SlideShare a Scribd company logo
1 of 37
Download to read offline
2.1
Chapter 2
Network Models
Copyright © The McGraw-Hill Companies, Inc. Permission required for reproduction or display.
2.2
2-1 LAYERED TASKS
We use the concept of layers in our daily life. As an
example, let us consider two friends who communicate
through postal mail. The process of sending a letter to a
friend would be complex if there were no services
available from the post office.
Sender, Receiver, and Carrier
Hierarchy
Topics discussed in this section:
2.3
2-1 LAYERED TASKS
 Example: Sending a letter
 Components:
 Sender, Receiver, and Carriers
 Hierarchy:
 The tasks are done in order
 Services: the relations between layers
 Each layer uses the services of the layer below it
2.4
Figure 2.1 Tasks involved in sending a letter
2.5
2-2 THE OSI MODEL
 ISO was Established in 1947
 ISO is a multinational body for worldwide agreement on
international standards
 An ISO standard for network communications is the Open
Systems Interconnection (OSI) model
 The OSI model was first introduced in the late 1970s.
ISO is the organization.
OSI is the model.
Note
2.6
Figure 2.2 Seven layers of the OSI model
 Each layer represents a set
of networking functions
with related uses
 Comprehensive and flexible
modular architecture
 Each layer uses the
services of the layer
immediately below it via an
interface
 Each layer in the sending
side communicates with its
peer in the receiving side
using peer-to-peer
protocols
2.7
Figure 2.3 The interaction between layers in the OSI model
2.8
Figure 2.4 An exchange using the OSI model
2.9
2-3 LAYERS IN THE OSI MODEL
In this section we briefly describe the functions of each
layer in the OSI model.
Physical Layer
Data Link Layer
Network Layer
Transport Layer
Session Layer
Presentation Layer
Application Layer
Topics discussed in this section:
2.10
Figure 2.5 Physical layer
The physical layer is responsible for movements of
individual bits from one hop (node) to the next.
Note
2.11
Functions of the Physical Layer
 The physical characteristics:
 The interface between devices and the transmission media
 Representation of bits:
 The type of encoding into signals
 Transmission data rate:
 The number of bits per second and the bit duration
 Synchronization of bit transmission:
 Clocks between the sender and receiver
 Line configuration:
 The connection of devices to the media
 Physical topology:
 mesh, star, bus, etc.
 Transmission mode:
 duplex, simplex, etc.
2.12
Figure 2.6 Data link layer
The data link layer is responsible for moving
frames from one hop (node) to the next.
Note
2.13
Functions of the Data Link Layer
 Framing: divides the bit stream from network layer into frames
 Physical addressing: specifies the physical addresses (e.g. the
MAC addresses) of the sender and/or the receiver of the frame
 If the receiver is outside the sender’s network, the frame is sent to
the network connecting device (router or gateway)
 Flow control: a mechanism to avoid overwhelming the receiver
buffers by the sender’s data
 Error control: a mechanism to detect and/or correct
transmission errors cause by the physical channel.
 Detection and retransmission of damaged frames
 Prevent frame duplication
 Access control: determines and controls the access of the
communication link among the devices sharing the link
2.14
Figure 2.7 Hop-to-hop delivery
2.15
Figure 2.8 Network layer
The network layer is responsible for the
delivery of individual packets from
the source host to the destination host.
Note
2.16
Functions of the Network Layer
 Packet delivery:
 From source host to destination host across multiple networks.
 Logical addressing:
 For packet delivery outside the local network (or subnet), a
logical address is needed (e.g. IP address)
 Packet routing:
 Defines the routing or switching mechanism for the connecting
devices (i.e.; routers) in order to deliver the packets to the final
destination through an internetwork
2.17
Figure 2.9 Source-to-destination delivery
2.18
Figure 2.10 Transport layer
The transport layer is responsible for the delivery
of a message from one process to another.
Note
2.19
Functions of the Transport Layer
 Message delivery:
 From a specific process in the sending host to a specific process in
the destination host
 Segmenting and reassembling:
 Divide the message from the application layer of the sender side
into transmittable segments containing sequence numbers
 Reassemble the segments into messages at the receiver side
 Connection control:
 The type of connection: connectionless or connection-oriented
