SlideShare a Scribd company logo
1 of 14
Download to read offline
Page 1 of 14
Spring 2021
Class Note
Prosanta Mazumder
ID: 1925102502
CSE 313 Data Communication
17/05/2021
INDEX OF CONTENT
1. What is Data Communication?
2. What is a network?
3. What is Node?
4. What is network interface card (NIC)?
5. Types of Computer Networks
6. What is a MAC Address?
7. What Types of Addressing?
8. What is a port?
9. What are the different port numbers?
10.What is Hub?
11.What is Router?
12.What is a Bridge?
13.What is Gateway?
14.What is Brouter?
15.What is OSI Model?
16.What is OSI model (Open Systems Interconnection)?
17.7 layers of the OSI model?
18.What Is the TCP/IP Model?
19.What Is the TCP/IP Model?
20.Classification of IP address Addressing?
Page 2 of 14
What is Data Communication?
Data communications means the exchange of data between two devices via some form of
transmission medium such as a wire cable.
What is a network?
In information technology, a network is defined as the connection of at least two computer systems,
either by a cable or a wireless connection. The simplest network is a combination of two computers
connected by a cable. This type of network is called a peer-to-peer network. There is no hierarchy
in this network; both participants have equal privileges. Each computer has access to the data of
the other device and can share resources such as disk space, applications or peripheral devices
(printers, etc.).
What is Node?
Any system or device connected to a network is also called a node. For example, if a network
connects a file server, five computers, and two printers, there are eight nodes on the network. Each
device on the network has a network address, such as a MAC address, which uniquely identifies
each device. This helps keep track of where data is being transferred to and from on the network.
A node can also refer to a leaf, which is a folder or file on your hard disk. In physics, a node, or
nodal point, is a point of minimum displacement or where multiple waves converge, creating a net
amplitude of zero.
What is network interface card (NIC)?
Network interface card (NIC) is a hardware component, typically a circuit board or chip.
It is used to connect different networking devices such as computers and servers to share data over
the connected network. It provides functionality such as support for I/O interrupt, Direct Memory
Access (DMA) interfaces, partitioning, and data transmission.
NIC is important for us to establish a wired or wireless connection over the network.
Network Interface Card is also known as Network Interface Controller, Network Adapter, Ethernet
card, Connection card, and LAN (Local Area Network) Adapter.
Page 3 of 14
1. Personal Area Network (PAN)
The smallest and most basic type of network, a PAN is made up of a wireless modem, a computer
or two, phones, printers, tablets, etc., and revolves around one person in one building. These types
of networks are typically found in small offices or residences, and are managed by one person or
organization from a single device.
2. Local Area Network (LAN)
We’re confident that you’ve heard of these types of networks before – LANs are the most
frequently discussed networks, one of the most common, one of the most original and one of the
simplest types of networks. LANs connect groups of computers and low-voltage devices together
across short distances (within a building or between a group of two or three buildings in close
proximity to each other) to share information and resources. Enterprises typically manage and
maintain LANs.
3. Wireless Local Area Network (WLAN)
Functioning like a LAN, WLANs make use of wireless network technologies, such as WiFi.
Typically seen in the same types of applications as LANs, these types of networks don’t require
that devices rely on physical cables to connect to the network.
4. Campus Area Network (CAN)
Larger than LANs, but smaller than metropolitan area networks (MANs, explained below), these
types of networks are typically seen in universities, large K-12 school districts or small businesses.
They can be spread across several buildings that are fairly close to each other so users can share
resources.
5. Metropolitan Area Network (MAN)
These types of networks are larger than LANs but smaller than WANs – and incorporate elements
from both types of networks. MANs span an entire geographic area (typically a town or city, but
sometimes a campus). Ownership and maintenance is handled by either a single person or company
(a local council, a large company, etc.).
Page 4 of 14
6. Wide Area Network (WAN)
Slightly more complex than a LAN, a WAN connects computers together across longer physical
distances. This allows computers and low-voltage devices to be remotely connected to each other
over one large network to communicate even when they’re miles apart.
The Internet is the most basic example of a WAN, connecting all computers together around the
world. Because of a WAN’s vast reach, it is typically owned and maintained by multiple
administrators or the public.
7. Storage-Area Network (SAN)
As a dedicated high-speed network that connects shared pools of storage devices to several servers,
these types of networks don’t rely on a LAN or WAN. Instead, they move storage resources away
from the network and place them into their own high-performance network. SANs can be accessed
in the same fashion as a drive attached to a server. Types of storage-area networks include
converged, virtual and unified SANs.
8. System-Area Network (also known as SAN)
This term is fairly new within the past two decades. It is used to explain a relatively local network
that is designed to provide high-speed connection in server-to-server applications (cluster
environments), storage area networks (called “SANs” as well) and processor-to-processor
applications. The computers connected on a SAN operate as a single system at very high speeds.
9. Passive Optical Local Area Network (POLAN)
As an alternative to traditional switch-based Ethernet LANs, POLAN technology can be integrated
into structured cabling to overcome concerns about supporting traditional Ethernet protocols and
network applications such as PoE (Power over Ethernet). A point-to-multipoint LAN architecture,
POLAN uses optical splitters to split an optical signal from one strand of single mode optical fiber
into multiple signals to serve users and devices.
10. Enterprise Private Network (EPN)
These types of networks are built and owned by businesses that want to securely connect its various
locations to share computer resources.
Page 5 of 14
11. Virtual Private Network (VPN)
By extending a private network across the Internet, a VPN lets its users send and receive data as if
their devices were connected to the private network – even if they’re not. Through a virtual point-
to-point connection, users can access a private network remotely.
What is a MAC Address?
MAC address is a unique identifier that is assigned to a NIC (Network Interface Controller/ Card).
It consists of a 48 bit or 64-bit address, which is associated with the network adapter. MAC address
can be in hexadecimal format. The full form of MAC address is Media Access Control address.
What Types of Addressing?
1. Physical Addressing
2. Logical Addressing
3. Port Addresses
4. Port Addresses
Physical Addresses:
The physical address, also known as the link address, is the address of a node as defined by its
LAN or WAN.
The size and format of these addresses vary depending on the network. For example, Ethernet uses
a 6-byte (48-bit) physical address.
Physical addresses can be either unicast (one single recipient), multicast (a group of recipients), or
broadcast (to be received by all systems in the network.
Example: Most local area networks use a 48-bit (6-byte) physical address written as 12
hexadecimal digits; every byte (2 hexadecimal digits) is separated by a colon, as shown below: A
6-byte (12 hexadecimal digits) physical address 07:01:02:01:2C:4B
Logical Addresses:
Logical addresses are used by networking software to allow packets to be independent of the
physical connection of the network, that is, to work with different network topologies and types of
media.
Page 6 of 14
A logical address in the Internet is currently a 32-bit address that can uniquely define a host
connected to the Internet. An internet address in IPv4 in decimal numbers 132.24.75.9
No two publicly addressed and visible hosts on the Internet can have the same IP address.
The physical addresses will change from hop to hop, but the logical addresses remain the same.
The logical addresses can be either unicast (one single recipient), multicast (a group of recipients),
or broadcast (all systems in the network). There are limitations on broadcast addresses.
Port Addresses:
There are many application running on the computer. Each application run with a port
no.(logically) on the computer.
A port number is part of the addressing information used to identify the senders and receivers of
messages.
Port numbers are most commonly used with TCP/IP connections.
These port numbers allow different applications on the same computer to share network resources
simultaneously.
The physical addresses change from hop to hop, but the logical and port addresses usually remain
the same.
Example: a port address is a 16-bit address represented by one decimal number 753
Application-Specific Addresses:
Some applications have user-friendly addresses that are designed for that specific application.
Examples include the e-mail address (for example, forouzan@fhda.edu) and the Universal
Resource Locator (URL) (for example, www.mhhe.com). The first defines the recipient of an e-
mail; the second is used to find a document on the World Wide Web.
What is a port?
Page 7 of 14
A port is a virtual point where network connections start and end. Ports are software-based and
managed by a computer's operating system. Each port is associated with a specific process or
service.
What are the different port numbers?
There are 65,535 possible port numbers, although not all are in common use. Some of the most
commonly used ports, along with their associated networking protocol, are:
Ports 20 and 21:
File Transfer Protocol (FTP). FTP is for transferring files between a client and a server.
Port 22:
Secure Shell (SSH). SSH is one of many tunneling protocols that create secure network
connections.
Port 25:
