Title: Computer Networks - 21CS52 - VTU Notes - Module 1
1Department ofInformation Science Engineering
Computer Networks Module 1
Dr Loganathan D Professor
www.cambridge.edu.in
221CS32 - Computer Networks -Course Outcomes
(Course Skill Set)
At the end of the course the student will be able
to CO 1. Learn the basic needs of
communication system. CO 2. Interpret the
communication challenges and its solution. CO 3.
Identify and organize the communication system
network components CO 4. Design communication
networks for user requirements
www.cambridge.edu.in
Department of Information Science Engineering
321CS32 - Computer Networks - Syllabus
Module 1 Introduction to networks Network
hardware, Network software, Reference models.
Physical Layer Guided transmission media,
Wireless transmission. Module 2 The Data link
layer Design issues of DLL, Error detection and
correction, Elementary data link protocols,
Sliding window protocols. The medium access
control sublayer The channel allocation problem,
Multiple access protocols.
www.cambridge.edu.in
Department of Information Science Engineering
421CS32 - Computer Networks - Syllabus
Module 3 The Network Layer Network Layer Design
Issues, Routing Algorithms, Congestion Control
Algorithms, QoS. Module 4 The Transport Layer
The Transport Service, Elements of transport
protocols, Congestion control, The internet
transport protocols. Module 5 Application
Layer Principles of Network Applications, The
Web and HTTP, Electronic Mail in the Internet,
DNSThe Internets Directory Service.
www.cambridge.edu.in
Department of Information Science Engineering
521CS32 - Computer Networks
- Laboratory Component
- Implement three nodes point to point network
with duplex links between them for different
topologies. Set the queue size, vary the
bandwidth, and find the number of packets dropped
for various iterations. - Implement simple ESS and with transmitting nodes
in wire-less LAN by simulation and determine the
throughput with respect to transmission of
packets. - Write a program for error detecting code using
CRC-CCITT (16- bits). - Implement transmission of ping messages/trace
route over a network topology consisting of 6
nodes and find the number of packets dropped due
to congestion in the network. - Write a program to find the shortest path between
vertices using bellman-ford algorithm. - Implement an Ethernet LAN using n nodes and set
multiple traffic nodes and plot congestion window
for different source / destination. - Write a program for congestion control using
leaky bucket algorithm.
www.cambridge.edu.in
Department of Information Science Engineering
621CS32 - Computer Networks - Books
Textbooks 1. Computer-Networks- Andrew S.
Tanenbaum and David J. Wetherall, Pearson
Education, 5th-Edition. (www.pearsonhighered.com/t
anenbaum) 2. Computer Networking A Top-Down
Approach -James F. Kurose and Keith W.
RossPearson Education 7th Edition. Reference
Books 1. Behrouz A Forouzan, Data and
Communications and Networking, Fifth Edition,
McGraw Hill,Indian Edition 2. Larry L Peterson
and Brusce S Davie, Computer Networks, fifth
edition, ELSEVIER
www.cambridge.edu.in
Department of Information Science Engineering
721CS32 - Computer Networks - Syllabus
- Module 1
- Introduction to networks
- Network hardware, Network software,
- Reference models.
- Physical Layer
- Guided transmission media,
- Wireless transmission.
www.cambridge.edu.in
Department of Information Science Engineering
821CS32 - Computer Networks
Networks hardware
- Computer network refers to interconnected
computing devices that can exchange data and
share resources with each other. These networked
devices use a system of rules, called
communications protocols, to transmit information
over physical/wired or wireless technologies.
Wired Communication
Wireless
Communication
www.cambridge.edu.in
Department of Information Science Engineering
9Module 1 - Introduction to networks
Networks hardware
- Computer networks components comprise both
physical parts as well as the software required
for installing computer networks, both at
organizations and at home. - The hardware components are, the server, client,
peer, transmission medium, and connecting
devices. - A server is a computer program or device that
provides a service to another computer program
and its user, also known as the client. The
network operating system is typically installed
in the server and so they give user accesses to
the network resources. - Clients are computers that request and receive
service from the servers to access and use the
network resources. - A peer is any device that participates in a
network and has the same functionality as one or
more devices in the network.
www.cambridge.edu.in
Department of Information Science Engineering
10Module 1 - Introduction to networks
Networks hardware
- Transmission media is basically divided into two
categories of Transmission Technology -
- 1.Broadcast Link and 2. Point-to-Point Link.
- Broadcast Link Broadcast networks are also
known as terrestrial networks. It is basically a
group of radio stations, television stations, or
any other electronic media outlets that simply
generate agreement to air, or broadcast, content
generally from a centralized source. - Broadcasting is simply a method of transferring
messages to all the recipients simultaneously.
www.cambridge.edu.in
Department of Information Science Engineering
11Module 1 - Introduction to networks
Networks hardware
- Transmission media is basically divided into two
categories - 1.Broadcast Links, 2. Point-to-Point Link.
- Point-to-Point Link In Point-to-Point
configuration, there is a line (link) that is
fully dedicated to carrying the data between two
devices. - Direct serial wired connections or wireless
connections(infrared) between two computers. - Communication can be full-duplex or half-duplex.
www.cambridge.edu.in
Department of Information Science Engineering
12Module 1 - Introduction to networks
Networks hardware
Casting in computer networks
- Casting in computer networks means transmitting
data (stream of packets) over a network. - There are 3 types of casting in data
transmission. - 1. Unicast transmission
- 2. Multicast transmission
- 3. Broadcast transmission
- Unicast, Multicast, Broadcast happen at layer 2
(Data Link Layer Using MAC address) and layer 3
(Network layer Using IP Address).
www.cambridge.edu.in
Department of Information Science Engineering
13Module 1 - Introduction to networks
Networks hardware
Unicast Transmission (One-to-One) In Unicast
transmission, the data is transferred from a
single sender (or a single source host) to a
single receiver (or a single destination host).
