Upload
colleen-dixon
View
218
Download
2
Embed Size (px)
Citation preview
ISO-OSI PROTOCOLSISO-OSI PROTOCOLS
Professor Saad Haj Bakry, PhD, CEng, FIEEProfessor Saad Haj Bakry, PhD, CEng, FIEE
NETWORK ARCHITECTURENETWORK ARCHITECTURE
CONTENTSCONTENTS
Saad Haj Bakry
Network ArchitectureISO-OSI Protocols
NETWORK STRUCTURENETWORK STRUCTURE
TRANSPORT
ASSOCIATED
STANDARDS
ASSOCIATED
STANDARDS
LAYERED PROTOCOLSLAYERED PROTOCOLS
ISO-OSI LAYERESISO-OSI LAYERES
ISO TERMSISO TERMSDATA LINK
PHYSICAL
USING OSIUSING OSINETWORK
SESSION
PRESENTATION
APPLICATION
MANAGEMENTMANAGEMENT
SECURITYSECURITY
REFERENCESREFERENCES
STANDARDSSTANDARDS
ISO-OSIISO-OSI
ISOISO
Saad Haj Bakry
Network ArchitectureISO-OSI Protocols
INTERNATIONAL STANDARDS ORGANIZATIONINTERNATIONAL STANDARDS ORGANIZATION
ADDRESS: PO Box
56, 1211 Geneva 20, Switzerland
ADDRESS: PO Box
56, 1211 Geneva 20, Switzerland
STARTED: 1946
200 (TCs) Technical
Committees
5000 (Standards)
STARTED: 1946
200 (TCs) Technical
Committees
5000 (Standards)
MEMBERS: 89 Countries ANSI: USA BSI: UK SASO:
Saudi Arabia
MEMBERS: 89 Countries ANSI: USA BSI: UK SASO:
Saudi Arabia
OSIOSI
Saad Haj Bakry
Network ArchitectureISO-OSI Protocols
TRANSPORT
DATA LINK
PHYSICAL
NETWORK
SESSION
PRESENTATION
APPLICATION
OPEN SYSTEM
INTERCONNECTION:
REFERENCE MODEL
OPEN SYSTEM
INTERCONNECTION:
REFERENCE MODEL
STARTED: 1983STARTED: 1983
NETWORK STRUCTURENETWORK STRUCTURE
Saad Haj Bakry
Network ArchitectureISO-OSI Protocols
H
Host / DTE
Node / DCE
Users
NN
NN NN
NN
COMMUNICATIONS
SUBNETWORKH
H H
H
H
UUUU
UU
UU
UU
UU
UU
ACCESS / SERVICES SUBNETWORK
ISO NETWORK TERMS: (1/4) ISO NETWORK TERMS: (1/4)
DATA: A representation of facts, concepts, or instructions in a formalized manner suitable for communications, interpretation, or processing
DATA: A representation of facts, concepts, or instructions in a formalized manner suitable for communications, interpretation, or processing
Saad Haj Bakry
Network Architecture ISO-OSI Protocols
INFORMATION: The meaning that is currently assigned to “data” by means of conventions applied to that data.
INFORMATION: The meaning that is currently assigned to “data” by means of conventions applied to that data.
FUNCTIONAL UNIT: An entity of HW or SW, or both, capable of accomplishing a specific purpose
FUNCTIONAL UNIT: An entity of HW or SW, or both, capable of accomplishing a specific purpose
ISO NETWORK TERMS: (2/3) ISO NETWORK TERMS: (2/3)
SOURCE: The “functional unit” that generates “data” for transmission
SOURCE: The “functional unit” that generates “data” for transmission
Saad Haj Bakry
Network Architecture ISO-OSI Protocols
SINK: The “functional unit” that accepts transmitted “data”.
SINK: The “functional unit” that accepts transmitted “data”.
PROTOCOL: A set of semantic and syntactic rules that determines the behaviour of “functional units” in achieving communications.
PROTOCOL: A set of semantic and syntactic rules that determines the behaviour of “functional units” in achieving communications.
