group11_dnaa:protocol stack and addressing
DESCRIPTION
TRANSCRIPT
![Page 1: group11_DNAA:protocol stack and addressing](https://reader035.vdocument.in/reader035/viewer/2022070304/54c8614c4a7959045b8b46ef/html5/thumbnails/1.jpg)
PROTOCOL STACK AND
ADDRESSINGBY
DNAAGROUP 11
1protocol stack
![Page 2: group11_DNAA:protocol stack and addressing](https://reader035.vdocument.in/reader035/viewer/2022070304/54c8614c4a7959045b8b46ef/html5/thumbnails/2.jpg)
TEAM MEMBERS
DHANUSHA 1MS07IS025NISHITA.M 1MS07IS061ARCHANA.H.V 1MS07IS012ANANYA.B.NAIK 1MS07IS007
2protocol stack
![Page 3: group11_DNAA:protocol stack and addressing](https://reader035.vdocument.in/reader035/viewer/2022070304/54c8614c4a7959045b8b46ef/html5/thumbnails/3.jpg)
TABLE OF CONTENTS
INTRODUCTION OSI MODELPHYSICAL LAYER DATA LINK LAYERNETWORK LAYERTRANSPORT LAYER
3protocol stack
![Page 4: group11_DNAA:protocol stack and addressing](https://reader035.vdocument.in/reader035/viewer/2022070304/54c8614c4a7959045b8b46ef/html5/thumbnails/4.jpg)
INTRODUCTION
PROTOCOLSPROTOCOL STACKOSI MODEL
4protocol stack
![Page 5: group11_DNAA:protocol stack and addressing](https://reader035.vdocument.in/reader035/viewer/2022070304/54c8614c4a7959045b8b46ef/html5/thumbnails/5.jpg)
OSI MODELAPPLICATION
LAYERPRESENTATION
LAYERSESSIONS LAYERTRANSPORT LAYERNETWORK LAYERDATA LINK LAYERPHYSICAL LAYER
5protocol stack
![Page 6: group11_DNAA:protocol stack and addressing](https://reader035.vdocument.in/reader035/viewer/2022070304/54c8614c4a7959045b8b46ef/html5/thumbnails/6.jpg)
PHYSICAL LAYER
It is the first and lowest layer of OSI model of computer networking. The physical layer consists of the basic hardware transmission technologies of a network
Physical layer obtains the data obtained by data link layer in the form of frames which it will convert into bits
Physical layer converts the data sent by data link layer into signals compatible with the transmission media
6protocol stack
![Page 7: group11_DNAA:protocol stack and addressing](https://reader035.vdocument.in/reader035/viewer/2022070304/54c8614c4a7959045b8b46ef/html5/thumbnails/7.jpg)
Techniques
Data present in the physical layer can be analog or digital. It has to be converted either to digital signal or analog signal
For the conversion of digital to digital signals three techniques are used:
1.Line coding
2.Block coding
3.scrambling
7protocol stack
![Page 8: group11_DNAA:protocol stack and addressing](https://reader035.vdocument.in/reader035/viewer/2022070304/54c8614c4a7959045b8b46ef/html5/thumbnails/8.jpg)
Techniques
For the conversion of digital data to analog signals the techniques used are
1.Amplitude shift keying
2.Frequency shift keying
3.Phase shift keying
4.Quadrature amplitude modulation
8protocol stack
![Page 9: group11_DNAA:protocol stack and addressing](https://reader035.vdocument.in/reader035/viewer/2022070304/54c8614c4a7959045b8b46ef/html5/thumbnails/9.jpg)
Functions Of physical Layer
Physical characteristics of interfaces and mediumRepresentation of bitsLine configurationPhysical topologyTransmission modeAutonegotiation
9protocol stack
![Page 10: group11_DNAA:protocol stack and addressing](https://reader035.vdocument.in/reader035/viewer/2022070304/54c8614c4a7959045b8b46ef/html5/thumbnails/10.jpg)
Protocols of Physical Layer
X.21EIA-232-EATM
10protocol stack
![Page 11: group11_DNAA:protocol stack and addressing](https://reader035.vdocument.in/reader035/viewer/2022070304/54c8614c4a7959045b8b46ef/html5/thumbnails/11.jpg)
X.21X.21 interface protocol is concerned only with
the set-up and clearing operating between DTE and DCE associated with each call
It is a circuit switching protocol using synchronous ASCII with odd parity to connect or disconnect a subscriber to bulic switching network
Any data can be transferred through the network after call establishment is successful via x.21 protocol
11protocol stack
![Page 12: group11_DNAA:protocol stack and addressing](https://reader035.vdocument.in/reader035/viewer/2022070304/54c8614c4a7959045b8b46ef/html5/thumbnails/12.jpg)
EIA-232-E
It is also called RS-232-C.it is found in both synchronous and asynchronous environment
Almost all modems conform to the EIA-232 standard and most PC have an EIA-232 port for connecting a modem or other devices
12protocol stack
![Page 13: group11_DNAA:protocol stack and addressing](https://reader035.vdocument.in/reader035/viewer/2022070304/54c8614c4a7959045b8b46ef/html5/thumbnails/13.jpg)
ATMAsynchronous transfer mode is an electronic digital
data transmission technology.It is mainly used to transfer real-time video
conference and audio as well as image files, text and email
ATM is a packet oriented transfer method that uses asynchronous time division multiplying techniques.
