SlideShare a Scribd company logo
1 of 78
Computer Network Models
•There are many users who use computer network
and are located all over the world.
•To ensure national and worldwide data
communication ISO (ISO stands for International
Organization of Standardization.) developed this
model. This is called a model for open system
interconnection (OSI) and is normally called as OSI
model.
•OSI model architecture consists of seven layers. It
defines seven layers or levels in a complete
communication system.
OSI Reference model
TCP/IP Reference Model
•There are many users who use computer network
and are located all over the world.
•To ensure national and worldwide data
communication ISO (ISO stands for International
Organization of Standardization.) developed this
model. This is called a model for open system
interconnection (OSI) and is normally called as OSI
model.
•OSI model architecture consists of seven layers. It
defines seven layers or levels in a complete
communication system.
TCP/IP Reference Model
TCP/IP vs. OSI Model
Network Layer - OSI Model
•The network Layer controls the operation of the
subnet. The main aim of this layer is to deliver
packets from source to destination across multiple
links (networks).
•If two computers (system) are connected on the
same link, then there is no need for a network layer.
It routes the signal through different channels to the
other end and acts as a network controller.
•It also divides the outgoing messages into packets
and to assemble incoming packets into messages
for higher levels.
Functions of Network Layer
Functions of Network Layer
•It translates logical network address into physical
address. Concerned with circuit, message or packet
switching.
•Routers and gateways operate in the network layer.
Mechanism is provided by Network Layer for routing
the packets to final destination.
•Connection services are provided including network
layer flow control, network layer error control and
packet sequence control.
•Breaks larger packets into small packets.
Store-and-Forward Packet
Switching
•All PSDNs, WANs and FR operate in “store and
forward” mode:- Packet stored at a node and
transmitted to next node. - Next node receives it
completely in a buffer. - Routing decision selects
outgoing link to “forward” it toward its final
destination. - Steps above repeated until packet fully
received at destination node.
•FR node involves much less processing per frame
than PSDN node but still operates in store and
forward mode. Note: FR=FrameRelay!
Store and Forward Timing
•Timing diagram for simple store and forward:
Minimum times required to transfer a single packet
from Node 1 to Node 4 in the absence of errors and
with no waiting at the node for frames from other
sources.
•Transmission delay of a packet: - TransP = Length
of packet (bits) / (Link transmission rate (bits/ s)) -
Different links may have different transmission rates.
•Propagation delay depends only on length of link.
Effects of Packet Size
•Above figure shows file transfer from Station X to
Station Y through intermediate store-and-forward
nodes a and b.
•Effect of length of packets on file transfer delay:-
Segmentation into smaller packets shortens delay
up to a point by reducing the store and forward
delay at each node.
•But cause extra overhead in packet headers and in
processing requirements at nodes which may
increase processing delays .
Services provided by the Transport
Layer
•Service Point Addressing: Transport Layer header
includes service point address which is port
address. This layer gets the message to the correct
process on the computer unlike Network Layer,
which gets each packet to the correct computer.
•Segmentation and Reassembling: A message is
divided into segments; each segment contains
sequence number, which enables this layer in
reassembling the message. Message is
reassembled correctly upon arrival at the destination
and replaces packets which were lost in
transmission.
Services provided by the Transport
Layer
•Connection Control: It includes 2 types:
•Connectionless Transport Layer : Each segment
is considered as an independent packet and
delivered to the transport layer at the destination
machine.
•Connection Oriented Transport Layer : Before
delivering packets, connection is made with
transport layer at the destination machine.
•Flow Control: In this layer, flow control is
performed end to end.
•Error Control: Error Control is performed end to
end in this layer to ensure that the complete
message arrives at the receiving transport layer
without any error. Error Correction is done through
Connection Oriented Services
•There is a sequence of operation to be followed by
the users of connection oriented service. These are:
Connection is established.
Information is sent.
Connection is released.
•In connection oriented service we have to establish
a connection before starting the communication.
•Connection oriented service is more reliable than
connectionless service.
•Example of connection oriented is TCP
(Transmission Control Protocol) protocol.
•FIG. NEXT SLIDE
Connection Less Services
•It is similar to the postal services, as it carries the
full address where the message (letter) is to be
carried. Each message is routed independently from
