SlideShare a Scribd company logo
1 of 10
UNIMTECH
LECTURE 2: COMPUTER NETWORKS & SECURITY
HOST-TO-HOST COMMUNICATION
Outline
Network Communication:
-Physical Addressing (MAC)
-Logical Addressing (IP)
OSI Internetworking Model - Importance
TCP/IP Model
IP communication Types
-Unicast
-Multicast
-Broadcast:
-Anycast
Network Communication
Entails two addressing concepts:
Physical Addressing (MAC Addresses)
Logical Addressing: We shall focus on IPv4 at this level of the course.
ANATOMY OF A MAC ADDRESS
A MAC address is a 48-bit length address, normally expressed in hexadecimal. It is
physically burned into all network communication devices. Computers use MAC
addresses to communicate with each other on a network. It is divided into two parts:
The first 24-bits are referred to as Organisation Unique Identifier (OUI); whereas
the remainder 24 are the serialization of the MAC address by a specific vendor. Note
that in dissimilar networks involving end to end communication, the MAC address
always change between two points during the course of the communication process.
NB: Command to view MAC address on windows : ipconfig /all from the cmd
interface.
Logical Addressing – IP Addressing
Format:
It constitutes 4 dotted numbers/octets; ranging from 0 – 255:
Example: 10.0.1.3
An IP address is always combined with a subnet mask and typically with a
default gateway
Example
IP: 10.0.1.3
Mask: 255.255.255.0
Default Gateway: 10.0.1.1
The Subnet Mask informs which portions of the IP address represent the
‘network’ and ‘host’.
Command to view IP address configuration on windows : ipconfig from the cmd
interface.
Demonstration of The Two Address Concepts in
Networks
Whilst IP addresses uniquely identify nodes on a network, they
exclusively communicate/speak to each other through their MAC
addresses!
Hypothetical Networks: 10.0.1.0, 10.0.2.0, 10.0.3.0, 10.0.4.0, 10.0.5.0-
255.255.255.0
Practically explained using the scenarios of:
i) copying a zipped file on a local network between a PC and a
server
ii) copying a zipped file from a PC to a server in a different
network
OSI Internetworking Model - Importance
The OSI model is a conceptual framework that depicts end-to-end
communication between end points. As a standardized architecture,
it defines network communication.
It provides a system to breakdown network communication
A standard for manufacturing equipment
Allows vendors to focus on specific areas of network
Mnemonic: ‘All People Seem To Need Data Processing’
‘Please Do Not Throw Sausage Pizza Away’
Understanding The Layers of The OSI Model
Application Layer
Provides an interface for applications to communicate across the network
Provides network access to network aware applications like web browsers.
Presentation Layer
It ‘generifies’ the data: That is formatting the data in such a way it is
understandable by the other end of the communication e.g. http, jpeg, etc.
It executes encryption functions as well.
Session Layer
Starts and ends sessions
Logically keeps sessions separate
N.B: It is worth noting that the top three layers, as discussed above, occurs
within the operating system of the node and of course least important to a
network engineer. The bottom four layers, discussed next, are the most
important as the job of a network engineer are defined in these four layers
Understanding the OSI Layers Cont’d.
Transport Layer
 It dictate how the data is sent by using the two protocols of TCP and UDP. These two respectively send data reliably or unreliably.
Programs, like VoIP, that run real-time typically choose unreliable communication.
 It defines ‘well known’ services (port numbers) by designating specific functions that run on a server or workstation.
In summary, it entails a choice between protocols (TCP/UDP) and Port Numbers
Network
 It provides ‘logical addressing’, popularly known as IP addressing
 It determines the best path to a destination by means of routing tables.
Data Link Layer
 It provides ‘physical addressing’ or ‘MAC addressing’. It’s physical because it’s burned into the NIC of the computing device
 It ensures that the data is ‘error-free’. As data traverses the network, this layer puts a check on it known as FCS to ensure that it
remains the same at the other end.
Physical Layer
Provides physical access to the cable
It combines all the ‘glossy’ applications and features into electrical signals of 0s and 1s.
TCP/IP (DoD) MODEL
The OSI Model describes how network communication occurs whilst the TCP/IP is how it is done!
IP Communication Types
Unicast : One-to-one communication between two hosts. It’s the most
predominant type of IP communication on a network. E.g. Preconfigured IP
Phone communication to a call manager on a network
Multicast: One to many communication where a single message is sent out
to a group. E.g. Music on hold in IP Teletphony, Using imaging software for
faster installation, etc
Broadcast: One to all. e.g DHCP, ARP
Anycast: One to closest. An IPv6 technology that has been adapted in IPv4
to allow having two or more servers having the same address in distant
locations over the Internet order to facilitate for clients to access the closest
resource. The routing of which is done to achieve better network latency
and minimise delays in network communication when a client requests the
resource.

