0% found this document useful (0 votes)
39 views25 pages

Lecture 03 - Network Requirements and Layered Architectures

The document provides information about network requirements, layered architectures, and common network protocols. It discusses performance, reliability, and security as key network requirements. It also outlines elements of protocols like syntax, semantics, and timing, as well as characteristics of protocols and examples of common protocols.

Uploaded by

kijabryan
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
39 views25 pages

Lecture 03 - Network Requirements and Layered Architectures

The document provides information about network requirements, layered architectures, and common network protocols. It discusses performance, reliability, and security as key network requirements. It also outlines elements of protocols like syntax, semantics, and timing, as well as characteristics of protocols and examples of common protocols.

Uploaded by

kijabryan
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
You are on page 1/ 25

UNIVERSITY OF DAR ES SALAAM

Department of CSE

IS013

Network Requirements and Layered Architectures


Instructor
Dr. Joseph Cosmas Mushi

Kijitonyama Campus
Block A,
Room No. A023
Tel.: 0684 697 697

[email protected]
Networks Requirements
• Any network must meet three most important criteria:-
a) Performance
b) Reliability
c) Security.

• Performance
 Depends on Network Elements (e.g. # of users, medium, etc.)
 Measured using transit time and response time
 Transit time: The amount of time required for a message to
travel from one node to another.
 Response time: The elapsed time between request and
response
 Measured in terms of Delay and Throughput, often need more
throughput and less delay.
Networks Requirements
• Reliability
 Network reliability is measured by:
o Less frequency of failure
o Time it takes a link to recover from a failure
o Network’s robustness in a catastrophe
 Generally, it is measured in terms of availability

• Security
 It means data protection against corruption/loss of data due
to:
o Errors
o Malicious users
Network Protocols
Definition
- Protocol is a set of rules that govern all aspects of data
communication between computers on a network.

- These rules include guidelines that regulate the following


characteristics of a network: access method, allowed physical
topologies, types of cabling, and speed of data transfer.
- A protocol defines what, how, and when it is communicated.

- The key elements of a protocol are syntax, semantics, and


timing.

- Protocols are to computers what language is to humans.


Since this article is in English, to understand it you must be
able to read English. Similarly, for two devices on a network
to successfully communicate, they must both understand
the same protocols.
Elements of protocol

i) Syntax
The structure or format of the data.
Eg. A simple protocol;
Sender Receiver
data
address address

8 bits 8 bits
64 bits
Elements of protocol

ii) Semantics
- Refers to the meaning of each section of
bits.

- how is a particular pattern to be


interpreted, and what action is to be taken
based on that interpretation.
Eg. Does an address identify the route to be
taken or the final of the message?
Elements of protocol

iii) Timing
Refers to two characteristics:
a. When data to be sent
b. How fast it can be sent
Eg. If a sender produces data at 100 Mbps
but the receiver can process data at only
1 Mbps, the transmission will overload
the receiver and data will be largely lost.
Characteristics of protocol
a) Direct / indirect
- communication between two entities maybe
direct or indirect.

i) point-to-point link
- connection provides a dedicated link
between two devices

- the entities in these systems may


communicate directly that is data and
control information pass directly
between entities with no intervening
active agent.
Characteristics of protocol

ii) multipoint link


- connection more than two devices can
share a single link
- The entities must be concerned with the
issue of access control and making the
protocol more complex.
Characteristics of protocol

b) Monolithic / structured
- The task of communication between
entities on different systems is too
complex to be handled as a unit.
Characteristics of protocol

Eg. An electronic mail package running on


two computers connected by a
synchronous HDLC link. To be structured,
the package would need to include all of
the HDLC logic. If the connection were
over a packet-switched network, the
packaged would still need the HDLC logic
to attach it to the network.
Characteristics of protocol

c) Symmetric / asymmetric
- Symmetric is the most used in protocol and
involves communication between peer
entities.