Data is sent to a single recipient. Email, file
transfer.
www.cambridge.edu.in
Department of Information Science Engineering
14Module 1 - Introduction to networks
Networks hardware
Multicast A communication where a message is
sent from one sender to a group of receivers.
Data is sent to a group of recipients. Video
streaming, online gaming.
www.cambridge.edu.in
Department of Information Science Engineering
15Module 1 - Introduction to networks
Networks hardware
Broadcast A communication where a message is
sent from one sender to all receivers. Data is
sent to all recipients in a network. DHCP
requests, ARP (Address Resolution Request)
requests.
www.cambridge.edu.in
Department of Information Science Engineering
16Module 1 - Introduction to networks
Networks hardware
Connection-oriented service and Connection-less
service
- Both Connection-oriented service and
Connection-less service are used for the
connection establishment between two or more two
devices. These types of services are offered by
the network layer. Connection-oriented service is
related to the telephone system. - It includes connection establishment and
connection termination. In a connection-oriented
service, the Handshake method is used to
establish the connection between sender and
receiver.
www.cambridge.edu.in
Department of Information Science Engineering
17Module 1 - Introduction to networks
Networks hardware
Connection-oriented service and Connection-less
service
- Connection-less service is related to the postal
system. It does not include any connection
establishment and connection termination.
Connection-less Service does not give a guarantee
of reliability. In this, Packets do not follow
the same path to reach their destination.
www.cambridge.edu.in
Department of Information Science Engineering
18Module 1 - Introduction to networks
Networks hardware
Transmission medium
- Transmission medium is a communication channel
that carries the information from the sender to
the receiver. Data is transmitted through the
electromagnetic signals. - The main functionality of the transmission media
is to carry the information in the form of bits
through LAN(Local Area Network). - Connecting devices
- Repeater A repeater operates at the physical
layer. Its job is to regenerate the signal over
the same network before the signal becomes too
weak. - A hub is a basically multi-port repeater. A hub
connects multiple wires coming from different
computers. - A bridge operates at the data link layer. It is
also a repeater, with add on the functionality of
filtering content by reading the MAC addresses of
the source and destination. It is also used for
interconnecting two LANs working on the same
protocol.
www.cambridge.edu.in
Department of Information Science Engineering
19Module 1 - Introduction to networks
Networks hardware
www.cambridge.edu.in
Department of Information Science Engineering
20Module 1 - Introduction to networks
Networks hardware
- The Network allows computers to connect and
communicate with different computers via any
medium or Network hardware with classic Ethernet
cables. - There are several types of Computer Networks.
- LAN (Local Area Network)
- MAN (Metropolitan Area Network)
- WAN (Wide Area Network)
- PAN (Personal Area Network)
- SAN (Storage Area Network)
- EPN (Enterprise Private Network)
- VPN (Virtual Private Network)
www.cambridge.edu.in
Department of Information Science Engineering
21Module 1 - Introduction to networks
Networks hardware
- LAN (Local Area Network)
- Local Area Network is a group of computers
connected to each other in a small area such as
building, office. - LAN is used for connecting two or more personal
computers through a communication medium such as
twisted pair, coaxial cable, etc. - The data is transferred at an extremely faster
rate in Local Area Network. - Local Area Network provides higher security.
- Early LANs had data rates in the 4 to 16 Mbps
range. Nowadays, speeds are normally 100 or 1000
Mbps.
www.cambridge.edu.in
Department of Information Science Engineering
22Module 1 - Introduction to networks
Networks hardware
- MAN (Metropolitan Area Network)
- A metropolitan area network is a network that
covers a larger geographic area by
interconnecting a different LAN to form a larger
network. - In MAN, various LANs are connected to each other
through a telephone exchange line. - The most widely used protocols in MAN are RS-232,
Frame Relay, Asynchronous Transfer Mode(ATM),
Integrated Services Digital Network (ISDN), OC-3
(Optical Carrier 3. The '3' refers to the speed
an OC3 line is three times as fast as an OC1
line), Asymmetric Digital Subscriber Line (ADSL),
etc. - It has a higher range than Local Area
Network(LAN).
www.cambridge.edu.in
Department of Information Science Engineering
23Module 1 - Introduction to networks
Networks hardware
- WAN (Wide Area Network)
- A Wide Area Network is a network that extends
over a large geographical area such as states or
countries. - A Wide Area Network is quite bigger network than
the LAN. - A Wide Area Network is not limited to a single
location, but it spans over a large geographical
area through a telephone line, fibre optic cable
or satellite links. - The internet is one of the biggest WAN in the
world. - There are two types of WAN Switched WAN and
Point-to-Point WAN. WAN is difficult to design
and maintain
www.cambridge.edu.in
Department of Information Science Engineering
24Module 1 - Introduction to networks
Networks hardware
- PAN (Personal Area Network)
- Personal Area Network is a network arranged
within an individual person, typically within a
range of 10 meters or 30 feet range. - Personal Area Network is used for connecting the
computer devices of personal use is known as
Personal Area Network. - Thomas Zimmerman was the first research scientist
to bring the idea of the Personal Area Network. - The personal area network are the laptop, mobile
phones, media player and play stations which
connected for personal use.
www.cambridge.edu.in
Department of Information Science Engineering
25Module 1 - Introduction to networks
Networks hardware
- SAN (Storage Area Network)
- A Storage Area Network is a specialized,
high-speed network that provides network access
to storage devices. - SANs are typically composed of hosts, switches,
storage elements, and storage devices that are
interconnected using a variety of technologies,
topologies, and protocols. - A SAN presents storage devices to a host such
that the storage appears to be locally attached.