ISO NETWORK TERMS: (3/4) ISO NETWORK TERMS: (3/4)
DATA COMMUNICATION EQUIPMENT (DCE): In a “data” station, the equipment that provides the signal conversion and coding between the “DTE” and the communication line. (Communication Node)
DATA COMMUNICATION EQUIPMENT (DCE): In a “data” station, the equipment that provides the signal conversion and coding between the “DTE” and the communication line. (Communication Node)Saad Haj Bakry
Network Architecture ISO-OSI Protocols
DATA TERMINAL EQUIPMENT (DTE): The part of “data” station that serves as a “data source”, “data sink”, or both. (Host)
DATA TERMINAL EQUIPMENT (DTE): The part of “data” station that serves as a “data source”, “data sink”, or both. (Host)
ISO NETWORK TERMS: (4/4) ISO NETWORK TERMS: (4/4)
DATA INTEGRITY : The “data” quality that exists as long as accidental or malicious destruction, alternation, or loss of “data” does not occur.
DATA INTEGRITY : The “data” quality that exists as long as accidental or malicious destruction, alternation, or loss of “data” does not occur.
Saad Haj Bakry
Network Architecture ISO-OSI Protocols
ENCRYPTION: Encryption methods and principles are examples pf things considered by “cryptography”.
ENCRYPTION: Encryption methods and principles are examples pf things considered by “cryptography”.
CRYPTOGRAPHY: A discipline involving principles, means, and methods for changing “data”, so that it is not readable.
CRYPTOGRAPHY: A discipline involving principles, means, and methods for changing “data”, so that it is not readable.
LAYERED PROTOCOLSLAYERED PROTOCOLS
Saad Haj Bakry
Network Architecture ISO-OSI Protocols
WHY DIVIDE:
Complex Operation
Divide & Rule
Remember: it is Integrated
(All in One)
WHY DIVIDE:
Complex Operation
Divide & Rule
Remember: it is Integrated
(All in One)
WHY LAYERS:
Nature of Network Structure
User Access Use Demands Presentation
Network Operation Communication
WHY LAYERS:
Nature of Network Structure
User Access Use Demands Presentation
Network Operation Communication
ISO-OSI LAYERSISO-OSI LAYERS
Saad Haj Bakry
Network Architecture ISO-OSI Protocols
APPLICATIONAPPLICATION
PRESENTATIONPRESENTATION
SESSIONSESSION
TRANSPORT`TRANSPORT`
NETWORKNETWORK
DATA LINKDATA LINK
PHYSICALPHYSICAL
APPLICATIONAPPLICATION
PRESENTATIONPRESENTATION
SESSIONSESSION
TRANSPORT`TRANSPORT`
NETWORKNETWORK
DATA LINKDATA LINK
PHYSICALPHYSICAL
COMMUNICATION MEDIUM
COMMUNICATION MEDIUM
PHYSICALPHYSICAL
DATA LINKDATA LINK
NETWORKNETWORK
COMMUNICATION SUBNETWORKCOMMUNICATION SUBNETWORK
COMMUNICATION MEDIUM
COMMUNICATION MEDIUM
PEER LEVELS
ISO-OSI FUNCTIONSISO-OSI FUNCTIONS
Saad Haj Bakry
Network Architecture ISO-OSI Protocols
APPLICATION: Supporting Services at Access Points
APPLICATION: Supporting Services at Access Points
PRESENTATION: Representation of
Information
PRESENTATION: Representation of
Information
SESSION: User Interface to the Network
SESSION: User Interface to the Network
TRANSPORT: End to End QOS
TRANSPORT: End to End QOS
NETWORK: Subnetwork Operation
NETWORK: Subnetwork Operation
DATA LINK: Point to Point Error FreeDATA LINK: Point to Point Error Free
