Top Banner
م ي ح ر ل ا ن م ح ر ل له ا ل ما س ب م ي ح ر ل ا ن م ح ر ل له ا ل ما س بFaculty of Computing and Information Technology, KAU Computer Science Department Chapter 2: Chapter 2: Network Network Models Models
74

بسم الله الرحمن الرحيم Faculty of Computing and Information Technology, KAU Computer Science Department Chapter 2: Network Models.

Dec 19, 2015

Download

Documents

Welcome message from author
This document is posted to help you gain knowledge. Please leave a comment to let me know what you think about it! Share it to your friends and learn new things together.
Transcript
Page 1: بسم الله الرحمن الرحيم Faculty of Computing and Information Technology, KAU Computer Science Department Chapter 2: Network Models.

الرحيم الرحمن الله الرحيم بسم الرحمن الله بسم

Faculty of Computing and Information Technology, KAUComputer Science Department

Chapter 2:Chapter 2: Network ModelsNetwork Models

Page 2: بسم الله الرحمن الرحيم Faculty of Computing and Information Technology, KAU Computer Science Department Chapter 2: Network Models.

2

CS-416, FCIT, KAU,KSA

Chapter 2:Chapter 2: Network ModelsNetwork Models

2.12.1 Layered Tasks

2.22.2 The OSI Model

2.32.3 Layers in the OSI Model

2.42.4 TCP/IP Protocol Suite

2.52.5 Addressing

Page 3: بسم الله الرحمن الرحيم Faculty of Computing and Information Technology, KAU Computer Science Department Chapter 2: Network Models.

3

CS-416, FCIT, KAU,KSA

IntroductionIntroduction

Network is a combination of Hardware and Software that sends data from one location to another Hardware: physical equipment that carries signals

from one point to another Software: instructions that make possible the services

that we expect from a network

Page 4: بسم الله الرحمن الرحيم Faculty of Computing and Information Technology, KAU Computer Science Department Chapter 2: Network Models.

4

CS-416, FCIT, KAU,KSA

IntroductionIntroduction

Task of solving a mathematics problem with a computer Fundamental job is done by hardware (tedious task if only

hardware is involved) Task is mush easier if software is available Levels of solving the problem

Highest level Program Lowest level Hardware

Task of Sending an e-mail using computer network: Can be broken into several tasks, each is performed by a

separate software package Each software package uses the services of another software

package At lowest layer, a signal or a set of signals is sent from the

source computer to the destination computer

Page 5: بسم الله الرحمن الرحيم Faculty of Computing and Information Technology, KAU Computer Science Department Chapter 2: Network Models.

5

CS-416, FCIT, KAU,KSA

2.12.1 Layered TasksLayered Tasks

We use the concept of Layers in our daily life

Example: Two friends who communicates through postal mail

Page 6: بسم الله الرحمن الرحيم Faculty of Computing and Information Technology, KAU Computer Science Department Chapter 2: Network Models.

6CS-416, FCIT, KAU,KSA

2.1 Layered Tasks

Tasks involved in sending a letter

Page 7: بسم الله الرحمن الرحيم Faculty of Computing and Information Technology, KAU Computer Science Department Chapter 2: Network Models.

7

CS-416, FCIT, KAU,KSA

2.12.1 Layered TasksLayered Tasks

Hierarchy: Task must be done in the order given in the hierarchy

Sender site from up to down ( ) Receiver site from down to up ( )

Services: Sender site each layer uses the services of the layer immediately below it

Page 8: بسم الله الرحمن الرحيم Faculty of Computing and Information Technology, KAU Computer Science Department Chapter 2: Network Models.

8

CS-416, FCIT, KAU,KSA

2.22.2 The OSI ModelThe OSI Model

ISO: IInternational SStandards OOrganization OSIOSI: OOpen SSystems IInterconnection model An open system is a set of protocols that allows

any two different systems to communicate regardless of their underlying architecture and without requiring changes to the logic underlying hardware and software

ISO is the organization. OSI is the model.

