - The application is free to bypass the transport layer and to directly use IP or one of the underlying layer.  Hour glass shape protocol graph - Wide at top, narrow in middle and wide at bottom. - IP serves as the focal point fir architecture • It defines a common method for exchanging packets among a different networks. - Above IP can be arbitrarily many transport protocols offering a different channel abstraction to application layer. • It separates the Host to Host delivery with Process to Process delivery - Below IP, the architecture allows for different network technologies, ranges from Ethernet to wireless. Network Architecture Contd…
  • 31.  In order to add a new protocol to the architecture, it needs to be a protocol specification and at least one representative implementations of the specification. - The application is free to bypass the transport layer and to directly use IP or one of the underlying layer. Network Architecture Contd…