This simplified presentation of storage to a host
is accomplished through the use of different
types of virtualization.
www.cambridge.edu.in
Department of Information Science Engineering
26Module 1 - Introduction to networks
Networks hardware
- EPN (Enterprise Private Network)
- Enterprise networking refers to the creation and
management of a group of interconnected computer
systems that serve the needs of a large business.
- It involves the use of local area networks (LANs)
that connect to wide area networks (WANs) and the
cloud to facilitate data exchange, business
processes, and analysis of network activity. - In an enterprise environment, various components,
including data centers, branch offices, public
and private clouds, Internet of Things (IoT)
devices, and employees, require reliable network
connections.
PSTN Public Switched Telephone Network Telco -
Telecommunication networks
www.cambridge.edu.in
Department of Information Science Engineering
27Module 1 - Networking
Networks hardware
- VPN (Virtual Private Network)
- A virtual private network, or VPN, is an
encrypted connection over the Internet from a
device to a network. - The encrypted connection helps ensure that
sensitive data is safely transmitted. - It prevents unauthorized people from
eavesdropping on the traffic and allows the user
to conduct work remotely. - VPN technology is widely used in corporate
environments.
www.cambridge.edu.in
Department of Information Science Engineering
28Module 2 - Networking
Networks hardware
- Internetworks
- The maximum size of a message that the networks
can transmit. - This leads to mechanisms for disassembling,
transmitting, and then reassembling messages. - Networks with each router makes the decision as
to where to - send a packet next is called the forwarding
algorithm. - Many such forwarding algorithm designed as
routing algorithm and exist. - This overall function is called internetworking
or Internetworks or Internet
www.cambridge.edu.in
Department of Information Science Engineering
29Module 1 - Networking
Networks hardware
- The Internet
- The Internet is not really a network at all, but
a vast collection of different - networks that use certain common protocols and
provide certain common services. - Internet Service Provider, or simply ISP, from
who the user purchases Internet access or
connectivity. - This lets the computer exchange packets.
- The ARPANET - Advanced Research Projects Agency
Network US Defence - NSFNET - National Science Foundation Network US
- ANSNET (Advanced Networks and Services Network)
www.cambridge.edu.in
Department of Information Science Engineering
30Module 1 - Introduction to networks
- A switch is a multiport bridge with a buffer and
a design that can boost its and performance. A
switch is a data link layer device. - A router is a device like a switch that routes
data packets based on their IP addresses. The
router is mainly a Network Layer device. Routers
normally connect LANs and WANs and have a
dynamically updating routing table based on which
they make decisions on routing the data packets. - A gateway, as the name suggests, is a passage to
connect two networks that may work upon different
networking models. - NIC or network interface card is a network
adapter that is used to connect the computer to
the network. It is installed in the computer to
establish a LAN.
www.cambridge.edu.in
Department of Information Science Engineering
31Module 1 - Networking
Networks hardware
Internet overall view
DSL - Digital Subscriber Line/Loop IXP -
Internet exchange point FTTH - Fiber to the
Home CMTS Cable Modem Termination System DSLAM
- Digital Subscriber Line Access Multiplexer How
two different networks can be connected? The
general name for a machine that makes a
connection between two or more networks and
provides the necessary translation, both in terms
of hardware and software, is a gateway.
Gateways are distinguished by the layer at which
they operate in the protocol hierarchy.
gateway
www.cambridge.edu.in
32Module 2 - Networking
Network Software
- Network software
- Network software is now highly structured. In the
following sections we examine the software
structuring technique in some detail. - Protocol Hierarchies
- To reduce their design complexity, most networks
are organized as a stack of - layers or levels, each one built upon the
one below it. - The number of layers, the name of each layer, the
contents of each layer, and the function of each
layer differ from network to network. - When layer n on one machine carries on a
conversation with layer n on another machine, the
rules and conventions used in this conversation
are collectively known as the layer n protocol. - Basically, a protocol is an agreement between the
communicating parties on how communication is to
proceed.
www.cambridge.edu.in
Department of Information Science Engineering
33layer 1 is the physical medium through which
actual communication occurs. virtual
communication is shown by dotted lines (Protocol)
and physical communication by solid lines
(Interface). Between each pair of adjacent
layers is an interface.
www.cambridge.edu.in
Department of Information Science Engineering
34M- Message H Header T Transmission Line
www.cambridge.edu.in
Department of Information Science Engineering
35Module 1 - Introduction to networks
Network Software
- Design Issues for the Layers
- A set of layers and protocols is called a network
architecture. - A list of the protocols used by a certain system,
one protocol per layer, is called a protocol
stack. - What are the Design Issues
- Error Detection Correction, Routing, Protocol
layering, Addressing and naming, Internetworking,
Flow control, Congestion, Real time transmission,
Quality of Service and data integrity
www.cambridge.edu.in
Department of Information Science Engineering
36Module 1 - Introduction to networks
Network Software
- Design Issues for the Layers
- One mechanism for finding errors in received
information uses codes for error detection until
it is received correctly. - More powerful codes allow for error correction,
where the correct message is - recovered from the possibly incorrect bits
that were originally received. - One of the important issue is finding a path
through a network. The network should
automatically make this decision to route/path
the packets called routing. - A second design issue concerns the evolution of
the network and its required protocol layering
for interface with each other protocols.
www.cambridge.edu.in
Department of Information Science Engineering
37Module 1 - Introduction to networks
Network Software
- Design Issues for the Layers
- Since there are many computers on the network,
every layer needs a mechanism for identifying the
senders and receivers that are involved in a
particular message. - This mechanism is called addressing or naming, in
the low and high layers, - respectively.
- Another example is differences in the maximum
size of a message that the networks can transmit.