Page 9: بسم الله الرحمن الرحيم Faculty of Computing and Information Technology, KAU Computer Science Department Chapter 2: Network Models.

9

CS-416, FCIT, KAU,KSA

2.22.2 The OSI ModelThe OSI Model

Layered Architecture:7 ordered layers ( P D N T S P A P D N T S P A )

Page 10: بسم الله الرحمن الرحيم Faculty of Computing and Information Technology, KAU Computer Science Department Chapter 2: Network Models.

10CS-416, FCIT, KAU,KSA

2.2 The OSI Model

The interaction between layers in the OSI model

Page 11: بسم الله الرحمن الرحيم Faculty of Computing and Information Technology, KAU Computer Science Department Chapter 2: Network Models.

11

CS-416, FCIT, KAU,KSA

2.22.2 The OSI ModelThe OSI Model

Intermediate nodes involve only the first 3 layers Each layer groups networking functions with

related uses Each layer defines a family of functions distinct

from those of the other layers This design creates an architecture that is both

comprehensive and flexible OSI model allows complete interoperability

between otherwise incompatible systems

Page 12: بسم الله الرحمن الرحيم Faculty of Computing and Information Technology, KAU Computer Science Department Chapter 2: Network Models.

12

CS-416, FCIT, KAU,KSA

2.22.2 The OSI ModelThe OSI Model

Within a single machine, each layer calls upon the services of the layer just below it

Between machines, layer x on one machine communicates with layer x on another machine

Communication is governed by an agreed-upon series of rules and conventions called protocols

Page 13: بسم الله الرحمن الرحيم Faculty of Computing and Information Technology, KAU Computer Science Department Chapter 2: Network Models.

13

CS-416, FCIT, KAU,KSA

2.22.2 The OSI ModelThe OSI Model

Peer-to-Peer Processes At the physical layer, communication is direct Each layer in the sending device adds its own

information to the message it receives from the layer just above it and places the whole package to the layer below it

At layer 1 the entire package is converted to a form that can be transmitted to the receiving device

At the receiving device machine, the message is unwrapped layer by layer, with each process receiving and removing the data meant for it

Page 14: بسم الله الرحمن الرحيم Faculty of Computing and Information Technology, KAU Computer Science Department Chapter 2: Network Models.

14

CS-416, FCIT, KAU,KSA

2.22.2 The OSI ModelThe OSI Model

Interfaces Between Layers Passing of data through layers is made possible by an

interface between each pair of adjacent layers Each interface defines the information and services a

layer must provide for the layer above it Well-defined interfaces and layer functions provide

modularity to a network Implementation of the functions of a layer can be

modified or replaced without requiring changes to the surrounding layers

Page 15: بسم الله الرحمن الرحيم Faculty of Computing and Information Technology, KAU Computer Science Department Chapter 2: Network Models.

15

CS-416, FCIT, KAU,KSA

2.22.2 The OSI ModelThe OSI Model

Organization of the Layers Layers can be thought of as three subgroups

Layers 1,2 and 3: Network support layers: deal with the physical aspects of moving data from one device to another

Layers 5, 6 and 7: User support layers: allow interoperability among unrelated software systems

Layer 4: links the two subgroups and ensures that what the lower layers have transmitted is in a form that the upper layers can use

At each layer a header (H) and or a trailer (T) is added to the data

Page 16: بسم الله الرحمن الرحيم Faculty of Computing and Information Technology, KAU Computer Science Department Chapter 2: Network Models.

16

CS-416, FCIT, KAU,KSA

2.22.2 The OSI ModelThe OSI Model

Organization of the Layers The upper OSI layers (4, 5, 6 and 7) are implemented in

software Lower layers (1, 2, and 3) are implemented in hardware

and software except for the physical layer which is mostly hardware

Page 17: بسم الله الرحمن الرحيم Faculty of Computing and Information Technology, KAU Computer Science Department Chapter 2: Network Models.