 Connectionless: packet are sent independently (e.g. UDP protocol)
 Connection-oriented: a connection is first established with the peer
before delivering the packets (e.g. TCP protocol)
 End-to-end flow control
 End-to-end error control
2.20
Figure 2.11 Reliable process-to-process delivery of a message
2.21
Figure 2.12 Session layer
The session layer is responsible for dialog
control and synchronization.
Note
2.22
Functions of the Session Layer
 Dialog Control
 Allows two systems to enter into a dialog
 Allows two processes to communicate
 Synchronization:
 Establish, maintain, and synchronize communicating
system interaction
 Add checkpoints in order to resume a session in case of a
crash
2.23
Figure 2.13 Presentation layer
The presentation layer is responsible for translation,
compression, and encryption.
Note
2.24
Functions of the Presentation Layer
 Handle the syntax and semantics of the information
exchange
 Translation:
 Sender-dependent formats into common formats
 Common formats into receiver-dependant formats
 Encryption and decryption:
 Encrypt sensitive sender information to insure privacy
 Decrypt at the receiver side to retain original message
 Compression:
 Reduce the size of transmitted message to speedup the
transmission
2.25
Figure 2.14 Application layer
The application layer is responsible for
providing services to the user.
Note
2.26
Functions of the Application Layer
 Enables the user, whether human or software, to
access the network
 Network virtual terminal:
 Software emulation of a terminal at a remote host
 File transfer, access, and management:
 Remote access and management of files and contents
 Mail services:
 Transfer and management of email messages
 Directory services:
 Access to distributed database sources
2.27
Figure 2.15 Summary of layers
2.28
2-4 TCP/IP PROTOCOL SUITE
The layers in the TCP/IP protocol suite do not exactly
match those in the OSI model. The original TCP/IP
protocol suite was defined as having four layers: host-
to-network, internet, transport, and application.
However, when TCP/IP is compared to OSI, we can say
that the TCP/IP protocol suite is made of five layers:
physical, data link, network, transport, and
application.
Physical and Data Link Layers
Network Layer
Transport Layer
Application Layer
Topics discussed in this section:
2.29
Figure 2.16 TCP/IP and OSI model
2.30
2-5 ADDRESSING
Four levels of addresses are used in an internet
employing the TCP/IP protocols: physical, logical, port,
and specific.
Physical Addresses
Logical Addresses
Port Addresses
Specific Addresses
Topics discussed in this section:
2.31
Figure 2.17 Addresses in TCP/IP
2.32
Figure 2.18 Relationship of layers and addresses in TCP/IP
2.33
Figure 2.19 Physical addresses
In Figure 2.19 a node with physical address 10 sends a frame to
a node with physical address 87. The two nodes are connected
by a link (bus topology LAN). As the figure shows, the computer
with physical address 10 is the sender, and the computer with
physical address 87 is the receiver.
Example 2.1
2.34
As we will see in Chapter 13, most local-area networks
use a 48-bit (6-byte) physical address written as 12
hexadecimal digits; every byte (2 hexadecimal digits) is
separated by a colon, as shown below:
Example 2.2
07:01:02:01:2C:4B
A 6-byte (12 hexadecimal digits) physical address.
2.35
Figure 2.20 IP addresses
Figure 2.20 shows a part of an
internet with two routers
connecting three LANs. Each
device (computer or router)
has a pair of addresses
(logical and physical) for each
connection. In this case, each
computer is connected to only
one link and therefore has
only one pair of addresses.
Each router, however, is
connected to three networks
(only two are shown in the
figure). So each router has
three pairs of addresses, one
for each connection.
Example 2.3
2.36
Figure 2.21 Port addresses
Figure 2.21 shows two
computers communicating via
the Internet. The sending
computer is running three
processes at this time with port
addresses a, b, and c. The
receiving computer is running
two processes at this time with
port addresses j and k. Process
a in the sending computer
needs to communicate with
process j in the receiving
computer. Note that although
physical addresses change
from hop to hop, logical and
port addresses remain the same
from the source to destination.
Example 2.4
2.37
Example 2.5
As we will see in Chapter 23, a port address is a 16-bit
address represented by one decimal number as shown.
753
A 16-bit port address represented
as one single number.
The physical addresses change from hop to hop,
but the logical and port addresses usually remain the same.
Note