It encodes the data into small sized cells and provides data link layer services that run over OSI layer.
It is mainly designed for high speed(155 MBits) communication
13protocol stack
![Page 14: group11_DNAA:protocol stack and addressing](https://reader035.vdocument.in/reader035/viewer/2022070304/54c8614c4a7959045b8b46ef/html5/thumbnails/14.jpg)
DATA LINK LAYER
The data link layer is the second layer in the OSI seven-layer reference model. It responds to service requests from the network layer above it and issues service requests to the physical layer below it.
FUNCTIONS:
1)Framing
2)Addressing
3)Flow Control
4)Error Control
5)Media Access Control
14protocol stack
![Page 15: group11_DNAA:protocol stack and addressing](https://reader035.vdocument.in/reader035/viewer/2022070304/54c8614c4a7959045b8b46ef/html5/thumbnails/15.jpg)
Framing Framing in this layer separates a message from one source to a
destination, or from other messages to other destinations, by adding a sender address and a destination address.
TYPES:
1)Fixed-Size Framing
2)Variable-Size Framing
Character-Oriented Protocols:
flag trailer flagheader Data from upper layer
15protocol stack
![Page 16: group11_DNAA:protocol stack and addressing](https://reader035.vdocument.in/reader035/viewer/2022070304/54c8614c4a7959045b8b46ef/html5/thumbnails/16.jpg)
Error detection
Data can be corrupted during transmission.TYPES of errors:
1)Single-Bit Error
2)Burst ErrorTo detect or correct errors, we need to send extra
(redundant) bits with data.Error detection:
1) The receiver has a list if valid codewords.
2) The original codeword has changed to an invalid one.
16protocol stack
![Page 17: group11_DNAA:protocol stack and addressing](https://reader035.vdocument.in/reader035/viewer/2022070304/54c8614c4a7959045b8b46ef/html5/thumbnails/17.jpg)
Data word
generator
codeword
Data word
Checker
Codeword
SENDER RECEIVER
Encoder Decoder
ExtractDiscard
Unreliable Transmission
00 000
01 011
10 101
11 110
Data words
Codewords
Code fro error detection
17protocol stack
![Page 18: group11_DNAA:protocol stack and addressing](https://reader035.vdocument.in/reader035/viewer/2022070304/54c8614c4a7959045b8b46ef/html5/thumbnails/18.jpg)
Error correction More redundant bits are required
for error correction than for error detection.
Example:
let the code word transferred be 01001.
Humming distance: between two words is the number of differences between corresponding bits.
Minimum humming distance is chosen.
Data word Code word
00 00000
01 01011
10 10101
11 11110
18protocol stack
![Page 19: group11_DNAA:protocol stack and addressing](https://reader035.vdocument.in/reader035/viewer/2022070304/54c8614c4a7959045b8b46ef/html5/thumbnails/19.jpg)
Protocols
Flow control refers to a set of procedures used to restrict the amount of data that the sender can send before waiting for acknowledgment.
