The Internet and Its Uses

Download Report

Transcript The Internet and Its Uses

Chapter 2
Communicating Over the
Network
Modified by Profs. Chen and Cappellino
Objectives

This chapter prepares you to:

Describe the structure of a network, including the
devices and media that are necessary for
successful communications.
 Explain the function of protocols in network
communications.
 Explain the advantages of using a layered model
to describe network functionality.
 Describe the role of each layer in two recognized
network models: The TCP/IP model and the OSI
model.
 Describe the importance of addressing and
naming schemes in network communications.
The three Elements of Communication
The first - message ___________, or sender.
 The second -________________, or receiver



receives the message and interprets it.
A third - a __________________
the
media that provides the pathway over which
the message can travel from source to
destination.
Communicating the Messages

In theory, a single communication, such as a an
e-mail message, could be sent across a network
from a source to a destination as one
massive continuous stream of bits.


Why is this not a good idea?
The solution: divide data into
_____________, more manageable pieces
to send over the network.
This
division of the data stream into smaller
pieces is called ___________________.
Communicating the Messages

Segmenting messages has two primary
benefits.
First,
many ___________________________
_________ or mixed together on the network.

The process used to mix together the pieces of separate and
distinct conversations on the network is called ______________.
Second,
segmentation can _______________
______________ of network communications.


Separate pieces need __________________________ across
the network from source to destination.
If part of the message fails to make it to the destination, _______
__________________________________________________
Communicating the Messages

Disadvantage of segmentation and
multiplexing

______________________________________
Each packet must be individually addressed and
numbered
 Then reassembled into the content of the original
message.


Devices throughout the network and
protocols ensure that the pieces of the
message arrive reliably at their destination.
Components of the Network

_____________________ are the physical elements
or _____________________ of the network.

Can you list some examples of devices?
 Can you list some examples of media?

_______________________________________
that run on the networked devices.
Services
include ______________________________ we
use. What are some examples?
 ____________________________________ that directs
and moves the messages through the network


The set of rules which help determine what goes where
______________________ consist of ___________
or _________________________ (more to come…)
End Devices and their Role on the Network

Example of end devices:
____________________________
(work stations,
laptops, file servers, web servers)
Network _____________________
______________________________
Security cameras
__________________________________ (such as
wireless barcode scanners, PDAs)

End devices are referred to as ______________.
A host

______ have software installed that enables them to provide information
and services, like e-mail or web pages, to other hosts on the network.


can act as a client, a server, or both.
Network computer that responds to client requests for network resources
_____________________________________ obtained from the server.
Intermediary Devices and their Role on the Network

Networks rely on ___________________________
_______________________ and ensure that data
flows to destination


work behind the scenes
Examples of intermediary network devices are:
_________________________
Devices (____________
__________________, and wireless access points)
_______________________________ (____________)
Communication Servers and Modems
_______________________ (_________________)

In managing data, _________________ devices use
the ___________________________, in conjunction
with information about the network interconnections,
in path determination
Intermediary Devices and their Role on the Network

Processes possibly running on some or all the
intermediary network devices are:
________________________________
_____________________________
about what
_________________________________
_____________________ other devices ____________
and communication failures
Direct data along __________________________ when
there is a link failure
Classify and direct messages according to QoS
priorities
__________________________________, based on
security settings – ACL’s
Network Media


Communication across a
network- from source to
destination is carried on a
_____________________.
These media are:

____________ within cables

Data sent via ___________ pulses

___________________ (fiber
optic cable)


Data sent via ________________
______________ transmission

Data sent via electromagnetic
_________________
Network Media

Different types of network media have different
features and benefits.
 The
___________________ the media can
successfully carry a signal
 _____________ can carry a signal the farthest
 The __________ in which the media is to be installed
 ___________ best in “noisy” environments
 The ________________________ at which it must be
transmitted.
 Cat 5 can go fairly high and is often very sufficient
but fiber is best
 The ________________ of the media and installation
 ________________ is most costly!
Network Infrastructures

Vary greatly in terms of:
 The
size of the area covered
 The number of users connected
 The number and types of services available

Different types include:
 ___________
(Local Area Networks)
 ___________ (Wide Area Networks)
 ___________ (Storage Area Networks)
 ETC
Local Area Networks


An individual ______________
network
__________________________
_____________________
providing
services to people within
a __________________________,


single business, campus or region.
Administered by a ___________
______________________
The
administrative control that
governs the security and access
control policies are enforced on the
_______________________