More Related Content

Similar to Computer Networks/Computer Engineering.pdf (20)

Network_Model. In the field of Computer Networking.ppt
Network_Model. In the field of Computer Networking.pptNetwork_Model. In the field of Computer Networking.ppt
Network_Model. In the field of Computer Networking.ppt
 
ch02.ppt
ch02.pptch02.ppt
ch02.ppt
 
COMPUTER NETWORKS UNIT 1
COMPUTER NETWORKS UNIT 1COMPUTER NETWORKS UNIT 1
COMPUTER NETWORKS UNIT 1
 
Computer Network - Chapter 2
Computer Network - Chapter 2Computer Network - Chapter 2
Computer Network - Chapter 2
 
Ch02
Ch02Ch02
Ch02
 
Data Communications and Networking ch02
Data Communications and Networking  ch02Data Communications and Networking  ch02
Data Communications and Networking ch02
 
Ch02
Ch02Ch02
Ch02
 
Network Models.ppt
Network Models.pptNetwork Models.ppt
Network Models.ppt
 
1
11
1
 
Ch02
Ch02Ch02
Ch02
 
Network Models in Networking.
Network Models in Networking.Network Models in Networking.
Network Models in Networking.
 
1
11
1
 
02 Network Models
02 Network Models02 Network Models
02 Network Models
 
ch2_v1.ppt
ch2_v1.pptch2_v1.ppt
ch2_v1.ppt
 
dcn 2.ppt
dcn 2.pptdcn 2.ppt
dcn 2.ppt
 
ANAND1.ppt
ANAND1.pptANAND1.ppt
ANAND1.ppt
 
ch2_v1.ppt
ch2_v1.pptch2_v1.ppt
ch2_v1.ppt
 
Ch2 v1
Ch2 v1Ch2 v1
Ch2 v1
 
ch2_v1.ppt
ch2_v1.pptch2_v1.ppt
ch2_v1.ppt
 
Network.ppt
Network.pptNetwork.ppt
Network.ppt
 

More from abdnazar2003

laplace transform 2 .pdf
laplace transform 2                  .pdflaplace transform 2                  .pdf
laplace transform 2 .pdfabdnazar2003
 
laplace transform 1 .pdf
laplace transform 1                 .pdflaplace transform 1                 .pdf
laplace transform 1 .pdfabdnazar2003
 
C. N. II Lec.4.pdf h
C. N. II Lec.4.pdf                      hC. N. II Lec.4.pdf                      h
C. N. II Lec.4.pdf habdnazar2003
 
Lecture 2 Connecting LANs, Backbone Networks, and Virtual LANs.ppt
Lecture 2   Connecting LANs, Backbone Networks, and Virtual LANs.pptLecture 2   Connecting LANs, Backbone Networks, and Virtual LANs.ppt
Lecture 2 Connecting LANs, Backbone Networks, and Virtual LANs.pptabdnazar2003
 
Forouzan6e_ch06_PPTs_Accessible 2024.pptx
Forouzan6e_ch06_PPTs_Accessible 2024.pptxForouzan6e_ch06_PPTs_Accessible 2024.pptx
Forouzan6e_ch06_PPTs_Accessible 2024.pptxabdnazar2003
 
Computer Networks/Computer Engineering.pdf
Computer Networks/Computer Engineering.pdfComputer Networks/Computer Engineering.pdf
Computer Networks/Computer Engineering.pdfabdnazar2003
 
Computer Networks/Computer Engineering.pdf
Computer Networks/Computer Engineering.pdfComputer Networks/Computer Engineering.pdf
Computer Networks/Computer Engineering.pdfabdnazar2003
 
Computer Networks/Computer Engineering.pdf
Computer Networks/Computer Engineering.pdfComputer Networks/Computer Engineering.pdf
Computer Networks/Computer Engineering.pdfabdnazar2003
 
Computer Networks/Computer Engineering.pdf
Computer Networks/Computer Engineering.pdfComputer Networks/Computer Engineering.pdf
Computer Networks/Computer Engineering.pdfabdnazar2003
 
Computer Networks/Computer Engineering.pdf
Computer Networks/Computer Engineering.pdfComputer Networks/Computer Engineering.pdf
Computer Networks/Computer Engineering.pdfabdnazar2003
 
Computer Networks/Computer Engineering.pdf
Computer Networks/Computer Engineering.pdfComputer Networks/Computer Engineering.pdf
Computer Networks/Computer Engineering.pdfabdnazar2003
 
Computer Networks/Computer Engineering.pdf
Computer Networks/Computer Engineering.pdfComputer Networks/Computer Engineering.pdf
Computer Networks/Computer Engineering.pdfabdnazar2003
 

More from abdnazar2003 (20)

laplace transform 2 .pdf
laplace transform 2                  .pdflaplace transform 2                  .pdf
laplace transform 2 .pdf
 
laplace transform 1 .pdf
laplace transform 1                 .pdflaplace transform 1                 .pdf
laplace transform 1 .pdf
 
Lecture 4 .pdf
Lecture 4                              .pdfLecture 4                              .pdf
Lecture 4 .pdf
 
Lecture 3 .pdf
Lecture   3                         .pdfLecture   3                         .pdf
Lecture 3 .pdf
 