More Related Content

Similar to Lecture 2 - Host to host communication.pptx

IMD 251 - Networking
IMD 251 - NetworkingIMD 251 - Networking
IMD 251 - Networkingisma ishak
 
Class_notes_InternetTechnology
Class_notes_InternetTechnologyClass_notes_InternetTechnology
Class_notes_InternetTechnologyGulrez Khan
 
Computer networking (nnm)
Computer networking (nnm)Computer networking (nnm)
Computer networking (nnm)nnmaurya
 
OSI model (7 LAYER )
OSI model (7 LAYER )OSI model (7 LAYER )
OSI model (7 LAYER )AAKASH S
 
Unit 1 network models & typical examples(part a)
Unit 1 network models & typical examples(part a)Unit 1 network models & typical examples(part a)
Unit 1 network models & typical examples(part a)Vishal kakade
 
pppppppppppppppppjjjjjjjjjjjpppppppp.pptx
pppppppppppppppppjjjjjjjjjjjpppppppp.pptxpppppppppppppppppjjjjjjjjjjjpppppppp.pptx
pppppppppppppppppjjjjjjjjjjjpppppppp.pptxzeyadosama505
 
layering.pdf
layering.pdflayering.pdf
layering.pdfBoostHub
 
computer network and chapter 7 OSI layers.pptx
computer network and chapter 7 OSI layers.pptxcomputer network and chapter 7 OSI layers.pptx
computer network and chapter 7 OSI layers.pptxgadisaAdamu
 
CSC1202_3_The_OSI_Reference_Model_-_V2.pptx
CSC1202_3_The_OSI_Reference_Model_-_V2.pptxCSC1202_3_The_OSI_Reference_Model_-_V2.pptx
CSC1202_3_The_OSI_Reference_Model_-_V2.pptxMuhammad Sohail
 
CSC1202_3_The_OSI_Reference_Model_-_V2.pdf
CSC1202_3_The_OSI_Reference_Model_-_V2.pdfCSC1202_3_The_OSI_Reference_Model_-_V2.pdf
CSC1202_3_The_OSI_Reference_Model_-_V2.pdfBoostHub
 
CN unit 1 part 2 2023.ppt
CN unit 1 part 2 2023.pptCN unit 1 part 2 2023.ppt
CN unit 1 part 2 2023.pptmohanravi1986
 
Summary networking
Summary networkingSummary networking
Summary networkingmugavanest01
 
Lecture 1 networking & internetworking
Lecture 1 networking & internetworkingLecture 1 networking & internetworking
Lecture 1 networking & internetworkingMd. Mashiur Rahman
 
Concept of networking
Concept of networkingConcept of networking
Concept of networkingsumit dimri
 

Similar to Lecture 2 - Host to host communication.pptx (20)

IMD 251 - Networking
IMD 251 - NetworkingIMD 251 - Networking
IMD 251 - Networking
 
Class_notes_InternetTechnology
Class_notes_InternetTechnologyClass_notes_InternetTechnology
Class_notes_InternetTechnology
 