17CS-416, FCIT, KAU,KSA

DATA

An exchange of Data

Page 18: بسم الله الرحمن الرحيم Faculty of Computing and Information Technology, KAU Computer Science Department Chapter 2: Network Models.

18CS-416, FCIT, KAU,KSA

D7H7

D6H6

D5H5

D4H4

D3H3

D2H2

010101010101101010000010000000010

T2

D7H7

D6H6

D5H5

D4H4

010101010101101010000010000000010

D3H3

D2H2 T2

An exchange using the OSI model

Page 19: بسم الله الرحمن الرحيم Faculty of Computing and Information Technology, KAU Computer Science Department Chapter 2: Network Models.

19

CS-416, FCIT, KAU,KSA

2.22.2 The OSI ModelThe OSI Model

Encapsulation A packet: data and header and maybe trailer) The data portion of a packet at level N-1

carries the whole packet from level N Level N-1 is not aware of which part of the

packet is data, header, or trailer For level N-1, the whole packet coming from

level N is treated as one integral unit

Page 20: بسم الله الرحمن الرحيم Faculty of Computing and Information Technology, KAU Computer Science Department Chapter 2: Network Models.

20

CS-416, FCIT, KAU,KSA

2.32.3 Layers in The OSI ModelLayers in The OSI Model

Physical Layer Coordinates the functions required to carry a bit

stream over the physical medium Deals with the mechanical and electrical

specifications of the interface and transmission medium

Defines the procedures and functions that physical devices and interfaces have to perform for transmission to occur

Page 21: بسم الله الرحمن الرحيم Faculty of Computing and Information Technology, KAU Computer Science Department Chapter 2: Network Models.

21

CS-416, FCIT, KAU,KSA

2.32.3 Layers in The OSI ModelLayers in The OSI Model

Physical Layer

Page 22: بسم الله الرحمن الرحيم Faculty of Computing and Information Technology, KAU Computer Science Department Chapter 2: Network Models.

22

CS-416, FCIT, KAU,KSA

2.32.3 Layers in The OSI ModelLayers in The OSI Model

Physical Layer Physical characteristics of interfaces and medium Representation of bits (encoding: bits signals) Data rate (duration of a bit: how long it lasts) Synchronization of bits (clocks) Line configuration (connection of the devices to the

media: point-to-point or multipoint) Physical topology Transmission mode (simplex / half-duplex / full-

duplex)

Page 23: بسم الله الرحمن الرحيم Faculty of Computing and Information Technology, KAU Computer Science Department Chapter 2: Network Models.

23CS-416, FCIT, KAU,KSA

2.3 Layers in The OSI Model

Data Link Layer Transform the physical layer, a raw transmission

facility, to a reliable link It makes the physical layer to appear error free to the

upper layer

Page 24: بسم الله الرحمن الرحيم Faculty of Computing and Information Technology, KAU Computer Science Department Chapter 2: Network Models.

24

CS-416, FCIT, KAU,KSA

2.32.3 Layers in The OSI ModelLayers in The OSI Model

Data Link Layer

The data link layer is responsible for moving frames from one hop (node) to the next.

Page 25: بسم الله الرحمن الرحيم Faculty of Computing and Information Technology, KAU Computer Science Department Chapter 2: Network Models.

25

CS-416, FCIT, KAU,KSA

2.32.3 Layers in The OSI ModelLayers in The OSI Model

Data Link Layer Framing

Frames: manageable data units Physical addressing

Add header to define sender and receiver of the frame Flow control

Impose it to avoid overwhelming the receiver data rate: receiver < sender

Page 26: بسم الله الرحمن الرحيم Faculty of Computing and Information Technology, KAU Computer Science Department Chapter 2: Network Models.