Simple Mail Transfer Protocol (SMTP). SMTP is used for email.
Port 53:
Domain Name System (DNS). DNS is an essential process for the modern Internet; it matches
human-readable domain names to machine-readable IP addresses, enabling users to load websites
and applications without memorizing a long list of IP addresses.
Port 80:
Hypertext Transfer Protocol (HTTP). HTTP is the protocol that makes the World Wide Web
possible.
Port 123:
Page 8 of 14
Network Time Protocol (NTP). NTP allows computer clocks to sync with each other, a process
that is essential for encryption.
Port 179:
Border Gateway Protocol (BGP). BGP is essential for establishing efficient routes between the
large networks that make up the Internet (these large networks are called autonomous systems).
Autonomous systems use BGP to broadcast which IP addresses they control.
Port 443:
HTTP Secure (HTTPS). HTTPS is the secure and encrypted version of HTTP. All HTTPS web
traffic goes to port 443. Network services that use HTTPS for encryption, such as DNS over
HTTPS, also connect at this port.
Port 500:
Internet Security Association and Key Management Protocol (ISAKMP), which is part of the
process of setting up secure IPsec connections.
Port 3389:
Remote Desktop Protocol (RDP). RDP enables users to remotely connect to their desktop
computers from another device.
What is Hub?
A network hub is a device that allows multiple computers to communicate with each other over a
network. It has several Ethernet ports that are used to connect two or more network devices
together.
What is Router?
A router is a device that communicates between the internet and the devices in your home that
connect to the internet. As its name implies, it “routes” traffic between the devices and the internet.
What is a Bridge?
Page 9 of 14
A Bridge can join segments or workgroup LANs. A bridge can also divide a network to isolate
traffic or problems. For example, if the volume of traffic from one or two computers or a single
department is flooding the network with data and slowing down entire operation, a bridge can
isolate those computers or that department.
What is Gateway?
A gateway, as the name suggests, is a passage to connect two networks together that may work
upon different networking models.
What is Brouter?
It is also known as bridging router is a device which combines features of both bridge and router.
It can work either at data link layer or at network layer.
What is OSI Model?
The OSI Model is a logical and conceptual model that defines network communication used by
systems open to interconnection and communication with other systems. The Open System
Interconnection (OSI Model) also defines a logical network and effectively describes computer
packet transfer by using various layers of protocols.
What is OSI model (Open Systems Interconnection)?
OSI (Open Systems Interconnection) is a reference model for how applications communicate over
a network. This model focuses on providing a visual design of how each communications layer is
built on top of the other, starting with the physical cabling, all the way to the application that's
trying to communicate with other devices on a network.
Page 10 of 14
7 layers of the OSI model
What is the function of each layer of the OSI model? The seven Open Systems Interconnection
layers are the following.
Layer 1. The physical layer
The physical layer transports data using electrical, mechanical or procedural interfaces. This layer
is responsible for sending computer bits from one device to another along the network. It
determines how physical connections to the network are set up and how bits are represented into
predictable signals as they're transmitted either electrically, optically or via radio waves.
Layer 2. The data-link layer
The data-link, or protocol layer, in a program handles moving data into and out of a physical link
in a network. This layer handles problems that occur as a result of bit transmission errors. It ensures
that the pace of the data flow doesn't overwhelm the sending and receiving devices. This layer also
permits the transmission of data to Layer 3, the network layer, where it's addressed and routed.
Page 11 of 14
Layer 3. The network layer
The primary function of the network layer is to move data into and through other networks.
Network layer protocols accomplish this by packaging data with correct network address
information, selecting the appropriate network routes and forwarding the packaged data up the
stack to the transport layer. From a TCP/IP perspective, this is where IP addresses are applied for
routing purposes
Layer 4. The transport layer
The transport layer is responsible for transferring data across a network and provides error-
checking mechanisms and data flow controls. It determines how much data to send, where it gets
sent and at what rate. TCP within the TCP/IP suite is the best-known example of the transport
layer. This is where the communications select TCP port numbers to categorize and organize data
transmissions across a network.
Layer 5. The session layer
The session layer sets up, coordinates and terminates conversations between applications. Its
services include authentication and reconnection after an interruption. This layer determines how
long a system will wait for another application to respond. Examples of session layer protocols
include X.225 and Zone Information Protocol (ZIP).
Layer 6. The presentation layer
The presentation layer translates or formats data for the application layer based on the semantics
or syntax the application accepts. This layer also handles the encryption and decryption that the
application layer requires.
Layer 7. The application layer
The application layer enables the user -- human or software -- to interact with the application or
network whenever the user elects to read messages, transfer files or perform other network-related
tasks. Web browsers and other internet-connected apps, such as Outlook and Skype, use Layer 7
application protocols.
Page 12 of 14
What Is the TCP/IP Model?
Transmission Control Protocol (TCP) and Internet Protocol (IP) are two of the network protocols,
or communications standards, that make the internet possible. IP defines how computers can get
data to each other over an interconnected set of networks. TCP defines how applications can create
reliable channels of communication across an IP network.
What is IP?
An IP address is a unique address that identifies a device on the internet or a local network. IP
stands for "Internet Protocol," which is the set of rules governing the format of data sent via the
internet or local network.
Classification of IP address Addressing?
The 32 bit IP address is divided into five sub-classes. These are:
 Class A
 Class B
 Class C
 Class D
 Class E
Class A Public Address
Class A addresses are for networks with large number of total hosts. Class A allows for 126
networks by using the first octet for the network ID. The first bit in this octet, is always set and
fixed to zero. And next seven bits in the octet is all set to one, which then complete network ID.
The 24 bits in the remaining octets represent the hosts ID, allowing 126 networks and
approximately 17 million hosts per network. Class A network number values begin at 1 and end
at 127.
 IP Range: 1.0.0.0 to 126.0.0.0
 First octet value range from 1 to 127
 Subnet Mask: 255.0.0.0 (8 bits)
 Number of Networks: 126
 Number of Hosts per Network: 16,777,214
Class B Public Address
Class B addresses are for medium to large sized networks. Class B allows for 16,384 networks by
using the first two octets for the network ID. The two bits in the first octet are always set and fixed
to 1 0. The remaining 6 bits, together with the next octet, complete network ID. The 16 bits in the
Page 13 of 14
third and fourth octet represent host ID, allowing for approximately 65,000 hosts per network.
Class B network number values begin at 128 and end at 191.
 Range: 128.0.0.0 to 191.255.0.0
o First octet value range from 128 to 191
 Subnet Mask: 255.255.0.0 (16 bits)
 Number of Networks: 16,382
 Number of Hosts per Network: 65,534
Class C Public Address
Class C addresses are used in small local area networks (LANs). Class C allows for approximately
2 million networks by using the first three octets for the network ID. In class C address three bits
are always set and fixed to 1 1 0. And in the first three octets 21 bits complete the total network
ID. The 8 bits of the last octet represent the host ID allowing for 254 hosts per one network. Class
C network number values begin at 192 and end at 223.
 Range: 192.0.0.0 to 223.255.255.0
o First octet value range from 192 to 223
 Subnet Mask: 255.255.255.0 (24 bits)
 Number of Networks: 2,097,150
 Number of Hosts per Network: 254
Class D Address Class
Classes D are not allocated to hosts and are used for multicasting.
 Range: 224.0.0.0 to 239.255.255.255
o First octet value range from 224 to 239
 Number of Networks: N/A
 Number of Hosts per Network: Multicasting
Class E Address Class
Classes E are not allocated to hosts and are not available for general use. They are reserved for
research purposes.
 Range: 240.0.0.0 to 255.255.255.255
o First octet value range from 240 to 255
 Number of Networks: N/A
 Number of Hosts per Network: Research/Reserved/Experimental
Page 14 of 14
Private Addresses
Within each network class, there are designated IP address that is reserved specifically for
private/internal use only. This IP address cannot be used on Internet-facing devices as that are non-
routable. For example, web servers and FTP servers must use non-private IP addresses. However,
within your own home or business network, private IP addresses are assigned to your devices (such
as workstations, printers, and file servers).
 Class A Private Range: 10.0.0.0 to 10.255.255.255
 Class B Private APIPA Range: 169.254.0.0 to 169.254.255.255
o Automatic Private IP Addressing (APIPA) is a feature on Microsoft Windows-based
computers to automatically assign itself an IP address within this range if
a Dynamic Host Configuration Protocol (DHCP) server is not available. A DHCP
server is a device on a network that is responsible for assigning IP address to
devices on the network.
 Class B Private Range: 172.16.0.0 to 172.31.255.255
 Class C Private Range: 192.168.0.0 to 192.168.255.255
Special Addresses
 IP Range: 127.0.0.1 to 127.255.255.255 are network testing addresses (also referred to as
loop-back addresses)

