Key Concepts

Interoperability

It only requires devices connected to the internet to have connections at the lower levels.

Layering

Each layer builds on the last so that any type of protocol used at the lower levels doesn't dictate the higher level protocols.

Security

There are many risks to the internet that were identified by Cerf and Cain, particularly for military users of the internet. They suggest that the previous models were not as secure as the DoD model

DoD

DoD Model

·

The DoD model was first advocated by Vinton Cerf and Edward Cain in their 1983 paper The DoD Internet Architecture Model.

Layer
1

It is a framework to understand how each protocol relies on a series of other protocols. For example, wifi protocols will form the basis for anything on top of them

2

Built on the heterogeneity of the lower level systems, focussing on the widely varying specifications of things connecting to a network

HTTP

Icon
Application Layer

When looking at a website such as www.google.com, the application layer would be the browser used to view the website. The browser would be able to interpret the HyperText Markup Language (HTML). It is the layer from which the actual communication (whatever it may be) is initiated.

Utility
Utility Layer

The utility layer contains protocols for specific applications. These include: Domain Name System (DNS), Internet Relay Chat (IRC), Secure Shell (SSH) and Voice over IP (VOIP). This differs from the layers below because almost all of these will then use the same transport and internet protocols.

For looking at websites the main protocol is HyperText Transfer Protocol (HTTP). Its format is shown on the right.

Transport
Transport Layer

The transport layer contains protocols that deal with the moving of packets. It splits the message into packets takes each of the packets and puts a "header" with metadata to then send through the network. Below shows the process. Particularly with TCP the headers contain data to then ensure the reliable delivery of packets. Other protocols such as UDP are used when reliable delivery is not so key.

If this data was split into three packets then the data structure would change, shown in on right

Internetwork
Internetwork Layer

The internetwork contains protocols by which the packets made in the transport layer are sent to other locations. It also adds its own header to sends some of its own metadata.

Version Header Length Total Length Source Destination Time to live Protocol
4 20 581 192.168.0.7 152.78.118.51 64 6

The internet forms a path through the computers connected, this is demonstrated below this to the right The most common protocol in this layer is IP which is used here.

Internetwork
Internetwork Layer

traceroute to 8.8.8.8 (8.8.8.8), 64 hops max, 52 byte packets routerlogin.net (192.168.0.1)
sotn-core-2a-xe-111-0.network.virginmedia.net (62.255.45.57)
popl-bb-1b-ae0-0.network.virginmedia.net (62.254.42.90)
eislou2-ic-1-ae0-0.network.virginmedia.net (62.254.42.18)
m350-mp2.cvx3-a.ltn.dial.ntli.net (213.104.85.94)
213.104.85.90 (213.104.85.90)
72.14.233.249 (72.14.233.249)
74.125.37.119 (74.125.37.119)
216.239.57.161 (216.239.57.161)
209.85.244.199 (209.85.244.199)
google-public-dns-a.google.com (8.8.8.8)

Network
Network Layer

The network layer deals with all the other types of connections apart from the internet. The protocols within this layer deal with the "packet" net. In the past local networks would have had their own networking protocols to support different services

Physical
Physical Layer

The physical layer is made up of the hardware that links computers together. In your house you probably have cables that come into the house from the street. These will then be connected to a router that will send out a wireless connection or a wired connection such as ethernet. The wired connections communicate through their ports with the rest of the computer. The ports, ethernet cables and fibre optic cables are all part of the physical layer.

The computers then send electronic messages down the wires (or using radiowaves) to transmit and receive

SMTP

Icon
Application Layer

When sending or receiving an email, the application layer would be the email client such as Microsoft Outlook or Mozilla Thunderbird. It is the layer from which the actual communication (whatever it may be) is initiated.

Utility
Utility Layer

The utility layer contains protocols for specific applications. These include: Domain Name System (DNS), Internet Relay Chat (IRC), Secure Shell (SSH) and Voice over IP (VOIP). This differs from the layers below because almost all of these will then use the same transport and internet protocols.

