SlideShare a Scribd company logo
Network Software
1
Protocol Hierarchies
 To reduce their design complexity, most networks are organized as a stack of
layers or levels, each one built upon the one below it. Layering partitions
related communications functions into groups that are manageable
 The number of layers, the name of each layer, the contents of each layer, and
the function of each layer differ from network to network.
 The purpose of each layer is to offer certain services to the higher layers,
shielding those layers from the details of how the offered services are actually
implemented.
MukeshChinta,AsstProf,CSE,VRSEC
2
Why Protocol Layering?
1. Modularity – one problem is decomposed into a number of smaller more
manageable sub-problems
⇒ more flexibility in designing, modifying and evolving computer networks
2. Functionality reuse – a common functionality of a lower layer can be
shared by many upper layers
Mukesh Chinta, Asst Prof,
CSE, VRSEC
3
Mukesh Chinta, Asst Prof, CSE, VRSEC
4
Mukesh Chinta, Asst Prof,
CSE, VRSEC
5
 Layer n on one machine carries on a conversation with layer n on
another machine. The rules and conventions used in this
conversation are collectively known as the layer n protocol.
Basically, a protocol is an agreement between the communicating
parties on how communication is to proceed.
 In reality, no data are directly transferred from layer n on one
machine to layer n on another machine. Instead, each layer passes
data and control information to the layer immediately below it,
until the lowest layer is reached. Below layer 1 is the physical
medium through which actual communication occurs
 Between each pair of adjacent layers is an interface. The interface
defines which primitive operations and services the lower layer
makes available to the upper one
 A set of layers and protocols is called a network architecture. A
list of protocols used by a certain system, one protocol per layer, is
called a protocol stack. Mukesh Chinta, Asst Prof, CSE, VRSEC
6
Information Flow
A message, M, is produced by an application process running in layer 5 and
given to layer 4 for transmission. Layer 4 puts a header in front of the message
to identify the message and passes the result to layer 3. The header includes
control information, such as sequence numbers, to allow layer 4 on the
destination machine to deliver messages in the right order if the lower layers do
not maintain sequence. In some layers, headers can also contain sizes, times,
and other control fields.
Mukesh Chinta, Asst Prof,
CSE, VRSEC
7
Mukesh Chinta, Asst Prof,
CSE, VRSEC
8
Protocol
stack within
kernel
Etherne
t
User
process
Client and Server on same Ethernet
Multiple Layers of Network Protocols
Mukesh Chinta, Asst Prof,
CSE, VRSEC
9
Design Issues of Layers
 Addressing - whom am I going to talk to? i.e., how do we identify
senders and receivers?
 Rules for data transfer: Simplex (one way channels), half-
duplex (two way communication but not simultaneously) and full
duplex (2 way)
 Logical channels: How many are needed? Usually at least 2. One
for normal mode and one for urgent transmission.
 Reconstituting messages: Message pieces are to be number to
preserve sequence. Out of order messages need to be numbered.
 Error control: This is all about communicating along imperfect
channels. Solution involves error correction/detection codes.
(Issues: Attenuation, delay distortion and noise).Mukesh Chinta, Asst Prof,
CSE, VRSEC
10
Design Issues of Layers Contd..
 Large messages: Procedures for disassembling, transmitting and
reassembling. What to do when messages are very small
(compared to packet)?
 Multiplexing: One connection per conversation or many on one
connection. What if, in the physical layer where only a few lines
are available
 Routing: Already alluded to. What to do when there are multiple
paths between communicating machines
 Flow Control: How to keep a fast sender from swamping a slow
receiver with data. Solutions involve direct/indirect feedback or
an agreed on transmission rate
Mukesh Chinta, Asst Prof,
CSE, VRSEC
11
Connection-Oriented and Connectionless Services
 Layer n offers 2 types of services to n+1: Connection Oriented & Connection
Less
 Connection-oriented: Like phone system. Dial, talk, hang up. To use a
connection-oriented network service user first establishes connection, uses the
connection and finally releases the connection. The connection should be
thought of as a water-pipe. Water (bits) is pumped from one end and comes out
the other in FIFO order. A negotiation is conducted at the time of connection
establishment about the parameters to be used such as message size, QOS &
other issues.
 Connectionless: Its like the postal system. Each packet is routed through the
system independent of the others. Possible for message 1 to arrive after
message 2. In connection oriented services this is impossible.
 Quality of service: Reliable services don’t lose data. Unreliable services may.
Reliability is obtained by having recipient acknowledge each message.
Mukesh Chinta, Asst Prof,
CSE, VRSEC
12
 Reliable connection-oriented service has two minor variations: message sequences
and byte streams. In the former variant, the message boundaries are preserved.
When two 1024-byte messages are sent, they arrive as two distinct 1024-byte
messages, never as one 2048-byte message.
 In the latter, the connection is simply a stream of bytes, with no message
boundaries. When 2048 bytes arrive at the receiver, there is no way to tell if they
were sent as one 2048-byte message, two 1024-byte messages, or 2048 1-byte
messages.
 Not all applications require connections. Unreliable (meaning not acknowledged)
connectionless service is often called datagram service, in analogy with telegram
service, which also does not return an acknowledgement to the sender.
Connection-Oriented and Connectionless Services
13
Service Primitives
 A service is formally specified by a set of primitives (operations)
available to a user process to access the service. These primitives tell the
service to perform some action or report on an action taken by a peer
entity.
 The set of primitives available depends on the nature of the service
being provided. The primitives for connection-oriented service are
different from those of connectionless service
Five service primitives for implementing a simple connection-oriented
service.
Mukesh Chinta, Asst Prof,
CSE, VRSEC
14
Packets sent in a simple client-server interaction on
a connection-oriented network
Mukesh Chinta, Asst Prof,
CSE, VRSEC
15
The Relationship of Services to Protocols
 A service is a set of primitives (operations) that a layer provides to the
layer above it. The service defines what operations the layer is prepared to
perform on behalf of its users, but it says nothing at all about how these
operations are implemented. A service relates to an interface between
two layers, with the lower layer being the service provider and the upper
layer being the service user.
 A protocol, in contrast, is a set of rules governing the format and meaning
of the packets, or messages that are exchanged by the peer entities within
a layer. Entities use protocols to implement their service definitions.
Mukesh Chinta, Asst Prof, CSE, VRSEC
16
Mukesh Chinta, Asst Prof, CSE, VRSEC17
Mukesh Chinta, Asst Prof, CSE, VRSEC
18