More Related Content

What's hot

Network access layer security protocol
Network access layer security protocolNetwork access layer security protocol
Network access layer security protocolKirti Ahirrao
 
INTRODUCTION TO INTERNET PROTOCOL BY SAIKIRAN PANJALA
INTRODUCTION TO INTERNET PROTOCOL BY SAIKIRAN PANJALAINTRODUCTION TO INTERNET PROTOCOL BY SAIKIRAN PANJALA
INTRODUCTION TO INTERNET PROTOCOL BY SAIKIRAN PANJALASaikiran Panjala
 
Internet Protocols
Internet ProtocolsInternet Protocols
Internet ProtocolsMohamed Daif
 
Networking Standards And Protocols
Networking Standards And ProtocolsNetworking Standards And Protocols
Networking Standards And ProtocolsSteven Cahill
 
Network and Protocol
 Network and Protocol Network and Protocol
Network and ProtocolSaif Muttair
 
Networrrrrrrrkkkk secuiiirtyyyyyyyyyyyyyyyyyyyy
Networrrrrrrrkkkk secuiiirtyyyyyyyyyyyyyyyyyyyyNetworrrrrrrrkkkk secuiiirtyyyyyyyyyyyyyyyyyyyy
Networrrrrrrrkkkk secuiiirtyyyyyyyyyyyyyyyyyyyyAvishek Maitra
 
Wireless Technology
Wireless TechnologyWireless Technology
Wireless TechnologyNetwax Lab
 
NETWORK PROTOCOL
NETWORK PROTOCOLNETWORK PROTOCOL
NETWORK PROTOCOLKak Yong
 
Slides for protocol layering and network applications
Slides for protocol layering and network applicationsSlides for protocol layering and network applications
Slides for protocol layering and network applicationsjajinekkanti
 
Internetworking
InternetworkingInternetworking
InternetworkingRaghu nath
 
Data communication
Data communication Data communication
Data communication SarifIslam3
 

What's hot (20)

Network protocals
Network protocalsNetwork protocals
Network protocals
 
Network protocol
Network protocolNetwork protocol
Network protocol
 
LAN,MAN,WAN & MAC Address
LAN,MAN,WAN & MAC AddressLAN,MAN,WAN & MAC Address
LAN,MAN,WAN & MAC Address
 
Network access layer security protocol
Network access layer security protocolNetwork access layer security protocol
Network access layer security protocol
 
Tcp/Ip Model
Tcp/Ip ModelTcp/Ip Model
Tcp/Ip Model
 
Computer network
Computer networkComputer network
Computer network
 
INTRODUCTION TO INTERNET PROTOCOL BY SAIKIRAN PANJALA
INTRODUCTION TO INTERNET PROTOCOL BY SAIKIRAN PANJALAINTRODUCTION TO INTERNET PROTOCOL BY SAIKIRAN PANJALA
INTRODUCTION TO INTERNET PROTOCOL BY SAIKIRAN PANJALA
 
Internet Protocols
Internet ProtocolsInternet Protocols
Internet Protocols
 
Networking Standards And Protocols
Networking Standards And ProtocolsNetworking Standards And Protocols
Networking Standards And Protocols
 
Network and Protocol
 Network and Protocol Network and Protocol
Network and Protocol
 
Networrrrrrrrkkkk secuiiirtyyyyyyyyyyyyyyyyyyyy
Networrrrrrrrkkkk secuiiirtyyyyyyyyyyyyyyyyyyyyNetworrrrrrrrkkkk secuiiirtyyyyyyyyyyyyyyyyyyyy
Networrrrrrrrkkkk secuiiirtyyyyyyyyyyyyyyyyyyyy
 
