Protocol Stack: ISO OSI Model. Layer 2: Data Link Layer. Layer 1: Physical Layer. Layer 4: Transport Layer. Layer 3: Network Layer

Similar documents
CSE331: Introduction to Networks and Security. Lecture 6 Fall 2006

Ethernet. Ethernet Frame Structure. Ethernet Frame Structure (more) Ethernet: uses CSMA/CD

Indian Institute of Technology Kharagpur. TCP/IP Part I. Prof Indranil Sengupta Computer Science and Engineering Indian Institute of Technology

Computer Network. Interconnected collection of autonomous computers that are able to exchange information

Ethernet. Ethernet. Network Devices

Local Area Networks transmission system private speedy and secure kilometres shared transmission medium hardware & software

Data Link Layer Overview

EECS 122: Introduction to Computer Networks Multiaccess Protocols. ISO OSI Reference Model for Layers

Chapter 2 - The TCP/IP and OSI Networking Models

EITF25 Internet Techniques and Applications L5: Wide Area Networks (WAN) Stefan Höst

How To Understand The Layered Architecture Of A Network

Data Communication Networks and Converged Networks

2. What is the maximum value of each octet in an IP address? A. 128 B. 255 C. 256 D. None of the above

Chapter 9. IP Secure

Protocols and Architecture. Protocol Architecture.

ESSENTIALS. Understanding Ethernet Switches and Routers. April 2011 VOLUME 3 ISSUE 1 A TECHNICAL SUPPLEMENT TO CONTROL NETWORK

CSE 3461 / 5461: Computer Networking & Internet Technologies

THE OSI REFERENCE MODEL LES M C LELLAN DEAN WHITTAKER SANDY WORKMAN

The OSI and TCP/IP Models. Lesson 2

Data Communication Networks

Note! The problem set consists of two parts: Part I: The problem specifications pages Part II: The answer pages

Data Link Layer(1) Principal service: Transferring data from the network layer of the source machine to the one of the destination machine

Module 1. Introduction. Version 2 CSE IIT, Kharagpur

CCNA R&S: Introduction to Networks. Chapter 5: Ethernet

Networking Test 4 Study Guide

- Hubs vs. Switches vs. Routers -

CSCI 362 Computer and Network Security

Based on Computer Networking, 4 th Edition by Kurose and Ross

OPEN SYSTEMS INTERCONNECTION OVERVIEW OF PROTOCOL LAYERING AND OSI MODEL OF NETWORK STACKS

Direct Link Networks. Introduction. Physical Properties. Lecture - Ethernet 1. Areas for Discussion. Ethernet (Section 2.6)

Protocol Data Units and Encapsulation

The OSI Model and the TCP/IP Protocol Suite

ICS 153 Introduction to Computer Networks. Inst: Chris Davison

DATA COMMUNICATION AND NETWORKS

Computer Networks. Data Link Layer

Layered Architectures and Applications

Mobile IP Network Layer Lesson 01 OSI (open systems interconnection) Seven Layer Model and Internet Protocol Layers

Network Models OSI vs. TCP/IP

Objectives of Lecture. Network Architecture. Protocols. Contents

Security (II) ISO : Security Architecture of OSI Reference Model. Outline. Course Outline: Fundamental Topics. EE5723/EE4723 Spring 2012

Computer Networks CS321

SFWR 4C03: Computer Networks & Computer Security Jan 3-7, Lecturer: Kartik Krishnan Lecture 1-3

IP - The Internet Protocol

Computer Networks Vs. Distributed Systems

Communications and Computer Networks

Module 15: Network Structures

The OSI Model and the TCP/IP Protocol Suite PROTOCOL LAYERS. Hierarchy. Services THE OSI MODEL

CPS221 Lecture: Layered Network Architecture

Network-Oriented Software Development. Course: CSc4360/CSc6360 Instructor: Dr. Beyah Sessions: M-W, 3:00 4:40pm Lecture 2

Guide to TCP/IP, Third Edition. Chapter 3: Data Link and Network Layer TCP/IP Protocols