Lecture 2 .pptx
Lecture 2                            .pptxLecture 2                            .pptx
Lecture 2 .pptx
 
Lecture 2 .pdf
Lecture 2                           .pdfLecture 2                           .pdf
Lecture 2 .pdf
 
Lecture 1 .pptx
Lecture 1                            .pptxLecture 1                            .pptx
Lecture 1 .pptx
 
LEC3 t.pdf
LEC3                               t.pdfLEC3                               t.pdf
LEC3 t.pdf
 
LEC2 j.pdf
LEC2                               j.pdfLEC2                               j.pdf
LEC2 j.pdf
 
LEC1 h.pdf
LEC1                               h.pdfLEC1                               h.pdf
LEC1 h.pdf
 
C. N. II Lec.4.pdf h
C. N. II Lec.4.pdf                      hC. N. II Lec.4.pdf                      h
C. N. II Lec.4.pdf h
 
Lecture 2 Connecting LANs, Backbone Networks, and Virtual LANs.ppt
Lecture 2   Connecting LANs, Backbone Networks, and Virtual LANs.pptLecture 2   Connecting LANs, Backbone Networks, and Virtual LANs.ppt
Lecture 2 Connecting LANs, Backbone Networks, and Virtual LANs.ppt
 
Forouzan6e_ch06_PPTs_Accessible 2024.pptx
Forouzan6e_ch06_PPTs_Accessible 2024.pptxForouzan6e_ch06_PPTs_Accessible 2024.pptx
Forouzan6e_ch06_PPTs_Accessible 2024.pptx
 
Computer Networks/Computer Engineering.pdf
Computer Networks/Computer Engineering.pdfComputer Networks/Computer Engineering.pdf
Computer Networks/Computer Engineering.pdf
 
Computer Networks/Computer Engineering.pdf
Computer Networks/Computer Engineering.pdfComputer Networks/Computer Engineering.pdf
Computer Networks/Computer Engineering.pdf
 
Computer Networks/Computer Engineering.pdf
Computer Networks/Computer Engineering.pdfComputer Networks/Computer Engineering.pdf
Computer Networks/Computer Engineering.pdf
 
Computer Networks/Computer Engineering.pdf
Computer Networks/Computer Engineering.pdfComputer Networks/Computer Engineering.pdf
Computer Networks/Computer Engineering.pdf
 
Computer Networks/Computer Engineering.pdf
Computer Networks/Computer Engineering.pdfComputer Networks/Computer Engineering.pdf
Computer Networks/Computer Engineering.pdf
 
Computer Networks/Computer Engineering.pdf
Computer Networks/Computer Engineering.pdfComputer Networks/Computer Engineering.pdf
Computer Networks/Computer Engineering.pdf
 
Computer Networks/Computer Engineering.pdf
Computer Networks/Computer Engineering.pdfComputer Networks/Computer Engineering.pdf
Computer Networks/Computer Engineering.pdf
 

Recently uploaded

(ANJALI) Dange Chowk Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...
(ANJALI) Dange Chowk Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...(ANJALI) Dange Chowk Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...
(ANJALI) Dange Chowk Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...ranjana rawat
 
MANUFACTURING PROCESS-II UNIT-2 LATHE MACHINE
MANUFACTURING PROCESS-II UNIT-2 LATHE MACHINEMANUFACTURING PROCESS-II UNIT-2 LATHE MACHINE
MANUFACTURING PROCESS-II UNIT-2 LATHE MACHINESIVASHANKAR N
 
Russian Call Girls in Nagpur Grishma Call 7001035870 Meet With Nagpur Escorts
Russian Call Girls in Nagpur Grishma Call 7001035870 Meet With Nagpur EscortsRussian Call Girls in Nagpur Grishma Call 7001035870 Meet With Nagpur Escorts
Russian Call Girls in Nagpur Grishma Call 7001035870 Meet With Nagpur EscortsCall Girls in Nagpur High Profile
 
Booking open Available Pune Call Girls Koregaon Park 6297143586 Call Hot Ind...
Booking open Available Pune Call Girls Koregaon Park  6297143586 Call Hot Ind...Booking open Available Pune Call Girls Koregaon Park  6297143586 Call Hot Ind...
Booking open Available Pune Call Girls Koregaon Park 6297143586 Call Hot Ind...Call Girls in Nagpur High Profile
 
Extrusion Processes and Their Limitations
Extrusion Processes and Their LimitationsExtrusion Processes and Their Limitations
Extrusion Processes and Their Limitations120cr0395
 
