The document discusses several topics related to computer network models and protocols. It describes the OSI model which consists of seven layers and was developed by ISO to ensure worldwide data communication. It also discusses the TCP/IP model. The network layer is described in detail, covering functions like routing packets between networks and logical to physical address translation. Store-and-forward packet switching is explained. The transport layer provides services like port addressing, segmentation and reassembly, and connection-oriented and connectionless transmission. IP addressing schemes like classful and classless are summarized. Network protocols such as ARP, DHCP, ICMP, and RIP are also mentioned briefly.
Heart Disease Prediction using machine learning.pptx
Network layer
1. Computer Network Models
•There are many users who use computer network
and are located all over the world.
•To ensure national and worldwide data
communication ISO (ISO stands for International
Organization of Standardization.) developed this
model. This is called a model for open system
interconnection (OSI) and is normally called as OSI
model.
•OSI model architecture consists of seven layers. It
defines seven layers or levels in a complete
communication system.
3. TCP/IP Reference Model
•There are many users who use computer network
and are located all over the world.
•To ensure national and worldwide data
communication ISO (ISO stands for International
Organization of Standardization.) developed this
model. This is called a model for open system
interconnection (OSI) and is normally called as OSI
model.
•OSI model architecture consists of seven layers. It
defines seven layers or levels in a complete
communication system.
6. Network Layer - OSI Model
•The network Layer controls the operation of the
subnet. The main aim of this layer is to deliver
packets from source to destination across multiple
links (networks).
•If two computers (system) are connected on the
same link, then there is no need for a network layer.
It routes the signal through different channels to the
other end and acts as a network controller.
•It also divides the outgoing messages into packets
and to assemble incoming packets into messages
for higher levels.
8. Functions of Network Layer
•It translates logical network address into physical
address. Concerned with circuit, message or packet
switching.
•Routers and gateways operate in the network layer.
Mechanism is provided by Network Layer for routing
the packets to final destination.
•Connection services are provided including network
layer flow control, network layer error control and
packet sequence control.
•Breaks larger packets into small packets.
9. Store-and-Forward Packet
Switching
•All PSDNs, WANs and FR operate in “store and
forward” mode:- Packet stored at a node and
transmitted to next node. - Next node receives it
completely in a buffer. - Routing decision selects
outgoing link to “forward” it toward its final
destination. - Steps above repeated until packet fully
received at destination node.
•FR node involves much less processing per frame
than PSDN node but still operates in store and
forward mode. Note: FR=FrameRelay!
10.
11. Store and Forward Timing
•Timing diagram for simple store and forward:
Minimum times required to transfer a single packet
from Node 1 to Node 4 in the absence of errors and
with no waiting at the node for frames from other
sources.
•Transmission delay of a packet: - TransP = Length
of packet (bits) / (Link transmission rate (bits/ s)) -
Different links may have different transmission rates.
•Propagation delay depends only on length of link.
12.
13. Effects of Packet Size
•Above figure shows file transfer from Station X to
Station Y through intermediate store-and-forward
nodes a and b.
•Effect of length of packets on file transfer delay:-
Segmentation into smaller packets shortens delay
up to a point by reducing the store and forward
delay at each node.
•But cause extra overhead in packet headers and in
processing requirements at nodes which may
increase processing delays .
14. Services provided by the Transport
Layer
•Service Point Addressing: Transport Layer header
includes service point address which is port
address. This layer gets the message to the correct
process on the computer unlike Network Layer,
which gets each packet to the correct computer.
•Segmentation and Reassembling: A message is
divided into segments; each segment contains
sequence number, which enables this layer in
reassembling the message. Message is
reassembled correctly upon arrival at the destination
and replaces packets which were lost in
transmission.
15.
16. Services provided by the Transport
Layer
•Connection Control: It includes 2 types:
•Connectionless Transport Layer : Each segment
is considered as an independent packet and
delivered to the transport layer at the destination
machine.
•Connection Oriented Transport Layer : Before
delivering packets, connection is made with
transport layer at the destination machine.
•Flow Control: In this layer, flow control is
performed end to end.
•Error Control: Error Control is performed end to
end in this layer to ensure that the complete
message arrives at the receiving transport layer
without any error. Error Correction is done through
17. Connection Oriented Services
•There is a sequence of operation to be followed by
the users of connection oriented service. These are:
Connection is established.