Error control in the data link layer is based on automatic repeat request, which is the retransmission of data.
Protocols are implemented in software by using one of the common programming languages.
Protocols
Noiseless channels
Noisy channel
Stop and waitsimplest Stop
and wait ARQ
Go back-N ARQ
Selective repeat ARQ
19protocol stack
![Page 20: group11_DNAA:protocol stack and addressing](https://reader035.vdocument.in/reader035/viewer/2022070304/54c8614c4a7959045b8b46ef/html5/thumbnails/20.jpg)
Simplest protocol
sender site algorithm
While (true)
{
wait for event();
if(event ( request to send))
{
get data();
make frame();
send frame();
}
}20protocol stack
![Page 21: group11_DNAA:protocol stack and addressing](https://reader035.vdocument.in/reader035/viewer/2022070304/54c8614c4a7959045b8b46ef/html5/thumbnails/21.jpg)
Receiver site algorithm While ( true )
{
wait for event();
if( event ( arrival notification))
{
receive frame();
extract data();
deliver data();
[send frame] // for stop and wait protocol
}
}21protocol stack
![Page 22: group11_DNAA:protocol stack and addressing](https://reader035.vdocument.in/reader035/viewer/2022070304/54c8614c4a7959045b8b46ef/html5/thumbnails/22.jpg)
STOP AND WAIT PROTOCOL
While(true)
Can send= true
{
wait for event();
if( event(request to send)and can send)
{
get data();
make frame();
send frame();
can send= false;
}
Wait for event();
If ( event( arrival notification)
{
receive frame();
can send= true;
}
}
22protocol stack
![Page 23: group11_DNAA:protocol stack and addressing](https://reader035.vdocument.in/reader035/viewer/2022070304/54c8614c4a7959045b8b46ef/html5/thumbnails/23.jpg)
POINT TO POINT PROTOCOL
provides network address configuration. That is when a home user needs a temporary network address to connect to the internet.
Defines format of the frame. Provides multiple network layer . Does not provide flow control. No sophisticated addressing mechanism to handle frames. Simple mechanism for error control.
flag address
control protocol
Payload (variable) FCS flag
23protocol stack
![Page 24: group11_DNAA:protocol stack and addressing](https://reader035.vdocument.in/reader035/viewer/2022070304/54c8614c4a7959045b8b46ef/html5/thumbnails/24.jpg)
Multiple access Data link layer consists of data link contol and multiple-access
resolution. Lower sub layer is responsible for resolving access to the shared
media. One of the methods is random access method. Here, no station is
superior to another station and none is assigned the control over another.
In controlled access method, the stations consult one another to find which station has the right to send.
Channelization is a multiple access method in which the available bandwidth of a link is shared in time, frequency, or through code, between different stations.
24protocol stack
![Page 25: group11_DNAA:protocol stack and addressing](https://reader035.vdocument.in/reader035/viewer/2022070304/54c8614c4a7959045b8b46ef/html5/thumbnails/25.jpg)
NETWORK LAYER
This is the third layer from the bottom of protocol stack.
There is a piece of network layer in each and every host and in the routers.
It determines how packets are routed from one route to another.
25protocol stack
![Page 26: group11_DNAA:protocol stack and addressing](https://reader035.vdocument.in/reader035/viewer/2022070304/54c8614c4a7959045b8b46ef/html5/thumbnails/26.jpg)
Network layer
26protocol stack
![Page 27: group11_DNAA:protocol stack and addressing](https://reader035.vdocument.in/reader035/viewer/2022070304/54c8614c4a7959045b8b46ef/html5/thumbnails/27.jpg)
Important functions
Main role of network layer is to move packets from a sending host to receiving host.
Functions are categorized into three typesPath determination: Determined by routing
algorithms.Forwarding: Done by routers.Call set up: Routers establish connections with
each other.
27protocol stack
![Page 28: group11_DNAA:protocol stack and addressing](https://reader035.vdocument.in/reader035/viewer/2022070304/54c8614c4a7959045b8b46ef/html5/thumbnails/28.jpg)
Network service modelDefines characteristics of end to end
transmission of data.