Computer Network basic
Computer Network basicComputer Network basic
Computer Network basic
 
Wireless Technology
Wireless TechnologyWireless Technology
Wireless Technology
 
NETWORK PROTOCOL
NETWORK PROTOCOLNETWORK PROTOCOL
NETWORK PROTOCOL
 
Slides for protocol layering and network applications
Slides for protocol layering and network applicationsSlides for protocol layering and network applications
Slides for protocol layering and network applications
 
Internetworking
InternetworkingInternetworking
Internetworking
 
Fragmentation
FragmentationFragmentation
Fragmentation
 
Lecture 3- tcp-ip
Lecture  3- tcp-ipLecture  3- tcp-ip
Lecture 3- tcp-ip
 
Data communication
Data communication Data communication
Data communication
 
Cisco doc
Cisco docCisco doc
Cisco doc
 

Similar to Data communication class note 1

2.Introduction to Network Devices.ppt
2.Introduction to Network Devices.ppt2.Introduction to Network Devices.ppt
2.Introduction to Network Devices.pptjaba kumar
 
Computer network
Computer networkComputer network
Computer networkAnupan Jain
 
Data communication assignment id1925102518
Data communication assignment  id1925102518Data communication assignment  id1925102518
Data communication assignment id1925102518MdZakirHossain66
 
Data Communication
Data Communication Data Communication
Data Communication MSSadeq
 
What is networking
What is networkingWhat is networking
What is networkingbabyparul
 
Network protocol
Network protocolNetwork protocol
Network protocolQadarAhmed1
 
Unit I_Computer Networks_2.ppt
Unit I_Computer Networks_2.pptUnit I_Computer Networks_2.ppt
Unit I_Computer Networks_2.pptArumugam90
 
Network-20210426203825.ppt
Network-20210426203825.pptNetwork-20210426203825.ppt
Network-20210426203825.pptSaagar Shetage
 
A computer network links several computers. Office networks allow people to w...
A computer network links several computers. Office networks allow people to w...A computer network links several computers. Office networks allow people to w...
A computer network links several computers. Office networks allow people to w...sherinjoyson
 
Network- computer networking by vinod ppt
Network- computer networking by vinod pptNetwork- computer networking by vinod ppt
Network- computer networking by vinod pptDhruvilSTATUS
 
Network-20210426203825.ppt
Network-20210426203825.pptNetwork-20210426203825.ppt
Network-20210426203825.pptkrishna683602
 
Advanced Computer Network-20210426203825.ppt
Advanced Computer Network-20210426203825.pptAdvanced Computer Network-20210426203825.ppt
Advanced Computer Network-20210426203825.pptSmitaPatil541701
 
Computer Network basic
Computer Network basicComputer Network basic
Computer Network basicCeoTranDang
 
The Computer Network - All the basic Knowledge
The Computer Network - All the basic KnowledgeThe Computer Network - All the basic Knowledge
The Computer Network - All the basic Knowledgessuseree2ffc
 
Network how to configure switch router .ppt
Network how to configure switch router .pptNetwork how to configure switch router .ppt
Network how to configure switch router .pptPawanKayande1
 

Similar to Data communication class note 1 (20)

1658897215230.pdf
1658897215230.pdf1658897215230.pdf
1658897215230.pdf
 
2.Introduction to Network Devices.ppt
2.Introduction to Network Devices.ppt2.Introduction to Network Devices.ppt
2.Introduction to Network Devices.ppt
 
Computer network
Computer networkComputer network
Computer network
 
Data communication assignment id1925102518
Data communication assignment  id1925102518Data communication assignment  id1925102518
Data communication assignment id1925102518
 
Data Communication
Data Communication Data Communication
Data Communication
 
What is networking
What is networkingWhat is networking
What is networking
 
Module-1.pptx
Module-1.pptxModule-1.pptx
Module-1.pptx
 
Network protocol
Network protocolNetwork protocol
Network protocol
 
Network.ppt
Network.pptNetwork.ppt
Network.ppt
 
Basic Networking.ppt
Basic Networking.pptBasic Networking.ppt
Basic Networking.ppt
 
Unit I_Computer Networks_2.ppt
Unit I_Computer Networks_2.pptUnit I_Computer Networks_2.ppt
Unit I_Computer Networks_2.ppt
 
Network-20210426203825.ppt
Network-20210426203825.pptNetwork-20210426203825.ppt
Network-20210426203825.ppt
 
A computer network links several computers. Office networks allow people to w...
A computer network links several computers. Office networks allow people to w...A computer network links several computers. Office networks allow people to w...
A computer network links several computers. Office networks allow people to w...
 
Network- computer networking by vinod ppt
Network- computer networking by vinod pptNetwork- computer networking by vinod ppt
Network- computer networking by vinod ppt
 
Network-20210426203825.ppt
Network-20210426203825.pptNetwork-20210426203825.ppt
Network-20210426203825.ppt
 
Networking devices.ppt
Networking devices.pptNetworking devices.ppt
Networking devices.ppt
 
Advanced Computer Network-20210426203825.ppt
Advanced Computer Network-20210426203825.pptAdvanced Computer Network-20210426203825.ppt
Advanced Computer Network-20210426203825.ppt
 
Computer Network basic
Computer Network basicComputer Network basic
Computer Network basic
 
The Computer Network - All the basic Knowledge
The Computer Network - All the basic KnowledgeThe Computer Network - All the basic Knowledge
The Computer Network - All the basic Knowledge
 
Network how to configure switch router .ppt
Network how to configure switch router .pptNetwork how to configure switch router .ppt
Network how to configure switch router .ppt
 

Recently uploaded

VIP Call Girls Service Kondapur Hyderabad Call +91-8250192130
VIP Call Girls Service Kondapur Hyderabad Call +91-8250192130VIP Call Girls Service Kondapur Hyderabad Call +91-8250192130
VIP Call Girls Service Kondapur Hyderabad Call +91-8250192130Suhani Kapoor
 
High Profile Call Girls Nagpur Isha Call 7001035870 Meet With Nagpur Escorts
High Profile Call Girls Nagpur Isha Call 7001035870 Meet With Nagpur EscortsHigh Profile Call Girls Nagpur Isha Call 7001035870 Meet With Nagpur Escorts
High Profile Call Girls Nagpur Isha Call 7001035870 Meet With Nagpur Escortsranjana rawat
 
VIP Call Girls Service Hitech City Hyderabad Call +91-8250192130
VIP Call Girls Service Hitech City Hyderabad Call +91-8250192130VIP Call Girls Service Hitech City Hyderabad Call +91-8250192130
VIP Call Girls Service Hitech City Hyderabad Call +91-8250192130Suhani Kapoor
 