Ie. – under control of that business itself
Wide Area Networks


__________________________
________________________
Typically _________________
capacity
slower

than LAN’s
_____________ (businesses)
that are at distant locations

businesses generally use a
_________________________
___________ (TSP) to interconnect
the LANs at the different locations.
WANs use specifically designed
network devices to make the
interconnections between LANs.
The Internet – A Network of Networks


Enables user to communicate with a resource on
another network, outside of our local organization.
Internetwork (aka Network)
The
most well-known and publicly-accessible internetwork
is the Internet.
Internet Service Provider (ISP) networks _____________
_________________ to help form the Internet


Use generally accepted standards and protocols
Intranet

Refers to ____________________________________
___________________________________________
_______________________, or others with authorization.

Accessed internally or remotely
Network Representations



Recall “Elements of a Network” from
Chapter 1
We will be using visual representations
often so please commit them to memory
Additional important terms:
______________________
- A NIC, or LAN
adapter, provides the ________________
__________________ or other host device.

The media connection plugs directly into the
NIC.
Physical
Port - A _________ or outlet on a
networking device ___________________
___________________
Interface - Specialized ports on an
internetworking device ________________
_________________________________

the ports on a router are referred to
_____________________
Rules that Govern Communications

For successful communication,
_____________________________
must be followed by both parties
These
protocols are ________________
______________________ that is loaded
on each host and network device.

Easy way to think of protocols
interacting with each other to help
move data along, is to think of a stack
or layered hierarchy.
Each
__________________________
depends on the functionality defined by the
____________________________

Higher level protocols focus on message
being sent and user interface
The
____________________ of the stack
are concerned with __________________
__________________________
Network Protocol Suite:

____________________________________
______________________________



used in a computer network
Example: ________________protocol suite
Must describe precise requirements and
interactions such as:
The
______________ or structure of the message
The ____________ by which networking devices
share information about pathways with other networks
How and when __________ and system messages
are ______________________________
The ___________________ of data transfer sessions
Proprietary Network Protocols

Individual protocols in a protocol suite _____
_________________________________

_______________ or vendor ___________ the
definition of the protocol and how it functions.
Not so with the TCP/IP protocol suite

________________________________
Industry Standards
A process or protocol that ______________
_________________________ and ratified
by a ________________________
Ex:
the Institute of Electrical and Electronics
Engineers (IEEE) or the Internet Engineering
Task Force (IETF).
Use of standards ensures that products _____
____________________________________ for
efficient communications.

Can anyone think of an example of a
product/process or protocol that is
considered standard?
Example: interaction of protocols between
a web server and a web browser.

___________________________:
Hypertext
Transfer Protocol (HTTP) is a
protocol that governs the way that a web
server and a web client interact.


HTTP defines first- the content and formatting of the
requests and second- the responses exchanged
between client and server.
How are the messages transported?...
___________________________:
______________________________
________________________________
________________ - in this examplebetween web servers and web clients


TCP divides the HTTP messages into __________
_________________________, to be sent to the
destination client.
TCP also controls the rate at which messages are
exchanged.
Example: interaction of protocols CONT…

____________________________:
Internet
Protocol (IP) is responsible for taking the
segments (from upper transport layer),
___________________________, _______
___________________________________


Then selecting the ________________________
to the destination host.
________________________________:
Network access protocols describe two primary
functions, _____________________ and the
______________________ of data on the media.

 Data-link management protocols take the packets from IP
(the above layer) and format them to be transmitted over the
media.
 The standards and protocols for the physical media govern
______________________________________________ and
how they are interpreted by the receiving clients.
 Transceivers on the network interface cards (NICs)
implement the appropriate standards for the media that
is being used.
Technology Independent Protocols
Networking protocols describe the _______
__________ during network communications.
 Protocols generally __________________
________________ a particular function.
 This is why many protocols are said to be
___________________________

This
means that a computer - and other devices
– can, for example, access a web page stored on
any type of web server (IIS, Apache, etc) that
uses any form of operating system (Windows,
MAC, Linux) from anywhere on the Internet.
The Benefits of Using Layered Model

________________________
protocols
that operate at a specific layer have
defined information that they act upon and a
defined interface to the layers above and
below.




