The Open System Interconnect model

Similar documents
Chapter 09 Network Protocols

ECE 333: Introduction to Communication Networks Fall 2001

The OSI Model. Open Systems Interconnection (OSI). Developed by the International Organization for Standardization (ISO).

Network Model: Each layer has a specific function.

Cross Layer Protocol Design. Radio Communication III

Data and Computer Communications. Chapter 2 Protocol Architecture, TCP/IP, and Internet-Based Applications

Network Architecture. TOC Architecture

Chapter 12 Network Protocols

University of Southern California EE450: Introduction to Computer Networks

Network.... communication system for connecting end- systems. End-systems a.k.a. hosts PCs, workstations dedicated computers network components

Routing in packet-switching networks

Computer Communication Networks

Routing. Information Networks p.1/35

Architectures of Communication Subsystems

Internet Architecture and Experimentation

OSI ISO, OSI Reference Model

The History and the layers of the OSI Model 30 - October

Reti di Calcolatori I

Subject: Adhoc Networks

ES623 Networked Embedded Systems

Network Architecture

Routing Algorithms. CS158a Chris Pollett Apr 4, 2007.

CCNA Exploration1 Chapter 7: OSI Data Link Layer

Chapter 2 - Part 1. The TCP/IP Protocol: The Language of the Internet

Chapter 2 Network Models 2.1

Abstract of the Book

ITEC 3800 Data Communication and Network. Introducing Networks

Peer entities. Protocol Layering. Protocols. Example

Data Communication and Network. Introducing Networks

William Stallings Data and Computer Communications. Chapter 10 Packet Switching

Digital Communication Networks

Computer Network : Lecture Notes Nepal Engineering College Compiled by: Junior Professor: Daya Ram Budhathoki Nepal Engineering college, Changunarayan

1. The Internet 2. Principles 3. Ethernet 4. WiFi 5. Routing 6. Internetworking 7. Transport 8. Models 9. WiMAX & LTE 10. QoS 11. Physical Layer 12.

Packet Switching, Layer Models and Protocol Suites

Defining Networks with the OSI Model. Module 2

CHAPTER -1. Introduction to Computer Networks

Course Routing Classification Properties Routing Protocols 1/39

Guide to Wireless Communications, 3 rd Edition. Objectives

Operating Systems. 16. Networking. Paul Krzyzanowski. Rutgers University. Spring /6/ Paul Krzyzanowski

Wireless Ad-Hoc Networks

Networking interview questions

ECE 650 Systems Programming & Engineering. Spring 2018

Introductions. Computer Networking Lecture 01. January 16, HKU SPACE Community College. HKU SPACE CC CN Lecture 01 1/36

Subnetting and addresses revisited

Data Networks. Lecture 1: Introduction. September 4, 2008

Internetworking Concepts Overview. 2000, Cisco Systems, Inc. 2-1

II. Principles of Computer Communications Network and Transport Layer

Course 6. Internetworking Routing 1/33

CCNA Guide to Cisco Networking, Third Edition

Chapter 7. Local Area Network Communications Protocols

CS3600 SYSTEMS AND NETWORKS

Ad Hoc Networks: Issues and Routing

Lecture 9 November 12, Wireless Access. Graduate course in Communications Engineering. University of Rome La Sapienza. Rome, Italy

Chapter 12. Network Organization and Architecture. Chapter 12 Objectives Introduction Introduction

Routing. 4. Mar INF-3190: Switching and Routing

Chapter Two. The OSI Model

L6: OSI Reference Model

Module 1. Introduction. Version 2, CSE IIT, Kharagpur

Reference Models. 7.3 A Comparison of the OSI and TCP/IP Reference Models

ETSF05/ETSF10 Internet Protocols. Routing on the Internet

OSI Layers (Open System Interconnection)

Bridging and Switching Basics

Internetworking Part 1

infrared Disadvantage: 1. cannot use for long-range communication or outside a building due to sun s rays.

