Top Banner
1 ISM - © 2010 Houman Younessi Lecture 5 Convener: Houman Younessi 1-860-548-7880 [email protected] Information Systems Spring 2011
13

1ISM - © 2010 Houman Younessi Lecture 5 Convener: Houman Younessi 1-860-548-7880 [email protected] Information Systems Spring 2011.

Dec 20, 2015

Download

Documents

Welcome message from author
This document is posted to help you gain knowledge. Please leave a comment to let me know what you think about it! Share it to your friends and learn new things together.
Transcript
Page 1: 1ISM - © 2010 Houman Younessi Lecture 5 Convener: Houman Younessi 1-860-548-7880 youneh@rpi.edu Information Systems Spring 2011.

1ISM - © 2010 Houman Younessi

Lecture 5

Convener:

Houman Younessi

1-860-548-7880

[email protected]

Information SystemsSpring 2011

Page 2: 1ISM - © 2010 Houman Younessi Lecture 5 Convener: Houman Younessi 1-860-548-7880 youneh@rpi.edu Information Systems Spring 2011.

2ISM - © 2010 Houman Younessi

Lecture 5

Islands of Information/Automation

Need for inter-communication

Page 3: 1ISM - © 2010 Houman Younessi Lecture 5 Convener: Houman Younessi 1-860-548-7880 youneh@rpi.edu Information Systems Spring 2011.

3ISM - © 2010 Houman Younessi

Lecture 5

Network:A collection of links arranged so that messages may be passed from one part to another usually over multiple links.

Data Communication Networks

Tele-Communication Networks

Page 4: 1ISM - © 2010 Houman Younessi Lecture 5 Convener: Houman Younessi 1-860-548-7880 youneh@rpi.edu Information Systems Spring 2011.

4ISM - © 2010 Houman Younessi

Lecture 5

Network ProtocolsThe Open Systems Interconnection Reference Model (OSI Model or OSI Reference Model for short) is a layered, abstract description for communications and computer network protocol design.

Page 5: 1ISM - © 2010 Houman Younessi Lecture 5 Convener: Houman Younessi 1-860-548-7880 youneh@rpi.edu Information Systems Spring 2011.

5ISM - © 2010 Houman Younessi

Lecture 5

Layer 1: Physical Layer

Defines all the electrical and physical specifications for devices including layout of pins, voltages, and cable specifications. Hubs, repeaters, network adapters and Host Bus Adapters (HBAs used in Storage Area Networks) are physical-layer devices. Ethernet incorporates both this layer and the data-link layer (Layer 2). The same applies to other local-area networks, such as Token ring, FDDI, and IEEE 802.11.The major functions and services performed by the physical layer are:

• Establish/terminate a connection• Contention resolution and flow control• Modulation, or conversion between the representation of digital data in user equipment and the corresponding signals transmitted over a communications channel. These are signals operating over the physical cabling—copper and fiber optic, for example—or over a radio link.

Page 6: 1ISM - © 2010 Houman Younessi Lecture 5 Convener: Houman Younessi 1-860-548-7880 youneh@rpi.edu Information Systems Spring 2011.

6ISM - © 2010 Houman Younessi

Lecture 5

Transfers data between network entities and to detect and possibly correct errors that may occur in the Physical layer. The addressing scheme is physical which means that the addresses are hard-coded into the network cards at the time of manufacture. The addressing scheme is flat.

Examples are Ethernet, HDLC and ADCCP for point-to-point or packet-switched networks and Aloha for local area networks. On IEEE 802 local area networks, and some non-IEEE 802 networks such as FDDI, this layer may be split into a Media Access Control (MAC) layer and the IEEE 802.2 Logical Link Control (LLC) layer.

This is the layer at which the bridges and switches operate. Connectivity is provided only among locally attached network nodes.

Layer 2: Data Link Layer

Page 7: 1ISM - © 2010 Houman Younessi Lecture 5 Convener: Houman Younessi 1-860-548-7880 youneh@rpi.edu Information Systems Spring 2011.