VIP Call Girls Ankleshwar 7001035870 Whatsapp Number, 24/07 Booking
VIP Call Girls Ankleshwar 7001035870 Whatsapp Number, 24/07 BookingVIP Call Girls Ankleshwar 7001035870 Whatsapp Number, 24/07 Booking
VIP Call Girls Ankleshwar 7001035870 Whatsapp Number, 24/07 Bookingdharasingh5698
 
High Profile Call Girls Nagpur Meera Call 7001035870 Meet With Nagpur Escorts
High Profile Call Girls Nagpur Meera Call 7001035870 Meet With Nagpur EscortsHigh Profile Call Girls Nagpur Meera Call 7001035870 Meet With Nagpur Escorts
High Profile Call Girls Nagpur Meera Call 7001035870 Meet With Nagpur EscortsCall Girls in Nagpur High Profile
 
UNIT-V FMM.HYDRAULIC TURBINE - Construction and working
UNIT-V FMM.HYDRAULIC TURBINE - Construction and workingUNIT-V FMM.HYDRAULIC TURBINE - Construction and working
UNIT-V FMM.HYDRAULIC TURBINE - Construction and workingrknatarajan
 
Sheet Pile Wall Design and Construction: A Practical Guide for Civil Engineer...
Sheet Pile Wall Design and Construction: A Practical Guide for Civil Engineer...Sheet Pile Wall Design and Construction: A Practical Guide for Civil Engineer...
Sheet Pile Wall Design and Construction: A Practical Guide for Civil Engineer...Dr.Costas Sachpazis
 
University management System project report..pdf
University management System project report..pdfUniversity management System project report..pdf
University management System project report..pdfKamal Acharya
 
Processing & Properties of Floor and Wall Tiles.pptx
Processing & Properties of Floor and Wall Tiles.pptxProcessing & Properties of Floor and Wall Tiles.pptx
Processing & Properties of Floor and Wall Tiles.pptxpranjaldaimarysona
 
Call for Papers - African Journal of Biological Sciences, E-ISSN: 2663-2187, ...
Call for Papers - African Journal of Biological Sciences, E-ISSN: 2663-2187, ...Call for Papers - African Journal of Biological Sciences, E-ISSN: 2663-2187, ...
Call for Papers - African Journal of Biological Sciences, E-ISSN: 2663-2187, ...Christo Ananth
 
High Profile Call Girls Nagpur Isha Call 7001035870 Meet With Nagpur Escorts
High Profile Call Girls Nagpur Isha Call 7001035870 Meet With Nagpur EscortsHigh Profile Call Girls Nagpur Isha Call 7001035870 Meet With Nagpur Escorts
High Profile Call Girls Nagpur Isha Call 7001035870 Meet With Nagpur Escortsranjana rawat
 
AKTU Computer Networks notes --- Unit 3.pdf
AKTU Computer Networks notes ---  Unit 3.pdfAKTU Computer Networks notes ---  Unit 3.pdf
AKTU Computer Networks notes --- Unit 3.pdfankushspencer015
 
ONLINE FOOD ORDER SYSTEM PROJECT REPORT.pdf
ONLINE FOOD ORDER SYSTEM PROJECT REPORT.pdfONLINE FOOD ORDER SYSTEM PROJECT REPORT.pdf
ONLINE FOOD ORDER SYSTEM PROJECT REPORT.pdfKamal Acharya
 
Introduction and different types of Ethernet.pptx
Introduction and different types of Ethernet.pptxIntroduction and different types of Ethernet.pptx
Introduction and different types of Ethernet.pptxupamatechverse
 
Call Girls in Nagpur Suman Call 7001035870 Meet With Nagpur Escorts
Call Girls in Nagpur Suman Call 7001035870 Meet With Nagpur EscortsCall Girls in Nagpur Suman Call 7001035870 Meet With Nagpur Escorts
Call Girls in Nagpur Suman Call 7001035870 Meet With Nagpur EscortsCall Girls in Nagpur High Profile
 
MANUFACTURING PROCESS-II UNIT-5 NC MACHINE TOOLS
MANUFACTURING PROCESS-II UNIT-5 NC MACHINE TOOLSMANUFACTURING PROCESS-II UNIT-5 NC MACHINE TOOLS
MANUFACTURING PROCESS-II UNIT-5 NC MACHINE TOOLSSIVASHANKAR N
 

Recently uploaded (20)

(ANJALI) Dange Chowk Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...
(ANJALI) Dange Chowk Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...(ANJALI) Dange Chowk Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...
(ANJALI) Dange Chowk Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...
 
