• No results found

Protocol Architecture

N/A
N/A
Protected

Academic year: 2021

Share "Protocol Architecture"

Copied!
19
0
0

Loading.... (view fulltext now)

Full text

(1)

© Jörg Liebeherr, 1998,1999 CS457

Protocol Architecture

Layered Protocol Architectures OSI Reference Model TCP/IP Protocol Stack

© Jörg Liebeherr, 1998,1999

Need for Protocols

• The task of exchanging information between devices

– requires a high degree of cooperation between the involved parties

– can be quite complex

• Protocols are a set of rules and conventions. By enforcing that communicating parties adhere to a common protocol,

communication is made possible.

• The complexity of the communication task is reduced by dividing it into subtasks:

– Each subtask is implemented independently.

(2)

© Jörg Liebeherr, 1998,1999 CS457

Example: Subtasks of Communications

• Example: The purchasing director of the Italian company

“Vendetta”, located in Milan, Italy, wants to ask the Sales Director of the US company “Crash”, with headquarters in Mobile, AL, about the price of the Ultimo 6000 Supercomputer which is produced by Crash.

• When we divide the described communication task into subtasks we see that:

– Separate entities in a company perform certain subtasks – Company entities provide services to other entities – An entity responsible for a certain subtask performs the

task by following a protocol

© Jörg Liebeherr, 1998,1999

Example: Subtasks of Communications

Mailroom Worker Attaches label Loads mailbag Shipping Clerk: Determines route of the shipment Shipping Manager: Packs shipment Assigns shipping number Administrative Assistant: Translates message and prepares a letter

Purchasing Director “Quanta costa l’Ultimo 6000?” Mailroom Worker Attaches label Loads mailbag Shipping Clerk: Determines route of the shipment Mailroom Worker Attaches label Loads mailbag Shipping Clerk: Determines route of the shipment Shipping Manager: Call Italy to confirm arrival of letter Administrative Assistant:

no action

Sales Director

(3)

© Jörg Liebeherr, 1998,1999 CS457

Network Architecture

• Protocol: A set of rules and conventions used for

communication of entities in different systems

– System: Object that contains several entities

(e.g., the company).

– Entity: Anything capable of sending or receiving

information

(e.g, the secretary in a company)

• A Network Architecture is a structured set of protocols that implement the exchange of information between computers

© Jörg Liebeherr, 1998,1999

Layered Network Architecture

• In a Layered Network Architecture, the services are grouped in a hierarchy of layers.

– An entity of layer N uses only services of layer N-1. – An entity of layer N provides services only to layer N+1.

• Example: Network Architecture

A C E B D E B layer 3 layer 2 layer 1

not layered layered

A C

(4)

© Jörg Liebeherr, 1998,1999 CS457

Layered Communications

• Each entity of a system is assigned to a layer

• An entity of a particular layer can only communicate with: 1. adjacent layer entities via Service Interfaces

above - to provide service below - to receive services

2. peer layer entity using a common protocol (Peer Protocol)

© Jörg Liebeherr, 1998,1999

Layered Communications

• A communication layer is completely defined by

(a) The peer protocol between peer entities at the same layer

(b) The service interface used to offer/provide services between adjacent layers

(5)

© Jörg Liebeherr, 1998,1999 CS457

Layered Communications

N+1 Layer Entity N+1 Layer Entity N+1 Layer Protocol N+1 Layer N-1 Layer Entity N-1 Layer Entity N-1 Layer Protocol N-1 Layer N Layer Entity N Layer Entity N Layer Protocol N Layer layer N+1/N interface layer N/N-1 interface Note:

• Layer interfaces define physical data flow.

• Peer protocols describe exchange of logical messages between peer layer entities

© Jörg Liebeherr, 1998,1999

Service Access Points

• A service user accesses services of the service provider at Service Access Points (SAPs)

• A SAP has an address that uniquely identifies where the service can be accessed

(6)

© Jörg Liebeherr, 1998,1999 CS457

Exchange of Data

• Assume a layer-N entity at A wants to send data to a layer-N peer entity to B.

• The unit of data send between peer entities is called a Protocol Data Unit (PDU)

• For now, let us think of a PDU as a single packet

• What actually happens: Layer N passes the PDU to one of A’s SAPs at layer N-1.

• The layer N-1 entity (at A) then constructs its own PDU which it sends to the layer N-1 entity at B.

