IST 228\Ch1\Internetworking 1
Chapter 1: Internetworking
• Internetworking Basics
• Network segmentation
• How bridges, switches, and routers are
used to physically segment a network
• How routers are used to create
internetwork
• OSI model
IST 228\Ch1\Internetworking 2
Internetworking Models
• Most networks are designed as a stack of
layers, each one built upon the one below
it. Why?
Host 1 Host 2
Layer 3 protocol
Layer 3 Layer 3
Layer 2/3 interface
Layer 2 protocol
Layer 2 Layer 2
Layer 1/2 interface
Layer 1 protocol
Layer 1 Layer 1
Physical Medium
IST 228\Ch1\Internetworking 3
• Each layer provides services to the higher
levels.
• Each layer behaves as a black box.
• Layer n on one machine talks to layer n on
another machines.
• The corresponding layer in the layered
structure are called peers.
• The communication between peers must
follow certain rules, known as protocol.
• No data are directly transferred between
layers. Actual communication is through a
physical medium below layer 1.
IST 228\Ch1\Internetworking 4
An Analogy
Professor A Professor B
J’aime
I like Message bien les
rabbits
lapins
Urdu & English Information Chinese & French
for the
Translator remote Translator
L: Dutch L: Ducth
translator
Ik vind Ik vind
konijnen use Dutch konijnen
leuk leuk
Secretary Information Secretary
Fax:# Fax:#
for the
L: Ducth L: Ducth
remote
Ik vind secretary Ik vind
konijnen konijnen
leuk use fax leuk
IST 228\Ch1\Internetworking 5
Open Systems Interconnection (OSI)
Reference Model
• Provides user interface
The upper levels
Application
• Initiates services
• Transfer data into standard format
Presentation before transmission
• Keeps data different applications’ data
Session separate
• Control the data exchange
• End-to-end data error free data
Transport
transmission
The lower levels
• Logical addressing for data packets
Network
Routing and error handling
• NIC software function
Data Link • How data in packaged
• Error detection
• Moves bits between devices
Physical
• Specifies voltages, cables, and cables
IST 228\Ch1\Internetworking 6
Reasons for Layering
• Simplifies the network model
• Enables programmers to specialize in a
particular level or layer of the networking
model
• Provides design modularity
• Encourages interoperability
• Allows for standardized interfaces to be
produced by networking vendors
IST 228\Ch1\Internetworking 7
The Application Layer (Layer 7)
• The layer where users communicate to the computer
• Contains protocols and utilities that provides services to
network applications
– (True/False) MsWord, Eudora Mail, Netscape are in the
application layer.
– Eudora (application) uses SMTP (Simple Mail Transfer Protocol)
(protocol).
• E-mail:
– Message formats such as RFC 822
– SMTP, POP3 (Post Office Protocol Version 3), IMAP (Internet
Message Access Protocol)
• WWW:
– HTML (The HyperText Markup Language), XML (eXtensible
Markup Language), XSL (eXtensible Style Language)
– HTTP (The HyperText Transfer Protocol)
IST 228\Ch1\Internetworking 8
The Presentation Layer (Layer 6)
• The presentation layer prepares the data from
the application layer for transmission over the
network or from the network to the application
layer.
• Include protocols specifying how to represent
data (MPEG, JPEG, PIC, WAV)
• Responsible for data translation, formatting,
encryption, compression.
• We need these services because different
computers use different internal representation
for data (integers and characters)
IST 228\Ch1\Internetworking 9
The Session Layer (Layer 5)
• Enables two applications on the network to have
an ongoing conversation
• Provide following services
– Communication setup and teardown
– Control for data exchange
– Data synchronization definition
– Failure recovery
• Examples:
– Structured Query Language (SQL)
– X Windows
– AppleTalk Session Protocol (ASP)
IST 228\Ch1\Internetworking 10
The Transport Layer (Layer 4)
• Provides
– end-to-end error free data transport services
– establish a logical connection
– data segmentation into maximum transmission unit
size
– messaging service for session layer
• Protocols in this layer can be
– connection-oriented : require an acknowledgment of
the receipt of data packets.
– connectionless : do not require an acknowledgment of
the receipt of data packets.
IST 228\Ch1\Internetworking 11
• Connection-oriented protocols:
sender receiver
Synchronize
Negotiate connection
Synchronize
Acknowledge
Virtual Circuit Connection Establish
Data Transfer
IST 228\Ch1\Internetworking 12
• Flow Control
• The segments delivered back to the sender upon their
reception
• Any segment not acknowledged are retransmitted.