source to destination. The order of message sent
can be different from the order received.
•In connectionless the data is transferred in one
direction from source to destination without checking
that destination is still there or not or if it prepared to
accept the message. Authentication is not needed in
this.
•Example of Connectionless service is UDP
(User Datagram Protocol) protocol.
Connection-oriented vs. Connection-less
Services.
Flooding
•When node receives broadcast packet, sends copy to
all neighbors.
•Problems: cycles & broadcast storm
•Controlled flooding: Node only broadcasts pkt if it
hasn’t broadcast same packet before.
•Node keeps track of packet ids already broadcasted.
•or reverse path forwarding (RPF): only forward packet
if it arrived on shortest path between node and source.
Shortest Path Routing - Dijkstra's
algorithm
Example
LINK STATE ROUTING ALGORITHM
Hierarchical Routing
Hierarchical Routing
IP Address
•IP (Internet Protocol) Address is an address of your
network hardware. It helps in connecting your computer
to other devices on your network and all over the world.
•An IP Address is made up of numbers or characters.
•An example of an IP address would be: 506.457.14.512
All devices that are connected to an internet connection
have a unique IP address which means there’s a need of
billions of IP addresses. This requirement is fulfilled by
the new IP version IPv6.
Classful Addressing
•IPv4 addressing used the concept of classes. This
architecture is known as classful addressing.
•In the Classful addressing, there are 5 classes in which
the address space is divided: A, B, C, D, and E.
•Each class occupies some fraction of the address
space.
•We can find the class of an address when given the
address in binary notation or dotted-decimal notation by
checking the first few bits or first byte.
Classful Addressing
Classful Addressing
•The "class A addresses" are designed for large
organizations to manage a large number of attached
hosts or routers.
•The "class B addresses" are designed for midsize
organizations to manage tens of thousands of attached
hosts or routers.
•The "class C addresses" are designed for small
organizations to manage a small number of attached
hosts or routers.
Classless Addressing
•Classful addressing leads to address depletion. That's
the big issue for this schema and that's why it's not used
nowadays.
•To overcome the problem of address depletion and to
give more organizations access to the Internet, the
classless addressing was designed and implemented.
•In this scheme of classless addressing, there are no
classes, but the addresses are still granted in blocks.
Classless Addressing
•In classless addressing, when an entity(organization or a
single household (small organization) or whatever which uses
the internet) needs to be connected to the Internet, it is
granted a block (range) of addresses.
•The size of the block (the number of addresses) varies based
on the nature, size, and need of the entity.
•For example, a household (small organization) may be given
only two addresses; a large organization may be given
thousands of addresses.
•On the other hand. An ISP, as the Internet service provider,
may be given hundreds of thousands based on the number of
customers it may serve.
•
Subnets
Subnets
IP addressing: CIDR
NAT: Network Address Translation
DHCP: Dynamic Host Configuration
Protocol
ARP AND RARP
ARP AND RARP EXAMPLE
SOLUTION
INTERNET PROTOCOL VERSION
4(IPV4)
•IPv4 is the first network protocol to
interconnect different networks
regardless of the medium used.
•Globally unique addressing scheme
•Any two nodes can communicate
directly
ICMP: Internet Control Message
Protocol
ICMP Header Format
IP fragmentation
IP fragmentation Example
RIP ( Routing Information Protocol)
Techniques to Improve QoS
•Scheduling
•Packets from different flows arrive at a switch or router
for processing. A good scheduling technique treats the
different flows in a fair and appropriate manner.
•Several scheduling techniques are designed to improve
the quality of service. We discuss three of them here:
FIFO queuing, priority queuing, and weighted fair
queuing.
Congestion Control techniques in Computer Networks
Open Loop Congestion Control
•Retransmission Policy :
It is the policy in which retransmission of the packets are
taken care.
•Window Policy :
The type of window at the sender side may also affect
the congestion.
•Discarding Policy :
A good discarding policy adopted by the routers is that
the routers may prevent congestion and at the same time
partially discards the corrupted or less sensitive package
and also able to maintain the quality of a message.
Open Loop Congestion Control
•Acknowledgment Policy :
Since acknowledgement are also the part of the load in
network, the acknowledgment policy imposed by the
receiver may also affect congestion. Several approaches
can be used to prevent congestion related to
acknowledgment.
•Admission Policy :
In admission policy a mechanism should be used to
prevent congestion. Switches in a flow should first check
the resource requirement of a network flow before
transmitting it further.
Closed Loop Congestion Control
Closed Loop Congestion Control
Closed Loop Congestion Control
Network layer
Network layer