MANUFACTURING PROCESS-II UNIT-2 LATHE MACHINE
MANUFACTURING PROCESS-II UNIT-2 LATHE MACHINEMANUFACTURING PROCESS-II UNIT-2 LATHE MACHINE
MANUFACTURING PROCESS-II UNIT-2 LATHE MACHINE
 
Russian Call Girls in Nagpur Grishma Call 7001035870 Meet With Nagpur Escorts
Russian Call Girls in Nagpur Grishma Call 7001035870 Meet With Nagpur EscortsRussian Call Girls in Nagpur Grishma Call 7001035870 Meet With Nagpur Escorts
Russian Call Girls in Nagpur Grishma Call 7001035870 Meet With Nagpur Escorts
 
Booking open Available Pune Call Girls Koregaon Park 6297143586 Call Hot Ind...
Booking open Available Pune Call Girls Koregaon Park  6297143586 Call Hot Ind...Booking open Available Pune Call Girls Koregaon Park  6297143586 Call Hot Ind...
Booking open Available Pune Call Girls Koregaon Park 6297143586 Call Hot Ind...
 
Extrusion Processes and Their Limitations
Extrusion Processes and Their LimitationsExtrusion Processes and Their Limitations
Extrusion Processes and Their Limitations
 
VIP Call Girls Ankleshwar 7001035870 Whatsapp Number, 24/07 Booking
VIP Call Girls Ankleshwar 7001035870 Whatsapp Number, 24/07 BookingVIP Call Girls Ankleshwar 7001035870 Whatsapp Number, 24/07 Booking
VIP Call Girls Ankleshwar 7001035870 Whatsapp Number, 24/07 Booking
 
Roadmap to Membership of RICS - Pathways and Routes
Roadmap to Membership of RICS - Pathways and RoutesRoadmap to Membership of RICS - Pathways and Routes
Roadmap to Membership of RICS - Pathways and Routes
 
High Profile Call Girls Nagpur Meera Call 7001035870 Meet With Nagpur Escorts
High Profile Call Girls Nagpur Meera Call 7001035870 Meet With Nagpur EscortsHigh Profile Call Girls Nagpur Meera Call 7001035870 Meet With Nagpur Escorts
High Profile Call Girls Nagpur Meera Call 7001035870 Meet With Nagpur Escorts
 
UNIT-V FMM.HYDRAULIC TURBINE - Construction and working
UNIT-V FMM.HYDRAULIC TURBINE - Construction and workingUNIT-V FMM.HYDRAULIC TURBINE - Construction and working
UNIT-V FMM.HYDRAULIC TURBINE - Construction and working
 
Sheet Pile Wall Design and Construction: A Practical Guide for Civil Engineer...
Sheet Pile Wall Design and Construction: A Practical Guide for Civil Engineer...Sheet Pile Wall Design and Construction: A Practical Guide for Civil Engineer...
Sheet Pile Wall Design and Construction: A Practical Guide for Civil Engineer...
 
University management System project report..pdf
University management System project report..pdfUniversity management System project report..pdf
University management System project report..pdf
 
Processing & Properties of Floor and Wall Tiles.pptx
Processing & Properties of Floor and Wall Tiles.pptxProcessing & Properties of Floor and Wall Tiles.pptx
Processing & Properties of Floor and Wall Tiles.pptx
 
Water Industry Process Automation & Control Monthly - April 2024
Water Industry Process Automation & Control Monthly - April 2024Water Industry Process Automation & Control Monthly - April 2024
Water Industry Process Automation & Control Monthly - April 2024
 
Call for Papers - African Journal of Biological Sciences, E-ISSN: 2663-2187, ...
Call for Papers - African Journal of Biological Sciences, E-ISSN: 2663-2187, ...Call for Papers - African Journal of Biological Sciences, E-ISSN: 2663-2187, ...
Call for Papers - African Journal of Biological Sciences, E-ISSN: 2663-2187, ...
 
High Profile Call Girls Nagpur Isha Call 7001035870 Meet With Nagpur Escorts
High Profile Call Girls Nagpur Isha Call 7001035870 Meet With Nagpur EscortsHigh Profile Call Girls Nagpur Isha Call 7001035870 Meet With Nagpur Escorts
High Profile Call Girls Nagpur Isha Call 7001035870 Meet With Nagpur Escorts
 
AKTU Computer Networks notes --- Unit 3.pdf
AKTU Computer Networks notes ---  Unit 3.pdfAKTU Computer Networks notes ---  Unit 3.pdf
AKTU Computer Networks notes --- Unit 3.pdf
 
ONLINE FOOD ORDER SYSTEM PROJECT REPORT.pdf
ONLINE FOOD ORDER SYSTEM PROJECT REPORT.pdfONLINE FOOD ORDER SYSTEM PROJECT REPORT.pdf
ONLINE FOOD ORDER SYSTEM PROJECT REPORT.pdf
 