More Related Content

PPTX
Quality of Service
PPTX
Evolution of network - computer networks
PPTX
MAC & IP addresses
PPTX
IP Configuration
PPSX
Packet Tracer Tutorial # 1
PPT
Basics Of Networking (Overview)
PPT
Types of Load distributing algorithm in Distributed System
PPT
Ip address and subnetting
Quality of Service
Evolution of network - computer networks
MAC & IP addresses
IP Configuration
Packet Tracer Tutorial # 1
Basics Of Networking (Overview)
Types of Load distributing algorithm in Distributed System
Ip address and subnetting

What's hot (20)

PPTX
Point to-point protocol (ppp)
PPTX
Mac addresses(media access control)
PPTX
Network management ppt
PPTX
802.11 Computer Networks
PPTX
Physical layer OSI Model & Transmission Media
DOCX
Ports and protocols
PPTX
The medium access sublayer
PPTX
Basics of IP Addressing
PPTX
What is Ping
PPT
Networking basics PPT
PPTX
Mobile network layer (mobile comm.)
PPTX
network monitoring system ppt
PPTX
TCP and UDP
PDF
Computer Network Notes (Handwritten) UNIT 2
PDF
CCNA Routing Fundamentals - EIGRP, OSPF and RIP
PPTX
Transport control protocols for Wireless sensor networks
PDF
IEEE 802.11 Architecture and Services
PPTX
Application Layer
PPTX
Computer Networks: Quality of service
PPTX
Lec1 :- Data communication and network
Point to-point protocol (ppp)
Mac addresses(media access control)
Network management ppt
802.11 Computer Networks
Physical layer OSI Model & Transmission Media
Ports and protocols
The medium access sublayer
Basics of IP Addressing
What is Ping
Networking basics PPT
Mobile network layer (mobile comm.)
network monitoring system ppt
TCP and UDP
Computer Network Notes (Handwritten) UNIT 2
CCNA Routing Fundamentals - EIGRP, OSPF and RIP
Transport control protocols for Wireless sensor networks
IEEE 802.11 Architecture and Services
Application Layer
Computer Networks: Quality of service
Lec1 :- Data communication and network
Ad

Similar to Networks software (20)