7ISM - © 2010 Houman Younessi

Lecture 5

Layer 3: Network Layer

Provides the functional and procedural means of transferring variable length data sequences from a source to a destination via one or more networks while maintaining the quality of service requested by the Transport layer. The Network layer performs network routing, flow control, segmentation/de-segmentation, and error control functions. Routers operate at this layer—sending data throughout the extended network and making the Internet possible (there also exist layer 3 (or IP) switches). This is a logical addressing scheme – values are chosen by the network engineer. The addressing scheme is hierarchical. The best known example of a layer 3 protocol is the Internet Protocol (IP).

Page 8: 1ISM - © 2010 Houman Younessi Lecture 5 Convener: Houman Younessi 1-860-548-7880 youneh@rpi.edu Information Systems Spring 2011.

8ISM - © 2010 Houman Younessi

Lecture 5

Layer 4: Transport Layer

Provides transparent transfer of data between end users, thus relieving the upper layers from any concern while providing reliable and cost-effective data transfer. The transport layer controls the reliability of a given link. Some protocols are state and connection oriented. This means that the transport layer can keep track of the packets and retransmit those that fail. The best known example of a layer 4 protocol is the Transmission Control Protocol (TCP). It is the layer that converts messages into TCP, User Datagram Protocol (UDP), Stream Control Transmission Protocol (SCTP), etc. packets.

Page 9: 1ISM - © 2010 Houman Younessi Lecture 5 Convener: Houman Younessi 1-860-548-7880 youneh@rpi.edu Information Systems Spring 2011.

9ISM - © 2010 Houman Younessi

Lecture 5

Layer 5: Session Layer

Controls the dialogues (sessions) between computers. It establishes, manages and terminates the connections between the local and remote application. It provides for either duplex or half-duplex operation and establishes check-pointing, adjournment, termination, and restart procedures. The OSI model made this layer responsible for "graceful close" of sessions, which is a property of TCP, and also for session check-pointing and recovery, which is not usually used in the Internet protocol suite.

Page 10: 1ISM - © 2010 Houman Younessi Lecture 5 Convener: Houman Younessi 1-860-548-7880 youneh@rpi.edu Information Systems Spring 2011.

10ISM - © 2010 Houman Younessi

Lecture 5

Layer 6: Presentation Layer

Transforms data to provide a standard interface for the Application layer. MIME encoding, data compression, data encryption and similar manipulation of the presentation is done at this layer to present the data as a service or protocol developer sees fit. Examples: converting an EBCDIC-coded text file to an ASCII-coded file, or serializing objects and other data structures into and out of XML.

Page 11: 1ISM - © 2010 Houman Younessi Lecture 5 Convener: Houman Younessi 1-860-548-7880 youneh@rpi.edu Information Systems Spring 2011.

11ISM - © 2010 Houman Younessi

Lecture 5

Layer 7: Application Layer

Provides a means for the user to access information on the network through an application. This layer is the main interface for the user(s) to interact with the application and therefore the network. Some examples of application layer protocols include Telnet, File Transfer Protocol (FTP), Simple Mail Transfer Protocol (SMTP) and Hypertext Transfer Protocol (HTTP).

Page 12: 1ISM - © 2010 Houman Younessi Lecture 5 Convener: Houman Younessi 1-860-548-7880 youneh@rpi.edu Information Systems Spring 2011.

12ISM - © 2010 Houman Younessi

Lecture 5

Page 13: 1ISM - © 2010 Houman Younessi Lecture 5 Convener: Houman Younessi 1-860-548-7880 youneh@rpi.edu Information Systems Spring 2011.

13ISM - © 2010 Houman Younessi

Lecture 5

Towards a Real-time Infra-structure:

Better Data – Better Decisions

Improved Process Visibility

Improved Process Efficiency

Sense-and-respond (respond to actual demand rather than forecasted demand)

But for this to take place, we need to integrate more than just the production.