Cisco doc
Cisco docCisco doc
Cisco doc
 
Computer networking (nnm)
Computer networking (nnm)Computer networking (nnm)
Computer networking (nnm)
 
ELEC2 - Lecture 1
ELEC2 - Lecture 1ELEC2 - Lecture 1
ELEC2 - Lecture 1
 
OSI model (7 LAYER )
OSI model (7 LAYER )OSI model (7 LAYER )
OSI model (7 LAYER )
 
Unit 1 network models & typical examples(part a)
Unit 1 network models & typical examples(part a)Unit 1 network models & typical examples(part a)
Unit 1 network models & typical examples(part a)
 
1834902097 class note 3
1834902097 class note 31834902097 class note 3
1834902097 class note 3
 
chapter 4.pptx
chapter 4.pptxchapter 4.pptx
chapter 4.pptx
 
pppppppppppppppppjjjjjjjjjjjpppppppp.pptx
pppppppppppppppppjjjjjjjjjjjpppppppp.pptxpppppppppppppppppjjjjjjjjjjjpppppppp.pptx
pppppppppppppppppjjjjjjjjjjjpppppppp.pptx
 
layering.pdf
layering.pdflayering.pdf
layering.pdf
 
computer network and chapter 7 OSI layers.pptx
computer network and chapter 7 OSI layers.pptxcomputer network and chapter 7 OSI layers.pptx
computer network and chapter 7 OSI layers.pptx
 
Ccna notes
Ccna notesCcna notes
Ccna notes
 
CSC1202_3_The_OSI_Reference_Model_-_V2.pptx
CSC1202_3_The_OSI_Reference_Model_-_V2.pptxCSC1202_3_The_OSI_Reference_Model_-_V2.pptx
CSC1202_3_The_OSI_Reference_Model_-_V2.pptx
 
CSC1202_3_The_OSI_Reference_Model_-_V2.pdf
CSC1202_3_The_OSI_Reference_Model_-_V2.pdfCSC1202_3_The_OSI_Reference_Model_-_V2.pdf
CSC1202_3_The_OSI_Reference_Model_-_V2.pdf
 
Protocols
ProtocolsProtocols
Protocols
 
CN unit 1 part 2 2023.ppt
CN unit 1 part 2 2023.pptCN unit 1 part 2 2023.ppt
CN unit 1 part 2 2023.ppt
 
Summary networking
Summary networkingSummary networking
Summary networking
 
Lecture 1 networking & internetworking
Lecture 1 networking & internetworkingLecture 1 networking & internetworking
Lecture 1 networking & internetworking
 
Concept of networking
Concept of networkingConcept of networking
Concept of networking
 

Recently uploaded

Biography Of Angeliki Cooney | Senior Vice President Life Sciences | Albany, ...
Biography Of Angeliki Cooney | Senior Vice President Life Sciences | Albany, ...Biography Of Angeliki Cooney | Senior Vice President Life Sciences | Albany, ...
Biography Of Angeliki Cooney | Senior Vice President Life Sciences | Albany, ...Angeliki Cooney
 
presentation ICT roal in 21st century education
presentation ICT roal in 21st century educationpresentation ICT roal in 21st century education
presentation ICT roal in 21st century educationjfdjdjcjdnsjd
 
Apidays New York 2024 - The Good, the Bad and the Governed by David O'Neill, ...
Apidays New York 2024 - The Good, the Bad and the Governed by David O'Neill, ...Apidays New York 2024 - The Good, the Bad and the Governed by David O'Neill, ...
Apidays New York 2024 - The Good, the Bad and the Governed by David O'Neill, ...apidays
 
Corporate and higher education May webinar.pptx
Corporate and higher education May webinar.pptxCorporate and higher education May webinar.pptx
Corporate and higher education May webinar.pptxRustici Software
 