BLM6196 COMPUTER NETWORKS AND COMMUNICATION PROTOCOLS

CN1047 INTRODUCTION TO COMPUTER NETWORKING CHAPTER 6 OSI MODEL TRANSPORT LAYER

Chapter 2 Communicating Over the Network

Chapter -4 OSI Reference Model

cs/ee 143 Communication Networks

Network+ Guide to Networks, 6 th Edition. Chapter 2 Solutions

Configuring your VLAN. Presented by Gregory Laffoon

Chapter 5 (Week 9) The Network Layer ANDREW S. TANENBAUM COMPUTER NETWORKS FOURTH EDITION PP BLM431 Computer Networks Dr.

IPv6 Stack. 6LoWPAN makes this possible. IPv6 over Low-Power wireless Area Networks (IEEE )

Open Systems Interconnection Model

Chapter 2 Network Models


Internetworking Models The OSI Reference Model

Chapter 22 Network Layer: Delivery, Forwarding, and Routing 22.1

CHAPTER 9: PACKET SWITCHING N/W & CONGESTION CONTROL

Reference Model. (virtual network service) (virtual session) Session. Session. (messages) Transport. Transport. (end-to-end packets) Network.

Wireless Networks (CSC-7602) Lecture 1 (27 Aug 2007)

Introduction. High Speed LANs. Emergence of High-Speed LANs. Characteristics of High Speed LANS. Text ch. 6, High-Speed Networks and

Chapter 1. Computer Networks and the Internet

L1: Introduction. Hui Chen, Ph.D. Dept. of Engineering & Computer Science Virginia State University Petersburg, VA 23806

DATA COMMUNICATOIN NETWORKING

Mobile Ad Hoc Networks: Basic Concepts and Research Issues

CCNA 1: Chapter 2 Exam Answer v %

A local area network that employs either a full mesh topology or partial mesh topology

Routing Strategies. Fixed Routing. Fixed Flooding Random Adaptive

Network Models. Presentation by Dr.S.Radha HOD / ECE SSN College of Engineering

ECE 4400:427/527 - Computer Networks Spring 2017

ISO/OSI Model and Collision Domain NETWORK INFRASTRUCTURES NETKIT - LECTURE 1 MANUEL CAMPO, MARCO SPAZIANI

Lecture 2: Network Protocols and Layering

William Stallings Data and Computer Communications 7 th Edition. Chapter 12 Routing

Chapter 3.1 Acknowledgment:

Communication Networks I December 4, 2001 Agenda Graph theory notation Trees Shortest path algorithms Distributed, asynchronous algorithms Page 1

Networking and Internetworking 1

COMS Introduction to Computers. Networking

Communications Options for Wireless Sensor Networks. Marco Zennaro and Antoine Bagula ICTP and UWC Italy and South Africa

Lecture Computer Networks

Transcription:

The Open System Interconnect model Telecomunicazioni Undergraduate course in Electrical Engineering University of Rome La Sapienza Rome, Italy 2007-2008 1

Layered network design Data networks are usually designed according to a layered architecture, in order to allow independent design of protocols according to different layers. Designers of a specific layer will be well aware of the internal details and operations of a layer Designers of other layers and users of the whole network, on the other hand, will see the layer as a black box with clearly defined input and output interfaces This allows to use of standardized modules, and to change a layer without affecting the other ones 2

The OSI network model The Open System Interconnect (OSI) was proposed in 1979 by the International Organization for Standardization (ISO) The OSI model is composed of two parts: A 7-layer stack model (Basic Reference Model) A set of original protocols for each layer The main contribution of the OSI model was to propose the concept that each layer only interacts with the layer immediately above and below in the stack 3

Interaction between OSI layers 4

The physical layer The function of the physical layer is to provide a virtual link (virtual bit pipe) for transmitting a sequence of bits between any pair of nodes joined by a physical communication channel The conversion from bits coming from higher layer to signal suitable for the channel is performed by a modem The modem carries out the tasks that we carry out in the first part of the course The physical layer also defines wiring and connections with the upper layer... 5