_________________ because products
from different vendors can work together.
_____________ technology or capability
_______________________________
_______________ above and below.
________________ to describe
networking functions and capabilities.
Helps us visualize and __________ about
networking and protocol interaction
Protocol and Reference Models


There are two basic types of
networking models: protocol
models and reference models.
A _______________ model:
provides a model that ________
__________________________
______________________.
The
hierarchical set of related protocols in
a suite typically represents all the
functionality required to interface the
human network with the data network.
The ____________________ (seen in
previous example) is a protocol model
because it describes the functions (and
protocols) that occur at each layer of the
TCP/IP suite.
________ Model
Protocol and Reference Models

A _______________ model:
helps provide ____________
_______________________
involved in all types of network
protocols and services.
 Not
intended to provide a sufficient
level of detail to define precisely the
services of the network architecture.
 The _________________________
___________ is the most widely
known internetwork reference model.
 Used in ___________, operation
specifications, and troubleshooting.
________ Model
The TCP/IP Model


It defines ________ categories
of functions (in layers) that must
occur for communications to be
successful.
An _____________________
________________________
________________________
over definitions and standards of
the model
Definitions and standards
(including use of the protocols)
defined in a publicly-available set
of documents

_____________________________
Please memorize
the functions
represented at leach
layer
Communication Process

(through the TCP/IP model)
A complete communication process includes these steps:
1. _____________ at the application layer of the __________ device
2. __________________________________ of data as it passes
down the protocol stack in the source end device
3. Generation of the data _______________________ at the
network access layer of the stack
4. _____________________________________________, which
consists of media and any intermediary devices
5. _________________ of the data at the network access layer of
the _____________________ device
6. _____________________ of the data as it passes up the stack in
the destination device
7. Passing this data to the destination application at the Application
layer of the destination device
Protocol Data Units and Encapsulation

______________________

__________________________
_______________________

The encapsulation process:
As
application data is passed
down the protocol stack various
________________________ to it
_______________________.
The form that a piece of data
takes at any layer is called a
_______________________
During encapsulation, each
succeeding layer encapsulates
the PDU that it _____________
__________________ in
accordance with the protocol
being used.
Protocol Data Units and Encapsulation

At each stage of the process, a
PDU has a different name to
reflect its new appearance.
 ______
- The general term for the
PDU used at the _____________
 ________ - _____________ PDU
 _________ - _______________
Layer PDU
 ____________ - _____________
___________ PDU
 ______________ - A PDU used
when __________________ data
over the medium
The Sending and Receiving process

(from Web Server to client)
In the web server example from earlier:
The Application layer: HTTP begins the process by delivering the
HTML web page data to the Transport layer.
The Transport layer: The application data is broken into TCP
segments.


Each TCP segment is given a label, _____________, containing information
about which process running on the destination computer should receive the
message.
The Transport layer: encapsulates the web page HTML data within the
segment and sends it to the Internet layer,
The Internet layer: Here the entire TCP segment is encapsulated
within an IP packet, which adds another label, called the IP header.

The IP header contains source and destination IP addresses.
 The Network Access layer: Using the Ethernet protocol, the
packet is encapsulated within a frame header and trailer.




Frame header contains source and destination physical address.
The trailer contains error checking information.
Finally the bits are encoded onto the Ethernet media by the server NIC.
This process is reversed at the receiving host.
Data
travels up the layers of the model
The OSI Model




Designed by the ______________
_____________________________
___________ (ISO)
Provides an extensive list of
functions and services that can occur
at each layer.
It also describes the ____________
_____________________________
____________________________
NOTE:
Although the content of this course
will be structured around the OSI
Model
 the
focus of discussion will be the
protocols identified in the TCP/IP
protocol stack.
Supplementary OSI
layer slides
ALL PEOPLE SEEM TO
NEED DATA PROCESSING
7. The Application Layer

_______________________________
________________________
 provides
general network access
Directly supports user applications
 The OSI layer ____________________
 Applications it supports are outside the
OSI layer model

 Example

of applications:
________________________________
6. The Presentation Layer
Ensures that data sent by the application
layer of one system is readable by the
application layer of another system
 ________ the way data is _____________
__________________________

5. The Session Layer

____________________________
_____________________ between
applications on different computers
4. The Transport Layer
Segments data from the sending host &
reassembles data on the receiving host
 ________________________________
________________________________
____________________________.

