Download as pdf or txt
Download as pdf or txt
You are on page 1of 17

Course Title:Computer System Security and Information System

NETWORK DEVICES
and
REFERENCE MODELS
Network devices
Hub, Repeater, Bridge, Switch, Router, Gateways
Reference Models
OSI Reference Model
TCP/IP Reference Model

Prepared By: Muleta T, Addis Abeba Science and Technology University


Course Title:Computer System Security and Information System

CH-01: Connecting Devices ...

What are the Central Connecting devices?


Hub, Repeater, Bridge, Switch, Router, Gateways and Brouter acts as
central connecting devices in the network.

Responsible for connecting appliances and transmitting data

Repeaters ...
1 Repeaters
Operates at the physical layer.
Function: regenerate the signal over the same network before the signal
becomes too weak or corrupted do not amplify the signal.
It is a 2 port device.
Types of Repeaters
1 Signals that they regenerate: 2 Types
7→ Analog Repeaters and Digital Repeaters
2 The networks they connect: 2 Types
7→ Wired Repeaters and Wireless Repeaters
3 Based on LANs they connect,: 2 Types
7→ Local Repeaters and Remote Repeaters
Course Title:Computer System Security and Information System

CH-01: Connecting Devices ...

Connecting Devices ...


2 Hub
Multiport repeater.
Hubs cannot filter data, so data packets are sent to all connected devices.
Do not have the intelligence to find out the best path for data packets.
How do they Function?
Hosts can send data to the Hub.
Then the hub broadcasts that data to all other connected hosts on the network.

Figure: Connective via HUbs


Course Title:Computer System Security and Information System

CH-01: Connecting Devices ...

Connecting Devices ...


3 Bridges
Operates at the data link layer.
A bridge is a repeater, with Added Functionality.
⇒ (i.e. filtering content by reading the MAC addresses of source and
destination).
used in computer networks to interconnect two LANs together and separate
network segments.

• Types of Bridge
Transparent Bridge
The stations are completely unaware of the
bridge’s existence.
Automatically maintains a routing table and
update table in response to maintain changing
topology
Source Routing Bridges → Routing operation is
performed by the source station

Figure: Interconnection Via Bridge Translational Bridges → Data format translation


Course Title:Computer System Security and Information System

Connecting Devices ...

CH-01: Connecting Devices ...


4 Switches
Operates at the data link layer.
A multiport bridge.
7→ (i.e. Can boost the efficency and Performance).
Can perform error checking before forwarding data. Means?
? It does not forward packets that have errors and
? Forward good packets selectively to the correct port only.
Switches addresses issues:
Of providing direct data connections,
Minimizing data collisions, and
maximizing the use of a LAN’s bandwidth
Course Title:Computer System Security and Information System

Connecting Devices ...

CH-01: Connecting Devices ...


5 Routers
The router is a layer 3 device
The router uses the network address to make routing decisions regarding
forwarding data packets.
Routers normally connect LANs and WANs together and have a dynamically
updating routing table based on which they make decisions on routing the
data packets.
5 Gateway
Any device that translates one data format to another
The key point about a gateway is that only the data format is translat- ed,
not the data itself.
5 CSU/DSU (Channel Service Unit/Digital Service Unit)
AkA Data Service Unit(DSU)
is a device that converts the digital signal format used on LANs into one
used on WANs.
WHy Translation required 7→ Network Technology is distnict
Course Title:Computer System Security and Information System

CH-01: Connecting Devices ...

Figure: Connecting Via Routers


Course Title:Computer System Security and Information System

CH-01: Reference Models ...

OSI Model
The model is called the ISO OSI (Open Systems Interconnection) Reference
Model 7→ it deals with connecting open systems.
It is a conceptual framework.
Composed of Layers
A layer created with a different abstraction is needed.
Each layer should performa well-defined function.
The function of each layer should be chosen with an eye toward defining
internationally standardized protocols.
The layer boundaries should be chosen to minimize the information flow
across the interfaces.
How Many Layer’s ,→ 7 Layers
Layer-7 : Application Layer
Layer-6 : Presentation Layer
Layer-5 : Session Layer
Layer-4 : Transport Layer
Layer-3 : Network Layer
Layer-2 : Data-Link Layer
Layer-1 : Physical Layer
Course Title:Computer System Security and Information System

CH-01: Reference Models ...

Figure: OSI Reference Model


Course Title:Computer System Security and Information System

CH-01: Reference Models ...

Application Layer
Provides an interface between the communications software and any applications
that need to communicate outside the computer
The application layer contains a variety of protocols that are commonly needed
by users
The application layer provides an interface between software running on a
computer and the network itself.
PDU ,→ Message
Contain various protocols for
Extract web pages,File transfer, Send & recieve a mail and others

Presentation Layer
is concerned with the syntax and semantics of the information transmitted.

Means to define and negotiate data formats ,→ such as ASCII text,
EBCDIC text, binary, BCD, and JPEG
Encryption and data Compression issues also ↓
Course Title:Computer System Security and Information System

CH-01: Reference Models ...

Session Layer
defines how to start, control, and end conversations 7→ Creating Session
mainly provide services like:
Dialog control ,→ whose turn it is to transmit
Token Management ,→ Preventing simultaneously critical operation
Synchronization ,→ Resuming communication in case of failures

Transport Layer
Function -
To accept data from above it,
Split it up into smaller units,
Pass these to the network layer, and
Ensure that the pieces all arrive correctly at the other end
The transport layer is a true end-to-end layer;
It carries data all the way from the source to the destination
Course Title:Computer System Security and Information System

CH-01: Reference Models ...

Network Layer
A key design issue is determining how packets are routed from source to
destination.
defines three main features: logical addressing, routing(forwarding), and path
determination
Routing : how devices forward packets to their final destination.
Logical addressing defines how each device can have an address that can be
used by the routing process.
Path determination refers to the work done by routing protocols to learn all
possible routes and choose the best route.

Data-Link Layer
This layer defines the rules that determine when a device can send data over a
particular medium.
To transform a raw transmission facility into a line that appears free of
undetected transmission errors.
The sender break up the input data into data frames and transmit the frames
sequentially
If recieved successfully ACK frame 7→ Sender
Course Title:Computer System Security and Information System

CH-01: Reference Models ...

Physical Layer
Concerned with transmitting raw bits over a communication channel
Representing pieces of information as 1 and 0
Question U may rise ?
What electrical signals should be used to represent a 1 and a 0 ?
How many nanoseconds a bit lasts ?
How the initial connection is established ?
How it is torn down when both sides are finished ?
How many pins the network connector has, and what each pin is used for

?TCP/IP Model ? ? ? ?
Started by ARPANET ,→ Grandparent of all wide area computer networks
ARPANET
is a Research project sponsored by US DoD
Later replaced Changed its name to TCP/IP
Course Title:Computer System Security and Information System

CH-01: Reference Models ...

Figure: TCP/IP Reference Model


Course Title:Computer System Security and Information System

CH-01: Reference Models ...

TCP/IP Layer

The Application layer: contains programs that make use of the network.
The network layer deals with how to combine:
Multiple links into networks,
Networks of networks, into internetworks so that we can send packets
between distant computers.
The link layer is concerned with

How to send finite-length messages between directly connected
computers with specified levels of reliability
The Physical layer : deal with the physical characteristics of the transmission
medium

Connectors, pins, use of pins, electrical currents, encoding, light modulation ...
Course Title:Computer System Security and Information System

CH-01: Reference Models ...

Any Similarities and Different between the Model?



YUP! Reading Assignment ....
Course Title:Computer System Security and Information System

Done!
Question!

You might also like