Call Girls Service Nagpur Tanvi Call 7001035870 Meet With Nagpur Escorts
Call Girls Service Nagpur Tanvi Call 7001035870 Meet With Nagpur EscortsCall Girls Service Nagpur Tanvi Call 7001035870 Meet With Nagpur Escorts
Call Girls Service Nagpur Tanvi Call 7001035870 Meet With Nagpur EscortsCall Girls in Nagpur High Profile
 
the ladakh protest in leh ladakh 2024 sonam wangchuk.pptx
the ladakh protest in leh ladakh 2024 sonam wangchuk.pptxthe ladakh protest in leh ladakh 2024 sonam wangchuk.pptx
the ladakh protest in leh ladakh 2024 sonam wangchuk.pptxhumanexperienceaaa
 
Gfe Mayur Vihar Call Girls Service WhatsApp -> 9999965857 Available 24x7 ^ De...
Gfe Mayur Vihar Call Girls Service WhatsApp -> 9999965857 Available 24x7 ^ De...Gfe Mayur Vihar Call Girls Service WhatsApp -> 9999965857 Available 24x7 ^ De...
Gfe Mayur Vihar Call Girls Service WhatsApp -> 9999965857 Available 24x7 ^ De...srsj9000
 
HARMONY IN THE NATURE AND EXISTENCE - Unit-IV
HARMONY IN THE NATURE AND EXISTENCE - Unit-IVHARMONY IN THE NATURE AND EXISTENCE - Unit-IV
HARMONY IN THE NATURE AND EXISTENCE - Unit-IVRajaP95
 
Coefficient of Thermal Expansion and their Importance.pptx
Coefficient of Thermal Expansion and their Importance.pptxCoefficient of Thermal Expansion and their Importance.pptx
Coefficient of Thermal Expansion and their Importance.pptxAsutosh Ranjan
 
Model Call Girl in Narela Delhi reach out to us at 🔝8264348440🔝
Model Call Girl in Narela Delhi reach out to us at 🔝8264348440🔝Model Call Girl in Narela Delhi reach out to us at 🔝8264348440🔝
Model Call Girl in Narela Delhi reach out to us at 🔝8264348440🔝soniya singh
 
Call for Papers - African Journal of Biological Sciences, E-ISSN: 2663-2187, ...
Call for Papers - African Journal of Biological Sciences, E-ISSN: 2663-2187, ...Call for Papers - African Journal of Biological Sciences, E-ISSN: 2663-2187, ...
Call for Papers - African Journal of Biological Sciences, E-ISSN: 2663-2187, ...Christo Ananth
 
Sheet Pile Wall Design and Construction: A Practical Guide for Civil Engineer...
Sheet Pile Wall Design and Construction: A Practical Guide for Civil Engineer...Sheet Pile Wall Design and Construction: A Practical Guide for Civil Engineer...
Sheet Pile Wall Design and Construction: A Practical Guide for Civil Engineer...Dr.Costas Sachpazis
 
OSVC_Meta-Data based Simulation Automation to overcome Verification Challenge...
OSVC_Meta-Data based Simulation Automation to overcome Verification Challenge...OSVC_Meta-Data based Simulation Automation to overcome Verification Challenge...
OSVC_Meta-Data based Simulation Automation to overcome Verification Challenge...Soham Mondal
 
Extrusion Processes and Their Limitations
Extrusion Processes and Their LimitationsExtrusion Processes and Their Limitations
Extrusion Processes and Their Limitations120cr0395
 
(SHREYA) Chakan Call Girls Just Call 7001035870 [ Cash on Delivery ] Pune Esc...
(SHREYA) Chakan Call Girls Just Call 7001035870 [ Cash on Delivery ] Pune Esc...(SHREYA) Chakan Call Girls Just Call 7001035870 [ Cash on Delivery ] Pune Esc...
(SHREYA) Chakan Call Girls Just Call 7001035870 [ Cash on Delivery ] Pune Esc...ranjana rawat
 
Software Development Life Cycle By Team Orange (Dept. of Pharmacy)
Software Development Life Cycle By  Team Orange (Dept. of Pharmacy)Software Development Life Cycle By  Team Orange (Dept. of Pharmacy)
Software Development Life Cycle By Team Orange (Dept. of Pharmacy)Suman Mia
 
(PRIYA) Rajgurunagar Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...
(PRIYA) Rajgurunagar Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...(PRIYA) Rajgurunagar Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...
(PRIYA) Rajgurunagar Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...ranjana rawat
 

Recently uploaded (20)

VIP Call Girls Service Kondapur Hyderabad Call +91-8250192130
VIP Call Girls Service Kondapur Hyderabad Call +91-8250192130VIP Call Girls Service Kondapur Hyderabad Call +91-8250192130
VIP Call Girls Service Kondapur Hyderabad Call +91-8250192130
 
DJARUM4D - SLOT GACOR ONLINE | SLOT DEMO ONLINE
DJARUM4D - SLOT GACOR ONLINE | SLOT DEMO ONLINEDJARUM4D - SLOT GACOR ONLINE | SLOT DEMO ONLINE
DJARUM4D - SLOT GACOR ONLINE | SLOT DEMO ONLINE
 
High Profile Call Girls Nagpur Isha Call 7001035870 Meet With Nagpur Escorts
High Profile Call Girls Nagpur Isha Call 7001035870 Meet With Nagpur EscortsHigh Profile Call Girls Nagpur Isha Call 7001035870 Meet With Nagpur Escorts
High Profile Call Girls Nagpur Isha Call 7001035870 Meet With Nagpur Escorts
 
VIP Call Girls Service Hitech City Hyderabad Call +91-8250192130
VIP Call Girls Service Hitech City Hyderabad Call +91-8250192130VIP Call Girls Service Hitech City Hyderabad Call +91-8250192130
VIP Call Girls Service Hitech City Hyderabad Call +91-8250192130
 
Call Girls Service Nagpur Tanvi Call 7001035870 Meet With Nagpur Escorts
Call Girls Service Nagpur Tanvi Call 7001035870 Meet With Nagpur EscortsCall Girls Service Nagpur Tanvi Call 7001035870 Meet With Nagpur Escorts
Call Girls Service Nagpur Tanvi Call 7001035870 Meet With Nagpur Escorts
 
the ladakh protest in leh ladakh 2024 sonam wangchuk.pptx
the ladakh protest in leh ladakh 2024 sonam wangchuk.pptxthe ladakh protest in leh ladakh 2024 sonam wangchuk.pptx
the ladakh protest in leh ladakh 2024 sonam wangchuk.pptx
 
Gfe Mayur Vihar Call Girls Service WhatsApp -> 9999965857 Available 24x7 ^ De...
Gfe Mayur Vihar Call Girls Service WhatsApp -> 9999965857 Available 24x7 ^ De...Gfe Mayur Vihar Call Girls Service WhatsApp -> 9999965857 Available 24x7 ^ De...
Gfe Mayur Vihar Call Girls Service WhatsApp -> 9999965857 Available 24x7 ^ De...
 