More Related Content

What's hot

TCP- Transmission Control Protocol
TCP-  Transmission Control Protocol TCP-  Transmission Control Protocol
TCP- Transmission Control Protocol Akhil .B
 
transport layer protocols
transport layer protocolstransport layer protocols
transport layer protocolsBE Smârt
 
Network Layer,Computer Networks
Network Layer,Computer NetworksNetwork Layer,Computer Networks
Network Layer,Computer Networksguesta81d4b
 
data-link layer protocols
data-link layer protocols  data-link layer protocols
data-link layer protocols BE Smârt
 
Switching
Switching Switching
Switching Abid Ali
 
Presentation Routing algorithm
Presentation Routing algorithmPresentation Routing algorithm
Presentation Routing algorithmBasit Hussain
 
switching techniques in data communication and networking
switching techniques in data communication and networkingswitching techniques in data communication and networking
switching techniques in data communication and networkingHarshita Yadav
 
Multiple Access Protocal
Multiple Access ProtocalMultiple Access Protocal
Multiple Access Protocaltes31
 
Switching Concepts presentation
Switching Concepts presentationSwitching Concepts presentation
Switching Concepts presentationzameer Abbas
 
Circuit Switching, Packet Switching, Virtual Circuit Networks and Datagram Ne...
Circuit Switching, Packet Switching, Virtual Circuit Networks and Datagram Ne...Circuit Switching, Packet Switching, Virtual Circuit Networks and Datagram Ne...
Circuit Switching, Packet Switching, Virtual Circuit Networks and Datagram Ne...Kaushik Panta
 
Introduction to TCP/IP
Introduction to TCP/IPIntroduction to TCP/IP
Introduction to TCP/IPMichael Lamont
 
Computer Networks Unit 2 UNIT II DATA-LINK LAYER & MEDIA ACCESS
Computer Networks Unit 2 UNIT II DATA-LINK LAYER & MEDIA ACCESSComputer Networks Unit 2 UNIT II DATA-LINK LAYER & MEDIA ACCESS
Computer Networks Unit 2 UNIT II DATA-LINK LAYER & MEDIA ACCESSDr. SELVAGANESAN S
 
Asynchronous transfer mode
Asynchronous transfer modeAsynchronous transfer mode
Asynchronous transfer modeaniston0108
 
Packet switching
Packet switchingPacket switching
Packet switchingasimnawaz54
 

What's hot (20)

TCP- Transmission Control Protocol
TCP-  Transmission Control Protocol TCP-  Transmission Control Protocol
TCP- Transmission Control Protocol
 
Token ring
Token ringToken ring
Token ring
 
transport layer protocols
transport layer protocolstransport layer protocols
transport layer protocols
 
Network Layer,Computer Networks
Network Layer,Computer NetworksNetwork Layer,Computer Networks
Network Layer,Computer Networks
 
data-link layer protocols
data-link layer protocols  data-link layer protocols
data-link layer protocols
 
Switching
Switching Switching
Switching
 
Presentation Routing algorithm
Presentation Routing algorithmPresentation Routing algorithm
Presentation Routing algorithm
 
IPV4 Frame Format
IPV4 Frame FormatIPV4 Frame Format
IPV4 Frame Format
 
switching techniques in data communication and networking
switching techniques in data communication and networkingswitching techniques in data communication and networking
switching techniques in data communication and networking
 
Tcp IP Model
Tcp IP ModelTcp IP Model
Tcp IP Model
 
Multiple Access Protocal
Multiple Access ProtocalMultiple Access Protocal
Multiple Access Protocal
 
Switching Concepts presentation
Switching Concepts presentationSwitching Concepts presentation
Switching Concepts presentation
 
Circuit Switching, Packet Switching, Virtual Circuit Networks and Datagram Ne...
Circuit Switching, Packet Switching, Virtual Circuit Networks and Datagram Ne...Circuit Switching, Packet Switching, Virtual Circuit Networks and Datagram Ne...
Circuit Switching, Packet Switching, Virtual Circuit Networks and Datagram Ne...
 
Application layer
Application layerApplication layer
Application layer
 
Introduction to TCP/IP
Introduction to TCP/IPIntroduction to TCP/IP
Introduction to TCP/IP
 
Computer Networks Unit 2 UNIT II DATA-LINK LAYER & MEDIA ACCESS
Computer Networks Unit 2 UNIT II DATA-LINK LAYER & MEDIA ACCESSComputer Networks Unit 2 UNIT II DATA-LINK LAYER & MEDIA ACCESS
Computer Networks Unit 2 UNIT II DATA-LINK LAYER & MEDIA ACCESS
 
Asynchronous transfer mode
Asynchronous transfer modeAsynchronous transfer mode
Asynchronous transfer mode
 
Packet switching
Packet switchingPacket switching
Packet switching
 
Network Layer
Network LayerNetwork Layer
Network Layer
 
Virtual LAN
Virtual LANVirtual LAN
Virtual LAN
 

Similar to Network layer

Network architecure (3).pptx
Network architecure (3).pptxNetwork architecure (3).pptx
Network architecure (3).pptxKaythry P
 