Introduction and different types of Ethernet.pptx
Introduction and different types of Ethernet.pptxIntroduction and different types of Ethernet.pptx
Introduction and different types of Ethernet.pptx
 
Call Girls in Nagpur Suman Call 7001035870 Meet With Nagpur Escorts
Call Girls in Nagpur Suman Call 7001035870 Meet With Nagpur EscortsCall Girls in Nagpur Suman Call 7001035870 Meet With Nagpur Escorts
Call Girls in Nagpur Suman Call 7001035870 Meet With Nagpur Escorts
 
MANUFACTURING PROCESS-II UNIT-5 NC MACHINE TOOLS
MANUFACTURING PROCESS-II UNIT-5 NC MACHINE TOOLSMANUFACTURING PROCESS-II UNIT-5 NC MACHINE TOOLS
MANUFACTURING PROCESS-II UNIT-5 NC MACHINE TOOLS
 

Computer Networks/Computer Engineering.pdf

  • 1. 2.1 Chapter 2 Network Models Copyright © The McGraw-Hill Companies, Inc. Permission required for reproduction or display.
  • 2. 2.2 2-1 LAYERED TASKS We use the concept of layers in our daily life. As an example, let us consider two friends who communicate through postal mail. The process of sending a letter to a friend would be complex if there were no services available from the post office. Sender, Receiver, and Carrier Hierarchy Topics discussed in this section:
  • 3. 2.3 2-1 LAYERED TASKS  Example: Sending a letter  Components:  Sender, Receiver, and Carriers  Hierarchy:  The tasks are done in order  Services: the relations between layers  Each layer uses the services of the layer below it
  • 4. 2.4 Figure 2.1 Tasks involved in sending a letter
  • 5. 2.5 2-2 THE OSI MODEL  ISO was Established in 1947  ISO is a multinational body for worldwide agreement on international standards  An ISO standard for network communications is the Open Systems Interconnection (OSI) model  The OSI model was first introduced in the late 1970s. ISO is the organization. OSI is the model. Note
  • 6. 2.6 Figure 2.2 Seven layers of the OSI model  Each layer represents a set of networking functions with related uses  Comprehensive and flexible modular architecture  Each layer uses the services of the layer immediately below it via an interface  Each layer in the sending side communicates with its peer in the receiving side using peer-to-peer protocols
  • 7. 2.7 Figure 2.3 The interaction between layers in the OSI model
  • 8. 2.8 Figure 2.4 An exchange using the OSI model
  • 9. 2.9 2-3 LAYERS IN THE OSI MODEL In this section we briefly describe the functions of each layer in the OSI model. Physical Layer Data Link Layer Network Layer Transport Layer Session Layer Presentation Layer Application Layer Topics discussed in this section:
  • 10. 2.10 Figure 2.5 Physical layer The physical layer is responsible for movements of individual bits from one hop (node) to the next. Note
  • 11. 2.11 Functions of the Physical Layer  The physical characteristics:  The interface between devices and the transmission media  Representation of bits:  The type of encoding into signals  Transmission data rate:  The number of bits per second and the bit duration  Synchronization of bit transmission:  Clocks between the sender and receiver  Line configuration:  The connection of devices to the media  Physical topology:  mesh, star, bus, etc.  Transmission mode:  duplex, simplex, etc.
  • 12. 2.12 Figure 2.6 Data link layer The data link layer is responsible for moving frames from one hop (node) to the next. Note
  • 13. 2.13 Functions of the Data Link Layer  Framing: divides the bit stream from network layer into frames  Physical addressing: specifies the physical addresses (e.g. the MAC addresses) of the sender and/or the receiver of the frame  If the receiver is outside the sender’s network, the frame is sent to the network connecting device (router or gateway)  Flow control: a mechanism to avoid overwhelming the receiver buffers by the sender’s data  Error control: a mechanism to detect and/or correct transmission errors cause by the physical channel.  Detection and retransmission of damaged frames  Prevent frame duplication  Access control: determines and controls the access of the communication link among the devices sharing the link
  • 15. 2.15 Figure 2.8 Network layer The network layer is responsible for the delivery of individual packets from the source host to the destination host. Note
  • 16. 2.16 Functions of the Network Layer  Packet delivery:  From source host to destination host across multiple networks.  Logical addressing:  For packet delivery outside the local network (or subnet), a logical address is needed (e.g. IP address)  Packet routing:  Defines the routing or switching mechanism for the connecting devices (i.e.; routers) in order to deliver the packets to the final destination through an internetwork
  • 18. 2.18 Figure 2.10 Transport layer The transport layer is responsible for the delivery of a message from one process to another. Note