26

CS-416, FCIT, KAU,KSA

2.32.3 Layers in The OSI ModelLayers in The OSI Model

Data Link Layer Error control

Mechanisms to detect and retransmit damaged or lost frames and to recognize duplicate frames

Achieved through trailer added to the end of the frame Access control

When two or more devices connected to the same link decide which device has control over the link at any given time

Page 27: بسم الله الرحمن الرحيم Faculty of Computing and Information Technology, KAU Computer Science Department Chapter 2: Network Models.

27CS-416, FCIT, KAU,KSA

2.3 Layers in The OSI Model

Hop-to-hop delivery

Page 28: بسم الله الرحمن الرحيم Faculty of Computing and Information Technology, KAU Computer Science Department Chapter 2: Network Models.

28

CS-416, FCIT, KAU,KSA

2.32.3 Layers in The OSI ModelLayers in The OSI Model

Network Layer Responsible for the source-to-destination delivery of a

packet possibly across multiple networks (links) Ensures that each packet gets from its point of origin

to its final destination No need for network layer if systems are on the same

networks

The network layer is responsible for the delivery of individual packets from the source host to the destination host.

Page 29: بسم الله الرحمن الرحيم Faculty of Computing and Information Technology, KAU Computer Science Department Chapter 2: Network Models.

29

CS-416, FCIT, KAU,KSA

2.32.3 Layers in The OSI ModelLayers in The OSI Model

Network Layer

Page 30: بسم الله الرحمن الرحيم Faculty of Computing and Information Technology, KAU Computer Science Department Chapter 2: Network Models.

30

CS-416, FCIT, KAU,KSA

2.32.3 Layers in The OSI ModelLayers in The OSI Model

Network Layer Logical addressing

Addresses of the sender and receiver when the packet passes the network boundary

Routing Routing or switching the packets to their final

destination using connecting devices (routers or switches)

Page 31: بسم الله الرحمن الرحيم Faculty of Computing and Information Technology, KAU Computer Science Department Chapter 2: Network Models.

31CS-416, FCIT, KAU,KSA

2.3 Layers in The OSI Model

Source-to-destination delivery

Page 32: بسم الله الرحمن الرحيم Faculty of Computing and Information Technology, KAU Computer Science Department Chapter 2: Network Models.

32

CS-416, FCIT, KAU,KSA

2.32.3 Layers in The OSI ModelLayers in The OSI Model

Transport Layer Responsible for process-to-process delivery A process is an application program on a host Ensures that the whole message arrives intact and in

order

The transport layer is responsible for the delivery of a message from one process to another.

Page 33: بسم الله الرحمن الرحيم Faculty of Computing and Information Technology, KAU Computer Science Department Chapter 2: Network Models.

33

CS-416, FCIT, KAU,KSA

2.32.3 Layers in The OSI ModelLayers in The OSI Model

Transport Layer

Page 34: بسم الله الرحمن الرحيم Faculty of Computing and Information Technology, KAU Computer Science Department Chapter 2: Network Models.

34

CS-416, FCIT, KAU,KSA

2.32.3 Layers in The OSI ModelLayers in The OSI Model

Transport Layer Service-point addressing

Delivery not only from one computer to the next but also from a specific process (running program) on one computer to a specific process on the other

Include service-point address (or port address)

Page 35: بسم الله الرحمن الرحيم Faculty of Computing and Information Technology, KAU Computer Science Department Chapter 2: Network Models.

35

CS-416, FCIT, KAU,KSA

2.32.3 Layers in The OSI ModelLayers in The OSI Model

Transport Layer Segmentation and reassembly

Divide message into segments each contains a sequence # Assemble the segments at the destination

Connection control Connectionless: send packets to destinations Connection-oriented: makes a connection before delivering

the packets Flow control

End to end rather than across a single link Error control

Process to process rather than a single link

Page 36: بسم الله الرحمن الرحيم Faculty of Computing and Information Technology, KAU Computer Science Department Chapter 2: Network Models.

36

CS-416, FCIT, KAU,KSA

2.32.3 Layers in The OSI ModelLayers in The OSI Model

Session Layer It is the network dialog controller It establishes, maintains, and synchronizes the

interaction among communicating systems

The session layer is responsible for dialog control and synchronization.