• Note: PDU at layer N-1 = Header + PDU at layer N

N Layer

Entity (at layer N)PDU

N Layer Entity

A

B

© Jörg Liebeherr, 1998,1999

Exchange of Data

Layer-N Entity N PDU Layer- N-1 Entity

When passed to the SAP, the PDU is called a Service Data Unit (SDU)

(Layer-N PDU = Layer- N-1 SDU) SAPs

control

N PDU

control

Header

(of layer N-1) N PDU

(7)

© Jörg Liebeherr, 1998,1999 CS457

Service Primitives

• Communication between adjacent layers is done via function calls. The functions are called service primitives

• Almost all communication is done with only four types of service primitives:

nREQUEST: entity wants service provider to do work

nINDICATION: service provider informs entity about an

event

nRESPONSE: entity wants to respond to an event

nCONFIRM: response to an earlier request has come back

© Jörg Liebeherr, 1998,1999

Service Primitives

N+1 Layer Entity N+1 Layer Entity N Layer Entity N Layer Entity N+1 Layer Protocol

(8)

© Jörg Liebeherr, 1998,1999 CS457

Service Primitives

Recall: A layer N+1 entity sees the lower layers only as a service provider N+1 Layer Entity N+1 Layer Entity N+1 Layer Protocol

X. Request X. Confirm X. Indication

Service Provider

X. Response

© Jörg Liebeherr, 1998,1999

Example: Sending a Letter

• Bob sends a letter to Alice

Bob’s mailbox Bob Alice Alice’s mailbox Postman

(9)

© Jörg Liebeherr, 1998,1999 CS457

Putting the Example into our Context

• Identify the entities?

• Identify layers? • What is the service? • Who is a service user? • Who is a service provider? • What are the SAPs? • What are the PDUs?

• Describe the peer protocol between Bob and Alice?

• Which service primitives are invoked ?

• Bob, Alice, Postman • Layer 2: Bob, Alice

Layer 1: Postman • Deliver_Letter (“L”) • Bob and Alice • Postman • Mailboxes • Letter (at Layer 2)

• The protocol is actually complicated:When Bob sends a letter to Alice, the letter must identify Alice as the recipient. The letter must be written in a language that Alice can read. Bob must be able to write, and Alice must be able to read. Both need to know where their respective mailboxes are, and they must be able to operate a mailbox, etc.

• Letter is dropped off by Bob (L.Request); Letter is delivered to Alice’s mailbox (L.Indicate)

© Jörg Liebeherr, 1998,1999

(Un-)Acknowledged Service

• The example showed only two service primitives:

L.Request , L.Indicate

• A service which uses these two primitives is called unconfirmed service

• If Bob asks for a “certificate of delivery” we would need: L.Request, L.Indicate, L.Response, L.Confirm

(10)

© Jörg Liebeherr, 1998,1999 CS457

Protocol Architectures

• There are only few protocol architectures that are relevant today:

– OSI Reference Model

• Defined as a big effort in the 1970’s by ISO to specify a comprehensive set of protocols for networking.

• The effort failed, in that the defined protocols are not widely used. However, the concepts and terminology defined in the OSI model are the lingua franca of many networkers

– TCP/IP Protocols Suite

• The Internet protocol architecture is not the result of a design effort, but has evolved over several decades

– ATM Protocol Stack

• An example that protocols can be designed by a committee. Future relevance will depend on the success of ATM

© Jörg Liebeherr, 1998,1999

OSI Reference Model

• In 1977 the International Standardization Organization (ISO) developed a model for a layered network architecture

• This effort was completed in 1983 and is known as the Open Systems Interconnection (OSI) Reference Model

• The OSI model defines seven layers: Layer 7: Application Layer Layer 6: Presentation Layer Layer 5: Session Layer Layer 4: Transport Layer Layer 3: Network Layer Layer 2: Data Link Layer Layer 1: Physical Layer

(11)

© Jörg Liebeherr, 1998,1999 CS457

OSI Layers

Physical Layer Physical Layer Physical Layer Physical Layer Data Link Layer Data Link Layer Data Link Layer Data Link Layer Network Layer Session Layer Session Layer Transport Layer Transport Layer Application Layer Application Layer Presentation Layer Presentation Layer Network Layer Network Layer Network Layer Application HOST NODE HOST NODE Application © Jörg Liebeherr, 1998,1999

OSI Layers and Encapsulation

(12)

© Jörg Liebeherr, 1998,1999 CS457

OSI Model in a Switched Communication Network

Transport Session Presentation Application Transport Session Presentation Application Physical Data Link Network Physical Data Link Network Physical Data Link Network Physical Data Link Network Physical Data Link Network Physical Data Link Network Station (Host) Node (Router) © Jörg Liebeherr, 1998,1999

A Tour of the OSI Layers

• Physical Layer (Layer 1):

Service: Transmission of a raw bit stream over a communication channel

Functions: Conversion of bits into electrical or optical signals

Examples: X.21, RS-232-C

• Data Link Layer (Layer 2):

Service: Reliable transfer of frames over a link Functions: synchronization, error Control, flow control

(13)

© Jörg Liebeherr, 1998,1999 CS457

A Tour of the OSI Layers

• Network Layer (Layer 3):

Service: Moves packets inside the network.

Functions: Routing, Addressing, Switching, Congestion Control. Examples: IP, X.25, CLNP.

• Transport Layer (Layer 4):

Service: Controls delivery of data between hosts.

Functions: Connection establishment/management/termination, Error Control, Flow Control, Multiplexing.

Examples: TCP, UDP, ISO TP0 - TP4.