PDF
Ch 2 network
PPTX
computer network OSI layer
PPTX
Chapter 2 computer network PPT CN-1.pptx
PPT
934 Ch1 Networks
PPT
Computer networks chapter1.
PDF
Chap 2 network models
PPTX
Networking (osi model)
PPTX
OSI and TCP/IP reference models in networking
PPTX
computer network and technology basic description
PDF
OSI Model
PPTX
A computer network is a system of interconnected devices that can share resou...
PPT
nv.ppt
PDF
Computer netwrks
PDF
Notes of computer communication and networking
PDF
Computer network first module notes of engineering
PPT
introduction to data comunication
PDF
OSI MODEL
PDF
OSI &TCP/IP Model
PPTX
PPTX
The ISO_OSI Reference Model
Ch 2 network
computer network OSI layer
Chapter 2 computer network PPT CN-1.pptx
934 Ch1 Networks
Computer networks chapter1.
Chap 2 network models
Networking (osi model)
OSI and TCP/IP reference models in networking
computer network and technology basic description
OSI Model
A computer network is a system of interconnected devices that can share resou...
nv.ppt
Computer netwrks
Notes of computer communication and networking
Computer network first module notes of engineering
introduction to data comunication
OSI MODEL
OSI &TCP/IP Model
The ISO_OSI Reference Model
Ad

More from Mukesh Chinta (20)

PDF
CCNA-2 SRWE Mod-10 LAN Security Concepts
PDF
CCNA-2 SRWE Mod-11 Switch Security Configuration
PDF
CCNA-2 SRWE Mod-12 WLAN Concepts
PDF
CCNA-2 SRWE Mod-13 WLAN Configuration
PDF
CCNA-2 SRWE Mod-15 Static IP Routing
PDF
CCNA-2 SRWE Mod-14 Routing Concepts
PDF
Protecting the Organization - Cisco: Intro to Cybersecurity Chap-4
PDF
Protecting Your Data and Privacy- Cisco: Intro to Cybersecurity chap-3
PDF
Attacks, Concepts and Techniques - Cisco: Intro to Cybersecurity Chap-2
PDF
The need for Cybersecurity - Cisco Intro to Cybersec Chap-1
PDF
Cisco Cybersecurity Essentials Chapter- 7
PDF
Protocols and Reference models CCNAv7-1
PDF
Basic Switch and End Device configuration CCNA7 Module 2
PDF
Introduction to networks CCNAv7 Module-1
PDF
Process scheduling (CPU Scheduling)
PDF
OS - Process Concepts
PDF
Operating systems system structures
PDF
Introduction to Operating Systems
PDF
Cisco cybersecurity essentials chapter 8
PDF
Cisco cybersecurity essentials chapter - 6
CCNA-2 SRWE Mod-10 LAN Security Concepts
CCNA-2 SRWE Mod-11 Switch Security Configuration
CCNA-2 SRWE Mod-12 WLAN Concepts
CCNA-2 SRWE Mod-13 WLAN Configuration
CCNA-2 SRWE Mod-15 Static IP Routing
CCNA-2 SRWE Mod-14 Routing Concepts
Protecting the Organization - Cisco: Intro to Cybersecurity Chap-4
Protecting Your Data and Privacy- Cisco: Intro to Cybersecurity chap-3
Attacks, Concepts and Techniques - Cisco: Intro to Cybersecurity Chap-2
The need for Cybersecurity - Cisco Intro to Cybersec Chap-1
Cisco Cybersecurity Essentials Chapter- 7
Protocols and Reference models CCNAv7-1
Basic Switch and End Device configuration CCNA7 Module 2
Introduction to networks CCNAv7 Module-1
Process scheduling (CPU Scheduling)
OS - Process Concepts
Operating systems system structures
Introduction to Operating Systems
Cisco cybersecurity essentials chapter 8
Cisco cybersecurity essentials chapter - 6

Recently uploaded (20)