Operating System Concepts. Operating System 資 訊 工 程 學 系 袁 賢 銘 老 師

Transport Layer Protocols

Understanding TCP/IP. Introduction. What is an Architectural Model? APPENDIX

EE4367 Telecom. Switching & Transmission. Prof. Murat Torlak

IP Networking. Overview. Networks Impact Daily Life. IP Networking - Part 1. How Networks Impact Daily Life. How Networks Impact Daily Life

Note! The problem set consists of two parts: Part I: The problem specifications pages Part II: The answer pages

Lecture 2: Protocols and Layering. CSE 123: Computer Networks Stefan Savage

Chapter 16: Distributed Operating Systems

Chapter 14: Distributed Operating Systems

IP Network Layer. Datagram ID FLAG Fragment Offset. IP Datagrams. IP Addresses. IP Addresses. CSCE 515: Computer Network Programming TCP/IP

Computer Networks. Definition of LAN. Connection of Network. Key Points of LAN. Lecture 06 Connecting Networks

Overview. Securing TCP/IP. Introduction to TCP/IP (cont d) Introduction to TCP/IP

ELEC3030 (EL336) Computer Networks. How Networks Differ. Differences that can occur at network layer, which makes internetworking difficult:

CMPE 150 Winter 2009

COMMUNICATION NETWORKS WITH LAYERED ARCHITECTURES. Gene Robinson E.A.Robinsson Consulting

11/22/

The OSI & Internet layering models

Chapter 3: Sample Questions, Problems and Solutions Bölüm 3: Örnek Sorular, Problemler ve Çözümleri

Slide 1 Introduction cnds@napier 1 Lecture 6 (Network Layer)

Unit of Learning # 2 The Physical Layer. Sergio Guíñez Molinos sguinez@utalca.cl

Lecture 3: Signaling and Clock Recovery. CSE 123: Computer Networks Stefan Savage

Written examination in Computer Networks

Topics. Computer Networks. Let s Get Started! Computer Networks: Our Definition. How are Networks Used by Computers? Computer Network Components

PART OF THE PICTURE: The TCP/IP Communications Architecture

UPPER LAYER SWITCHING

High-Level Data Link Control

Introduction to TCP/IP

DATA COMMUNICATION (Basics of data communication, OSI layers.)

Lecture 15. IP address space managed by Internet Assigned Numbers Authority (IANA)

Asynchronous Transfer Mode: ATM. ATM architecture. ATM: network or link layer? ATM Adaptation Layer (AAL)

LANs. Local Area Networks. via the Media Access Control (MAC) SubLayer. Networks: Local Area Networks

BCS THE CHARTERED INSTITUTE FOR IT. BCS HIGHER EDUCATION QUALIFICATIONS BCS Level 5 Diploma in IT COMPUTER NETWORKS

Candidates should attempt FOUR questions. All questions carry 25 marks.

Basic Networking Concepts. 1. Introduction 2. Protocols 3. Protocol Layers 4. Network Interconnection/Internet

FIREWALLS & NETWORK SECURITY with Intrusion Detection and VPNs, 2 nd ed. Chapter 2 An Introduction to Networking

Ethernet, VLAN, Ethernet Carrier Grade

IT4405 Computer Networks (Compulsory)

Mathatma Gandhi University

Communication Systems Internetworking (Bridges & Co)

What is CSG150 about? Fundamentals of Computer Networking. Course Outline. Lecture 1 Outline. Guevara Noubir noubir@ccs.neu.

Computer Networks III

Data Communication Networks Introduction

Objectives. Lecture 4. How do computers communicate? How do computers communicate? Local asynchronous communication. How do computers communicate?