PHYSICAL: Interface to the MediumPHYSICAL: Interface to the Medium
INTERNETWORKINGINTERNETWORKING INTERCONNECTIONINTERCONNECTION
PHYSICAL LAYER: (1/2)
PHYSICAL LAYER: (1/2)
FUNCTIONS: CIRCUIT IDENTIFICATION CONNECTION: Activate / Maintain / Deactivate
SIGNAL & MEDIUM: Put on / Take off
FLOW: Sequencing & Transmission
FAULT: Detection Notification
FUNCTIONS: CIRCUIT IDENTIFICATION CONNECTION: Activate / Maintain / Deactivate
SIGNAL & MEDIUM: Put on / Take off
FLOW: Sequencing & Transmission
FAULT: Detection Notification
An Interface to the Physical MediumAn Interface to the Physical Medium
Saad Haj Bakry
Network Architecture ISO-OSI Protocols
PYSICAL LAYER: (2/2) PYSICAL LAYER: (2/2)
STANDARDS: MECHANICAL: Plugs / Sockets / Pins Functions
ELECTRICAL: Voltage Levels on the Medium
FUNCTIONAL: Levels Assigned to: 0 / 1
PROCEDURAL: Rules of Operation, Sequencing
STANDARDS: MECHANICAL: Plugs / Sockets / Pins Functions
ELECTRICAL: Voltage Levels on the Medium
FUNCTIONAL: Levels Assigned to: 0 / 1
PROCEDURAL: Rules of Operation, Sequencing
Saad Haj Bakry
Network Architecture ISO-OSI Protocols
EXAMPLES: ITU: V.24 / X.21; EIS: RS 232 / RS
449
EXAMPLES: ITU: V.24 / X.21; EIS: RS 232 / RS
449
DATA LINK LAYER: (1/2) DATA LINK LAYER: (1/2)
FUNCTIONS:
CONNECTION ESTABLISHMENT BREAKING DATA INTO FRAMES
ERROR CONTROL: Detection / Recovery
FLOW CONTROL: Buffer Limit / QOS
FUNCTIONS:
CONNECTION ESTABLISHMENT BREAKING DATA INTO FRAMES
ERROR CONTROL: Detection / Recovery
FLOW CONTROL: Buffer Limit / QOS
Point to Point Error Free TransmissionPoint to Point Error Free Transmission
Saad Haj Bakry
Network Architecture ISO-OSI Protocols
DATA LINK LAYER: (2/2) DATA LINK LAYER: (2/2)
Saad Haj Bakry
Network Architecture ISO-OSI Protocols
EXAMPLES:
IBM SNA: SDLC (Synchronous DL Control) ISO: HDLC
(High level DLC)
EXAMPLES:
IBM SNA: SDLC (Synchronous DL Control) ISO: HDLC
(High level DLC)
ERROR CONTROL: Adding Control Bits
ERROR CONTROL: Adding Control Bits
TECHNIQUES:
Echo Checking
ARQ: Automatic
Repeat Request
FEC: Forward Error
Correction
TECHNIQUES:
Echo Checking
ARQ: Automatic
Repeat Request
FEC: Forward Error
Correction
NETWORK LAYER: 1/2 NETWORK LAYER: 1/2
FUNCTIONS: SUBNETWORK PATH CONTROL:
Addressing, Set Up, Maintain, Clear Down MULTIPLEXING /
CONCENTRATION ROUTING / RELAYING: QOS CONGESTION
CONTROL: QOS
FUNCTIONS: SUBNETWORK PATH CONTROL:
Addressing, Set Up, Maintain, Clear Down MULTIPLEXING /
CONCENTRATION ROUTING / RELAYING: QOS CONGESTION
CONTROL: QOS
Control of Communications SubnetworkControl of Communications Subnetwork
Saad Haj Bakry
Network Architecture ISO-OSI Protocols
NETWORK LAYER: 2/2NETWORK LAYER: 2/2
Saad Haj Bakry
Network Architecture ISO-OSI Protocols
EXAMPLES: ITU: X.25 / EIA: RS-366
EXAMPLES: ITU: X.25 / EIA: RS-366
ROUTING:
STATIC: Shortest Path / Table DYNAMIC: Least Busy Link
HYBRID
ROUTING:
STATIC: Shortest Path / Table DYNAMIC: Least Busy Link
HYBRID
CONGESTION
CONTROL: PERMITS / TOKENS SHARING BUFFERING LIMITS
CONGESTION
CONTROL: PERMITS / TOKENS SHARING BUFFERING LIMITS
TRANSPORT LAYER: (1/2)TRANSPORT LAYER: (1/2)