 Error
detection-and-recovery
 Information flow control
 Involved in Quality Of Service, Reliability
3. The Network Layer

_________________________________
______________ between two end
systems
 based
on network conditions, priority of
service etc
__________________ occurs at this layer
 __________________ occurs at this layer

2. The Data Link Layer
Provides reliable __________________
______________________ (media)
 ______________ (vs. logical)addressing
 Cyclical redundancy check (_______)
allows for __________________________

1. The Physical Layer

Defines the _______________________
__________________________
specifications for the ______________
 Wires,

connectors, voltages, data rates
Transmits ______________________
over the physical medium
Comparing the OSI and TCP/IP Model

The key parallels between the two models occur at
the OSI model _______________________

L3 of OSI deals with addressing and routing of
messages


Functions at L4 of OSI include acknowledgement,
error recovery, and sequencing.



The ___________________ is the TCP/IP suite protocol
that includes the functionality described at ___________
______________________________ includes the
functionality described at ________________
Application layer and the Network Access layer of the
TCP/IP model are further detailed in the OSI model
At the TCP/IP Network Access Layer,
 the
TCP/IP protocol suite does not specify which
protocols to use when transmitting over a physical
medium; it only describes the handoff from the Internet
Layer to the physical network protocols.

The TCP/IP Application layer

OSI model Layers 5, 6 and 7 are used as references for application software developers
and vendors to produce products that need to access networks for communications.
Addressing in the Network


The OSI model describes the processes of
encoding, formatting, segmenting, and
encapsulating data for transmission over the
network.
Using the OSI model as a guide, we can see the
different addresses and identifiers that are
necessary at each layer.
Address
identifiers are added to the data (using
encapsulation) as it travels down the protocol stack on
the source host.
Getting the Data to the End Device
Focusing on Layer 2 PDU – Frame…

Host physical address, is contained in
the header of the frame.
The physical address is also called the
______________________________


Layer 2 is concerned with the delivery
of messages on a _____________
_______________________
The
MAC address is unique on the local
network and _______________________
_______________________________

Once a frame is successfully received
by the destination host, the Layer 2
address information is removed as the
data is decapsulated and moved up the
protocol stack to Layer 3…
Getting the Data Through the Internetwork
Focusing on Layer 3 PDU – Packet…

Layer 3 protocols are designed to ____
________________________________
_____________ within an internetwork.
Layer
3 addresses must include _________
that enable intermediary network devices to
_______________________________

Every _________________________
________________________________
__________________________
___________
use the __________ identifier
portion of this address to determine which
path to use to reach the destination host.
Once the path is determined, the router
encapsulates the packet in a new frame and
sends it on its way toward the destination
end device.
When the frame reaches its final destination,
the frame and packet headers are removed
and the data moved up to Layer 4.
Getting the Data To the Right Application

At Layer 4, information contained in the PDU header
(segment) identifies the _____________________
__________________________________________
___________________________________
Hosts can run ______________________________.
 Example: e-mail client running at the same time as a web browser,
an instant messaging program etc
 All these separately running programs are examples of individual
processes.

Each application or service is _______________ at
Layer 4 by a ________________________
A unique
dialogue between devices is identified with a pair
of Layer 4 source and destination port numbers that are
representative of the two communicating applications.
When the data is received at the host, the ____________
_______________________________________________
______________________________________
Putting it all together
OSI
TCP/
ISO Layer
Layer
IP
Name
#
#
7
Application
(All)
4
6
Presentation
(People)
5
Session
(Seem)
4
Transport
(To)
3
3
Network
(Need)
2
2
Data Link
(Data)
1
1
Physical
(Processing)
Devices
Encapsul
or
TCP/IP
ation
Keywords/Description
Compon Protocols
Units
ents
FTP, HTTP,
POP3, IMAP,
Network services for
telnet,
application processes, such
SMTP, DNS, as file, print, messaging,
TFTP
data
PC
database services
Standard interface to data
Application
for the application layer.
MIME encoding, data
encryption, conversion,
data
formatting, compression
Interhost communication.
Establishes, manages and
data
terminates connection
between applications
TCP, UDP
End-to-end connections
and reliability.
Segmentation/desegmentat
Transport segments
ion of data in proper
sequence. Flow control
IP
Logical addressing and
path determination.
Internet packets
Routing. Reporting delivery
router
errors
Physical addressing and
access to media. Two
bridge,
sublayers: Logical Link
Network
frames switch,
Control (LLC) and Media
Access
NIC
Access Control (MAC)
repeater,
Binary transmission signals
hub,
and encoding. Layout of
bits
trancieve
pins, voltages, cable
r
specifications, modulation
TCP/IP
layer
Name