CCN Slide
CCN Slide
CCN Slide
COMPUTER
COMMUNICATION
AND NETWORKS
Recommended Books
2
Cryptography and
Network Security principles and
Practice
William Stallings
Content
3
Network ?
Network selection criteria
Network components
Classification of Network
OSI Model
OSI Model Layers
Application layer
Presentation Layer
Session Layer
Transport Layer
Network Layer
Data Link layer
Physical Layer
Broadband and Digital Networks
4
Network ?
5
Advantages
6
Sharing
resources
Easy Sharing
communication information
Networks
Increased
storage
Disadvantages
7
o Cost
o Security concern
o Viruses
o Attacks
Network selection criteria (1/4)
8
A network must be able to meet certain criteria, these are mentioned below:
Performance
Reliability
Security
Scalability
Performance: rate of transferring error free data.
It can be measured in following ways :
Transit time : It is the time taken to travel a message from one device to another.
Response time : It is defined as the time elapsed between enquiry and response.
Other factors to measure performance are :
Number of users: more users on network, slower the network
Transmission speed: the speed at which data will be transmitted (bps)
Media Type: type of communication channel
Hardware type: capabilities of connected hardware (slow computer)
Efficiency of software: Network Operating System (NOS)
Network selection criteria (2/4)
9
Transmission cables
Network components
14
Wireless transmission
Network components
15
Twisted pair,
PSTN, satellite
Coaxial cables,
Communication medium Twisted pair or optical fibre
optical fibre, cables,
links
wireless
NETWORK
Advantages: Disadvantages:
Use less expensive Not very secure
OSIModel
• Stands for Open Systems Interconnection,
was an effort to standardize networking.
• Developed by the International
Organization for Standardization (ISO) in
the early1980's(1884).
• provide a logical framework for how
data communication processes should
interact across networks.
36
Network complexities
Over the past couple of decades many of the networks that were built used
proprietary protocols that were meant to work only with their software and
hardware, as a result they were incompatible and it became difficult for
networks using different specifications to communicate with each other.
This caused many vendors to support multiple types of hardware and
software which was complicated, expensive and wasteful.
To address the problem of networks being incompatible and unable to
communicate with each other, ISO researched various network schemes.
The ISO recognised there was a need to create a NETWORK MODEL that
would help vendors create interoperable network implementations so
different vendor networks could work (communicate) with each other.
“Open System” means it was intended to be used by all vendors.
Open Systems Interconnect (OSI) Model
The OSI model describes how data flows from one
computer, through a network to another computer
The OSI model divides the tasks involved with moving
information between networked computers into 7 smaller,
more manageable sub-task, called layers .
Each layer has a specific function
The process of breaking up the functions or tasks of
networking into layers reduces complexity.
Each layer provides a service to the layer above it in
the protocol specification.
Each layer communicates with the same layer’s
software or hardware on other computers.
39
OSI Model Layers
40
The layers of the OSI model are divided into two groups: the upper layer and lower
layer.
WORKS OF DIFFERENT LAYERS
41
All Please
Application
People Presentation Do
To Transport Tell
47
Session Layer
Responsible for setting up, managing, and then tearing down sessions
Also responsible for dialog control and synchronization.
Dialog Control: allows two systems to enter into a dialog.
It allows the communication between two processes to take place in
either half duplex (one way at a time) or full-duplex (two ways at a
time) mode.
Synchronization: allows a process to add checkpoints (synchronization
points) into a stream of data.
Example: If a system is sending a file of 800 pages, add checkpoints after
every 50 pages is recommended.
This ensures that 50 page unit is successfully received and acknowledged.
This is beneficial at the time of crash as if a crash happens at page
number 110; there is no need to retransmit 1 to100 pages.
48
Transport Layer
Responsible for host-to-host delivery of entire message.
ensures whole message arrives intact and in order, ensuring both error
control and flow control.
breaks the message (data) into small units, called segments, so that they
are handled more efficiently by the upper layers.
Flow control : prevents a sending host on one side of the connection from
overflowing the buffers in the receiving host—an event that can result in
lost data.
Data flow is maintained in order to avoid congestion, overloading, and data loss.
Segmentation and reassembly:
A message is divided into segments, the segments delivered are acknowledged back
to the sender upon their reception. Any segments not acknowledged are
retransmitted.
Each segment contains a sequence number. These numbers enable the transport
layer to reassemble the message correctly upon arriving at the destination and
49
to identify and replace packets that were lost in transmission.
