38
Dr. L. Christofi 1 Local & Metropolitan Area Networks ACOE322 Lecture 7 Upper OSI layers

Dr. L. Christofi1 Local & Metropolitan Area Networks ACOE322 Lecture 7 Upper OSI layers

Embed Size (px)

Citation preview

Dr. L. Christofi 1

Local & Metropolitan Area Networks

ACOE322

Lecture 7Upper OSI layers

Dr. L. Christofi 2

Upper OSI layers

7 Application

6 Presentation

5 Session

4 Transport

3 Network

2 Data Link

1 Physical

Upper OSI (Host layers): Upper OSI (Host layers):

Provide accurate data delivery between computers

Dr. L. Christofi 3

Transport Layer• It is responsible for source-to-destination

(end-to-end) delivery of the entire message. —Whereas the network layer oversees end-to-end

delivery of individual packets, it does not recognize any relationship between those packets.

• Ensures that the whole message arrives intact and in order, overseeing both error control and flow control at the source-to-destination level.

Dr. L. Christofi 4

Transport Layer (Cont.)

Dr. L. Christofi 5

The responsibilities of Transport Layer• Service-point addressing

—Source-to-destination delivery means delivery not only from one computer to the next but also from a specific process(running program) on one computer to a specific process(running program) on the other.

—The transport layer header must include a type of address called a service-point address (or port address).

—The network layer gets each packet to the correct computer; the transport layer gets the entire message to the correct process on that computer.

Dr. L. Christofi 6

The responsibilities of Transport Layer (cont.)

• Segmentation and reassembly—A message is divided into transmittable segments,

each segment containing a sequence number.—These numbers enable the transport layer to

reassemble the message correctly upon arriving at the destination and to identify and replace packets that were lost in the transmission.

• Flow control—The transport layer is responsible for flow control.— It is performed end-to-end rather than across a

single link.

Dr. L. Christofi 7

The responsibilities of Transport Layer (cont.)

• Connection control—Can be either connectionless or connection-

oriented.—A connectionless transport layer treats each

segment as an independent packet and delivers it to the transport layer at the destination machine.

—A connection-oriented transport layer makes a connection with the transport layer at the destination machine first before delivering the packets.

—After all the data is transferred, the connection is terminated.

• Error control— It is performed end-to-end rather than across a

single link.

Dr. L. Christofi 8

User Layers• The session, presentation and application

layers are known as user layers

• Mainly implemented by software

• In most protocols like TCP/IP and Novell, these layers are implemented by a single layer called application layer

Dr. L. Christofi 9

Session Layer• It is responsible for establishing, maintaining,

and synchronising dialogs between communication upper layers

• Also helps to handle upper level problems such as inadequate disk space or out of paper for the printer

• Although it is considered as user layer, but it is often implemented within the operating system

Dr. L. Christofi 10

Session layer

Dr. L. Christofi 11

Services of the Session Layer• Coordinate connection and disconnection of

dialogs between application

• Provide synchronisation points for data exchange

• Coordinate who sends first and when

• Ensure that the data exchange is complete before the session closes

Dr. L. Christofi 12

Session and Transport Interaction

• The transport layer can make an abrupt disconnection while session layer has an obligation to the user and cannot disconnect until the session can be brought to a conclusion

• The communication with the transport layer can be of 3 types:—One-to-one: there is one session layer

connection for each transport layer connection—Many-to-one: multiple session layer

connections share the services of one transport layer connection

—One-to-many: one session layer connection needs many transport layer connections to handle the task

Dr. L. Christofi 13

Synchronization points• Mechanism for recovering data that have

been delivered but mishandled

• Reference points are introduced into the data to control flow of information and allow recovery from software or operator errors

• These reference points may call for user acknowledgment or just may provide a go-back facility for data recovery

Dr. L. Christofi 14

Two types of synchronization points• Major synchronization points:

—Divide an exchange into a series of dialogs—Each point must be acknowledged before the

session can continue—If an error occurs, data can be recovered only up

to the last major point—A session layer activity can be a single dialog or

several dialogs separated by major synchronization points

Dr. L. Christofi 15

Two types of synchronization points• Minor synchronization points:

—Are inserted into the middle of dialogs and may or may not require confirmation

—If an error occurs, the control can go back one or more minor synchronization points within a dialog to recover the data

Dr. L. Christofi 16

Presentation Layer• Functions performed includes:

—Translation

—Encryption/decryption

—Authentication

—Compression

Dr. L. Christofi 17

Presentation Layer

Dr. L. Christofi 18

Translation• The internal representation of a piece of

information might vary enormously from one machine to the other (e.g. one may be using ASCII and the other using EBCDIC)

• Therefore translation is require so that the two machines can communicate

• Two methods: direct or indirect

Dr. L. Christofi 19

Direct and Indirect Translation

• Direct translation performs the translation at the receiver

• Indirect translation performs the translation at the sender and at the receiver

• The direct method is not acceptable in most cases, because if a computer is communicating with several other computers, it may need several conversion tables

• The indirect is recommended by OSI and the recommended model is called abstract syntax notation 1 (ASN.1)

• ASN.1 not only takes care of translation but also handles other formatting problems such as the diverse nature of data (text, program) and the diversity in data storage (store data in different format)

Dr. L. Christofi 20

Encryption/Decryption

• To assure privacy for transmitting sensitive information

• Microwave, satellite and other wireless media cannot be protected from unauthorised reception of the transmission, cable transmission cannot totally avoid that either.