© Jörg Liebeherr, 1998,1999

A Tour of the OSI Layers

• Session Layer (Layer 5):

Service: Support the dialog between cooperating application programs

Functions: Session establishment/management/termination, Synchronization, Recovery

Examples: ISO session protocol, RPC • Presentation Layer (Layer 6):

Service: Provides freedom from compatibility problems Functions: Virtual device support, syntax conversion,

encryption

Examples: ISO presentation protocol • Application Layer (Layer 7):

Service: Provides network access to application programs Functions: Everything is application specific

(14)

© Jörg Liebeherr, 1998,1999 CS457

TCP/IP Protocol Suite

• The TCP/IP protocol suite was first defined in 1974 • The TCP/IP protocol suite is

the protocol architecture of the Internet

• The TCP/IP suite has four layers:

Application, Transport, Internet, and Network Interface Layer Application Layer Transport Layer Internet Network Interface telnet, ftp, email TCP, UDP

IP, ICMP, IGMP

Device Drivers

© Jörg Liebeherr, 1998,1999

Example: File Transfer

FTP program TCP IP Ethernet Driver Ethernet Driver Ethernet Driver IP FTP program TCP IP Ethernet Driver FTP protocol TCP protocol IP protocol IP protocol Ethernet protocol Ethernet protocol

(15)

© Jörg Liebeherr, 1998,1999 CS457

Encapsulation in the TCP/IP Suite

Application TCP IP Ethernet Driver User data User data Application Header Application data TCP Header Application data TCP Header IP Header Application data TCP Header IP Header Ethernet Header Ethernet Trailer IP datagram TCP segment Ethernet frame

• As data is moving down the protocol stack, each protocol is adding layer-specific control information.

© Jörg Liebeherr, 1998,1999

TCP/IP Protocol Suite

• The complete TCP/IP protocol suite contains many pro-tocols. The following graph is far from complete

(16)

© Jörg Liebeherr, 1998,1999 CS457

Comparison of OSI Model and TCP/IP Suite

Application Presentation Session Transport Network Data Link Physical Application Transport Internetwork Network Access Physical OSI TCP/IP © Jörg Liebeherr, 1998,1999

The B-ISDN ATM Reference Model

• ATM technology has its own protocol architecture

Physical Layer ATM Layer

ATM Adaptation Layer (AAL) Upper Layer Upper Layer

Control Plane User Plane

(17)

© Jörg Liebeherr, 1998,1999 CS457

Layers of ATM

AAL ATM Layer Physical Layer Physical Layer Physical Layer ATM Layer AAL ATM Layer Physical Layer AAL Protocol l Upper Layers Upper Layers Upper Layer Protocol

Host A ATM

Switch Host B

© Jörg Liebeherr, 1998,1999

ATM Layer

• The ATM Layer is responsible for the transport of 53 cells across an ATM network

• The ATM Layer can provide a variety of services for cells from an ATM virtual connection:

• Constant Bit Rate (CBR)

– guarantees a fixed capacity, similar to circuit switching – guarantees a maximum delay for cells

• Variable Bit Rate (VBR)

– guarantees an average throughput – can guarantee maximum delay • Available Bit Rate (ABR)

– guarantees ‘fairness” with respect to other traffic • Unspecified Bit Rate (UBR)

(18)

© Jörg Liebeherr, 1998,1999 CS457

ATM Adaptation Layer (AAL)

• AAL provides services which are between upper layers and ATM layers.

• An important service is the segmenation and reassembly of upper layer data

Data AAL Data AAL Cells Cells ATM Network segmentation reassembly © Jörg Liebeherr, 1998,1999

AAL Service Classification

• AAL has 4 different protocols: AAL 1, AAL 2, AAL 3/4, AAL 5 • Each protocol provides a different service

Class A Class B Class C Class D

Required Not required

Constant Variable Connectionless Connection-oriented Timing information in data ? Bit rate of data:

Mode of connection AAL protocol to

be used AAL 1 AAL 2 AAL 3/4

(19)

© Jörg Liebeherr, 1998,1999 CS457

ATM Services and AAL Protocols

CBR rt-VBR nrt-VBR ABR UBR

References

Related documents

Findings did not indicate a significant difference in the proportion of the variance in terrorist incidents that was predictable from political stability in the DRC and

The funding rules in place prior to the passage of the PPA enabled sponsors of underfunded plans to make no contributions to their plans if certain conditions applied, a practice

Day centers for children with special needs Educational programs for disabled children from socially disadvantaged families in order to prevent their separation from their

losses than AC lines for the same power capacity. The losses in the converter stations have of course to be added, but since they are only about 0.6 % of the transmitted power

happened, and as such was an act of self-definition. Du Fu’s poetics of historical memory refers to these transformations enacted in and through poems on the identities of place

The 2003 Ministerial Policy Guidelines on Food Safety Management in Australia – Food Safety Programs identifies four high-risk industry sectors where implementation of the

Topics include indoctrination into the fire service, general maintenance, apparatus and equipment operations, fire control, wildland firefighting, emergency vehicle operations,

One caveat must be noted: astronomical datasets are produced by complex instruments which need to be fully understood by anyone carrying out the basic data reduction stages and