Transport Layer
Responsible for host-to-host delivery of entire message.
Connection Control : It includes 2 types,
Connectionless Transport Layer : Each segment is considered as an independent
packet and delivered to the transport layer at the destination machine.
Connection Oriented Transport Layer : Before delivering packets, connection is
made with transport layer at the destination machine.
Error control: The sending transport layer makes sure that the entire
message arrives at the receiving transport layer without error (damage,
loss, or duplication).
Service Point Addressing : Transport Layer header includes service point
address which is port address.
Computers often run several programs at the same time (FTP, HTTP, etc).
The network layer gets each packet to the correct computer; the transport
layer gets the entire message to the correct process on that computer.
Transport layer protocols: TCP, UDP and SCTP 50
Network Layer
The Network layer manages device addressing, tracks the location of
devices on the network, and determines the best way to move data,
which means that the Network layer must transport traffic between
devices that aren’t locally attached.
Routers (layer 3 devices) are specified at the Network layer and provide
the routing services within an internetwork.
Routing: If a message is being sent between devices that are not on the
same network, then it must be passed between directly-connected
networks until it reaches its final destination.
51
Network Layer
Datagram Encapsulation:
The network layer normally encapsulates messages received from higher layers by
placing network layer header into datagrams , called packets.
Logical Addressing: Every device that communicates over a network has
associated with it a logical address.
For example, on the Internet, the Internet Protocol (IP) is the network
layer protocol and every machine has an IP address. IP is the backbone of
the Internet.
Network layer protocols offer connectionless services for delivering packets
across the network.
For example, in TCP/IP, the Internet Protocol (IP) is connectionless, while
Transmission Control Protocol (TCP) is connection-oriented.
Two types of packets are used at the Network layer: data and route
updates.
52
Network Layer
Data packets: Used to transport user data through the internetwork.
Protocols used to support data traffic are called routed protocols;
examples of routed protocols are IP and IPX.
Route update packets: Used to update neighboring routers about the
networks connected to all routers within the internetwork. Protocols that
send route update packets are called routing protocols; examples of some
common ones are RIP, EIGRP, and OSPF. Route update packets are used
to help build and maintain routing tables on each router.
Network layer protocols: IPv4/IPv6, IPX, ICMP, IPSec, RIP, IGRP, EIGRP,
BGP, OSPF etc
Network Layer device: Router
53
Data Link Layer
The data link layer, also sometimes just called the link layer, is where
many wired and wireless local area networking (LAN) technologies
primarily function.
For example, Ethernet, and IEEE 802.11 (“wireless Ethernet” or “Wi-Fi’) are
all sometimes called “data link layer technologies”.
The data link layer is concerned with local delivery of ”frames” between
devices on the same LAN.
Framing. The data link layer divides the stream of bits received from the
network layer into manageable data units called frames.
Physical addressing. The physical addressing implemented by the data
link layer handles the addressing problem locally.
Each device on a network has a unique number, usually called a hardware
address or MAC address, that is used by the data link layer protocol to ensure that
data intended for a specific machine gets to it properly.
Flow control. The data link layer imposes a flow control mechanism
54 to
avoid overwhelming the receiver.
Data Link Layer
Error Detection and Handling: The data link layer handles errors that
occur at the lower levels. For example, a cyclic redundancy check (CRC)
field is often employed to allow the station receiving data to detect if it
was received correctly.
Access control. When two or more devices are connected to the same link,
data link layer protocols are necessary to determine which device has
control over the link at any given time.
The data link layer is often conceptually divided into two
sublayers: logical link control (LLC) and Media Access Control (MAC). This
split is based on the architecture used in the IEEE 802 Project.
Logical Link Control (LLC): Logical link control refers to the functions
required for the establishment and control of logical links between local
devices on a network.
55
Data Link Layer
Media Access Control (MAC): This refers to the procedures used by devices
to control access to the network medium.
Since many networks use a shared medium (such as a single network
cable, or a series of cables that are electrically connected into a single
virtual medium) it is necessary to have rules for managing the medium to
avoid conflicts.
For example. Ethernet uses the CSMA/CD method of media access control,
while wireless technologies uses CSMA/CA method for media access.
Data Link layer device: Switch
Data Link layer protocols: Ethernet (LAN), Frame relay, HDLC, IEEE 802.11
wireless LAN, LLDP, Spanning Tree Protocol, OpenFlow, etc
56
Physical Layer
57