This leads to mechanisms for disassembling,
transmitting, and then reassembling messages.
This overall topic is called internetworking.
www.cambridge.edu.in
Department of Information Science Engineering
38Module 1 - Introduction to networks
Network Software
- Design Issues for the Layers
- A third design issue is resource allocation.
Networks provide a service to - hosts from their underlying resources, such
as the capacity of transmission - lines.
- Sharing the resources via the design is called
statistical multiplexing, meaning sharing based
on the statistics of demand like bandwidth
sharing. - An allocation problem that occurs at every level
is how to keep a fast sender - from swamping a slow receiver with data.
- Feedback from the receiver to the sender is often
used. This subject is called flow control.
www.cambridge.edu.in
Department of Information Science Engineering
39Module 1 - Introduction to networks
Network Software
- Sometimes the problem is that the network is
oversubscribed because too many computers want to
send too much traffic, and the network cannot
deliver it all. - This overloading of the network is called
congestion. - Real-time delivery at the same time is important.
- Quality of service is also important with respect
to network throughput. - The last major design issue is to secure the
network by defending it against - different kinds of threats.
- Data integrity no manipulation on data while
transmission - provide confidentiality defend
against any threats. Mechanisms for
authentication prevent someone from imitating
someone else.
www.cambridge.edu.in
Department of Information Science Engineering
40Module 1 - Introduction to networks
Network Software
Connection-Oriented Versus Connectionless Service
request-reply service With Acknowledged Datagram
connectionless service is often called datagram
service
Six different types of service.
www.cambridge.edu.in
Department of Information Science Engineering
41Module 1 - Introduction to networks
Network Software
Connection-Oriented Versus Connectionless Service
- Connection oriented Services
- Requires the establishment of a connection before
data transfer. - TCP (Transmission Control Protocol) is a
prominent example of a connection-oriented
protocol. - Implements flow control mechanisms to manage the
rate of data transmission. - Offers a reliable communication channel with
error checking and correction mechanisms. - Connectionless Oriented Services
- Does not require a pre-established connection
before data transmission. - UDP (User Datagram Protocol) is a common
connectionless protocol. - Provides no guarantee of reliable data delivery.
- Error checking may be minimal or absent.
www.cambridge.edu.in
Department of Information Science Engineering
42Module 1 - Introduction to networks
Network Software
Connection-Oriented Versus Connectionless Service
- Service is formally specified by a set of
primitives (operations) available to - user processes to access the service.
Service Primitives
Six Service Primitives
www.cambridge.edu.in
Department of Information Science Engineering
43Module 1 - Introduction to networks
Network Software
Connection-Oriented Versus Connectionless Service
www.cambridge.edu.in
Department of Information Science Engineering
44Module 1 - Introduction to networks
Network Software
- The Relationship of Services to Protocols
- Service
- A service is a set of primitives (operations)
that a layer provides to the layer above it. A
service relates to an interface between two
layers, with the lower layer being the service
provider and the upper layer being the service
user. - Protocol
- A protocol, in contrast, is a set of rules
governing the format and meaning of - the packets, or messages that are exchanged
by the peer entities within a - layer. Entities use protocols to implement
their service definitions.
www.cambridge.edu.in
Department of Information Science Engineering
45Module 1 - Introduction to networks
Network Software
- Services to Protocols - Implementations
- A service is like an abstract data type or an
object in an object-oriented language. - It defines operations that can be performed on an
object but does not specify how these operations
are implemented. - In contrast, a protocol relates to the
implementation of the service and as such is not
visible to the user of the service.
www.cambridge.edu.in
Department of Information Science Engineering
46Module 1 - Introduction to networks
Network Software
Services and protocols are distinct concepts.
- The service defines what operations the layer is
prepared to perform on behalf of its users. - A protocol, in contrast, is a set of rules
governing the format and meaning of the packets,
or messages that are exchanged by the peer
entities within a layer.
www.cambridge.edu.in
Department of Information Science Engineering
47Module 1 - Introduction to networks
Reference Models
Protocol Stock OSI Model and TCP/IP Model
Required protocols supports for Service to
communicate the data
www.cambridge.edu.in
Department of Information Science Engineering
48Module 1 - Introduction to networks
Reference Models
- The software components are operating system and
protocols. - Networking Operating System - It is typically
installed in the server and facilitate
workstations in a network to share files,
database, applications, printers etc. - Protocol Suite - A protocol is a rule or
guideline followed by each computer for data
communication. The two popular protocol suites
are - - a. OSI Model ( Open System Interconnections)
- b. TCP / IP Model.
- We will discuss two important network
architectures the OSI reference model and the
TCP/IP reference model.
www.cambridge.edu.in
Department of Information Science Engineering
49Module 1 - Introduction to networks
Reference Models
- OSI or Open System Interconnection model was
developed by International Standards Organization
(ISO). - It is a reference model that describes how
information from a software application in one
computer moves through a physical medium to the
software application in another computer. - It gives a layered networking framework that
conceptualizes how communication should be done
between heterogeneous systems. It has seven
interconnected layers. - The seven layers of the OSI Model are,
- a physical layer, data link layer, network layer,
transport layer, session layer, presentation
layer, and application layer. - The hierarchy is depicted in the given figure
www.cambridge.edu.in
Department of Information Science Engineering
50Module 1 - Introduction to networks
Reference Models
OSI Model APS in TN DP
www.cambridge.edu.in
Department of Information Science Engineering
51Module 1 - Introduction to networks
Reference Models
The upper layer mainly deals with the application
related issues, and they are implemented only in
the software.
The lower layer of the OSI model deals with the
data transport issues.
www.cambridge.edu.in
Department of Information Science Engineering
52Reference Models
Three concepts are central to the OSI model 1.