ET3003-2 OSI-TCPIP (Semester II 2013-2014)
ET3003-2 OSI-TCPIP (Semester II 2013-2014)ET3003-2 OSI-TCPIP (Semester II 2013-2014)
ET3003-2 OSI-TCPIP (Semester II 2013-2014)Tutun Juhana
 
Web technologies: recap on TCP-IP
Web technologies: recap on TCP-IPWeb technologies: recap on TCP-IP
Web technologies: recap on TCP-IPPiero Fraternali
 
Protocol layer,OSI model & POP3
Protocol layer,OSI model & POP3Protocol layer,OSI model & POP3
Protocol layer,OSI model & POP3Zakirul Islam
 
Unit 2 ppt-idc
Unit 2 ppt-idcUnit 2 ppt-idc
Unit 2 ppt-idchiya123jes
 
DS Unit-4-Communication .pdf
DS Unit-4-Communication .pdfDS Unit-4-Communication .pdf
DS Unit-4-Communication .pdfSantoshUpreti6
 
OSI Reference Model and TCP/IP (Lecture #3 ET3003 Sem1 2014/2015)
OSI Reference Model and TCP/IP (Lecture #3 ET3003 Sem1 2014/2015)OSI Reference Model and TCP/IP (Lecture #3 ET3003 Sem1 2014/2015)
OSI Reference Model and TCP/IP (Lecture #3 ET3003 Sem1 2014/2015)Tutun Juhana
 
Sargation university's open system interconnection
Sargation university's open system interconnectionSargation university's open system interconnection
Sargation university's open system interconnectionKingPinYT
 
Osi layer and network protocol
Osi layer and network protocolOsi layer and network protocol
Osi layer and network protocolNayan Sarma
 
Computer networks unit iii
Computer networks    unit iiiComputer networks    unit iii
Computer networks unit iiiJAIGANESH SEKAR
 

Similar to Network layer (20)

Application Layer
Application LayerApplication Layer
Application Layer
 
Dc2 t1
Dc2 t1Dc2 t1
Dc2 t1
 
Osi model
Osi modelOsi model
Osi model
 
Network architecure (3).pptx
Network architecure (3).pptxNetwork architecure (3).pptx
Network architecure (3).pptx
 
ET3003-2 OSI-TCPIP (Semester II 2013-2014)
ET3003-2 OSI-TCPIP (Semester II 2013-2014)ET3003-2 OSI-TCPIP (Semester II 2013-2014)
ET3003-2 OSI-TCPIP (Semester II 2013-2014)
 
OSI Model.ppt
OSI Model.pptOSI Model.ppt
OSI Model.ppt
 
Web technologies: recap on TCP-IP
Web technologies: recap on TCP-IPWeb technologies: recap on TCP-IP
Web technologies: recap on TCP-IP
 
MVA slides lesson 2
MVA slides lesson 2MVA slides lesson 2
MVA slides lesson 2
 
Protocol layer,OSI model & POP3
Protocol layer,OSI model & POP3Protocol layer,OSI model & POP3
Protocol layer,OSI model & POP3
 
Unit 2 ppt-idc
Unit 2 ppt-idcUnit 2 ppt-idc
Unit 2 ppt-idc
 
DS Unit-4-Communication .pdf
DS Unit-4-Communication .pdfDS Unit-4-Communication .pdf
DS Unit-4-Communication .pdf
 
OSI Reference Model and TCP/IP (Lecture #3 ET3003 Sem1 2014/2015)
OSI Reference Model and TCP/IP (Lecture #3 ET3003 Sem1 2014/2015)OSI Reference Model and TCP/IP (Lecture #3 ET3003 Sem1 2014/2015)
OSI Reference Model and TCP/IP (Lecture #3 ET3003 Sem1 2014/2015)
 
Viloria osi layer4-7
Viloria osi layer4-7Viloria osi layer4-7
Viloria osi layer4-7
 
Sargation university's open system interconnection
Sargation university's open system interconnectionSargation university's open system interconnection
Sargation university's open system interconnection
 
Computer Networks basics
Computer Networks basicsComputer Networks basics
Computer Networks basics
 
Osi layer and network protocol
Osi layer and network protocolOsi layer and network protocol
Osi layer and network protocol
 
Networking basics
Networking basicsNetworking basics
Networking basics
 
Computer networks
Computer networksComputer networks
Computer networks
 
Osi
OsiOsi
Osi
 
Computer networks unit iii
Computer networks    unit iiiComputer networks    unit iii
Computer networks unit iii
 

Recently uploaded

EduAI - E learning Platform integrated with AI
EduAI - E learning Platform integrated with AIEduAI - E learning Platform integrated with AI
EduAI - E learning Platform integrated with AIkoyaldeepu123
 