- Asymmetry may be dictated by the logic of


an exchange (eg; client and a server
process) the desire to keep one of the
entities or systems as simple as possible.
Characteristics of protocol
d) Standard / nonstandard
If K different kinds of information sources
have to communicate with L types of
information receivers, as many as K x L
different protocols are needed without
standards and a total of 2 x K x L
implementations are required

If all systems shared a common protocol,


only K+L implementations would be needed.
Common protocol used
Protocol Acronym Remarks
Point To Point PPP Used to manage network communication
over a modem

Transfer/Transmission Control TCP / IP Backbone protocol. The most widely used


Protocol protocol.

Internetwork package exchange IPX Standard protocol for Novell NOS

NetBIOS extended user interface NetBEUI Microsoft protocol that doesn’t support
routing to other network. Running only
Windows-based clients.

File transfer Protocol FTP used to send and received file from a
remote host
Simple mail Transfer protocol SMTP Used to send Email over a network

Hyper text transfer protocol HTTP Used for Internet to send document that
encoded in HTML

Apple Talk Apple Talk Protocol suite to network Macintosh


computer and a peer-to-peer network
protocol

OSI Model OSI Layers A way of illustrating how information


functions travels through network of its 7
layers.
Network Protocols
a) Simple Network Management Protocol (SNMP)

- Allows simple maintenance and remote monitoring of any


device on a network.

- With SNMP, administrators can address issues such as


problems with a network card in a server, a program, or
service on the server, or a device such as a hub or a
router.

- When managing a network device using SNMP, an


administrator can use the central management system
and the management information base.

- The management system allows the administrator to view


the performance and operation statistics of the network
devices, enabling him to diagnose a network remotely.
Network Protocols
b) User Diagram Protocol (UDP) Relay
- A connectionless protocol that operates at the
transport layer of the TCP/IP and OSI models.

- UDP is an unreliable delivery service, it does not


require receiving protocols to acknowledge the
receipt of the packet.

- The advantage of UDP is; it does not concentrate on


establishing a connection, it can transmit more
information in a smaller amount of time than TCP.
Network Protocols
c) Virtual LAN(VLAN)
- A logical grouping of network devices or users
that are not restricted to a physical switch
segment.

- The devices or users in a VLAN can be grouped


by function, department, and application,
regardless of their physical segment location.

- A VLAN creates a single broadcast domain that is


not restricted to a physical segment and is
treated like a subnet.
Network Protocols
d) Routing Information Protocol (RIP)
- A protocol supplied with UNIX BSD systems.

- Used to transfer routing information between


routers that are located in the same domain.

- RIP uses hop count as a routing metric.

- Allows the router to determine which path it will use


to send, based on a concept known as distance-
vector routing.
Network Protocols
e) Open Shortest Path First (OSPF)

- A link-state routing protocol based on open


standards. A better description might be
“determination of optimum path” because this
interior gateway protocol actually uses several
criteria to determine the best route to a destination.

- These criteria include cost metrics, which factor in


such things as route speed, traffic, reliability, and
security.
Network Protocols
f) Quality Of Service (QoS)
- Network management traffic

- Provide traffic management on the network,


particularly during times of congestion or
failure.

- QoS also give preferential treatment if a node


does not reach the worth levels during the
packets transmission.
Network Logical Models
 Network logical model depicts logical tasks involved
in sending and receiving messages

 A network logical model is a layered architecture


 Task is broken into subtasks
 Implemented separately in layers in a stack
 Functions need in both systems
 Peer layers communicate

 The models are implemented through Network


Protocols:
 A set of rules that governs data communication
 It represents an agreement between the communicating
devices
Network Logical Models
 Its analogous to tasks involved in sending a letter
Network Logical Models
 It brought about the architectural structure of a
protocol layer

user of protocol user of protocol

service interface service interface


service offered
protocol entity by the protocol entity
protocol

message encoding Protocol message encoding

service interfaces of lower layer


communication service used by the protocol
(offered by the lower layer)
Network Logical Models - Protocol
 A protocol is a set of rules that govern all aspects of
communication between two or more partners, called
peers
 These rules are human-made; not like chemistry or physics!

 The purpose of a protocol is to provide a specific


communication service.

 What aspects must be defined for assuring compatibility


between the communicating partners? (see next slides)

 Who makes protocols?


 Standardization committees
 Designers of a new distributed application

You might also like