Services/functions 2. Interfaces. 3. Protocols.
www.cambridge.edu.in
Department of Information Science Engineering
53Module 1 - Introduction to networks
Reference Models
The upper layer mainly deals with the application
related issues, and they are implemented only in
the software.
www.cambridge.edu.in
Department of Information Science Engineering
54Module 1 - Introduction to networks
Reference Models
RJ45, stands for Registered Jack-45. The term
RJ45 has also come to refer to a range of
connectors for Ethernet jacks
www.cambridge.edu.in
Department of Information Science Engineering
55Module 1 - Introduction to networks
Reference Models
1. Functions of Physical Layer
www.cambridge.edu.in
Department of Information Science Engineering
56Module 1 - Introduction to networks
Reference Models
1. Functions of Physical Layer
www.cambridge.edu.in
Department of Information Science Engineering
57Module 1 - Introduction to networks
Reference Models
Functions of a Physical layer Line
Configuration It defines the way how two or more
devices can be connected physically. Data
Transmission It defines the transmission mode
whether it is simplex, half-duplex or full-duplex
mode between the two devices on the
network. Topology It defines the way how network
devices are arranged. Signals It determines the
type of the signal used for transmitting the
information.
www.cambridge.edu.in
Department of Information Science Engineering
58Module 1 - Introduction to networks
Reference Models
2. Functions of Data Link Layer
www.cambridge.edu.in
Department of Information Science Engineering
59Module 1 - Introduction to networks
Reference Models
2. Functions of Data Link Layer
www.cambridge.edu.in
Department of Information Science Engineering
60Basics of Computer Networks
Reference Models
IP address and MAC Address
When a computer joins a network, the network
assigns a special number called an IP address to
the computer. Without an IP address, the computer
will not be able to use the network. An IPv4
address looks like this 192.168.1.14 A MAC
address is a 48 or 64 bit number and is used by a
network to identify the computer. Every time a
computer needs to send or receive data, the MAC
address is used to direct the traffic. MAC
addresses are linked to the hardware
www.cambridge.edu.in
Department of Information Science Engineering
61Module 1 - Introduction to networks
Reference Models
2. Functions of Data Link Layer
www.cambridge.edu.in
Department of Information Science Engineering
62Module 1 - Introduction to networks
Reference Models
2. Functions of Data Link Layer a) Access
Media and b)data is placed
www.cambridge.edu.in
Department of Information Science Engineering
63Module 1 - Introduction to networks
Reference Models
2. Functions of Data Link Layer
www.cambridge.edu.in
Department of Information Science Engineering
64Module 1 - Introduction to networks
Reference Models
Functions of a Data Link Layer Framing The data
link layer translates the physical's raw bit
stream into packets known as Frames. The Data
link layer adds the header and trailer to the
frame. The header which is added to the frame
contains the hardware destination and source
address. Physical Addressing The Data link layer
adds a header to the frame that contains a
destination address. The frame is transmitted to
the destination address mentioned in the header.
www.cambridge.edu.in
Department of Information Science Engineering
65Module 1 - Introduction to networks
Reference Models
Flow Control Flow control is the main
functionality of the Data-link layer. It is the
technique through which the constant data rate is
maintained on both the sides so that no data get
corrupted. It ensures that the transmitting
station such as a server with higher processing
speed does not exceed the receiving station, with
lower processing speed. Error Control Error
control is achieved by adding a calculated value
CRC (Cyclic Redundancy Check) that is placed to
the Data link layer's trailer which is added to
the message frame before it is sent to the
physical layer. If any error seems to occur, then
the receiver sends the acknowledgment for the
retransmission of the corrupted frames. Access
Control When two or more devices are connected
to the same communication channel, then the data
link layer protocols are used to determine which
device has control over the link at a given time.
www.cambridge.edu.in
Department of Information Science Engineering
66Module 1 - Introduction to networks
Reference Models
3. Functions of Network Layer
www.cambridge.edu.in
Department of Information Science Engineering
67Module 1 - Introduction to networks
Reference Models
Functions of Network Layer Internetworking An
internetworking is the main responsibility of the
network layer. It provides a logical connection
between different devices. Addressing A Network
layer adds the source and destination address to
the header of the frame. Addressing is used to
identify the device on the internet. Routing
Routing is the major component of the network
layer, and it determines the best optimal path
out of the multiple paths from source to the
destination. Packetizing A Network Layer
receives the packets from the upper layer and
converts them into packets. This process is known
as Packetizing. It is achieved by internet
protocol (IP).
www.cambridge.edu.in
Department of Information Science Engineering
68Module 1 - Introduction to networks
Reference Models
3. Functions of Network Layer
A subnet mask defines the range of IP addresses
that can be used within a network or subnet.
www.cambridge.edu.in
Department of Information Science Engineering
69Module 1 - Introduction to networks
Reference Models
3. Functions of Network Layer
www.cambridge.edu.in
Department of Information Science Engineering
70Module 1 - Introduction to networks
Reference Models
3. Functions of Network Layer
www.cambridge.edu.in
Department of Information Science Engineering
71Module 1 - Introduction to networks
Reference Models
4. Functions of Transport Layer
www.cambridge.edu.in
Department of Information Science Engineering
72Module 1 - Introduction to networks
Reference Models
Functions of Transport Layer Service-point
addressing Computers run several programs
simultaneously due to this reason, the
transmission of data from source to the
destination not only from one computer to another
computer but also from one process to another
process. The transport layer adds the header that
contains the address known as a service-point
address or port address. The responsibility of
the network layer is to transmit the data from
one computer to another computer. The
responsibility of the transport layer is to
transmit the message to the correct process.
www.cambridge.edu.in
Department of Information Science Engineering
73Module 1 - Introduction to networks
Reference Models
Segmentation and reassembly When the transport
layer receives the message from the upper layer,
it divides the message into multiple segments,
and each segment is assigned with a sequence
number that uniquely identifies each segment.