Vector Search -An Introduction in Oracle Database 23ai.pptx
Vector Search -An Introduction in Oracle Database 23ai.pptxVector Search -An Introduction in Oracle Database 23ai.pptx
Vector Search -An Introduction in Oracle Database 23ai.pptxRemote DBA Services
 
TrustArc Webinar - Unlock the Power of AI-Driven Data Discovery
TrustArc Webinar - Unlock the Power of AI-Driven Data DiscoveryTrustArc Webinar - Unlock the Power of AI-Driven Data Discovery
TrustArc Webinar - Unlock the Power of AI-Driven Data DiscoveryTrustArc
 
Rising Above_ Dubai Floods and the Fortitude of Dubai International Airport.pdf
Rising Above_ Dubai Floods and the Fortitude of Dubai International Airport.pdfRising Above_ Dubai Floods and the Fortitude of Dubai International Airport.pdf
Rising Above_ Dubai Floods and the Fortitude of Dubai International Airport.pdfOrbitshub
 
Six Myths about Ontologies: The Basics of Formal Ontology
Six Myths about Ontologies: The Basics of Formal OntologySix Myths about Ontologies: The Basics of Formal Ontology
Six Myths about Ontologies: The Basics of Formal Ontologyjohnbeverley2021
 
EMPOWERMENT TECHNOLOGY GRADE 11 QUARTER 2 REVIEWER
EMPOWERMENT TECHNOLOGY GRADE 11 QUARTER 2 REVIEWEREMPOWERMENT TECHNOLOGY GRADE 11 QUARTER 2 REVIEWER
EMPOWERMENT TECHNOLOGY GRADE 11 QUARTER 2 REVIEWERMadyBayot
 
Apidays New York 2024 - Scaling API-first by Ian Reasor and Radu Cotescu, Adobe
Apidays New York 2024 - Scaling API-first by Ian Reasor and Radu Cotescu, AdobeApidays New York 2024 - Scaling API-first by Ian Reasor and Radu Cotescu, Adobe
Apidays New York 2024 - Scaling API-first by Ian Reasor and Radu Cotescu, Adobeapidays
 
CNIC Information System with Pakdata Cf In Pakistan
CNIC Information System with Pakdata Cf In PakistanCNIC Information System with Pakdata Cf In Pakistan
CNIC Information System with Pakdata Cf In Pakistandanishmna97
 
Elevate Developer Efficiency & build GenAI Application with Amazon Q​
Elevate Developer Efficiency & build GenAI Application with Amazon Q​Elevate Developer Efficiency & build GenAI Application with Amazon Q​
Elevate Developer Efficiency & build GenAI Application with Amazon Q​Bhuvaneswari Subramani
 
Web Form Automation for Bonterra Impact Management (fka Social Solutions Apri...
Web Form Automation for Bonterra Impact Management (fka Social Solutions Apri...Web Form Automation for Bonterra Impact Management (fka Social Solutions Apri...
Web Form Automation for Bonterra Impact Management (fka Social Solutions Apri...Jeffrey Haguewood
 
WSO2's API Vision: Unifying Control, Empowering Developers
WSO2's API Vision: Unifying Control, Empowering DevelopersWSO2's API Vision: Unifying Control, Empowering Developers
WSO2's API Vision: Unifying Control, Empowering DevelopersWSO2
 
Navigating the Deluge_ Dubai Floods and the Resilience of Dubai International...
Navigating the Deluge_ Dubai Floods and the Resilience of Dubai International...Navigating the Deluge_ Dubai Floods and the Resilience of Dubai International...
Navigating the Deluge_ Dubai Floods and the Resilience of Dubai International...Orbitshub
 
Finding Java's Hidden Performance Traps @ DevoxxUK 2024
Finding Java's Hidden Performance Traps @ DevoxxUK 2024Finding Java's Hidden Performance Traps @ DevoxxUK 2024
Finding Java's Hidden Performance Traps @ DevoxxUK 2024Victor Rentea
 