FUNCTIONS: END TO END PATH CONTROL
BREAKING DATA INTO
MANAGEBLE UNITS ERROR /
CONGESTION / COST / QOS MONITORING & CONTROL
SPLITTING: (1) Transport to (n)
Network Connections MULTIPLEXING: (n) Transports to (1) Connection
FUNCTIONS: END TO END PATH CONTROL
BREAKING DATA INTO
MANAGEBLE UNITS ERROR /
CONGESTION / COST / QOS MONITORING & CONTROL
SPLITTING: (1) Transport to (n)
Network Connections MULTIPLEXING: (n) Transports to (1) Connection
End to End Service Quality ControlEnd to End Service Quality Control
Saad Haj Bakry
Network Architecture ISO-OSI Protocols
TRANSPORT LAYER: (2/2)TRANSPORT LAYER: (2/2)
Saad Haj Bakry
Network Architecture ISO-OSI Protocols
CLASS 0: Simplest / Assuming
High Quality
Network
CLASS 0: Simplest / Assuming
High Quality
Network
CLASS 4:
Assuming Low Quality Network
CLASS 4: Assuming Low Quality Network
CLASS 3: Both: Error Recovery &
Multiplexing
CLASS 3: Both: Error Recovery &
Multiplexing
CLASS 1: Basic Error
Recovery
CLASS 1: Basic Error
Recovery
CLASS 2: Multiplexing Required
CLASS 2: Multiplexing Required
EXAMPLE:
INTERNET: TCP / UDP
EXAMPLE:
INTERNET: TCP / UDP
SESSION LAYERSESSION LAYER
User Interface to the NetworkUser Interface to the Network
Saad Haj Bakry
Network Architecture ISO-OSI Protocols
Session
Connection
Establishment
Session
Connection
Establishment
Session
Interaction
Management
Session
Interaction
Management
QUARANTINE: (for Security)
Receiver Needs Permission to Release
Information to Presentation
QUARANTINE: (for Security)
Receiver Needs Permission to Release
Information to Presentation
Session
Connection
Release
Session
Connection
Release
BRACKETING: (for Failure) Retaining the Ability to
Retransmit Using the Last Bracketed Message
BRACKETING: (for Failure) Retaining the Ability to
Retransmit Using the Last Bracketed Message
PRESENTATION LAYERPRESENTATION LAYER
Representation of InformationRepresentation of Information
Saad Haj Bakry
Network Architecture ISO-OSI Protocols
CODING: Syntax & Semantics of Information CODING: Syntax & Semantics of Information
ENCRYPTION ENCRYPTION COMPRESSIONCOMPRESSION
CODE CONVERSION: ASCII / EBCDICCODE CONVERSION: ASCII / EBCDIC
TRANSFERRING / RECEIVING InformationTRANSFERRING / RECEIVING Information
APPLICATION LAYERAPPLICATION LAYER
Supporting Network Services at Access Points (User End)
Supporting Network Services at Access Points (User End)
Saad Haj Bakry
Network Architecture ISO-OSI Protocols
GENERAL FUNCTIONS: AUTHORITY TO COMMUNICATE
SERVICE SELECTION
PARTNERS IDENTIFICATION
MESSAGE HANDLING
GENERAL FUNCTIONS: AUTHORITY TO COMMUNICATE
SERVICE SELECTION
PARTNERS IDENTIFICATION
MESSAGE HANDLING
USING ISO-OSIUSING ISO-OSI
Saad Haj Bakry
Network Architecture ISO-OSI Protocols
APPLICATIONAPPLICATION
PRESENTATIONPRESENTATION
SESSIONSESSION
TRANSPORT`TRANSPORT`
NETWORKNETWORK
DATA LINKDATA LINK
PHYSICALPHYSICAL
APPLICATIONAPPLICATION
PRESENTATIONPRESENTATION
SESSIONSESSION
TRANSPORT`TRANSPORT`
NETWORKNETWORK
DATA LINKDATA LINK
PHYSICALPHYSICAL
COMMUNICATION MEDIUMCOMMUNICATION MEDIUM
DATA
DATA
DATA
DATA
DATA
DATA
DATA
DATA
A P S T N L H
A
A
A
A