Connection control Transport layer provides two
services Connection-oriented service and
connectionless service. A connectionless service
treats each segment as an individual packet, and
they all travel in different routes to reach the
destination. In connection-oriented service, all
the packets travel in the single route.
www.cambridge.edu.in
Department of Information Science Engineering
74Module 1 - Introduction to networks
Reference Models
Flow control The transport layer also
responsible for flow control but it is performed
end-to-end rather than across a single
link. Error control The transport layer is also
responsible for Error control. Error control is
performed end-to-end rather than across the
single link. The sender transport layer ensures
that message reach at the destination without any
error.
www.cambridge.edu.in
Department of Information Science Engineering
75Module 1 - Introduction to networks
Reference Models
4. Functions of Transport Layer - Flow control
and error control
www.cambridge.edu.in
Department of Information Science Engineering
76Module 1 - Introduction to networks
Reference Models
4. Functions of Transport Layer - Flow control
and error control
www.cambridge.edu.in
Department of Information Science Engineering
77Module 1 - Introduction to networks
Reference Models
5. Functions of Session Layer
www.cambridge.edu.in
Department of Information Science Engineering
78Module 1 - Introduction to networks
Reference Models
Functions of Session layer Dialog control
Session layer acts as a dialog controller that
creates a dialog between two processes or we can
say that it allows the communication between two
processes which can be either half-duplex or
full-duplex. Synchronization Session layer adds
some checkpoints when transmitting the data in a
sequence. If some error occurs in the middle of
the transmission of data, then the transmission
will take place again from the checkpoint. This
process is known as Synchronization and
recovery. Authentication, Authorization and
Session Management of Text and contain image file
www.cambridge.edu.in
Department of Information Science Engineering
79Module 1 - Introduction to networks
Reference Models
5. Functions of Session Layer
www.cambridge.edu.in
Department of Information Science Engineering
80Module 1 - Introduction to networks
Reference Models
6. Functions of Presentation layer
www.cambridge.edu.in
Department of Information Science Engineering
81Module 1 - Introduction to networks
Reference Models
Functions of Presentation layer Translation The
processes in two systems exchange the information
in the form of character strings, numbers and so
on. Different computers use different encoding
methods, the presentation layer handles the
interoperability between the different encoding
methods. It converts the data from
sender-dependent format into a common format and
changes the common format into receiver-dependent
format at the receiving end. Encryption
Encryption is needed to maintain privacy.
Compression Data compression is a process of
compressing the data. Data compression is very
important in multimedia such as text, audio,
video.
www.cambridge.edu.in
Department of Information Science Engineering
82Module 1 - Introduction to networks
Reference Models
6. Functions of Presentation layer
www.cambridge.edu.in
Department of Information Science Engineering
83Module 1 - Introduction to networks
Reference Models
7. Functions of Application layer
www.cambridge.edu.in
Department of Information Science Engineering
84Module 1 - Introduction to networks
Reference Models
Functions of Application layer File transfer,
access, and management (FTAM) An application
layer allows a user to access the files in a
remote computer, to retrieve the files from a
computer and to manage the files in a remote
computer. Mail services An application layer
provides the facility for email forwarding and
storage. Directory services An application
provides the distributed database sources and is
used to provide that global information about
various objects.
www.cambridge.edu.in
Department of Information Science Engineering
85Module 1 - Introduction to networks
Reference Models
Protocols used in Application layer
www.cambridge.edu.in
Department of Information Science Engineering
86Module 1 - Introduction to networks
Reference Models
- TCP / IP PROTOCOL SUITE
- TCP stands for Transmission Control Protocol,
while IP stands for Internet Protocol. - It is a suite of protocols for communication
structured in four layers. It can be used for
communication over the internet as well as for
private networks. - The four layers are Application layer, Transport
layer, Internet layer and Network access layer or
Link layer, as depicted in the following diagram
www.cambridge.edu.in
Department of Information Science Engineering
87Module 1 - Introduction to networks
Reference Models
Comparison of OSI and TCP/IP Models
www.cambridge.edu.in
Department of Information Science Engineering
88Module 1 - Introduction to networks
Reference Models
- What is the TCP/IP Model?
- Protocols Applied
- Layers of the TCP/IP Model
- Advantages of TCP/IP Model
- OSI Model VS TCP/IP Model
www.cambridge.edu.in
Department of Information Science Engineering
89Module 1 - Introduction to networks
Reference Models
Types of network protocol 1.Transmission Control
Protocol (TCP) TCP stands for Transmission
Control Protocol a communications standard that
enables application programs and computing
devices to exchange messages over a
network. 2.Internet Protocol (IP) Internet
Protocol (IP) is the method or protocol by which
data is sent from one computer to another on the
internet. 3.User Datagram Protocol (UDP) What is
UDP protocol used for?User Datagram Protocol
(UDP) refers to a protocol used for communication
throughout the internet.
www.cambridge.edu.in
Department of Information Science Engineering
90Module 1 - Introduction to networks
Reference Models
4.Post office Protocol (POP) POP3 is designed
for receiving incoming E-mails. 5.Simple mail
transport Protocol (SMTP) SMTP is designed to
send and distribute outgoing E-Mail. 6.File
Transfer Protocol (FTP) FTP allows users to
transfer files from one machine to
another. 7.Hyper Text Transfer Protocol (HTTP)
Through the HTTP protocol, resources are
exchanged between client devices and servers over
the internet. 8.Hyper Text Transfer Protocol
Secure (HTTPS) Hypertext Transfer Protocol
Secure (HTTPS) is a protocol that secures
communication and data transfer between a user's
web browser and a website.