An experimental study in using natural admixture as an alternative for chemic...
An experimental study in using natural admixture as an alternative for chemic...An experimental study in using natural admixture as an alternative for chemic...
An experimental study in using natural admixture as an alternative for chemic...Chandu841456
 
UNIT III ANALOG ELECTRONICS (BASIC ELECTRONICS)
UNIT III ANALOG ELECTRONICS (BASIC ELECTRONICS)UNIT III ANALOG ELECTRONICS (BASIC ELECTRONICS)
UNIT III ANALOG ELECTRONICS (BASIC ELECTRONICS)Dr SOUNDIRARAJ N
 
Architect Hassan Khalil Portfolio for 2024
Architect Hassan Khalil Portfolio for 2024Architect Hassan Khalil Portfolio for 2024
Architect Hassan Khalil Portfolio for 2024hassan khalil
 
Risk Assessment For Installation of Drainage Pipes.pdf
Risk Assessment For Installation of Drainage Pipes.pdfRisk Assessment For Installation of Drainage Pipes.pdf
Risk Assessment For Installation of Drainage Pipes.pdfROCENODodongVILLACER
 
Artificial-Intelligence-in-Electronics (K).pptx
Artificial-Intelligence-in-Electronics (K).pptxArtificial-Intelligence-in-Electronics (K).pptx
Artificial-Intelligence-in-Electronics (K).pptxbritheesh05
 
INFLUENCE OF NANOSILICA ON THE PROPERTIES OF CONCRETE
INFLUENCE OF NANOSILICA ON THE PROPERTIES OF CONCRETEINFLUENCE OF NANOSILICA ON THE PROPERTIES OF CONCRETE
INFLUENCE OF NANOSILICA ON THE PROPERTIES OF CONCRETEroselinkalist12
 
Internship report on mechanical engineering
Internship report on mechanical engineeringInternship report on mechanical engineering
Internship report on mechanical engineeringmalavadedarshan25
 
CCS355 Neural Networks & Deep Learning Unit 1 PDF notes with Question bank .pdf
CCS355 Neural Networks & Deep Learning Unit 1 PDF notes with Question bank .pdfCCS355 Neural Networks & Deep Learning Unit 1 PDF notes with Question bank .pdf
CCS355 Neural Networks & Deep Learning Unit 1 PDF notes with Question bank .pdfAsst.prof M.Gokilavani
 
Biology for Computer Engineers Course Handout.pptx
Biology for Computer Engineers Course Handout.pptxBiology for Computer Engineers Course Handout.pptx
Biology for Computer Engineers Course Handout.pptxDeepakSakkari2
 
Gfe Mayur Vihar Call Girls Service WhatsApp -> 9999965857 Available 24x7 ^ De...
Gfe Mayur Vihar Call Girls Service WhatsApp -> 9999965857 Available 24x7 ^ De...Gfe Mayur Vihar Call Girls Service WhatsApp -> 9999965857 Available 24x7 ^ De...
Gfe Mayur Vihar Call Girls Service WhatsApp -> 9999965857 Available 24x7 ^ De...srsj9000
 
Introduction-To-Agricultural-Surveillance-Rover.pptx
Introduction-To-Agricultural-Surveillance-Rover.pptxIntroduction-To-Agricultural-Surveillance-Rover.pptx
Introduction-To-Agricultural-Surveillance-Rover.pptxk795866
 
pipeline in computer architecture design
pipeline in computer architecture  designpipeline in computer architecture  design
pipeline in computer architecture designssuser87fa0c1
 
Call Girls Delhi {Jodhpur} 9711199012 high profile service
Call Girls Delhi {Jodhpur} 9711199012 high profile serviceCall Girls Delhi {Jodhpur} 9711199012 high profile service
Call Girls Delhi {Jodhpur} 9711199012 high profile servicerehmti665
 
Churning of Butter, Factors affecting .
Churning of Butter, Factors affecting  .Churning of Butter, Factors affecting  .
Churning of Butter, Factors affecting .Satyam Kumar
 
CCS355 Neural Network & Deep Learning Unit II Notes with Question bank .pdf
CCS355 Neural Network & Deep Learning Unit II Notes with Question bank .pdfCCS355 Neural Network & Deep Learning Unit II Notes with Question bank .pdf
CCS355 Neural Network & Deep Learning Unit II Notes with Question bank .pdfAsst.prof M.Gokilavani
 
Heart Disease Prediction using machine learning.pptx
Heart Disease Prediction using machine learning.pptxHeart Disease Prediction using machine learning.pptx
Heart Disease Prediction using machine learning.pptxPoojaBan
 