FWD Group - Insurer Innovation Award 2024
FWD Group - Insurer Innovation Award 2024FWD Group - Insurer Innovation Award 2024
FWD Group - Insurer Innovation Award 2024The Digital Insurer
 
Apidays New York 2024 - Passkeys: Developing APIs to enable passwordless auth...
Apidays New York 2024 - Passkeys: Developing APIs to enable passwordless auth...Apidays New York 2024 - Passkeys: Developing APIs to enable passwordless auth...
Apidays New York 2024 - Passkeys: Developing APIs to enable passwordless auth...apidays
 
ICT role in 21st century education and its challenges
ICT role in 21st century education and its challengesICT role in 21st century education and its challenges
ICT role in 21st century education and its challengesrafiqahmad00786416
 
Polkadot JAM Slides - Token2049 - By Dr. Gavin Wood
Polkadot JAM Slides - Token2049 - By Dr. Gavin WoodPolkadot JAM Slides - Token2049 - By Dr. Gavin Wood
Polkadot JAM Slides - Token2049 - By Dr. Gavin WoodJuan lago vázquez
 

Recently uploaded (20)

Biography Of Angeliki Cooney | Senior Vice President Life Sciences | Albany, ...
Biography Of Angeliki Cooney | Senior Vice President Life Sciences | Albany, ...Biography Of Angeliki Cooney | Senior Vice President Life Sciences | Albany, ...
Biography Of Angeliki Cooney | Senior Vice President Life Sciences | Albany, ...
 
presentation ICT roal in 21st century education
presentation ICT roal in 21st century educationpresentation ICT roal in 21st century education
presentation ICT roal in 21st century education
 
Apidays New York 2024 - The Good, the Bad and the Governed by David O'Neill, ...
Apidays New York 2024 - The Good, the Bad and the Governed by David O'Neill, ...Apidays New York 2024 - The Good, the Bad and the Governed by David O'Neill, ...
Apidays New York 2024 - The Good, the Bad and the Governed by David O'Neill, ...
 
Corporate and higher education May webinar.pptx
Corporate and higher education May webinar.pptxCorporate and higher education May webinar.pptx
Corporate and higher education May webinar.pptx
 
Vector Search -An Introduction in Oracle Database 23ai.pptx
Vector Search -An Introduction in Oracle Database 23ai.pptxVector Search -An Introduction in Oracle Database 23ai.pptx
Vector Search -An Introduction in Oracle Database 23ai.pptx
 
TrustArc Webinar - Unlock the Power of AI-Driven Data Discovery
TrustArc Webinar - Unlock the Power of AI-Driven Data DiscoveryTrustArc Webinar - Unlock the Power of AI-Driven Data Discovery
TrustArc Webinar - Unlock the Power of AI-Driven Data Discovery
 
Rising Above_ Dubai Floods and the Fortitude of Dubai International Airport.pdf
Rising Above_ Dubai Floods and the Fortitude of Dubai International Airport.pdfRising Above_ Dubai Floods and the Fortitude of Dubai International Airport.pdf
Rising Above_ Dubai Floods and the Fortitude of Dubai International Airport.pdf
 
Six Myths about Ontologies: The Basics of Formal Ontology
Six Myths about Ontologies: The Basics of Formal OntologySix Myths about Ontologies: The Basics of Formal Ontology
Six Myths about Ontologies: The Basics of Formal Ontology
 
EMPOWERMENT TECHNOLOGY GRADE 11 QUARTER 2 REVIEWER
EMPOWERMENT TECHNOLOGY GRADE 11 QUARTER 2 REVIEWEREMPOWERMENT TECHNOLOGY GRADE 11 QUARTER 2 REVIEWER
EMPOWERMENT TECHNOLOGY GRADE 11 QUARTER 2 REVIEWER
 