www.cambridge.edu.in
Department of Information Science Engineering
91Module 1 - Introduction to networks
Reference Models
9. RTP (Real-Time Transport Protocol) It carries
the media streams. 10. ICMP (Internet Control
Message Protocol) is used for reporting errors
and performing network diagnostics. 11. DNS
(Domain Name System) translates human readable
domain names (for example, www.amazon.com) to
machine readable IP addresses (for example,
192.0.2.44) 12. DSL (Digital Subscriber Line)
DSL, networking technology that provides
broadband (high-speed) Internet connections over
conventional telephone lines. 13.SONET
(Synchronous Optical Network) It can transmits
and multiplexes multiple data streams across a
fiber optic cable.
www.cambridge.edu.in
Department of Information Science Engineering
92Module 1 - Introduction to networks
Reference Models
A network protocol is an established set of rules
that determine how data is transmitted between
different devices in the same network.
www.cambridge.edu.in
Department of Information Science Engineering
93Module 1 - Introduction to networks
Reference Models
Between two person understand the language in
format
www.cambridge.edu.in
Department of Information Science Engineering
94Module 1 - Introduction to networks
Reference Models
Between two system in format
www.cambridge.edu.in
Department of Information Science Engineering
95Module 1 - Introduction to networks
Reference Models
Between two computers understand the message
in format
www.cambridge.edu.in
Department of Information Science Engineering
96Module 1 - Introduction to networks
Reference Models
Protocols
www.cambridge.edu.in
Department of Information Science Engineering
97Module 1 - Introduction to networks
Reference Models
Protocols support for Networks communications
Communication
Network
www.cambridge.edu.in
Department of Information Science Engineering
98Module 1 - Introduction to networks
Reference Models
TCP/IP
www.cambridge.edu.in
Department of Information Science Engineering
99Module 1 - Introduction to networks
Reference Models
TCP/IP vs OSI
www.cambridge.edu.in
Department of Information Science Engineering
100Module 1 - Introduction to networks
Reference Models
TCP/IP Layers
www.cambridge.edu.in
Department of Information Science Engineering
101Module 1 - Introduction to networks
Reference Models
- TCP IP model layers functions
- 1. Functions of Link Layer
- The link layer is the first layer of the TCP IP
model. The link layer is the combination of the
Physical layer and the data link layer of the OSI
model. - The link layer is responsible for sending data
bits over the communication medium or media. - The link layer is responsible for communication
among devices of the same network. - The link layer uses WiFi as well as an Ethernet
protocol to allow network devices of the same
network to communicate with each other.
www.cambridge.edu.in
Department of Information Science Engineering
102Module 1 - Introduction to networks
Reference Models
Link Layer
www.cambridge.edu.in
Department of Information Science Engineering
103Module 1 - Introduction to networks
Reference Models
Link Layer function
www.cambridge.edu.in
Department of Information Science Engineering
104Module 1 - Introduction to networks
Reference Models
Link Layer function
www.cambridge.edu.in
Department of Information Science Engineering
105Module 1 - Introduction to networks
Reference Models
Link Layer function
www.cambridge.edu.in
Department of Information Science Engineering
106Module 1 - Introduction to networks
Reference Models
Link Layer function
www.cambridge.edu.in
Department of Information Science Engineering
107Module 1 - Introduction to networks
Reference Models
Logical Link Control
Link Layer function
www.cambridge.edu.in
Department of Information Science Engineering
108Module 1 - Introduction to networks
Reference Models
- 2. Functions of Internet Layer (IP and ICMP)
- The Internet layer is the middle layer between
the Transport layer and link layer. The Internet
layer is similar to network layer of OSI model. - Internet Layer converts received segment into
packets. - Internet Layer Adds Source and destination IP
address to each packet. - Internet Layer Responsible for routing of
packets. - Handles network traffic i.e network conjunction.
- Internet Layer adds sequence number to each
packet. - Internet Layer Protocols IP, ICMP, IGMP, IPsec.
www.cambridge.edu.in
Department of Information Science Engineering
109Module 1 - Introduction to networks
Reference Models
Routing, Path Determination
Network Layer function
www.cambridge.edu.in
Department of Information Science Engineering
110Module 1 - Introduction to networks
Reference Models
Routing, Path Determination
Network Layer function
www.cambridge.edu.in
Department of Information Science Engineering
111Module 1 - Introduction to networks
Reference Models
www.cambridge.edu.in
Department of Information Science Engineering
112Module 1 - Introduction to networks
Reference Models
Address Resolution Protocol (ARP) is a protocol
or procedure that connects an ever-changing
Internet Protocol (IP) address to a fixed
physical machine address, also known as a media
access control (MAC) address, in a local-area
network (LAN). MAC address will change in every
hop
www.cambridge.edu.in
Department of Information Science Engineering
113Module 1 - Introduction to networks
Reference Models
OSPF - Open Shortest Path First) protocol BGP -
Border Gateway Protocol ISIS - Intermediate
System to Intermediate System
Network layer function
www.cambridge.edu.in
Department of Information Science Engineering
114Module 1 - Introduction to networks
Reference Models
Delivery of data will take care by transport layer
Network layer function
www.cambridge.edu.in
Department of Information Science Engineering
115Module 1 - Introduction to networks
Reference Models
- 3. Functions of Transport layer
- The transport layer is the middle layer between
the Application layer and the Internet layer. It
receives data or information from the Application
Layer. - If we send entire data or information together
and if we lose that data while sending then we
will lose the entire data or information. - So it is better to divide that data or
information into small parts or units and then
send it. - This job of dividing data or information into
small parts or units is done by Transport Layer.