Recently uploaded (20)

EduAI - E learning Platform integrated with AI
EduAI - E learning Platform integrated with AIEduAI - E learning Platform integrated with AI
EduAI - E learning Platform integrated with AI
 
Call Us -/9953056974- Call Girls In Vikaspuri-/- Delhi NCR
Call Us -/9953056974- Call Girls In Vikaspuri-/- Delhi NCRCall Us -/9953056974- Call Girls In Vikaspuri-/- Delhi NCR
Call Us -/9953056974- Call Girls In Vikaspuri-/- Delhi NCR
 
An experimental study in using natural admixture as an alternative for chemic...
An experimental study in using natural admixture as an alternative for chemic...An experimental study in using natural admixture as an alternative for chemic...
An experimental study in using natural admixture as an alternative for chemic...
 
UNIT III ANALOG ELECTRONICS (BASIC ELECTRONICS)
UNIT III ANALOG ELECTRONICS (BASIC ELECTRONICS)UNIT III ANALOG ELECTRONICS (BASIC ELECTRONICS)
UNIT III ANALOG ELECTRONICS (BASIC ELECTRONICS)
 
Architect Hassan Khalil Portfolio for 2024
Architect Hassan Khalil Portfolio for 2024Architect Hassan Khalil Portfolio for 2024
Architect Hassan Khalil Portfolio for 2024
 
Risk Assessment For Installation of Drainage Pipes.pdf
Risk Assessment For Installation of Drainage Pipes.pdfRisk Assessment For Installation of Drainage Pipes.pdf
Risk Assessment For Installation of Drainage Pipes.pdf
 
Artificial-Intelligence-in-Electronics (K).pptx
Artificial-Intelligence-in-Electronics (K).pptxArtificial-Intelligence-in-Electronics (K).pptx
Artificial-Intelligence-in-Electronics (K).pptx
 
INFLUENCE OF NANOSILICA ON THE PROPERTIES OF CONCRETE
INFLUENCE OF NANOSILICA ON THE PROPERTIES OF CONCRETEINFLUENCE OF NANOSILICA ON THE PROPERTIES OF CONCRETE
INFLUENCE OF NANOSILICA ON THE PROPERTIES OF CONCRETE
 
Internship report on mechanical engineering
Internship report on mechanical engineeringInternship report on mechanical engineering
Internship report on mechanical engineering
 
young call girls in Green Park🔝 9953056974 🔝 escort Service
young call girls in Green Park🔝 9953056974 🔝 escort Serviceyoung call girls in Green Park🔝 9953056974 🔝 escort Service
young call girls in Green Park🔝 9953056974 🔝 escort Service
 
CCS355 Neural Networks & Deep Learning Unit 1 PDF notes with Question bank .pdf
CCS355 Neural Networks & Deep Learning Unit 1 PDF notes with Question bank .pdfCCS355 Neural Networks & Deep Learning Unit 1 PDF notes with Question bank .pdf
CCS355 Neural Networks & Deep Learning Unit 1 PDF notes with Question bank .pdf
 
Biology for Computer Engineers Course Handout.pptx
Biology for Computer Engineers Course Handout.pptxBiology for Computer Engineers Course Handout.pptx
Biology for Computer Engineers Course Handout.pptx
 
Gfe Mayur Vihar Call Girls Service WhatsApp -> 9999965857 Available 24x7 ^ De...
Gfe Mayur Vihar Call Girls Service WhatsApp -> 9999965857 Available 24x7 ^ De...Gfe Mayur Vihar Call Girls Service WhatsApp -> 9999965857 Available 24x7 ^ De...
Gfe Mayur Vihar Call Girls Service WhatsApp -> 9999965857 Available 24x7 ^ De...
 
Introduction-To-Agricultural-Surveillance-Rover.pptx
Introduction-To-Agricultural-Surveillance-Rover.pptxIntroduction-To-Agricultural-Surveillance-Rover.pptx
Introduction-To-Agricultural-Surveillance-Rover.pptx
 
pipeline in computer architecture design
pipeline in computer architecture  designpipeline in computer architecture  design
pipeline in computer architecture design
 
Call Girls Delhi {Jodhpur} 9711199012 high profile service
Call Girls Delhi {Jodhpur} 9711199012 high profile serviceCall Girls Delhi {Jodhpur} 9711199012 high profile service
Call Girls Delhi {Jodhpur} 9711199012 high profile service
 
Churning of Butter, Factors affecting .
Churning of Butter, Factors affecting  .Churning of Butter, Factors affecting  .
Churning of Butter, Factors affecting .
 