Apidays New York 2024 - Scaling API-first by Ian Reasor and Radu Cotescu, Adobe
Apidays New York 2024 - Scaling API-first by Ian Reasor and Radu Cotescu, AdobeApidays New York 2024 - Scaling API-first by Ian Reasor and Radu Cotescu, Adobe
Apidays New York 2024 - Scaling API-first by Ian Reasor and Radu Cotescu, Adobe
 
CNIC Information System with Pakdata Cf In Pakistan
CNIC Information System with Pakdata Cf In PakistanCNIC Information System with Pakdata Cf In Pakistan
CNIC Information System with Pakdata Cf In Pakistan
 
Elevate Developer Efficiency & build GenAI Application with Amazon Q​
Elevate Developer Efficiency & build GenAI Application with Amazon Q​Elevate Developer Efficiency & build GenAI Application with Amazon Q​
Elevate Developer Efficiency & build GenAI Application with Amazon Q​
 
Web Form Automation for Bonterra Impact Management (fka Social Solutions Apri...
Web Form Automation for Bonterra Impact Management (fka Social Solutions Apri...Web Form Automation for Bonterra Impact Management (fka Social Solutions Apri...
Web Form Automation for Bonterra Impact Management (fka Social Solutions Apri...
 
WSO2's API Vision: Unifying Control, Empowering Developers
WSO2's API Vision: Unifying Control, Empowering DevelopersWSO2's API Vision: Unifying Control, Empowering Developers
WSO2's API Vision: Unifying Control, Empowering Developers
 
Navigating the Deluge_ Dubai Floods and the Resilience of Dubai International...
Navigating the Deluge_ Dubai Floods and the Resilience of Dubai International...Navigating the Deluge_ Dubai Floods and the Resilience of Dubai International...
Navigating the Deluge_ Dubai Floods and the Resilience of Dubai International...
 
Finding Java's Hidden Performance Traps @ DevoxxUK 2024
Finding Java's Hidden Performance Traps @ DevoxxUK 2024Finding Java's Hidden Performance Traps @ DevoxxUK 2024
Finding Java's Hidden Performance Traps @ DevoxxUK 2024
 
FWD Group - Insurer Innovation Award 2024
FWD Group - Insurer Innovation Award 2024FWD Group - Insurer Innovation Award 2024
FWD Group - Insurer Innovation Award 2024
 
Apidays New York 2024 - Passkeys: Developing APIs to enable passwordless auth...
Apidays New York 2024 - Passkeys: Developing APIs to enable passwordless auth...Apidays New York 2024 - Passkeys: Developing APIs to enable passwordless auth...
Apidays New York 2024 - Passkeys: Developing APIs to enable passwordless auth...
 
ICT role in 21st century education and its challenges
ICT role in 21st century education and its challengesICT role in 21st century education and its challenges
ICT role in 21st century education and its challenges
 
Polkadot JAM Slides - Token2049 - By Dr. Gavin Wood
Polkadot JAM Slides - Token2049 - By Dr. Gavin WoodPolkadot JAM Slides - Token2049 - By Dr. Gavin Wood
Polkadot JAM Slides - Token2049 - By Dr. Gavin Wood
 