Page 37: بسم الله الرحمن الرحيم Faculty of Computing and Information Technology, KAU Computer Science Department Chapter 2: Network Models.

37

CS-416, FCIT, KAU,KSA

2.32.3 Layers in The OSI ModelLayers in The OSI Model

Session Layer Dialog control

Allows two systems to enter into a dialog Allows communication between two processes to take place

in either half-duplex or full-duplex Synchronization

Allows a process to add checkpoints, or synchronization points to a stream of data

Example: Sending a file of 2000 pages, insert checkpoints after every 100 pages. If a crash happens during transmission of page 523, the only pages that need to be resent after system recovery are pages 501 to 523

Page 38: بسم الله الرحمن الرحيم Faculty of Computing and Information Technology, KAU Computer Science Department Chapter 2: Network Models.

38

CS-416, FCIT, KAU,KSA

2.32.3 Layers in The OSI ModelLayers in The OSI Model

Session Layer

Page 39: بسم الله الرحمن الرحيم Faculty of Computing and Information Technology, KAU Computer Science Department Chapter 2: Network Models.

39

CS-416, FCIT, KAU,KSA

2.32.3 Layers in The OSI ModelLayers in The OSI Model

Presentation Layer Concerned with the syntax and semantics of the

information exchanged between two systems

The presentation layer is responsible for translation, compression, and encryption.

Page 40: بسم الله الرحمن الرحيم Faculty of Computing and Information Technology, KAU Computer Science Department Chapter 2: Network Models.

40

CS-416, FCIT, KAU,KSA

2.32.3 Layers in The OSI ModelLayers in The OSI Model

Presentation Layer Concerned with the syntax and semantics of the

information exchanged between two systems

Page 41: بسم الله الرحمن الرحيم Faculty of Computing and Information Technology, KAU Computer Science Department Chapter 2: Network Models.

41

CS-416, FCIT, KAU,KSA

2.32.3 Layers in The OSI ModelLayers in The OSI Model

Presentation Layer Translation

Interoperability between different coding systems Encryption Compression

Page 42: بسم الله الرحمن الرحيم Faculty of Computing and Information Technology, KAU Computer Science Department Chapter 2: Network Models.

42

CS-416, FCIT, KAU,KSA

2.32.3 Layers in The OSI ModelLayers in The OSI Model

Application Layer Enables the user to access the network Provides user interfaces

The application layer is responsible for providing services to the user.

Page 43: بسم الله الرحمن الرحيم Faculty of Computing and Information Technology, KAU Computer Science Department Chapter 2: Network Models.

43

CS-416, FCIT, KAU,KSA

2.32.3 Layers in The OSI ModelLayers in The OSI Model

Application Layer

Page 44: بسم الله الرحمن الرحيم Faculty of Computing and Information Technology, KAU Computer Science Department Chapter 2: Network Models.

44

CS-416, FCIT, KAU,KSA

2.32.3 Layers in The OSI ModelLayers in The OSI Model

Application Layer Enables network virtual terminal (a software version

of a physical terminal) it allows a user to log on to a remote host

File transfer access, and management Mail services Directory services

Page 45: بسم الله الرحمن الرحيم Faculty of Computing and Information Technology, KAU Computer Science Department Chapter 2: Network Models.

45

CS-416, FCIT, KAU,KSA

2.32.3 Layers in The OSI ModelLayers in The OSI Model

Summary of Layers

Page 46: بسم الله الرحمن الرحيم Faculty of Computing and Information Technology, KAU Computer Science Department Chapter 2: Network Models.

46

CS-416, FCIT, KAU,KSA

2.32.3 Layers in The OSI ModelLayers in The OSI Model

Summary of Layers

Page 47: بسم الله الرحمن الرحيم Faculty of Computing and Information Technology, KAU Computer Science Department Chapter 2: Network Models.