young call girls in Rajiv Chowk🔝 9953056974 🔝 Delhi escort Service
young call girls in Rajiv Chowk🔝 9953056974 🔝 Delhi escort Serviceyoung call girls in Rajiv Chowk🔝 9953056974 🔝 Delhi escort Service
young call girls in Rajiv Chowk🔝 9953056974 🔝 Delhi escort Service
 
CCS355 Neural Network & Deep Learning Unit II Notes with Question bank .pdf
CCS355 Neural Network & Deep Learning Unit II Notes with Question bank .pdfCCS355 Neural Network & Deep Learning Unit II Notes with Question bank .pdf
CCS355 Neural Network & Deep Learning Unit II Notes with Question bank .pdf
 
Heart Disease Prediction using machine learning.pptx
Heart Disease Prediction using machine learning.pptxHeart Disease Prediction using machine learning.pptx
Heart Disease Prediction using machine learning.pptx
 

Network layer

  • 1. Computer Network Models •There are many users who use computer network and are located all over the world. •To ensure national and worldwide data communication ISO (ISO stands for International Organization of Standardization.) developed this model. This is called a model for open system interconnection (OSI) and is normally called as OSI model. •OSI model architecture consists of seven layers. It defines seven layers or levels in a complete communication system.
  • 3. TCP/IP Reference Model •There are many users who use computer network and are located all over the world. •To ensure national and worldwide data communication ISO (ISO stands for International Organization of Standardization.) developed this model. This is called a model for open system interconnection (OSI) and is normally called as OSI model. •OSI model architecture consists of seven layers. It defines seven layers or levels in a complete communication system.
  • 6. Network Layer - OSI Model •The network Layer controls the operation of the subnet. The main aim of this layer is to deliver packets from source to destination across multiple links (networks). •If two computers (system) are connected on the same link, then there is no need for a network layer. It routes the signal through different channels to the other end and acts as a network controller. •It also divides the outgoing messages into packets and to assemble incoming packets into messages for higher levels.
  • 8. Functions of Network Layer •It translates logical network address into physical address. Concerned with circuit, message or packet switching. •Routers and gateways operate in the network layer. Mechanism is provided by Network Layer for routing the packets to final destination. •Connection services are provided including network layer flow control, network layer error control and packet sequence control. •Breaks larger packets into small packets.
  • 9. Store-and-Forward Packet Switching •All PSDNs, WANs and FR operate in “store and forward” mode:- Packet stored at a node and transmitted to next node. - Next node receives it completely in a buffer. - Routing decision selects outgoing link to “forward” it toward its final destination. - Steps above repeated until packet fully received at destination node. •FR node involves much less processing per frame than PSDN node but still operates in store and forward mode. Note: FR=FrameRelay!
  • 10.
  • 11. Store and Forward Timing •Timing diagram for simple store and forward: Minimum times required to transfer a single packet from Node 1 to Node 4 in the absence of errors and with no waiting at the node for frames from other sources. •Transmission delay of a packet: - TransP = Length of packet (bits) / (Link transmission rate (bits/ s)) - Different links may have different transmission rates. •Propagation delay depends only on length of link.
  • 12.
  • 13. Effects of Packet Size •Above figure shows file transfer from Station X to Station Y through intermediate store-and-forward nodes a and b. •Effect of length of packets on file transfer delay:- Segmentation into smaller packets shortens delay up to a point by reducing the store and forward delay at each node. •But cause extra overhead in packet headers and in processing requirements at nodes which may increase processing delays .
  • 14. Services provided by the Transport Layer •Service Point Addressing: Transport Layer header includes service point address which is port address. This layer gets the message to the correct process on the computer unlike Network Layer, which gets each packet to the correct computer. •Segmentation and Reassembling: A message is divided into segments; each segment contains sequence number, which enables this layer in reassembling the message. Message is reassembled correctly upon arrival at the destination and replaces packets which were lost in transmission.
  • 15.
  • 16. Services provided by the Transport Layer •Connection Control: It includes 2 types: •Connectionless Transport Layer : Each segment is considered as an independent packet and delivered to the transport layer at the destination machine. •Connection Oriented Transport Layer : Before delivering packets, connection is made with transport layer at the destination machine. •Flow Control: In this layer, flow control is performed end to end. •Error Control: Error Control is performed end to end in this layer to ensure that the complete message arrives at the receiving transport layer without any error. Error Correction is done through
  • 17. Connection Oriented Services •There is a sequence of operation to be followed by the users of connection oriented service. These are: Connection is established. Information is sent. Connection is released. •In connection oriented service we have to establish a connection before starting the communication. •Connection oriented service is more reliable than connectionless service. •Example of connection oriented is TCP (Transmission Control Protocol) protocol. •FIG. NEXT SLIDE