The Data Link Control Layer The DLC layer has the goal to convert the unreliable bit pipe provided by PHY layer into a virtual communication link capable of sending packets asynchronously and error-free in both directions over the link A packet at this level is a string of bits received by the higher layer In order to correct errors introduced by the bit pipe at layer 1 the DLC must add control bits (header) to the packet: Header PAYLOAD Trailer 6

The Data Link Control Layer Data Link Control layer tasks and organization depend on the kind of communication links we consider: Point-to-point communication links Multi access communication links In the case of multi access links the DLC layer also takes care of managing and coordinating the condivision of the medium among multiple users This task is carried out by the Medium Access Control sublayer 7

Medium Access Control: basic principles The basic role of the MAC module is to allow multiple users to share a common resource. Example of a network of multiple users using the same transmission resource (the wireless channel) for accessing the fixed infrastructure. 8

Medium Access Control: basic principles MAC key objectives are: To maximize throughput. To guarantee an acceptable delay to all terminals. To guarantee a fair access to all terminals. The MAC should be capable of fulfilling the above goals in a dynamic environment. It should be flexible in adapting to different channel behaviors, traffic characteristics, and local network topologies. 9

Medium Access Control: basic principles MAC key tasks are: Medium sharing MAC organization Admission Control Packet Scheduling Power Control MAC tasks often include: Error detection Forward Error Correction (FEC) Handling of Automatic Repeat on request (ARQ) algorithms 10

What is the resource? The channel to be used for transmitting information will be further on called RESOURCE The resource might be defined in the frequency or time domains, as well as in other dimensions such as a code space 11

Topology of access: centralized vs. decentralized In centralized access, the resource is managed and controlled by a central unit that acts as a coordinator In decentralized access, all nodes are hierarchically equivalent and a central unit does not necessarily exist. Nodes may eventually cooperate for the purpose of resource sharing and management 12

Example of centralized access: the cellular network (GSM, UMTS) Systems that provide access to a fixed infrastructure, have usually a centralized topology of access. The central unit is the node that interfaces the fixed network Radio Access Point or Node Fixed network 13

Another example of centralized access is Wi-Fi access points Access Control in these networks is typically demanded to the element connected to the fixed network, that coordinates the access of wireless devices by managing the resource 14

Example of decentralized access: self-organizing networks RX TX Decentralized access Nodes might be cooperative or non-cooperative in finding end-to-end routes formed by multi-hop 15

Ad-hoc networks Self-organizing networks are a special case of ad-hoc networks Ad-hoc networks are sets of wireless terminals, capable of communicating in absence of fixed infrastructure Connectivity between two terminals can be obtained thanks to cooperative relaying terminals, based on multi-hop routes 16

Key properties of ad-hoc networks Easy deployment: No fixed infrastructure Fast configuration Flexibility: Adaptable to network variations (terminals going on/off, mobility, etc.) Scalability Multi-hop allows geographical extension of ad-hoc networks Robustness: No central control means no critical points 17

Network organization vs. network architecture Network organization and network architecture are two distinct concepts A network can be organized in either a centralized or distributed manner, independently of network architecture. 802.15.3 is an example of a network with a typical peer-to-peer distributed architecture, that self-organizes in a centralized way 18

Wireless networks organization vs. architecture The 802.15.3/802.15.3a example 802.15.3 is a standard for Personal Area Networks (PAN) During start-up, the MAC organizes devices in PicoNets (PNs) Each PN is controlled by a PicoNet Coordinator (PNC) PN2 PN3 PN4 The standard completely defines MAC procedures for intra-piconet operations Procedures for inter-piconet exchanges are only drafted PN1 19

The network layer The network layer has two main tasks: Routing - selecting the best path for a packet between a source and a destination Flow control - regulating the access to the network, refusing traffic when network is not able to handle it 20