PPTX
Strings in CPP - Strings in C++ are sequences of characters used to store and...
PPTX
Engineering Ethics, Safety and Environment [Autosaved] (1).pptx
PDF
PRIZ Academy - 9 Windows Thinking Where to Invest Today to Win Tomorrow.pdf
PPTX
UNIT 4 Total Quality Management .pptx
PPTX
MET 305 2019 SCHEME MODULE 2 COMPLETE.pptx
PPTX
CH1 Production IntroductoryConcepts.pptx
PPTX
web development for engineering and engineering
PPTX
Welding lecture in detail for understanding
PPT
Project quality management in manufacturing
PPTX
Recipes for Real Time Voice AI WebRTC, SLMs and Open Source Software.pptx
PPTX
Sustainable Sites - Green Building Construction
PPTX
UNIT-1 - COAL BASED THERMAL POWER PLANTS
PDF
Digital Logic Computer Design lecture notes
PPTX
Construction Project Organization Group 2.pptx
PDF
Mohammad Mahdi Farshadian CV - Prospective PhD Student 2026
PDF
composite construction of structures.pdf
PPTX
FINAL REVIEW FOR COPD DIANOSIS FOR PULMONARY DISEASE.pptx
PPTX
KTU 2019 -S7-MCN 401 MODULE 2-VINAY.pptx
PPTX
Geodesy 1.pptx...............................................
PPTX
Infosys Presentation by1.Riyan Bagwan 2.Samadhan Naiknavare 3.Gaurav Shinde 4...
Strings in CPP - Strings in C++ are sequences of characters used to store and...
Engineering Ethics, Safety and Environment [Autosaved] (1).pptx
PRIZ Academy - 9 Windows Thinking Where to Invest Today to Win Tomorrow.pdf
UNIT 4 Total Quality Management .pptx
MET 305 2019 SCHEME MODULE 2 COMPLETE.pptx
CH1 Production IntroductoryConcepts.pptx
web development for engineering and engineering
Welding lecture in detail for understanding
Project quality management in manufacturing
Recipes for Real Time Voice AI WebRTC, SLMs and Open Source Software.pptx
Sustainable Sites - Green Building Construction
UNIT-1 - COAL BASED THERMAL POWER PLANTS
Digital Logic Computer Design lecture notes
Construction Project Organization Group 2.pptx
Mohammad Mahdi Farshadian CV - Prospective PhD Student 2026
composite construction of structures.pdf
FINAL REVIEW FOR COPD DIANOSIS FOR PULMONARY DISEASE.pptx
KTU 2019 -S7-MCN 401 MODULE 2-VINAY.pptx
Geodesy 1.pptx...............................................
Infosys Presentation by1.Riyan Bagwan 2.Samadhan Naiknavare 3.Gaurav Shinde 4...