  • 18.
  • 19. Connection Less Services •It is similar to the postal services, as it carries the full address where the message (letter) is to be carried. Each message is routed independently from source to destination. The order of message sent can be different from the order received. •In connectionless the data is transferred in one direction from source to destination without checking that destination is still there or not or if it prepared to accept the message. Authentication is not needed in this. •Example of Connectionless service is UDP (User Datagram Protocol) protocol.
  • 21. Flooding •When node receives broadcast packet, sends copy to all neighbors. •Problems: cycles & broadcast storm •Controlled flooding: Node only broadcasts pkt if it hasn’t broadcast same packet before. •Node keeps track of packet ids already broadcasted. •or reverse path forwarding (RPF): only forward packet if it arrived on shortest path between node and source.
  • 22. Shortest Path Routing - Dijkstra's algorithm
  • 23.
  • 25.
  • 26.
  • 27.
  • 28.
  • 29.
  • 30.
  • 31.
  • 32.
  • 33.
  • 34. LINK STATE ROUTING ALGORITHM
  • 37. IP Address •IP (Internet Protocol) Address is an address of your network hardware. It helps in connecting your computer to other devices on your network and all over the world. •An IP Address is made up of numbers or characters. •An example of an IP address would be: 506.457.14.512 All devices that are connected to an internet connection have a unique IP address which means there’s a need of billions of IP addresses. This requirement is fulfilled by the new IP version IPv6.
  • 38. Classful Addressing •IPv4 addressing used the concept of classes. This architecture is known as classful addressing. •In the Classful addressing, there are 5 classes in which the address space is divided: A, B, C, D, and E. •Each class occupies some fraction of the address space. •We can find the class of an address when given the address in binary notation or dotted-decimal notation by checking the first few bits or first byte.
  • 40. Classful Addressing •The "class A addresses" are designed for large organizations to manage a large number of attached hosts or routers. •The "class B addresses" are designed for midsize organizations to manage tens of thousands of attached hosts or routers. •The "class C addresses" are designed for small organizations to manage a small number of attached hosts or routers.
  • 41. Classless Addressing •Classful addressing leads to address depletion. That's the big issue for this schema and that's why it's not used nowadays. •To overcome the problem of address depletion and to give more organizations access to the Internet, the classless addressing was designed and implemented. •In this scheme of classless addressing, there are no classes, but the addresses are still granted in blocks.
  • 42. Classless Addressing •In classless addressing, when an entity(organization or a single household (small organization) or whatever which uses the internet) needs to be connected to the Internet, it is granted a block (range) of addresses. •The size of the block (the number of addresses) varies based on the nature, size, and need of the entity. •For example, a household (small organization) may be given only two addresses; a large organization may be given thousands of addresses. •On the other hand. An ISP, as the Internet service provider, may be given hundreds of thousands based on the number of customers it may serve. •
  • 46. NAT: Network Address Translation
  • 47. DHCP: Dynamic Host Configuration Protocol
  • 49. ARP AND RARP EXAMPLE
  • 51. INTERNET PROTOCOL VERSION 4(IPV4) •IPv4 is the first network protocol to interconnect different networks regardless of the medium used. •Globally unique addressing scheme •Any two nodes can communicate directly
  • 52. ICMP: Internet Control Message Protocol
  • 56. RIP ( Routing Information Protocol)
  • 57.
  • 58.
  • 59.
  • 60.
  • 61.
  • 62.
  • 63.
  • 64.
  • 65.
  • 66.
  • 67. Techniques to Improve QoS •Scheduling •Packets from different flows arrive at a switch or router for processing. A good scheduling technique treats the different flows in a fair and appropriate manner. •Several scheduling techniques are designed to improve the quality of service. We discuss three of them here: FIFO queuing, priority queuing, and weighted fair queuing.
  • 68.
  • 69.
  • 70.
  • 71. Congestion Control techniques in Computer Networks
  • 72. Open Loop Congestion Control •Retransmission Policy : It is the policy in which retransmission of the packets are taken care. •Window Policy : The type of window at the sender side may also affect the congestion. •Discarding Policy : A good discarding policy adopted by the routers is that the routers may prevent congestion and at the same time partially discards the corrupted or less sensitive package and also able to maintain the quality of a message.
  • 73. Open Loop Congestion Control •Acknowledgment Policy : Since acknowledgement are also the part of the load in network, the acknowledgment policy imposed by the receiver may also affect congestion. Several approaches can be used to prevent congestion related to acknowledgment. •Admission Policy : In admission policy a mechanism should be used to prevent congestion. Switches in a flow should first check the resource requirement of a network flow before transmitting it further.