47

CS-416, FCIT, KAU,KSA

2.42.4 TCP/IP Protocol SuiteTCP/IP Protocol Suite

TCP/IP protocol was defined as having 4 layers: host-to-network, internet, transport, and application

The layers in the TCP/IP protocol suite do not exactly match those in the OSI model

When TCP/IP is compared to OSI, it can be said that the TCP/IP protocol is made of 5 layers: physical, data link, network, transport, and application

Page 48: بسم الله الرحمن الرحيم Faculty of Computing and Information Technology, KAU Computer Science Department Chapter 2: Network Models.

48

CS-416, FCIT, KAU,KSA

2.42.4 TCP/IP Protocol SuiteTCP/IP Protocol Suite

Page 49: بسم الله الرحمن الرحيم Faculty of Computing and Information Technology, KAU Computer Science Department Chapter 2: Network Models.

49

CS-416, FCIT, KAU,KSA

2.42.4 TCP/IP Protocol SuiteTCP/IP Protocol Suite

Physical and Data Link Layers Network Layer Transport Layer Application Layer

Page 50: بسم الله الرحمن الرحيم Faculty of Computing and Information Technology, KAU Computer Science Department Chapter 2: Network Models.

50

CS-416, FCIT, KAU,KSA

2.42.4 TCP/IP Protocol SuiteTCP/IP Protocol Suite

Physical and Data Link Layers TCP/IP does not define any specific protocol It supports all the standard and proprietary protocols

Page 51: بسم الله الرحمن الرحيم Faculty of Computing and Information Technology, KAU Computer Science Department Chapter 2: Network Models.

51

CS-416, FCIT, KAU,KSA

2.42.4 TCP/IP Protocol SuiteTCP/IP Protocol Suite

Network Layer: TCP/IP supports the Internetworking protocol (IP) It uses 4 supporting protocol

ARP RARP ICMP IGMP

Page 52: بسم الله الرحمن الرحيم Faculty of Computing and Information Technology, KAU Computer Science Department Chapter 2: Network Models.

52

CS-416, FCIT, KAU,KSA

2.42.4 TCP/IP Protocol SuiteTCP/IP Protocol Suite

Network Layer Internetworking Protocol (IP)

The transmission mechanism used by the TCP/IP protocols Unreliable and connectionless protocol – best short delivery

service (means no error checking or tracking) Data packets are called datagrams which are transmitted

separately. Datagrams can travel along different routes and can arrive out of sequence or be duplicated.

IP does not keep track of the routes and has no facility for reordering datagrams once they arrive at their destination

IP provides bare-bones transmission functions that free the user to add only those facilities necessary for a given application and thereby allow for maximum efficiency

Page 53: بسم الله الرحمن الرحيم Faculty of Computing and Information Technology, KAU Computer Science Department Chapter 2: Network Models.

53

CS-416, FCIT, KAU,KSA

2.42.4 TCP/IP Protocol SuiteTCP/IP Protocol Suite

Network Layer Address Resolution Protocol (ARP)

Used to associate a logical address with a physical address

Each device on a on a link is identified by a physical or station address usually imprinted on the network interface card (NIC)

Page 54: بسم الله الرحمن الرحيم Faculty of Computing and Information Technology, KAU Computer Science Department Chapter 2: Network Models.

54

CS-416, FCIT, KAU,KSA

2.42.4 TCP/IP Protocol SuiteTCP/IP Protocol Suite

Network Layer Reverse Address Resolution Protocol (RARP)

Allows a host to discover its Internet address when it knows only its physical address

It is used when the computer is connected to a network for the first time

Page 55: بسم الله الرحمن الرحيم Faculty of Computing and Information Technology, KAU Computer Science Department Chapter 2: Network Models.