  • 19. 2.19 Functions of the Transport Layer  Message delivery:  From a specific process in the sending host to a specific process in the destination host  Segmenting and reassembling:  Divide the message from the application layer of the sender side into transmittable segments containing sequence numbers  Reassemble the segments into messages at the receiver side  Connection control:  The type of connection: connectionless or connection-oriented  Connectionless: packet are sent independently (e.g. UDP protocol)  Connection-oriented: a connection is first established with the peer before delivering the packets (e.g. TCP protocol)  End-to-end flow control  End-to-end error control
  • 20. 2.20 Figure 2.11 Reliable process-to-process delivery of a message
  • 21. 2.21 Figure 2.12 Session layer The session layer is responsible for dialog control and synchronization. Note
  • 22. 2.22 Functions of the Session Layer  Dialog Control  Allows two systems to enter into a dialog  Allows two processes to communicate  Synchronization:  Establish, maintain, and synchronize communicating system interaction  Add checkpoints in order to resume a session in case of a crash
  • 23. 2.23 Figure 2.13 Presentation layer The presentation layer is responsible for translation, compression, and encryption. Note
  • 24. 2.24 Functions of the Presentation Layer  Handle the syntax and semantics of the information exchange  Translation:  Sender-dependent formats into common formats  Common formats into receiver-dependant formats  Encryption and decryption:  Encrypt sensitive sender information to insure privacy  Decrypt at the receiver side to retain original message  Compression:  Reduce the size of transmitted message to speedup the transmission
  • 25. 2.25 Figure 2.14 Application layer The application layer is responsible for providing services to the user. Note
  • 26. 2.26 Functions of the Application Layer  Enables the user, whether human or software, to access the network  Network virtual terminal:  Software emulation of a terminal at a remote host  File transfer, access, and management:  Remote access and management of files and contents  Mail services:  Transfer and management of email messages  Directory services:  Access to distributed database sources
  • 28. 2.28 2-4 TCP/IP PROTOCOL SUITE The layers in the TCP/IP protocol suite do not exactly match those in the OSI model. The original TCP/IP protocol suite was defined as having four layers: host- to-network, internet, transport, and application. However, when TCP/IP is compared to OSI, we can say that the TCP/IP protocol suite is made of five layers: physical, data link, network, transport, and application. Physical and Data Link Layers Network Layer Transport Layer Application Layer Topics discussed in this section:
  • 29. 2.29 Figure 2.16 TCP/IP and OSI model
  • 30. 2.30 2-5 ADDRESSING Four levels of addresses are used in an internet employing the TCP/IP protocols: physical, logical, port, and specific. Physical Addresses Logical Addresses Port Addresses Specific Addresses Topics discussed in this section:
  • 32. 2.32 Figure 2.18 Relationship of layers and addresses in TCP/IP
  • 33. 2.33 Figure 2.19 Physical addresses In Figure 2.19 a node with physical address 10 sends a frame to a node with physical address 87. The two nodes are connected by a link (bus topology LAN). As the figure shows, the computer with physical address 10 is the sender, and the computer with physical address 87 is the receiver. Example 2.1
  • 34. 2.34 As we will see in Chapter 13, most local-area networks use a 48-bit (6-byte) physical address written as 12 hexadecimal digits; every byte (2 hexadecimal digits) is separated by a colon, as shown below: Example 2.2 07:01:02:01:2C:4B A 6-byte (12 hexadecimal digits) physical address.
  • 35. 2.35 Figure 2.20 IP addresses Figure 2.20 shows a part of an internet with two routers connecting three LANs. Each device (computer or router) has a pair of addresses (logical and physical) for each connection. In this case, each computer is connected to only one link and therefore has only one pair of addresses. Each router, however, is connected to three networks (only two are shown in the figure). So each router has three pairs of addresses, one for each connection. Example 2.3
  • 36. 2.36 Figure 2.21 Port addresses Figure 2.21 shows two computers communicating via the Internet. The sending computer is running three processes at this time with port addresses a, b, and c. The receiving computer is running two processes at this time with port addresses j and k. Process a in the sending computer needs to communicate with process j in the receiving computer. Note that although physical addresses change from hop to hop, logical and port addresses remain the same from the source to destination. Example 2.4
  • 37. 2.37 Example 2.5 As we will see in Chapter 23, a port address is a 16-bit address represented by one decimal number as shown. 753 A 16-bit port address represented as one single number. The physical addresses change from hop to hop, but the logical and port addresses usually remain the same. Note