HARMONY IN THE NATURE AND EXISTENCE - Unit-IV
HARMONY IN THE NATURE AND EXISTENCE - Unit-IVHARMONY IN THE NATURE AND EXISTENCE - Unit-IV
HARMONY IN THE NATURE AND EXISTENCE - Unit-IV
 
9953056974 Call Girls In South Ex, Escorts (Delhi) NCR.pdf
9953056974 Call Girls In South Ex, Escorts (Delhi) NCR.pdf9953056974 Call Girls In South Ex, Escorts (Delhi) NCR.pdf
9953056974 Call Girls In South Ex, Escorts (Delhi) NCR.pdf
 
Coefficient of Thermal Expansion and their Importance.pptx
Coefficient of Thermal Expansion and their Importance.pptxCoefficient of Thermal Expansion and their Importance.pptx
Coefficient of Thermal Expansion and their Importance.pptx
 
Model Call Girl in Narela Delhi reach out to us at 🔝8264348440🔝
Model Call Girl in Narela Delhi reach out to us at 🔝8264348440🔝Model Call Girl in Narela Delhi reach out to us at 🔝8264348440🔝
Model Call Girl in Narela Delhi reach out to us at 🔝8264348440🔝
 
Call for Papers - African Journal of Biological Sciences, E-ISSN: 2663-2187, ...
Call for Papers - African Journal of Biological Sciences, E-ISSN: 2663-2187, ...Call for Papers - African Journal of Biological Sciences, E-ISSN: 2663-2187, ...
Call for Papers - African Journal of Biological Sciences, E-ISSN: 2663-2187, ...
 
Sheet Pile Wall Design and Construction: A Practical Guide for Civil Engineer...
Sheet Pile Wall Design and Construction: A Practical Guide for Civil Engineer...Sheet Pile Wall Design and Construction: A Practical Guide for Civil Engineer...
Sheet Pile Wall Design and Construction: A Practical Guide for Civil Engineer...
 
OSVC_Meta-Data based Simulation Automation to overcome Verification Challenge...
OSVC_Meta-Data based Simulation Automation to overcome Verification Challenge...OSVC_Meta-Data based Simulation Automation to overcome Verification Challenge...
OSVC_Meta-Data based Simulation Automation to overcome Verification Challenge...
 
Exploring_Network_Security_with_JA3_by_Rakesh Seal.pptx
Exploring_Network_Security_with_JA3_by_Rakesh Seal.pptxExploring_Network_Security_with_JA3_by_Rakesh Seal.pptx
Exploring_Network_Security_with_JA3_by_Rakesh Seal.pptx
 
Extrusion Processes and Their Limitations
Extrusion Processes and Their LimitationsExtrusion Processes and Their Limitations
Extrusion Processes and Their Limitations
 
(SHREYA) Chakan Call Girls Just Call 7001035870 [ Cash on Delivery ] Pune Esc...
(SHREYA) Chakan Call Girls Just Call 7001035870 [ Cash on Delivery ] Pune Esc...(SHREYA) Chakan Call Girls Just Call 7001035870 [ Cash on Delivery ] Pune Esc...
(SHREYA) Chakan Call Girls Just Call 7001035870 [ Cash on Delivery ] Pune Esc...
 
Call Us -/9953056974- Call Girls In Vikaspuri-/- Delhi NCR
Call Us -/9953056974- Call Girls In Vikaspuri-/- Delhi NCRCall Us -/9953056974- Call Girls In Vikaspuri-/- Delhi NCR
Call Us -/9953056974- Call Girls In Vikaspuri-/- Delhi NCR
 
Software Development Life Cycle By Team Orange (Dept. of Pharmacy)
Software Development Life Cycle By  Team Orange (Dept. of Pharmacy)Software Development Life Cycle By  Team Orange (Dept. of Pharmacy)
Software Development Life Cycle By Team Orange (Dept. of Pharmacy)
 
(PRIYA) Rajgurunagar Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...
(PRIYA) Rajgurunagar Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...(PRIYA) Rajgurunagar Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...
(PRIYA) Rajgurunagar Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...
 