This process of dividing data or information into
small parts or units is called Segmentation. - Transport layer protocols TCP, UDP, etc.
www.cambridge.edu.in
Department of Information Science Engineering
116Module 1 - Introduction to networks
Reference Models
Delivery of data will take care by transport
layer
Transport layer function
www.cambridge.edu.in
Department of Information Science Engineering
117Module 1 - Introduction to networks
Reference Models
1
2
3
Simple Network Management Protocol (SNMP) Routing
Information Protocol (RIP)
Transport layer function
www.cambridge.edu.in
Department of Information Science Engineering
118Module 1 - Introduction to networks
Reference Models
1
2
Transport layer function
www.cambridge.edu.in
Department of Information Science Engineering
119Module 1 - Introduction to networks
Reference Models
3
Transport layer function
www.cambridge.edu.in
Department of Information Science Engineering
120Module 1 - Introduction to networks
Reference Models
Sequence Number
Transport layer function
www.cambridge.edu.in
Department of Information Science Engineering
121Module 1 - Introduction to networks
Reference Models
Not received ACK from receiver
Transport layer function
www.cambridge.edu.in
Department of Information Science Engineering
122Module 1 - Introduction to networks
Reference Models
Same Segment number identify and remove
Transport layer function
www.cambridge.edu.in
Department of Information Science Engineering
123Module 1 - Introduction to networks
Reference Models
If ACK missed
Transport layer function
www.cambridge.edu.in
Department of Information Science Engineering
124Module 1 - Introduction to networks
Reference Models
- 4. Functions of Application layer
- The application layer is responsible for
receiving webpage request from user or client
using the most widely used protocol namely HTTP
protocol and displaying response back in the
browser. - Application layer also responsible for sending
data or files from one place to another place. - Application layer is used to send Emails.
- Application is responsible for converting a
domain name i.e website name into IP address i.e
DNS. - Application layer also acts as a data translator.
- Application layer is also responsible for data
encryption or decryption, compression, and
decompression. - The Application layer is responsible for creating
a session between client and server.
www.cambridge.edu.in
Department of Information Science Engineering
125Module 1 - Introduction to networks
Reference Models
Application layer function
www.cambridge.edu.in
Department of Information Science Engineering
126Module 1 - Introduction to networks
Reference Models
Internet Message Access Protocol, or IMAP IRC
(Internet Relay Chat) is a protocol for real-time
text messaging between internet-connected
computers
Application layer function
www.cambridge.edu.in
Department of Information Science Engineering
127Module 1 - Introduction to networks
Reference Models
- The main advantages of TCP/IP are as follows -
- It is a broadly accepted model which can deploy
effectively in all the practical networking
issues. - TCP / IP can also enable cross-platform
communications among the heterogeneous networks. - It supports connection-oriented reliable service.
It defines that it maintains the transfer of data
packets. - If the data packet is missing across the web,
thus the TCP will retransmit the lost packets.
www.cambridge.edu.in
Department of Information Science Engineering
128Module 1 - Introduction to networks
Reference Models
Heterogeneous Networks
www.cambridge.edu.in
Department of Information Science Engineering
129Module 1 - Introduction to networks
Reference Models
- It supports error disclosure by using checksum
and error control by using Go Back or ARP
protocol. - Disadvantages
- The TCP/IP model is not shared and appropriated
to represent any protocol stack other than
TCP/IP. - The TCP/IP model does not determine the physical
and data link layers. - It can improve a considerable overhead as every
structure obtains its TCP header. Therefore,
fragmentation through the router improves the
overhead.
www.cambridge.edu.in
Department of Information Science Engineering
130Module 1 - Introduction to networks
Reference Models
- The Model Used in This Book with 5 Layers
- Due to the strength of the TCP/IP reference model
is the protocols, which have been widely used for
many years. - This model has five layers, running from the
physical layer up through the link layer, network
layer and transport layers to the application
layer.
www.cambridge.edu.in
Department of Information Science Engineering
131Module 1 - Introduction to networks
Reference Models
- A Comparison of the OSI and TCP/IP Reference
Models - It is important to note that we are comparing the
reference models here, not the corresponding
protocol stacks. - Three concepts are central to the OSI model
- 1. Services.
- 2. Interfaces.
- 3. Protocols.
- Each layer performs some services for the layer
above it. A layers interface tells the processes
above it how to access it. It specifies what the
parameters are and what results to expect.
Finally, the peer protocols used in a layer are
the layers own business. It can use any
protocols it wants to, as long as it gets the job
done
www.cambridge.edu.in
Department of Information Science Engineering
132Module 1 - Introduction to networks
Reference Models
- A Comparison of the OSI and TCP/IP Reference
Models - The TCP/IP model did not originally clearly
distinguish between services, interfaces, and
protocols, although people have tried to retrofit
it after the fact to make it more OSI-like. For
example, the only real services offered by the
internet layer are SEND IP PACKET and RECEIVE IP
PACKET. - The OSI reference model was devised before the
corresponding protocols were invented. This
ordering meant that the model was not biased
toward one particular set of protocols, a fact
that made it quite general.
www.cambridge.edu.in
Department of Information Science Engineering
133Module 1 - Introduction to networks
Reference Models
- A Comparison of the OSI and TCP/IP Reference
Models - When people started to build real networks using
the OSI model and existing protocols, it was
discovered that these networks did not match the
required service specifications, so convergence
sublayers had to be grafted onto the model to
provide a place for papering over the
differences. - Finally, the committee originally expected that
each country would have one network, run by the
government and using the OSI protocols, so no
thought was given to internetworking.
www.cambridge.edu.in
Department of Information Science Engineering
134Module 1 - Introduction to networks
Reference Models
- A Comparison of the OSI and TCP/IP Reference
Models - With TCP/IP the reverse was true the protocols
came first, and the model was really just a
description of the existing protocols. There was
no problem with the protocols fittin