A
A
P
P
P
P
P
S
S
S
S
T
T
T
N
N L
ASSOCIATED STANDARDSASSOCIATED STANDARDS
Saad Haj Bakry
Network Architecture ISO-OSI Protocols
MANAGEMENTMANAGEMENT
NAMING &
ADDRESSING: Identifying
Communicating Entities
NAMING &
ADDRESSING: Identifying
Communicating Entities
DIRECTORY
SERVICES: Distributed
Database to Hold Standard Names
& Addresses
DIRECTORY
SERVICES: Distributed
Database to Hold Standard Names
& Addresses
SECURITYSECURITY
NETWORK MANAGEMENT: (1/2)NETWORK MANAGEMENT: (1/2)
Saad Haj Bakry
Network Architecture ISO-OSI Protocols
FAULTS: Testing / Detection /
Isolation / Notification / Recovery
FAULTS: Testing / Detection /
Isolation / Notification / Recovery
CONFIGURATION: Addition / Deletion /
Initialization / Termination
CONFIGURATION: Addition / Deletion /
Initialization / Termination
SECURITY:
Access / Records / Files
SECURITY:
Access / Records / Files
PERFORMANCE: Congestion / Delay /
Reliability /
Utilization
PERFORMANCE: Congestion / Delay /
Reliability /
Utilization
ACCOUNTING: Usage / Charging / Billing
ACCOUNTING: Usage / Charging / Billing
NETWORK MANAGEMENT: (2/2)NETWORK MANAGEMENT: (2/2)
Saad Haj Bakry
Network Architecture ISO-OSI Protocols
OSI PROTOCOL MANAGEMENT: Management of a Function / Protocol of a Layer
OSI PROTOCOL MANAGEMENT: Management of a Function / Protocol of a Layer
OSI LAYER MANAGEMENT: Management of Interaction between Peer Layers
OSI LAYER MANAGEMENT: Management of Interaction between Peer Layers
OSI SYSTEM MANAGEMENT: Management of Functions Related to All Layers
OSI SYSTEM MANAGEMENT: Management of Functions Related to All Layers
NETWORK SECURITY: 1/2NETWORK SECURITY: 1/2
Saad Haj Bakry
Network Architecture ISO-OSI Protocols
UNAUTHORIZED
MODIFICATION OF DATA
UNAUTHORIZED
MODIFICATION OF DATA
MASQUERADING
AS A FRIENDLY
ENTITY
MASQUERADING
AS A FRIENDLY
ENTITY
MESSAGE
REPETITION
MESSAGE
REPETITION
DENIAL
OF SERVICE
DENIAL
OF SERVICE
NETWORK SECURITY: 2/2NETWORK SECURITY: 2/2
Saad Haj Bakry
Network Architecture ISO-OSI Protocols
AUTHENTICATION
FOR CONFIDENCE
AUTHENTICATION
FOR CONFIDENCE
ACCESS CONTROLACCESS CONTROL
DATA INTEGRITY:
DATA INTEGRITY:
DATA CONFIDENTIALITY: No Disclosure
DATA CONFIDENTIALITY: No Disclosure
NON REPUDIATION: Proof of Sending / Receiving NON REPUDIATION: Proof of Sending / Receiving
ISO POEM: 1/8ISO POEM: 1/8
Saad Haj Bakry
Network Architecture ISO-OSI Protocols
The APPLICATION layer is the top one; to the user it’s connected. It is where the transaction is begun, or sometimes just rejected
The APPLICATION layer is the top one; to the user it’s connected. It is where the transaction is begun, or sometimes just rejected
The user may make many demands, for lots of different things. This layer that handles commands,
and output bells it rings
The user may make many demands, for lots of different things. This layer that handles commands,
and output bells it rings
ISO POEM: 2/8ISO POEM: 2/8
Saad Haj Bakry
Network Architecture ISO-OSI Protocols
The next layer down is PRESENTATION, it handles different devices. It performs any necessary translation, so
there won’t be any surprises.