Goal: Routing in data networks Goal Find the best path between two nodes in the network D S 21

Routing in data networks Strategies Routing can be done: At the beginning of a communication, by creating a virtual circuit between source and destination, that will be followed by all packets (virtual circuit networks) For each transferred packet (datagram networks): packets belonging to the same communication can follow different paths in the network 22

Routing in data networks Effects (1/2) The routing algorithm determines: directly: the average packet delay Undirectly: the network throughput, defined as: Throughput=Offered Traffic Refused Traffic Delay and throughput are linked by the flow control algorithm: if the average packet delay grows excessively, the flow control reacts by reducing the traffic allowed in the network and thus reducing the overall network throughput. 23

Routing in data networks Effects (2/2) A good routing algorithm can: increase the throughput while keeping the delay constant (for high values of offered traffic) Decrease ddelay while keeping the throughput constant ed a diminuire il delay a parità di throughput (for low values of offered traffic) Bad routing Good routing 24

Routing in data networks Classification Routing algorithms can be divided in: Centralized The path between source and destination is selected by a central node that communicates the path to the involved node Distributed The path selection is carried out by all nodes by cooperation; nodes exchange information in order to take decisions And also in: Static The selected path between a source and a destination is only modified when there is a failure or a topology variation Adaptive The selected path between a source and a destination adapts to network conditions (e.g. traffic) 25

Routing in data networks Shortest path algorithms (1/2) A key family of algorithms is formed by the shortest path routing algorithms: 1. A cost is associated to each link in the network; 2. The algorithm considers all possible paths and selects the one for which the sum of the link costs is minimum. The cost associated to each link can be: Equal to one: the algorithm selects the minimum-hop path Based on link capacity and on the expected traffic on the link Variable in time according to instantaneous link conditions. 26

Routing in data networks Shortest path algorithms (2/2) Shortest path algorithms: Dijkstra: + in a network of N nodes has complexity equal to O(N 2 ) Bellman-Ford: + It is distributed and does not require synchronism among nodes - in a network of N nodes has complexity O(N 3 ) Floyd-Warshall: + Evaluates at the same time the best path betwween all sources and all destinations - has complexity O(N 3 ) 27

Routing in data networks Flooding (1/3) It is sometimes necessary (in order to communicate failures or topology variations) transfer information from a node x in the network to all other nodes (broadcasting) A simple solution for broadcasting is the so-called flooding: 1. x sends the information (that is a data packet) to its neighbors (that is the nodes that are physically reachable); 2. Every neighbor repeats the operation, by retransmitting the packet to all its neighbors, excluding x; 3. Every packet is identified by a growing sequence number and by the ID of node x, in order to avoid that a node transmits the same packet more than one time. 28

Routing in data networks Flooding (2/3) Example of application of flooding: 29

Routing in data networks Flooding (3/3) Flooding has two main drawbacks: The number of packets transmitted for each update depends on the number L of links in the network The algorithm must foresee special information (sequence numbers) in order to guarantee that information is always correct and up to date 30

Analogies between Network and MAC layer Routing, addressing and flow control are functions commonly associated with the network module. Such functions can be also defined as functions of the MAC module in the case of a homogenous network of nodes. Heterogeneous network of nodes Homogeneous network of nodes 31

The Transport layer The Transport layer manages a virtual end-to-end link Main tasks of the Transport layer Message breaking / reassembly (required to meet maximum data size for network layer) Multiplexing of several low-rate sessions in a single network layer stream Splitting a high-rate session in several low-rate network streams If necessary, correct residual errors 32

The Session layer The Session layer manages a virtual endto-end link Main tasks of the Session layer Directory service : indicates to transport layer where a service is located Access rights management: regulates access to information 33

The Presentation and Application layers Main tasks of the Presentation layer Data compression Data encryption Code conversion Main tasks of the Application layer Application-specific tasks (software) 34