55

CS-416, FCIT, KAU,KSA

2.42.4 TCP/IP Protocol SuiteTCP/IP Protocol Suite

Network Layer Internet Control Message Protocol (ICMP)

A mechanism used by hosts and gateways to send notification of datagram problems back to the sender

Internet Group Message Protocol (IGMP) Used to facilitate the simultaneous transmission of a

message to a group of recipients

Page 56: بسم الله الرحمن الرحيم Faculty of Computing and Information Technology, KAU Computer Science Department Chapter 2: Network Models.

56

CS-416, FCIT, KAU,KSA

2.42.4 TCP/IP Protocol SuiteTCP/IP Protocol Suite

Transport Layer Protocols TCP, UDP, and SCTP IP is host-to host UDP and TCP are process-to-process

Page 57: بسم الله الرحمن الرحيم Faculty of Computing and Information Technology, KAU Computer Science Department Chapter 2: Network Models.

57

CS-416, FCIT, KAU,KSA

2.42.4 TCP/IP Protocol SuiteTCP/IP Protocol Suite

Transport Layer User Datagram Protocol (UDP)

Process-to-process protocol Adds:

Port addresses Checksum error control Length information to the data from the upper layer

Page 58: بسم الله الرحمن الرحيم Faculty of Computing and Information Technology, KAU Computer Science Department Chapter 2: Network Models.

58

CS-416, FCIT, KAU,KSA

2.42.4 TCP/IP Protocol SuiteTCP/IP Protocol Suite

Transport Layer Transmission Control Protocol (TCP)

Provides full transport-layer services to applications A reliable stream (connection-oriented) transport protocol At the sending end of each transmission, TCP divides a

stream of data into smaller units called segments Each segment includes a sequence number for reordering

after receipt together with an acknowledgment number for the segments received

Segments are carried across internet inside of IP datagrams At the receiving end TCP collects each datagram as it comes

in and reorders the transmission based on sequence numbers

Page 59: بسم الله الرحمن الرحيم Faculty of Computing and Information Technology, KAU Computer Science Department Chapter 2: Network Models.

59

CS-416, FCIT, KAU,KSA

2.42.4 TCP/IP Protocol SuiteTCP/IP Protocol Suite

Transport Layer Stream Control Transmission Protocol (SCTP)

Provides support for newer applications such as voice over the Internet

Page 60: بسم الله الرحمن الرحيم Faculty of Computing and Information Technology, KAU Computer Science Department Chapter 2: Network Models.

60

CS-416, FCIT, KAU,KSA

2.42.4 TCP/IP Protocol SuiteTCP/IP Protocol Suite

Application Layer

Page 61: بسم الله الرحمن الرحيم Faculty of Computing and Information Technology, KAU Computer Science Department Chapter 2: Network Models.

61

CS-416, FCIT, KAU,KSA

2.52.5 AddressingAddressing

In an internet employing the TCP/IP protocols 4 levels of addresses are used Physical (link) addresses Logical (IP) addresses Port addresses Specific addresses

Page 62: بسم الله الرحمن الرحيم Faculty of Computing and Information Technology, KAU Computer Science Department Chapter 2: Network Models.

62

CS-416, FCIT, KAU,KSA

2.52.5 AddressingAddressing

Relationship of layers and addresses in TCP/IP

Page 63: بسم الله الرحمن الرحيم Faculty of Computing and Information Technology, KAU Computer Science Department Chapter 2: Network Models.

63

CS-416, FCIT, KAU,KSA

2.52.5 AddressingAddressing

Physical Addresses ( Link address) Address of a node as defined by its LAN or WAN Included in the frame used by the data link layer Lowest level address Size and format depend on the network

Ethernet uses 6-byte physical address LocalTalk uses 1-byte dynamic address

Page 64: بسم الله الرحمن الرحيم Faculty of Computing and Information Technology, KAU Computer Science Department Chapter 2: Network Models.

64

CS-416, FCIT, KAU,KSA

2.52.5 AddressingAddressing

Example 1: A node with physical address 10 sends a frame to a node with physical address 87.