LAN Switching Computer Networking. Switched Network Advantages. Hubs (more) Hubs. Bridges/Switches, , PPP. Interconnecting LANs

OSI Reference Model: An Overview

Transport Layer. Chapter 3.4. Think about

Overview of Computer Networks

Random Access Protocols

Network Layer: Network Layer and IP Protocol

What You Will Learn About. Computers Are Your Future. Chapter 8. Networks: Communicating and Sharing Resources. Network Fundamentals

Transcription:

Protocol Stack: ISO OSI Model CSCE 515: Computer Programming OSI Models & layer Wenyuan Xu Department of Computer Science and Engineering University of South Carolina Some slides are made by Dave Hollinger and Badri Nath ISO: the International Standards Organization OSI: Open Systems Interconnection Reference Model (1984) Layer 1: Layer Layer 2: Data Link Layer Transmission of a raw bit stream Forms the physical interface between devices Issues: mechanical and electrical interfaces time per bit distances Provides reliable transfer of information between two adjacent nodes Provides frame-level error control Provides flow control Issues: framing (dividing data into chunks) header & trailer bits addressing 10110110101 01100010011 10110000001 Layer 3: Layer Layer 4: Layer path selection between endsystems (routing). Dynamic routing Fixed routing fragmentation & reassembly translation between different network types provides virtual end-to-end links between peer processes. end-to-end flow control Issues: headers error detection reliable communication

Layer 5: Layer Layer 6: Layer Establishes, manages, and terminates a communication session with remote systems Groups several user-level connections into a single session Many protocol suites do not include a Layer. Represents data properly Data encryption Data compression Data conversion Many protocol suites do not include a Layer. Layer 7: Layer Anything not provided by any of the other layers Implements communication between two applications of the same type Examples: FTP HTTP SMTP/POP3/IMAP (email) Problems Seven layers not widely accepted Standardized before implemented Top three layers fuzzy Internet or TCP/IP layering widespread TCP/IP Layering Architecture Hybrid Reference Model OSI model TCP/IP model Host A Host B Host to Layer A simplified model The network layer Hosts drop packets into this layer, layer routes towards destination- only promise- try my best The transport layer Reliable/unreliable byte oriented stream Router

Header encapsulation and stripping Host A DH AH TH AH Data Data Data NH TH AH Data NH TH AH Data DT Host B Layering & Headers Each layer needs to add some control information to the data in order to do it s job. This information is typically pre-appended to the data before being given to the lower layer. Once the lower layers deliver the data and control information - the peer layer uses the control information. What are the headers? : no header - just a bunch of bits. Data Link: address of the receiving endpoints address of the sending endpoint length of the data checksum. layer header - examples protocol suite version type of service length of the data packet identifier fragment number time to live protocol header checksum source network address destination network address Important Summary Data-Link: communication between machines on the same network. : communication between machines on possibly different networks. : communication between processes (running on machines on possibly different networks). Addresses Each communication endpoint must have an address. Consider 2 processes communicating over an internet: the network must be specified the host (end-system) must be specified the process must be specified.

Addresses at Layers Layer no address necessary Data Link Layer address must be able to select any host on the network. Layer address must be able to provide information to enable routing. Layer address must identify the destination process. Repeater Copies bits from one network to another Does not look at any bits Allows the extension of a network beyond physical length limitations REPEATER Bridge Router Copies frames from one network to another Can operate selectively - does not copy all frames (must look at data-link headers). Extends the network beyond physical length limitations. Copies packets from one network to another. Makes decisions about what route a packet should take (looks at network headers). ROUTER BRIDGE Gateway Operates as a router Data conversions above the network layer. Conversions: encapsulation - use an intermediate network translation - connect different application protocols encryption - could be done by a gateway Which layer? Repeater & Hub physical layer Bridge & Switch data link layer Router network layer Gateway network layer and above.

Hardware vs. Software Repeaters are typically hardware devices. Bridges can be implemented in hardware or software. Routers & Gateways are typically implemented in software so that they can be extended to handle new protocols. Many workstations can operate as routers or gateways. Data Link Layer Protocol Date Link Layer Functionality Convert bits to signals and recover bits from received signals Encoding Decide on a minimum unit for sending bits Frame creation Error detection and /or correction of frames Parity, CRC Flow control ARQ, Sliding WINDOW Encoding Signals propagate over a physical medium Modulate electromagnetic waves e.g. vary voltage Encode binary date onto signals e.g. 0 as low signal and 1 as high signal Known as non-return to zero (NRZ) Non-return to zero inverted (NRZI) Make a transition from current signal to encode a 1; stay at current signal to encode a 0 Manchester Transmit xor of the NRZ encoded data and the clock Only 50% efficient Framing The date unit at the date link layer is called a frame A frame is a group of bits, typically in sequence Issues: Frame creation Frame delineation Use starting and ending characters (tags) to mark boundaries of frame Problem: what if tag characters occur in the date or control portions of the frame Insert extra escape character when a tag appears in date field Error Control No physical link is perfect Bits will be corrupted We can either: Detect errors and request retransmission Or correct errors without retransmission Error Detection Parity bits Polynomial codes or checksums