Information is sent.
Connection is released.
•In connection oriented service we have to establish
a connection before starting the communication.
•Connection oriented service is more reliable than
connectionless service.
•Example of connection oriented is TCP
(Transmission Control Protocol) protocol.
•FIG. NEXT SLIDE
18.
19. Connection Less Services
•It is similar to the postal services, as it carries the
full address where the message (letter) is to be
carried. Each message is routed independently from
source to destination. The order of message sent
can be different from the order received.
•In connectionless the data is transferred in one
direction from source to destination without checking
that destination is still there or not or if it prepared to
accept the message. Authentication is not needed in
this.
•Example of Connectionless service is UDP
(User Datagram Protocol) protocol.
21. Flooding
•When node receives broadcast packet, sends copy to
all neighbors.
•Problems: cycles & broadcast storm
•Controlled flooding: Node only broadcasts pkt if it
hasn’t broadcast same packet before.
•Node keeps track of packet ids already broadcasted.
•or reverse path forwarding (RPF): only forward packet
if it arrived on shortest path between node and source.
37. IP Address
•IP (Internet Protocol) Address is an address of your
network hardware. It helps in connecting your computer
to other devices on your network and all over the world.
•An IP Address is made up of numbers or characters.
•An example of an IP address would be: 506.457.14.512
All devices that are connected to an internet connection
have a unique IP address which means there’s a need of
billions of IP addresses. This requirement is fulfilled by
the new IP version IPv6.
38. Classful Addressing
•IPv4 addressing used the concept of classes. This
architecture is known as classful addressing.
•In the Classful addressing, there are 5 classes in which
the address space is divided: A, B, C, D, and E.
•Each class occupies some fraction of the address
space.
•We can find the class of an address when given the
address in binary notation or dotted-decimal notation by
checking the first few bits or first byte.
40. Classful Addressing
•The "class A addresses" are designed for large
organizations to manage a large number of attached
hosts or routers.
•The "class B addresses" are designed for midsize
organizations to manage tens of thousands of attached
hosts or routers.
•The "class C addresses" are designed for small
organizations to manage a small number of attached
hosts or routers.
41. Classless Addressing
•Classful addressing leads to address depletion. That's
the big issue for this schema and that's why it's not used
nowadays.
•To overcome the problem of address depletion and to
give more organizations access to the Internet, the
classless addressing was designed and implemented.
•In this scheme of classless addressing, there are no
classes, but the addresses are still granted in blocks.
42. Classless Addressing
•In classless addressing, when an entity(organization or a
single household (small organization) or whatever which uses
the internet) needs to be connected to the Internet, it is
granted a block (range) of addresses.
•The size of the block (the number of addresses) varies based
on the nature, size, and need of the entity.
•For example, a household (small organization) may be given
only two addresses; a large organization may be given
thousands of addresses.
•On the other hand. An ISP, as the Internet service provider,
may be given hundreds of thousands based on the number of
customers it may serve.
•
51. INTERNET PROTOCOL VERSION
4(IPV4)
•IPv4 is the first network protocol to
interconnect different networks
regardless of the medium used.
•Globally unique addressing scheme
•Any two nodes can communicate
directly
67. Techniques to Improve QoS
•Scheduling
•Packets from different flows arrive at a switch or router
for processing. A good scheduling technique treats the
different flows in a fair and appropriate manner.
•Several scheduling techniques are designed to improve
the quality of service. We discuss three of them here:
FIFO queuing, priority queuing, and weighted fair
queuing.
72. Open Loop Congestion Control
•Retransmission Policy :
It is the policy in which retransmission of the packets are
taken care.
•Window Policy :
The type of window at the sender side may also affect
the congestion.
•Discarding Policy :
A good discarding policy adopted by the routers is that
the routers may prevent congestion and at the same time
partially discards the corrupted or less sensitive package
and also able to maintain the quality of a message.
73. Open Loop Congestion Control
•Acknowledgment Policy :
Since acknowledgement are also the part of the load in
network, the acknowledgment policy imposed by the
receiver may also affect congestion. Several approaches
can be used to prevent congestion related to
acknowledgment.
•Admission Policy :
In admission policy a mechanism should be used to
prevent congestion. Switches in a flow should first check
the resource requirement of a network flow before
transmitting it further.