• To alter the information before transmitting so that only an authorised receiver can understand it

• Encryption means that the sender transforms the original information to another form and sends the resulting message out over the network

• Decryption reverses the encryption process in order to transform the message back to its original form

Dr. L. Christofi 21

Encryption/Decryption Methods• Conventional Methods: the encryption

key (Ke) and the decryption key (Kd) are the same and secret

• Public Key Methods: every user has the same encryption algorithm and key, however, the decryption algorithm and key are kept secret

Dr. L. Christofi 22

Conventional Method• Can be divided into two categories:

—Character-level encryption—Bit-level encryption

• There are two methods in character-level encryption:—Substitutional—Transpositional

Dr. L. Christofi 23

Substitutional Character-level Encryption• The simplest form of ciphering• In mono-alphabetic substitution, also known

as Caesar Cipher, each character is replaced by another character in the set

• The mono-alphabetic encryption algorithm simply adds a number to the ASCII code of the character; and the decryption algorithm simply subtracts the same number

• Mono-alphabetic substitution is very simple and can be broken easily

Dr. L. Christofi 24

Substitutional Character-level Encryption• In poly-alphabetic substitution, each occurrence

of a character can have different substitute

• One poly-alphabetic encryption technique is to find the position of the character in the text and use that value as the key

• It is not very secure as well, even though the words replaced by different characters but their position is still the same; the code can easily be broken by someone with more experience

Dr. L. Christofi 25

Transpositional Character-level Encryption• Transpositional encryption is a more secure

method in which the characters retain their plaintext form but change their positions to create the ciphertext

• The text is organised into a 2-dimensional table and the columns are interchanged according to a key

• The key defines which columns should be swapped

• Again this encryption is not very secure either, one can still break it through trial and error

Dr. L. Christofi 26

Bit-level Encryption• Data as text, graphics, audio, or video are

first divided into blocks of bits, then altered by —encoding/decoding—permutation—exclusive OR—rotation—others

Dr. L. Christofi 27

Public Key Encryption• In conventional method, the decryption algorithm is

always the inverse of the encryption algorithm and uses the same key

• Anyone who knows the encryption algorithm and key can deduce the decryption algorithm

• Security can only be assured only if the entire process is kept secret

• In public key, anyone can encrypt information but only an authorised receiver can decrypt it

• The decryption algorithm is designed in such a way that it is not the inverse of the encryption algorithm

• Figure 23.21 shows the idea; every customer can use them but the decryption algorithm and key are kept secret and used only by the bank

Dr. L. Christofi 28

Authentication

• Means verifying the identity of a sender• There are many methods, only digital signature

will be discuss here• Digital signature is based on public key

encryption/decryption• See Figure 23.25 to get an idea of how digital

signature works.• If the customer claims never have made such a

transaction, the bank can take C1 out of its file and apply Kp-2 (public key) to it to show that it creates P. This decryption is not possible unless the customer had originally applied Ks-1 (secret key) to P to create C1

Dr. L. Christofi 29

Compression• Reduces the number of bits sent• Becomes important when data that are not

pure text such as audio and video are send• Can be divided into two broad categories:

—lossless—lossy

Dr. L. Christofi 30

Lossless Compression• The compressing and decompressing

algorithms are usually the inverse of each other

• After decompressing, we will get the exact data as they were before compressing

• Some of the techniques used in lossless compression:—Run-length encoding: when data contain strings

of repeated symbols, the strings can be replaced by a special marker, followed by the repeated symbol, followed by the number of occurrences (see Figure 23.27)

Dr. L. Christofi 31

Lossless Compression—Statistical compression: uses short codes for

frequent symbols and long codes for infrequent symbols

—Relative compression: when there is little difference between consecutive frames, only the difference between the consecutive frames are send instead of the entire frame

Dr. L. Christofi 32

Lossy Compression• The decompressed information does not produce

exactly the same information as the original but something very close

• In video transmission, if an image does not have sharp discontinuities, after transformation to a mathematical expression, most of the information is contained in the first few terms

• Using the terms sent, it is possible to reproduce the original frame with enough accuracy

• Some methods are:— Joint photographic experts group (JPEG): for

pictures and graphics— Motion picture experts group (MPEG): for video

Dr. L. Christofi 33

Application Layer• Contains whatever functions are required

by the user• No standardisation in general is possible• However, ITU-T has recognised some

common applications for which standardisation is possible. Two of them are:—Message Handling System (MHS)—File Transfer, Access, and Management

(FTAM)

Dr. L. Christofi 34

Application Layer

Dr. L. Christofi 35

Message Handling System (MHS)• Is the OSI protocol that underlies electronic

mail and store-and-forward handling

• Is the system used to send any message that can be delivered in a store-and-forward manner

• Store-and-forward: instead of opening an active channel between the sender and receiver, the protocol provides a delivery service that forwards the message when a link becomes available

Dr. L. Christofi 36

MHS structure• Each user communicate with a program or

process called a user agent (UA) which is unique to each user

• Each user has message storage (MS), which consists of disk space in a mail storage system and is usually referred to as a mailbox

• The message communicates with a series of processes called message transfer agents (MTAs)

• The combined MTAs make up the message transfer system (MTS)

Dr. L. Christofi 37

File Transfer, Access, and Management (FTAM)• It is used to

—transfer (copy) —access (read, write, or modify) —manage (control) files

• To allow the interaction of different file systems, it uses the concept of virtual files and virtual filestores

• A virtual filestore is a non implementation-specific model for files and databases that can be used as an intermediary for file transfer, access, and management

• Each transaction requires an initiator and responder

Dr. L. Christofi 38

References

• W. Stalling, Local and Metropolitan Area Networks, 6th edition, Prentice Hall, 2000

• F. Halsall, Data Communications, Computer Networks and Open Systems, 4th edition, Addison Wesley, 1995

• B.A. Forouzan, Data Communications and Networking, 3rd edition, McGraw-Hill, 2004

• W. Stallings, Data and Computer Communications, 7th edition, Prentice Hall, 2004