Virtual circuit model•Network determines the path between sender and receiver.•Packets flow along the path set up.•Routers are aware of the connection made.•Connection oriented service.
Virtual circuit model•Network determines the path between sender and receiver.•Packets flow along the path set up.•Routers are aware of the connection made.•Connection oriented service.
Datagram model•Networks sends packets with the address of destination.•Packets flow towards nearest router along the destination.•Routers are not aware of the connection made. They maintain a forwarding table.•Connectionless service.
Datagram model•Networks sends packets with the address of destination.•Packets flow towards nearest router along the destination.•Routers are not aware of the connection made. They maintain a forwarding table.•Connectionless service. 28protocol stack
![Page 29: group11_DNAA:protocol stack and addressing](https://reader035.vdocument.in/reader035/viewer/2022070304/54c8614c4a7959045b8b46ef/html5/thumbnails/29.jpg)
Network layer protocols
Internet protocol:
Responsible for network layer addressing.
IP address: An address assigned to every interface.
They are of two types: IPV4 and IPV6
29protocol stack
![Page 30: group11_DNAA:protocol stack and addressing](https://reader035.vdocument.in/reader035/viewer/2022070304/54c8614c4a7959045b8b46ef/html5/thumbnails/30.jpg)
IPV4 addressing
32 bit length(4 bytes)Represented in dotted decimal notationEg: 193.32.216.9
Equivalent decimal notation
11000001 00100000 11011000 00001001Two ways of assigning IP address:
Manual configuration
Dynamic host configuration protocol
30protocol stack
![Page 31: group11_DNAA:protocol stack and addressing](https://reader035.vdocument.in/reader035/viewer/2022070304/54c8614c4a7959045b8b46ef/html5/thumbnails/31.jpg)
IPV4 data packet format
version Header length Type of service Data packet length
16-bit identifier Flags 13-bit fragmentation offset
Time-to-live Upper-layer protocol Header checksum
32-bit source IP address
32-bit destination IP address
Options(if any)
Data
31protocol stack
32bits
![Page 32: group11_DNAA:protocol stack and addressing](https://reader035.vdocument.in/reader035/viewer/2022070304/54c8614c4a7959045b8b46ef/html5/thumbnails/32.jpg)
ICMP – Internet Control Message Protocol•Used by routers, hosts and gateways.
•Used for error reporting when IP router in not able to find the path to the host specified as the target.
32protocol stack
![Page 33: group11_DNAA:protocol stack and addressing](https://reader035.vdocument.in/reader035/viewer/2022070304/54c8614c4a7959045b8b46ef/html5/thumbnails/33.jpg)
TRANSPORT LAYER
![Page 34: group11_DNAA:protocol stack and addressing](https://reader035.vdocument.in/reader035/viewer/2022070304/54c8614c4a7959045b8b46ef/html5/thumbnails/34.jpg)
Network layer oversees source to destination delivery of individual packets, it does not recognize any relationship between those packets.
It treats each one independently, as though each piece belonged to a separate message, whether or not it does.
Transport layer on the other hand ensures that the whole message arrives intact and in order overseeing both error control and flow control at the source to destination level.
Process to Process delivery
34protocol stack
![Page 35: group11_DNAA:protocol stack and addressing](https://reader035.vdocument.in/reader035/viewer/2022070304/54c8614c4a7959045b8b46ef/html5/thumbnails/35.jpg)
Service Point Addressing- Several programs run at the same time.- Data transfer needed only between two specific
processes.- Port numbers of the destination process is assigned in
the header which ensures that only the specific process responds to it.
Segmentation and Reassembling- The message is divided into transmittable segments. - Each segment contains a sequence number .- This enables the correct reassembling of the message at
the destination end and also in retransmission.35protocol stack
![Page 36: group11_DNAA:protocol stack and addressing](https://reader035.vdocument.in/reader035/viewer/2022070304/54c8614c4a7959045b8b46ef/html5/thumbnails/36.jpg)
Connection Control
Two types: Connectionless : Treats each segment as a
independent packet and delivers it. Connection Oriented: sets up a connection with
the transport layer at the destination machine before delivering the packets.
Flow Control- Oversees the proper co-ordination of transfer
between the source and destination.