Data communication class note 1

  • 1. Page 1 of 14 Spring 2021 Class Note Prosanta Mazumder ID: 1925102502 CSE 313 Data Communication 17/05/2021 INDEX OF CONTENT 1. What is Data Communication? 2. What is a network? 3. What is Node? 4. What is network interface card (NIC)? 5. Types of Computer Networks 6. What is a MAC Address? 7. What Types of Addressing? 8. What is a port? 9. What are the different port numbers? 10.What is Hub? 11.What is Router? 12.What is a Bridge? 13.What is Gateway? 14.What is Brouter? 15.What is OSI Model? 16.What is OSI model (Open Systems Interconnection)? 17.7 layers of the OSI model? 18.What Is the TCP/IP Model? 19.What Is the TCP/IP Model? 20.Classification of IP address Addressing?
  • 2. Page 2 of 14 What is Data Communication? Data communications means the exchange of data between two devices via some form of transmission medium such as a wire cable. What is a network? In information technology, a network is defined as the connection of at least two computer systems, either by a cable or a wireless connection. The simplest network is a combination of two computers connected by a cable. This type of network is called a peer-to-peer network. There is no hierarchy in this network; both participants have equal privileges. Each computer has access to the data of the other device and can share resources such as disk space, applications or peripheral devices (printers, etc.). What is Node? Any system or device connected to a network is also called a node. For example, if a network connects a file server, five computers, and two printers, there are eight nodes on the network. Each device on the network has a network address, such as a MAC address, which uniquely identifies each device. This helps keep track of where data is being transferred to and from on the network. A node can also refer to a leaf, which is a folder or file on your hard disk. In physics, a node, or nodal point, is a point of minimum displacement or where multiple waves converge, creating a net amplitude of zero. What is network interface card (NIC)? Network interface card (NIC) is a hardware component, typically a circuit board or chip. It is used to connect different networking devices such as computers and servers to share data over the connected network. It provides functionality such as support for I/O interrupt, Direct Memory Access (DMA) interfaces, partitioning, and data transmission. NIC is important for us to establish a wired or wireless connection over the network. Network Interface Card is also known as Network Interface Controller, Network Adapter, Ethernet card, Connection card, and LAN (Local Area Network) Adapter.
  • 3. Page 3 of 14 1. Personal Area Network (PAN) The smallest and most basic type of network, a PAN is made up of a wireless modem, a computer or two, phones, printers, tablets, etc., and revolves around one person in one building. These types of networks are typically found in small offices or residences, and are managed by one person or organization from a single device. 2. Local Area Network (LAN) We’re confident that you’ve heard of these types of networks before – LANs are the most frequently discussed networks, one of the most common, one of the most original and one of the simplest types of networks. LANs connect groups of computers and low-voltage devices together across short distances (within a building or between a group of two or three buildings in close proximity to each other) to share information and resources. Enterprises typically manage and maintain LANs. 3. Wireless Local Area Network (WLAN) Functioning like a LAN, WLANs make use of wireless network technologies, such as WiFi. Typically seen in the same types of applications as LANs, these types of networks don’t require that devices rely on physical cables to connect to the network. 4. Campus Area Network (CAN) Larger than LANs, but smaller than metropolitan area networks (MANs, explained below), these types of networks are typically seen in universities, large K-12 school districts or small businesses. They can be spread across several buildings that are fairly close to each other so users can share resources. 5. Metropolitan Area Network (MAN) These types of networks are larger than LANs but smaller than WANs – and incorporate elements from both types of networks. MANs span an entire geographic area (typically a town or city, but sometimes a campus). Ownership and maintenance is handled by either a single person or company (a local council, a large company, etc.).
  • 4. Page 4 of 14 6. Wide Area Network (WAN) Slightly more complex than a LAN, a WAN connects computers together across longer physical distances. This allows computers and low-voltage devices to be remotely connected to each other over one large network to communicate even when they’re miles apart. The Internet is the most basic example of a WAN, connecting all computers together around the world. Because of a WAN’s vast reach, it is typically owned and maintained by multiple administrators or the public. 7. Storage-Area Network (SAN) As a dedicated high-speed network that connects shared pools of storage devices to several servers, these types of networks don’t rely on a LAN or WAN. Instead, they move storage resources away from the network and place them into their own high-performance network. SANs can be accessed in the same fashion as a drive attached to a server. Types of storage-area networks include converged, virtual and unified SANs. 8. System-Area Network (also known as SAN) This term is fairly new within the past two decades. It is used to explain a relatively local network that is designed to provide high-speed connection in server-to-server applications (cluster environments), storage area networks (called “SANs” as well) and processor-to-processor applications. The computers connected on a SAN operate as a single system at very high speeds. 9. Passive Optical Local Area Network (POLAN) As an alternative to traditional switch-based Ethernet LANs, POLAN technology can be integrated into structured cabling to overcome concerns about supporting traditional Ethernet protocols and network applications such as PoE (Power over Ethernet). A point-to-multipoint LAN architecture, POLAN uses optical splitters to split an optical signal from one strand of single mode optical fiber into multiple signals to serve users and devices. 10. Enterprise Private Network (EPN) These types of networks are built and owned by businesses that want to securely connect its various locations to share computer resources.
  • 5. Page 5 of 14 11. Virtual Private Network (VPN) By extending a private network across the Internet, a VPN lets its users send and receive data as if their devices were connected to the private network – even if they’re not. Through a virtual point- to-point connection, users can access a private network remotely. What is a MAC Address? MAC address is a unique identifier that is assigned to a NIC (Network Interface Controller/ Card). It consists of a 48 bit or 64-bit address, which is associated with the network adapter. MAC address can be in hexadecimal format. The full form of MAC address is Media Access Control address. What Types of Addressing? 1. Physical Addressing 2. Logical Addressing 3. Port Addresses 4. Port Addresses Physical Addresses: The physical address, also known as the link address, is the address of a node as defined by its LAN or WAN. The size and format of these addresses vary depending on the network. For example, Ethernet uses a 6-byte (48-bit) physical address. Physical addresses can be either unicast (one single recipient), multicast (a group of recipients), or broadcast (to be received by all systems in the network. Example: Most local area networks use a 48-bit (6-byte) physical address written as 12 hexadecimal digits; every byte (2 hexadecimal digits) is separated by a colon, as shown below: A 6-byte (12 hexadecimal digits) physical address 07:01:02:01:2C:4B Logical Addresses: Logical addresses are used by networking software to allow packets to be independent of the physical connection of the network, that is, to work with different network topologies and types of media.
  • 6. Page 6 of 14 A logical address in the Internet is currently a 32-bit address that can uniquely define a host connected to the Internet. An internet address in IPv4 in decimal numbers 132.24.75.9 No two publicly addressed and visible hosts on the Internet can have the same IP address. The physical addresses will change from hop to hop, but the logical addresses remain the same. The logical addresses can be either unicast (one single recipient), multicast (a group of recipients), or broadcast (all systems in the network). There are limitations on broadcast addresses. Port Addresses: There are many application running on the computer. Each application run with a port no.(logically) on the computer. A port number is part of the addressing information used to identify the senders and receivers of messages. Port numbers are most commonly used with TCP/IP connections. These port numbers allow different applications on the same computer to share network resources simultaneously. The physical addresses change from hop to hop, but the logical and port addresses usually remain the same. Example: a port address is a 16-bit address represented by one decimal number 753 Application-Specific Addresses: Some applications have user-friendly addresses that are designed for that specific application. Examples include the e-mail address (for example, forouzan@fhda.edu) and the Universal Resource Locator (URL) (for example, www.mhhe.com). The first defines the recipient of an e- mail; the second is used to find a document on the World Wide Web. What is a port?
  • 7. Page 7 of 14 A port is a virtual point where network connections start and end. Ports are software-based and managed by a computer's operating system. Each port is associated with a specific process or service. What are the different port numbers? There are 65,535 possible port numbers, although not all are in common use. Some of the most commonly used ports, along with their associated networking protocol, are: Ports 20 and 21: File Transfer Protocol (FTP). FTP is for transferring files between a client and a server. Port 22: Secure Shell (SSH). SSH is one of many tunneling protocols that create secure network connections. Port 25: Simple Mail Transfer Protocol (SMTP). SMTP is used for email. Port 53: Domain Name System (DNS). DNS is an essential process for the modern Internet; it matches human-readable domain names to machine-readable IP addresses, enabling users to load websites and applications without memorizing a long list of IP addresses. Port 80: Hypertext Transfer Protocol (HTTP). HTTP is the protocol that makes the World Wide Web possible. Port 123:
  • 8. Page 8 of 14 Network Time Protocol (NTP). NTP allows computer clocks to sync with each other, a process that is essential for encryption. Port 179: Border Gateway Protocol (BGP). BGP is essential for establishing efficient routes between the large networks that make up the Internet (these large networks are called autonomous systems). Autonomous systems use BGP to broadcast which IP addresses they control. Port 443: HTTP Secure (HTTPS). HTTPS is the secure and encrypted version of HTTP. All HTTPS web traffic goes to port 443. Network services that use HTTPS for encryption, such as DNS over HTTPS, also connect at this port. Port 500: Internet Security Association and Key Management Protocol (ISAKMP), which is part of the process of setting up secure IPsec connections. Port 3389: Remote Desktop Protocol (RDP). RDP enables users to remotely connect to their desktop computers from another device. What is Hub? A network hub is a device that allows multiple computers to communicate with each other over a network. It has several Ethernet ports that are used to connect two or more network devices together. What is Router? A router is a device that communicates between the internet and the devices in your home that connect to the internet. As its name implies, it “routes” traffic between the devices and the internet. What is a Bridge?
  • 9. Page 9 of 14 A Bridge can join segments or workgroup LANs. A bridge can also divide a network to isolate traffic or problems. For example, if the volume of traffic from one or two computers or a single department is flooding the network with data and slowing down entire operation, a bridge can isolate those computers or that department. What is Gateway? A gateway, as the name suggests, is a passage to connect two networks together that may work upon different networking models. What is Brouter? It is also known as bridging router is a device which combines features of both bridge and router. It can work either at data link layer or at network layer. What is OSI Model? The OSI Model is a logical and conceptual model that defines network communication used by systems open to interconnection and communication with other systems. The Open System Interconnection (OSI Model) also defines a logical network and effectively describes computer packet transfer by using various layers of protocols. What is OSI model (Open Systems Interconnection)? OSI (Open Systems Interconnection) is a reference model for how applications communicate over a network. This model focuses on providing a visual design of how each communications layer is built on top of the other, starting with the physical cabling, all the way to the application that's trying to communicate with other devices on a network.
  • 10. Page 10 of 14 7 layers of the OSI model What is the function of each layer of the OSI model? The seven Open Systems Interconnection layers are the following. Layer 1. The physical layer The physical layer transports data using electrical, mechanical or procedural interfaces. This layer is responsible for sending computer bits from one device to another along the network. It determines how physical connections to the network are set up and how bits are represented into predictable signals as they're transmitted either electrically, optically or via radio waves. Layer 2. The data-link layer The data-link, or protocol layer, in a program handles moving data into and out of a physical link in a network. This layer handles problems that occur as a result of bit transmission errors. It ensures that the pace of the data flow doesn't overwhelm the sending and receiving devices. This layer also permits the transmission of data to Layer 3, the network layer, where it's addressed and routed.
  • 11. Page 11 of 14 Layer 3. The network layer The primary function of the network layer is to move data into and through other networks. Network layer protocols accomplish this by packaging data with correct network address information, selecting the appropriate network routes and forwarding the packaged data up the stack to the transport layer. From a TCP/IP perspective, this is where IP addresses are applied for routing purposes Layer 4. The transport layer The transport layer is responsible for transferring data across a network and provides error- checking mechanisms and data flow controls. It determines how much data to send, where it gets sent and at what rate. TCP within the TCP/IP suite is the best-known example of the transport layer. This is where the communications select TCP port numbers to categorize and organize data transmissions across a network. Layer 5. The session layer The session layer sets up, coordinates and terminates conversations between applications. Its services include authentication and reconnection after an interruption. This layer determines how long a system will wait for another application to respond. Examples of session layer protocols include X.225 and Zone Information Protocol (ZIP). Layer 6. The presentation layer The presentation layer translates or formats data for the application layer based on the semantics or syntax the application accepts. This layer also handles the encryption and decryption that the application layer requires. Layer 7. The application layer The application layer enables the user -- human or software -- to interact with the application or network whenever the user elects to read messages, transfer files or perform other network-related tasks. Web browsers and other internet-connected apps, such as Outlook and Skype, use Layer 7 application protocols.
  • 12. Page 12 of 14 What Is the TCP/IP Model? Transmission Control Protocol (TCP) and Internet Protocol (IP) are two of the network protocols, or communications standards, that make the internet possible. IP defines how computers can get data to each other over an interconnected set of networks. TCP defines how applications can create reliable channels of communication across an IP network. What is IP? An IP address is a unique address that identifies a device on the internet or a local network. IP stands for "Internet Protocol," which is the set of rules governing the format of data sent via the internet or local network. Classification of IP address Addressing? The 32 bit IP address is divided into five sub-classes. These are:  Class A  Class B  Class C  Class D  Class E Class A Public Address Class A addresses are for networks with large number of total hosts. Class A allows for 126 networks by using the first octet for the network ID. The first bit in this octet, is always set and fixed to zero. And next seven bits in the octet is all set to one, which then complete network ID. The 24 bits in the remaining octets represent the hosts ID, allowing 126 networks and approximately 17 million hosts per network. Class A network number values begin at 1 and end at 127.  IP Range: 1.0.0.0 to 126.0.0.0  First octet value range from 1 to 127  Subnet Mask: 255.0.0.0 (8 bits)  Number of Networks: 126  Number of Hosts per Network: 16,777,214 Class B Public Address Class B addresses are for medium to large sized networks. Class B allows for 16,384 networks by using the first two octets for the network ID. The two bits in the first octet are always set and fixed to 1 0. The remaining 6 bits, together with the next octet, complete network ID. The 16 bits in the
  • 13. Page 13 of 14 third and fourth octet represent host ID, allowing for approximately 65,000 hosts per network. Class B network number values begin at 128 and end at 191.  Range: 128.0.0.0 to 191.255.0.0 o First octet value range from 128 to 191  Subnet Mask: 255.255.0.0 (16 bits)  Number of Networks: 16,382  Number of Hosts per Network: 65,534 Class C Public Address Class C addresses are used in small local area networks (LANs). Class C allows for approximately 2 million networks by using the first three octets for the network ID. In class C address three bits are always set and fixed to 1 1 0. And in the first three octets 21 bits complete the total network ID. The 8 bits of the last octet represent the host ID allowing for 254 hosts per one network. Class C network number values begin at 192 and end at 223.  Range: 192.0.0.0 to 223.255.255.0 o First octet value range from 192 to 223  Subnet Mask: 255.255.255.0 (24 bits)  Number of Networks: 2,097,150  Number of Hosts per Network: 254 Class D Address Class Classes D are not allocated to hosts and are used for multicasting.  Range: 224.0.0.0 to 239.255.255.255 o First octet value range from 224 to 239  Number of Networks: N/A  Number of Hosts per Network: Multicasting Class E Address Class Classes E are not allocated to hosts and are not available for general use. They are reserved for research purposes.  Range: 240.0.0.0 to 255.255.255.255 o First octet value range from 240 to 255  Number of Networks: N/A  Number of Hosts per Network: Research/Reserved/Experimental
  • 14. Page 14 of 14 Private Addresses Within each network class, there are designated IP address that is reserved specifically for private/internal use only. This IP address cannot be used on Internet-facing devices as that are non- routable. For example, web servers and FTP servers must use non-private IP addresses. However, within your own home or business network, private IP addresses are assigned to your devices (such as workstations, printers, and file servers).  Class A Private Range: 10.0.0.0 to 10.255.255.255  Class B Private APIPA Range: 169.254.0.0 to 169.254.255.255 o Automatic Private IP Addressing (APIPA) is a feature on Microsoft Windows-based computers to automatically assign itself an IP address within this range if a Dynamic Host Configuration Protocol (DHCP) server is not available. A DHCP server is a device on a network that is responsible for assigning IP address to devices on the network.  Class B Private Range: 172.16.0.0 to 172.31.255.255  Class C Private Range: 192.168.0.0 to 192.168.255.255 Special Addresses  IP Range: 127.0.0.1 to 127.255.255.255 are network testing addresses (also referred to as loop-back addresses)