Networks software

  • 2. Protocol Hierarchies  To reduce their design complexity, most networks are organized as a stack of layers or levels, each one built upon the one below it. Layering partitions related communications functions into groups that are manageable  The number of layers, the name of each layer, the contents of each layer, and the function of each layer differ from network to network.  The purpose of each layer is to offer certain services to the higher layers, shielding those layers from the details of how the offered services are actually implemented. MukeshChinta,AsstProf,CSE,VRSEC 2
  • 3. Why Protocol Layering? 1. Modularity – one problem is decomposed into a number of smaller more manageable sub-problems ⇒ more flexibility in designing, modifying and evolving computer networks 2. Functionality reuse – a common functionality of a lower layer can be shared by many upper layers Mukesh Chinta, Asst Prof, CSE, VRSEC 3
  • 4. Mukesh Chinta, Asst Prof, CSE, VRSEC 4
  • 5. Mukesh Chinta, Asst Prof, CSE, VRSEC 5
  • 6.  Layer n on one machine carries on a conversation with layer n on another machine. The rules and conventions used in this conversation are collectively known as the layer n protocol. Basically, a protocol is an agreement between the communicating parties on how communication is to proceed.  In reality, no data are directly transferred from layer n on one machine to layer n on another machine. Instead, each layer passes data and control information to the layer immediately below it, until the lowest layer is reached. Below layer 1 is the physical medium through which actual communication occurs  Between each pair of adjacent layers is an interface. The interface defines which primitive operations and services the lower layer makes available to the upper one  A set of layers and protocols is called a network architecture. A list of protocols used by a certain system, one protocol per layer, is called a protocol stack. Mukesh Chinta, Asst Prof, CSE, VRSEC 6
  • 7. Information Flow A message, M, is produced by an application process running in layer 5 and given to layer 4 for transmission. Layer 4 puts a header in front of the message to identify the message and passes the result to layer 3. The header includes control information, such as sequence numbers, to allow layer 4 on the destination machine to deliver messages in the right order if the lower layers do not maintain sequence. In some layers, headers can also contain sizes, times, and other control fields. Mukesh Chinta, Asst Prof, CSE, VRSEC 7
  • 8. Mukesh Chinta, Asst Prof, CSE, VRSEC 8
  • 9. Protocol stack within kernel Etherne t User process Client and Server on same Ethernet Multiple Layers of Network Protocols Mukesh Chinta, Asst Prof, CSE, VRSEC 9
  • 10. Design Issues of Layers  Addressing - whom am I going to talk to? i.e., how do we identify senders and receivers?  Rules for data transfer: Simplex (one way channels), half- duplex (two way communication but not simultaneously) and full duplex (2 way)  Logical channels: How many are needed? Usually at least 2. One for normal mode and one for urgent transmission.  Reconstituting messages: Message pieces are to be number to preserve sequence. Out of order messages need to be numbered.  Error control: This is all about communicating along imperfect channels. Solution involves error correction/detection codes. (Issues: Attenuation, delay distortion and noise).Mukesh Chinta, Asst Prof, CSE, VRSEC 10
  • 11. Design Issues of Layers Contd..  Large messages: Procedures for disassembling, transmitting and reassembling. What to do when messages are very small (compared to packet)?  Multiplexing: One connection per conversation or many on one connection. What if, in the physical layer where only a few lines are available  Routing: Already alluded to. What to do when there are multiple paths between communicating machines  Flow Control: How to keep a fast sender from swamping a slow receiver with data. Solutions involve direct/indirect feedback or an agreed on transmission rate Mukesh Chinta, Asst Prof, CSE, VRSEC 11
  • 12. Connection-Oriented and Connectionless Services  Layer n offers 2 types of services to n+1: Connection Oriented & Connection Less  Connection-oriented: Like phone system. Dial, talk, hang up. To use a connection-oriented network service user first establishes connection, uses the connection and finally releases the connection. The connection should be thought of as a water-pipe. Water (bits) is pumped from one end and comes out the other in FIFO order. A negotiation is conducted at the time of connection establishment about the parameters to be used such as message size, QOS & other issues.  Connectionless: Its like the postal system. Each packet is routed through the system independent of the others. Possible for message 1 to arrive after message 2. In connection oriented services this is impossible.  Quality of service: Reliable services don’t lose data. Unreliable services may. Reliability is obtained by having recipient acknowledge each message. Mukesh Chinta, Asst Prof, CSE, VRSEC 12
  • 13.  Reliable connection-oriented service has two minor variations: message sequences and byte streams. In the former variant, the message boundaries are preserved. When two 1024-byte messages are sent, they arrive as two distinct 1024-byte messages, never as one 2048-byte message.  In the latter, the connection is simply a stream of bytes, with no message boundaries. When 2048 bytes arrive at the receiver, there is no way to tell if they were sent as one 2048-byte message, two 1024-byte messages, or 2048 1-byte messages.  Not all applications require connections. Unreliable (meaning not acknowledged) connectionless service is often called datagram service, in analogy with telegram service, which also does not return an acknowledgement to the sender. Connection-Oriented and Connectionless Services 13
  • 14. Service Primitives  A service is formally specified by a set of primitives (operations) available to a user process to access the service. These primitives tell the service to perform some action or report on an action taken by a peer entity.  The set of primitives available depends on the nature of the service being provided. The primitives for connection-oriented service are different from those of connectionless service Five service primitives for implementing a simple connection-oriented service. Mukesh Chinta, Asst Prof, CSE, VRSEC 14
  • 15. Packets sent in a simple client-server interaction on a connection-oriented network Mukesh Chinta, Asst Prof, CSE, VRSEC 15
  • 16. The Relationship of Services to Protocols  A service is a set of primitives (operations) that a layer provides to the layer above it. The service defines what operations the layer is prepared to perform on behalf of its users, but it says nothing at all about how these operations are implemented. A service relates to an interface between two layers, with the lower layer being the service provider and the upper layer being the service user.  A protocol, in contrast, is a set of rules governing the format and meaning of the packets, or messages that are exchanged by the peer entities within a layer. Entities use protocols to implement their service definitions. Mukesh Chinta, Asst Prof, CSE, VRSEC 16
  • 17. Mukesh Chinta, Asst Prof, CSE, VRSEC17
  • 18. Mukesh Chinta, Asst Prof, CSE, VRSEC 18