Lecture 2 - Host to host communication.pptx

  • 1. UNIMTECH LECTURE 2: COMPUTER NETWORKS & SECURITY HOST-TO-HOST COMMUNICATION
  • 2. Outline Network Communication: -Physical Addressing (MAC) -Logical Addressing (IP) OSI Internetworking Model - Importance TCP/IP Model IP communication Types -Unicast -Multicast -Broadcast: -Anycast
  • 3. Network Communication Entails two addressing concepts: Physical Addressing (MAC Addresses) Logical Addressing: We shall focus on IPv4 at this level of the course. ANATOMY OF A MAC ADDRESS A MAC address is a 48-bit length address, normally expressed in hexadecimal. It is physically burned into all network communication devices. Computers use MAC addresses to communicate with each other on a network. It is divided into two parts: The first 24-bits are referred to as Organisation Unique Identifier (OUI); whereas the remainder 24 are the serialization of the MAC address by a specific vendor. Note that in dissimilar networks involving end to end communication, the MAC address always change between two points during the course of the communication process. NB: Command to view MAC address on windows : ipconfig /all from the cmd interface.
  • 4. Logical Addressing – IP Addressing Format: It constitutes 4 dotted numbers/octets; ranging from 0 – 255: Example: 10.0.1.3 An IP address is always combined with a subnet mask and typically with a default gateway Example IP: 10.0.1.3 Mask: 255.255.255.0 Default Gateway: 10.0.1.1 The Subnet Mask informs which portions of the IP address represent the ‘network’ and ‘host’. Command to view IP address configuration on windows : ipconfig from the cmd interface.
  • 5. Demonstration of The Two Address Concepts in Networks Whilst IP addresses uniquely identify nodes on a network, they exclusively communicate/speak to each other through their MAC addresses! Hypothetical Networks: 10.0.1.0, 10.0.2.0, 10.0.3.0, 10.0.4.0, 10.0.5.0- 255.255.255.0 Practically explained using the scenarios of: i) copying a zipped file on a local network between a PC and a server ii) copying a zipped file from a PC to a server in a different network
  • 6. OSI Internetworking Model - Importance The OSI model is a conceptual framework that depicts end-to-end communication between end points. As a standardized architecture, it defines network communication. It provides a system to breakdown network communication A standard for manufacturing equipment Allows vendors to focus on specific areas of network Mnemonic: ‘All People Seem To Need Data Processing’ ‘Please Do Not Throw Sausage Pizza Away’
  • 7. Understanding The Layers of The OSI Model Application Layer Provides an interface for applications to communicate across the network Provides network access to network aware applications like web browsers. Presentation Layer It ‘generifies’ the data: That is formatting the data in such a way it is understandable by the other end of the communication e.g. http, jpeg, etc. It executes encryption functions as well. Session Layer Starts and ends sessions Logically keeps sessions separate N.B: It is worth noting that the top three layers, as discussed above, occurs within the operating system of the node and of course least important to a network engineer. The bottom four layers, discussed next, are the most important as the job of a network engineer are defined in these four layers
  • 8. Understanding the OSI Layers Cont’d. Transport Layer  It dictate how the data is sent by using the two protocols of TCP and UDP. These two respectively send data reliably or unreliably. Programs, like VoIP, that run real-time typically choose unreliable communication.  It defines ‘well known’ services (port numbers) by designating specific functions that run on a server or workstation. In summary, it entails a choice between protocols (TCP/UDP) and Port Numbers Network  It provides ‘logical addressing’, popularly known as IP addressing  It determines the best path to a destination by means of routing tables. Data Link Layer  It provides ‘physical addressing’ or ‘MAC addressing’. It’s physical because it’s burned into the NIC of the computing device  It ensures that the data is ‘error-free’. As data traverses the network, this layer puts a check on it known as FCS to ensure that it remains the same at the other end. Physical Layer Provides physical access to the cable It combines all the ‘glossy’ applications and features into electrical signals of 0s and 1s.
  • 9. TCP/IP (DoD) MODEL The OSI Model describes how network communication occurs whilst the TCP/IP is how it is done!
  • 10. IP Communication Types Unicast : One-to-one communication between two hosts. It’s the most predominant type of IP communication on a network. E.g. Preconfigured IP Phone communication to a call manager on a network Multicast: One to many communication where a single message is sent out to a group. E.g. Music on hold in IP Teletphony, Using imaging software for faster installation, etc Broadcast: One to all. e.g DHCP, ARP Anycast: One to closest. An IPv6 technology that has been adapted in IPv4 to allow having two or more servers having the same address in distant locations over the Internet order to facilitate for clients to access the closest resource. The routing of which is done to achieve better network latency and minimise delays in network communication when a client requests the resource.