36protocol stack
![Page 37: group11_DNAA:protocol stack and addressing](https://reader035.vdocument.in/reader035/viewer/2022070304/54c8614c4a7959045b8b46ef/html5/thumbnails/37.jpg)
Error Control- Sending Transport Layer make sure that the entire
message arrives at the receiving transport layer without error (damage, loss or duplication).
Terminologies:Reliable : Flow and error control present at the transport
layer resulting in slower and more complex service.Non-Reliable: Uses Own Flow and error control
mechanism or it needs fast service or nature of the service does not demand flow and error control (Real Time Application)
37protocol stack
![Page 38: group11_DNAA:protocol stack and addressing](https://reader035.vdocument.in/reader035/viewer/2022070304/54c8614c4a7959045b8b46ef/html5/thumbnails/38.jpg)
User Datagram Protocol (UDP) It’s a connectionless, unreliable transport protocol. No services added to IP except process to process
communication using port numbers. Limited error checking.
UDP Operations
Connectionless Services: It is important to note that the process which uses UDP cannot send a stream of data to UDP and expect UDP to chop them into different related user datagrams. Instead each request must be small enough to fit into one user datagram.
38protocol stack
![Page 39: group11_DNAA:protocol stack and addressing](https://reader035.vdocument.in/reader035/viewer/2022070304/54c8614c4a7959045b8b46ef/html5/thumbnails/39.jpg)
Flow and Error Control No Flow Control: Receiver may overflow with incoming
messages.
No Error Control: Sender does not know if the message is lost or duplicated.
Checksum is one error control mechanism and if the receiver detects an error through the checksum, the user datagram is silently discarded.
UDP Uses- Process that require simple request response communication
with little concern for flow and error control.
- Process with internal flow and error mechanism.
Ex: Trivial File Transfer Protocol (TFTP) can easily use UDP
39protocol stack
![Page 40: group11_DNAA:protocol stack and addressing](https://reader035.vdocument.in/reader035/viewer/2022070304/54c8614c4a7959045b8b46ef/html5/thumbnails/40.jpg)
Transmission Control Protocol (TCP)
16/09/09
• It’s a connection oriented, reliable transport protocol.
• TCP Services:
Process to process communication using port numbers.
Stream Delivery Service:
Data is sent as a stream of bytes and obtained also as a stream of bytes.
An environment is created in which the two processes seem to be connected by an imaginary tube that carries their data across the internet.
Sending And Receiving Buffers:
Sending or receiving processes may not read or write data at the same speed, hence buffers are needed for storage.
![Page 41: group11_DNAA:protocol stack and addressing](https://reader035.vdocument.in/reader035/viewer/2022070304/54c8614c4a7959045b8b46ef/html5/thumbnails/41.jpg)
Segments The IP layer as a service provider for TCP cannot send
data as a stream of bytes. Therefore TCP groups a number of bytes together into a packet called segment.
TCP adds a header to each segment (for control purposes) and delivers the segment to the IP layer for transmission.
Full Duplex Communication TCP offers full duplex service in which data can flow in
both directions as each time.
Reliable Service: TCP is reliable transfer protocol which uses an Acknowledgement mechanism to check the safe and sound arrival of data
41protocol stack
![Page 42: group11_DNAA:protocol stack and addressing](https://reader035.vdocument.in/reader035/viewer/2022070304/54c8614c4a7959045b8b46ef/html5/thumbnails/42.jpg)
Comparison Between UDP and TCP
UDP TCP
Packet Header Size 8 bytes 20 – 60 bytes
Transport Layer Packet entity Datagram Segment
Port Numbering Yes Yes
Error Detection Optional Yes
Reliability: Error recovery by automatic repeat request (ARQ) No Yes
Virtual circuits: Sequence numbering and reordering No Yes
Flow control No Yes
Congestion avoidance: Variable congestion window, slow start, time outs
No Yes
Multiple streams No No
ECN support No Yes42protocol stack
![Page 43: group11_DNAA:protocol stack and addressing](https://reader035.vdocument.in/reader035/viewer/2022070304/54c8614c4a7959045b8b46ef/html5/thumbnails/43.jpg)
THANK YOU
43protocol stack