The next layer down is PRESENTATION, it handles different devices. It performs any necessary translation, so
there won’t be any surprises.
A virtual terminal is the aim, so the key that you will hit, will always
be just the same, whatever kind of kit
A virtual terminal is the aim, so the key that you will hit, will always
be just the same, whatever kind of kit
ISO POEM: 3/8ISO POEM: 3/8
Saad Haj Bakry
Network Architecture ISO-OSI Protocols
Below presentation we have SESSION, in our network system. The session layer is the one,
which contacts station distant.
Below presentation we have SESSION, in our network system. The session layer is the one,
which contacts station distant.
Virtual calls by it are placed, for a network task,
and when it has a contact made, for a dialogue it
will ask.
Virtual calls by it are placed, for a network task,
and when it has a contact made, for a dialogue it
will ask.
ISO POEM: 4/8ISO POEM: 4/8
Saad Haj Bakry
Network Architecture ISO-OSI Protocols
Session is followed by TRANSPORTATION, a data path it sets up. It gives the layers above support,
in the form of error free network.
Session is followed by TRANSPORTATION, a data path it sets up. It gives the layers above support,
in the form of error free network.
Below transport things become closer to the hardware, but the layers higher up do not need to
care.
Below transport things become closer to the hardware, but the layers higher up do not need to
care.
ISO POEM: 5/8ISO POEM: 5/8
Saad Haj Bakry
Network Architecture ISO-OSI Protocols
NETWORK is the next one down, moving all the data.
It handles all the routing round, like a network
operator
NETWORK is the next one down, moving all the data.
It handles all the routing round, like a network
operator Data which is not for us, must be passed along. This is what the network does, to keep the things
moving on.
Data which is not for us, must be passed along. This is what the network does, to keep the things
moving on.
ISO POEM: 6/8ISO POEM: 6/8
Saad Haj Bakry
Network Architecture ISO-OSI Protocols
DATA LINK is the next from the end, an error free connection.
On the network it will send, streams in one direction.
DATA LINK is the next from the end, an error free connection.
On the network it will send, streams in one direction.
Greatly error checked they are, so if anything corrupts it,
the data link it can repair, or cause retransmit.
Greatly error checked they are, so if anything corrupts it,
the data link it can repair, or cause retransmit.
ISO POEM: 7/8ISO POEM: 7/8
Saad Haj Bakry
Network Architecture ISO-OSI Protocols
PHYSICAL is right down low, at the base of communication. This is where the signals go, to
their destination.
PHYSICAL is right down low, at the base of communication. This is where the signals go, to
their destination.
The changes to this layer are great, for different communications. The medium it does dictate,
how we send the data.
The changes to this layer are great, for different communications. The medium it does dictate,
how we send the data.
ISO POEM: 8/8ISO POEM: 8/8
Saad Haj Bakry
Network Architecture ISO-OSI Protocols
Making the network works in layers, is not just for the standard players.
There are already more than one, who with layered protocols have begun.
The ultimate aim in view, is for them to use OSI too.
Making the network works in layers, is not just for the standard players.
There are already more than one, who with layered protocols have begun.
The ultimate aim in view, is for them to use OSI too.