87 10 T2Data

Data

87 10 T2Data

Data

1010 8787

Page 65: بسم الله الرحمن الرحيم Faculty of Computing and Information Technology, KAU Computer Science Department Chapter 2: Network Models.

65

CS-416, FCIT, KAU,KSA

2.52.5 AddressingAddressing

Example 2: LANs use 48- bit (6-byte) physical address written as 12 hexadecimal digits; every byte is separated by a colon.

07:01:02:01:2C:4B

A 6-byte (12 hexadecimal digits) physical address.

Page 66: بسم الله الرحمن الرحيم Faculty of Computing and Information Technology, KAU Computer Science Department Chapter 2: Network Models.

66

CS-416, FCIT, KAU,KSA

2.52.5 AddressingAddressing

Logical Addresses Necessary for universal communication that are independent of

underlying physical networks Physical addresses are not adequate in an internetwork

environment where different networks can have different address formats

A universal addressing system is needed in which each host can be identified uniquely, regardless of the underlying physical network

Logical address in the Internet is currently a 32-bit address that can uniquely define a host connected to the internet

No two publicly addressed and visible hosts on the Internet can have the same IP address

Page 67: بسم الله الرحمن الرحيم Faculty of Computing and Information Technology, KAU Computer Science Department Chapter 2: Network Models.

67

CS-416, FCIT, KAU,KSA

2.52.5 AddressingAddressing

Example The following exhibit shows part of an internet with:

3 LANs 2 Routers Each device has a pair of addresses (logical &

physical) Computer with logical/physical address A/10 needs to

send a packet to the computer with address P/95

Page 68: بسم الله الرحمن الرحيم Faculty of Computing and Information Technology, KAU Computer Science Department Chapter 2: Network Models.

68

IP addresses

Page 69: بسم الله الرحمن الرحيم Faculty of Computing and Information Technology, KAU Computer Science Department Chapter 2: Network Models.

69

CS-416, FCIT, KAU,KSA

2.52.5 AddressingAddressing

The physical addresses will change from hop to hop,but the logical addresses usually remain the same.

Page 70: بسم الله الرحمن الرحيم Faculty of Computing and Information Technology, KAU Computer Science Department Chapter 2: Network Models.

70

CS-416, FCIT, KAU,KSA

2.52.5 AddressingAddressing

Port Addresses Arrival at the destination host is not the final objective

of data communication on the Internet A system that sends nothing but data from one

computer to another is not complete Today computers are devices that can run multiple

processes at the same time The end objective of Internet communication is a

process communicating with another process For processes to receive data simultaneously, a

method to label the different processes is needed In TCP/IP the label is called: port number (16-bit)

Page 71: بسم الله الرحمن الرحيم Faculty of Computing and Information Technology, KAU Computer Science Department Chapter 2: Network Models.

71

CS-416, FCIT, KAU,KSA

2.52.5 AddressingAddressingPort addresses

Page 72: بسم الله الرحمن الرحيم Faculty of Computing and Information Technology, KAU Computer Science Department Chapter 2: Network Models.

72

CS-416, FCIT, KAU,KSA

2.52.5 AddressingAddressing

Port Addresses

The physical addresses change from hop to hop,but the logical and port addresses usually remain the same.

Page 73: بسم الله الرحمن الرحيم Faculty of Computing and Information Technology, KAU Computer Science Department Chapter 2: Network Models.

73

CS-416, FCIT, KAU,KSA

2.52.5 AddressingAddressing

Port Addresses Example: A port address is a 16-bit address

represented by one decimal number

753

A 16-bit port address represented as one single number.

Page 74: بسم الله الرحمن الرحيم Faculty of Computing and Information Technology, KAU Computer Science Department Chapter 2: Network Models.

74

CS-416, FCIT, KAU,KSA

2.52.5 AddressingAddressing

Specific Addresses Some application have user-friendly addresses that

are designed for that specific address Example: e-mail address, URL, These addresses,

however, get changed to the corresponding port and logical addresses by the sending computer