Parity bits Append a single parity bit to a sequence of bits If using odd parity, the parity bit is chosen to make the total number of 1 s in the bit sequence odd If even parity, the parity bit makes the total number of 1 s in the bit sequence even Q: for even parity, what s the parity bit for 00010101? Problem: Only detects when there are an odd number of bit errors Polynomial codes Can detect errors on large chunks of data Has low overhead More robust than parity bit Requires the use of a code polynomial Example x 2 +1 Message 1011 -> 1 *x 3 + 0 *x 2 + 1 *x + 1 = x 3 + x + 1 Cyclic redundancy check CRC: Example of a polynomial code Procedure: 1. Let r be the degree of the code polynomial. Append r zero bits to the end of the transmitted bit string. Call the entire bit string S(x) 2. Divide S(x) by the code polynomial using modulo 2 division. 3. Subtract the remainder from S(x) using modulo 2 subtraction. The result is the checksummed message Decoding a CRC Procedure 1. Let n be the length of the checksummed message in bits 2. Divide the checksummed message by the code polynomial using modulo 2 division. If the remainder is zero, there is no error detected. Choosing a CRC polynomial The longer the polynomial, the smaller the probability of undetected error Common standard polynomials: (1) CRC-12: x 12 + x 11 + x 3 + x 2 + x 1 + 1 (2) CRC-16: x 16 + x 15 + x 2 + 1 (3) CRC-CCITT: x 16 + x 12 + x 5 + 1 Ethernet

Ethernet - A Real Data-Link Layer It will be useful to discuss a real data-link layer. History developed by Xerox PARC in mid-1970s roots in Aloha packet-radio network standardized by Xerox, DEC, and Intel in 1978 similar to IEEE 802.3 standard CSMA/CD Multi-access (shared medium) many hosts on 1 wire Carrier sense: can tell when another host is transmitting Collision detection: can tell when another host transmits at the same time Ethernet Addresses unique, 48-bit unicast address assigned to each adapter example: 08:00:e4:b1:20 broadcast: all 1s multicast: first bit is 1 Addresses are assigned to vendors by a central authority Bandwidth: 10Mbps, 100Mbps, 1Gbps Length: 2500m (500m segments with 4 repeaters) Problem: Distributed algorithm that provides fair access An Ethernet Frame Preamble 8 bytes 6 Destination Address Source Address Len DATA CRC 6 2 0-1500 4 The preamble is a sequence of alternating 1s and 0s used for synchronization. CRC is Cyclic Redundancy Check Transmit Algorithm If line is idle send immediately upper bound message size of 1500 bytes must wait 9.6us between back-to-back frames If line is busy wait until idle and transmit immediately Collisions Ethernet Backoff Algorithm If collision, How to detect collision? How to handle collision? jam for 48 bits, then stop transmitting frame minimum frame is 64 bytes (header + 46 bytes of data) WHY? If data portion is less than 46 bytes, pad is used. Back off Choose one slot randomly from 2 k slots, where k is the number of collisions the frame has suffered. ([0, 2 k -1]) One contention slot length = 2 x end-to-end propagation delay If 16 backoffs occur, the transmission of the frame is considered a failure.

Ethernet Addressing Each interface looks at every frame and inspects the destination address. If the address does not match the hardware address of the interface (or the broadcast address), the frame is discarded. Some interfaces can also be programmed to recognize multicast addresses. Assignment & Next time Reading: TI 2.1, 2.2, 2.7, 2.8 ** IEEE 802.3 Overview IEEE 802.3 Standard Next Lecture: TCP/IP