• Segments are sequence back into their proper order upon
arrival at their destination
• Manageable data flow is maintained in order to avoid
congestion
sender receiver
Buffer full
GO
IST 228\Ch1\Internetworking 13
• Windowing: The quantity of data segment
(in bytes) is sent without receiving an
acknowledgment (ack) is called a window.
sender receiver sender receiver
Window Window
size of 1 size of 3
send 1 receive 1 send 1
ack. 2 send 2
send 2 receive 2 send 3
ack. 3 ack. 4
send 3 send 4
IST 228\Ch1\Internetworking 14
• Acknowledgments:
sender receiver
Positive Acknowledgment
with retransmission
1 2 3 4 5 6 1 2 3 4 5 6
send 1
send 2
send 3
ack. 4
send 4
send 5 Connection lost!
send 6
ack. 5
send 5
ack. 7
IST 228\Ch1\Internetworking 15
The Network Layer (Layer 3)
• Provides services
– to manage devices addressing
– to tracks the location of devices on the
network
– to determine the best way to move data on
the network
• The network layer must transport traffic
between devices that are not directly
connected.
• Routers are specified at this layer.
IST 228\Ch1\Internetworking 16
The Data Link (Layer 2)
• Services
– Identification of the source and destination nodes via
their physical address (Media Access Control (MAC)
address)
– Definition of how data is packaged for transport as
frames
– Error detection
– Flow control of information sent across the link
• Has two sublayers:
– Media Access Control (MAC) 802.3
– Logical Link Control (LLC) 802.2
IST 228\Ch1\Internetworking 17
The Physical Layer (Layer 1)
• This layer communicates directly with the
various types of actual communication
media
• Services
– definition of the physical characteristics of the
network hardware, including cable and
connector
– Encoding
– Transmission of signals on the wire
IST 228\Ch1\Internetworking 18
Example:
568B twisted pair wiring scheme
IST 228\Ch1\Internetworking 19
Layer 1 Network Devices: Repeaters
• The number of nodes on a network and the length of
cable used influence the quality of communication on the
network
• Attenuation
– Natural degradation of a transmitted signal over distance
• Repeaters work against attenuation by repeating signals
that they receive on a network
• Why are repeaters Layer 1 devices?
IST 228\Ch1\Internetworking 20
Layer 1 Network Devices: Hubs
• Generic connection device used to tie several
networking cables together to create a link
between different stations on a network
IST 228\Ch1\Internetworking 21
• Hubs that are plugged into electric power are
called active hubs
• A hub that merely connects different cables
on a network and provides no signal
regeneration is called a passive hub and is
not a repeater
• “Hub” is a generic term applied to many
different network-connection devices
• If a hub in some way segments or subdivides
the traffic on a network, it is an intelligent, or
switching, hub
IST 228\Ch1\Internetworking 22
Network Segmentation
• Segmentation
– Process of breaking a network into smaller broadcast or
collision domains
• Ethernet network, which are characterized by IEEE
802.3 standard, define the use of a Carrier Sense
Multiple Access with Collision Detection
(CSMA/CD) access method
– Backoff algorithm : Mathematical calculation
performed by computers after a collision occurs on a
CSMA/CD network
– Backoff period : Random time interval used after a
collision has been detected on an Ethernet network
IST 228\Ch1\Internetworking 23
Network Segmentation via Bridges
IST 228\Ch1\Internetworking 24
Layer 2 Devices: Bridges
• Operate at the Data Link layer of the OSI
model
• Filters traffic between network segments
by examining the destination MAC address
– Based on this destination MAC address, the
bridge either forwards or discards the frame
– When a client sends a broadcast frame to
the entire network, the bridge will always
forward the frame
IST 228\Ch1\Internetworking 25
• Transparent Bridges : Also called learning
bridges because they build a table of MAC
addresses as they receive frames
– This means that they “learn” which addresses
are on which segments
– Ethernet networks mainly use transparent
bridges
• Source-routing bridges : Rely on the
source of the frame transmission to
provide the routing information
– Usually employed by Token Ring networks
• Translation bridges : Can connect
networks with different architectures
IST 228\Ch1\Internetworking 26
Layer 2 Devices: Switches
• Increase network performance by reducing the
number of packets transmitted to the rest of the
network
• Like bridges, operate at the Data Link layer of
the OSI model
• In an Ethernet network, computers are usually
connected directly to a switch
• Virtual circuit
– Private connections between two points created by a
switch that allows the two points to use the entire
available bandwidth between those two points without
contention