For sending and receiving emails the main protocol is Simple Mail Transfer Protocol (SMTP) is used. It is a series of connections made to server, its format displayed to the right. The initial connection is made by opening the link but nothing is written).

Transport
Transport Layer

The transport layer contains protocols that deal with the moving of packets. It splits the message into packets takes each of the packets and puts a "header" with metadata to then send through the network. Below shows the process. Particularly with TCP the headers contain data to then ensure the reliable delivery of packets. Other protocols such as UDP are used when reliable delivery is not so key.

If this data was split into three packets then the data structure would change, shown in on right

Internetwork
Internetwork Layer

The internetwork contains protocols by which the packets made in the transport layer are sent to other locations. It also adds its own header to sends some of its own metadata.

Version Header Length Total Length Source Destination Time to live Protocol
4 20 7 192.168.0.7 152.78.118.51 64 6

The internet forms a path through the computers connected, this is demonstrated below this to the right The most common protocol in this layer is IP which is used here.

Internetwork
Internetwork Layer

traceroute to 8.8.8.8 (8.8.8.8), 64 hops max, 52 byte packets routerlogin.net (192.168.0.1)
sotn-core-2a-xe-111-0.network.virginmedia.net (62.255.45.57)
popl-bb-1b-ae0-0.network.virginmedia.net (62.254.42.90)
eislou2-ic-1-ae0-0.network.virginmedia.net (62.254.42.18)
m350-mp2.cvx3-a.ltn.dial.ntli.net (213.104.85.94)
216.239.41.207 (216.239.41.207)
72.14.233.249 (72.14.233.249)
74.125.37.119 (74.125.37.119)
216.239.57.161 (216.239.57.161)
209.85.244.199 (209.85.244.199)
google-public-dns-a.google.com (8.8.8.8)

Network
Network Layer

The network layer deals with all the other types of connections apart from the internet. The protocols within this layer deal with the "packet" net. In the past local networks would have had their own networking protocols to support different services

Link
Link Layer

The link layer is used to move packets from one network location to another. The packets that are transferred are called frames. Each frame can be visualised as hexadecimal or bits, the example of a frame here is hexadecimal. Each paragraph can be interpreted as one line from each of the layers starting with the internetwork, followed by the transport layer and finishing with the utility. The syntax for the hardware is also a part of the frame which is the first part.

Physical
Physical Layer

The physical layer is made up of the hardware that links computers together. In your house you probably have cables that come into the house from the street. These will then be connected to a router that will send out a wireless connection or a wired connection such as ethernet. The wired connections communicate through their ports with the rest of the computer. The ports, ethernet cables and fibre optic cables are all part of the physical layer.

The computers then send electronic messages down the wires (or using radiowaves) to transmit and receive

Impacts

·

The DOD model was first advocated by Vinton Cerf and Edward Cain in their 1983 paper The DoD Internet Architecture Model.

impact
1

The key contribution to Computer Science is that this model still exists today (albeit in a different form) today. The modern day TCP/IP model is based on DOD architecture, although the ISO and CCITT architectures are used.

2

The fact that it is built on the heterogeneity of the lower level systems, has made it more applicable across a wide array of systems, which contributes towards its longevity.

References

  • Information on application layer: http://www.tutorialspoint.com/data_communication_computer_network/application_layer_introduction.htm
  • Protocol numbers found at: http://www.iana.org/assignments/protocol-numbers/protocol-numbers.xhtml
  • TCP http://www.freesoft.org/CIE/Course/Section4/8.htm
  • Other content is based on Cerf, Vinton G., and Edward Cain. "The DoD internet architecture model." Computer Networks (1976) 7.5 (1983): 307-318.
  • Images are either creative commons or taken from the Cerf and Cain, 1983 paper

Team members & skills

Sawan J. Kapai Harpalani

Group Member

Computer scientist with high passion in programming. Expert in JAVA, C++ and high knowledge in HTML5, CSS, JavaScript.

Olivia Wilson

Group Member

Computer scientist with a passion for Machine Learning. Expert in Python, proficient in R, Javascript, HTML and CSS