OSI LAYER PRINCIPLES OSI LAYER PRINCIPLES
Saad Haj Bakry
Network ArchitectureISO-OSI Protocols
DIFFERENT
ABSTRACTION
DIFFERENT
ABSTRACTION
DIFFERENT
DEFINED
FUNCTION
DIFFERENT
DEFINED
FUNCTION
CONCEPT OF INTERNATIONAL
STANDARD
CONCEPT OF INTERNATIONAL
STANDARD
LIMITED
BOUNDARY
FLOW
LIMITED
BOUNDARY
FLOW
REASONABLE
NUMBER
OF LAYERS
REASONABLE
NUMBER
OF LAYERS
VIEWSVIEWS
Saad Haj Bakry
Network ArchitectureISO-OSI Protocols
MODEL:
NOT A
REAL
SYSTEM
LIKE
SNA & TCP/IP
MODEL:
NOT A
REAL
SYSTEM
LIKE
SNA & TCP/IP
BRITISH PROPOSAL: 5 LayersBRITISH PROPOSAL: 5 Layers
NEEDS PRACTICAL ADAPTATIONNEEDS PRACTICAL ADAPTATION
SESSION / PRESENTATION
LAYERS: Limited Use
SESSION / PRESENTATION
LAYERS: Limited Use
REFERENCES: (1/3)REFERENCES: (1/3)
Saad Haj Bakry
Network Architecture
D.E. Commer, Computer Networks and Internet, Prentice Hall, 1997
D.E. Commer, Computer Networks and Internet, Prentice Hall, 1997
A. S. Tanenbaum, Computer Networks, 3rd Ed., Prentice Hall, 1996
A. S. Tanenbaum, Computer Networks, 3rd Ed., Prentice Hall, 1996
K. Washburn, and J. Evans, TCP/IP: Running a Successful Network, 2nd Ed., Addison Wesley, 1996
K. Washburn, and J. Evans, TCP/IP: Running a Successful Network, 2nd Ed., Addison Wesley, 1996
J. S. Quarterman, and S. Carl-Mitchell, The Internet Connection, Addison- Wesley, 1994.
J. S. Quarterman, and S. Carl-Mitchell, The Internet Connection, Addison- Wesley, 1994.
ISO-OSI Protocols
REFERENCES: (2/3)REFERENCES: (2/3)
Saad Haj Bakry
Network Architecture
W. Stallings, Data and
Computer Communications,
5th Ed., Prentice Hall, 1997
W. Stallings, Data and
Computer Communications,
5th Ed., Prentice Hall, 1997
W. Stallings, High Speed Networks: TCP/IP & ATM Design Principles, Prentice Hall, 1998
W. Stallings, High Speed Networks: TCP/IP & ATM Design Principles, Prentice Hall, 1998
F. Halsall, Data Communications, Computer Networks, & Open Systems, 4th Ed., Addison Wesley, 1996
F. Halsall, Data Communications, Computer Networks, & Open Systems, 4th Ed., Addison Wesley, 1996
ISO-OSI Protocols
REFERENCES: (3/3)REFERENCES: (3/3)
Saad Haj Bakry
Network Architecture
W. Hioki, Telecommunications,
3rd Ed., Prentice Hall, 1998
W. Hioki, Telecommunications,
3rd Ed., Prentice Hall, 1998
T. Russel, Telecommunications Protocols, McGraw Hill, 1997
T. Russel, Telecommunications Protocols, McGraw Hill, 1997
A. Macpherson, International Telecommunication Standards Organizations, Artech House, 1990
A. Macpherson, International Telecommunication Standards Organizations, Artech House, 1990
M van Steen, and H. Sips, Computer & Network Organization, Prentice Hall, 1995.
M van Steen, and H. Sips, Computer & Network Organization, Prentice Hall, 1995.
ISO-OSI Protocols
SUGGESTED WORKSUGGESTED WORK
Saad Haj Bakry
Network Architecture ISO-OSI Protocols
STUDY THE
DETAILS OF
THE OSI PROTOCOLS AT
DIFFERENT
LAYERS
STUDY THE
DETAILS OF
THE OSI PROTOCOLS AT
DIFFERENT
LAYERS
STUDY
PRACTICAL
NETWORKS
PROTOCOL
S AGAINST
OSI
STUDY
PRACTICAL
NETWORKS
PROTOCOL
S AGAINST
OSI