SlideShare a Scribd company logo
1 of 35
TABLE OF CONTENT
 INTRODUCTION
 ROLE
 OBJECTIVE
 FUNCTION NETWORK LAYER
 NETWORK LAYER PROTOCOL
 OSI MODEL
 BASIC REQUIREMENT OF PROTOCOL
 EX:ENTHERNET PROTOCOL
 INTERNET PROTOCOL
 IPv4
 BEST DELIVERY
 ADDRESSING
 PACKET STRUCTURE
 PACKET TRANSFER
 GROUPING DEVICES IN NETWORK& HIERARCHICAL ADDRESSING
 FUNDAMENTAL OF ROUTE,NEXT HOP,ADDRESS AND PACKET FOWARDING
 PROBLEM
 ROUTER
 SUMMARY
INTRODUCTION
 The protocols of the OSI model Network layer specify
 addressing and processes that enable Transport layer
 data to be packaged and transported. The Network
 layer encapsulation allows its contents to be passed to
 the destination within a network or on another
 network with minimum overhead.
ROLE
 Examining how it divides networks into groups of
 hosts to manage the flow of data packets within a
 network. We also consider how communication
 between networks is facilitated. This communication
 between networks is called routing.
OBJECTIVE
 Identify the role of the Network layer as it describes
    communication from one end device to another end
    device.
   Examine the most common Network layer
    protocol, Internet Protocol (IP), and its features for
    providing connectionless and best-effort service.
   Understand the principles used to guide the division, or
    grouping, of devices into networks.
   Understand the hierarchical addressing of devices and how
    this allows communication between networks.
   Understand the fundamentals of routes, next-hop
    addresses, and packet forwarding to a destination network.
FUNCTION OF NETWORK LAYER
 Connection model
 Host addressing
 Message forwarding
NETWORK LAYER PROTOCOL
• A communications protocol is a formal description of
  digital message formats and the rules for exchanging those
  messages in or between computing systems and in
  telecommunications.

• Protocols may include signaling, authentication and error
  detection and correction capabilities.

• Communicating systems use well-defined formats for
  exchanging messages. Describes the syntax, semantics, and
  synchronization of communication.
 A programming language describes the same for computations, so
  there is a close analogy between protocols and programming
  languages: protocols are to communications what programming
  languages are to computations.
 Protocol exists in Network Layer:

   IPv4/IPv6, Internet Protocol
   DVMRP, Distance Vector Multicast Routing Protocol
   ICMP, Internet Control Message Protocol
   IGMP, Internet Group Multicast Protocol
   PIM-SM, Protocol Independent Multicast Sparse Mode
   PIM-DM, Protocol Independent Multicast Dense Mode
   IPsec, Internet Protocol Security
   IPX, Internetwork Packet Exchange
   RIP, Routing Information Protocol
   DDP, Datagram Delivery Protocol

 The level of a sub-document determines the class it belongs to. The
    sub-documents belonging to a class all provide similar functionality
    and, when form follows function, have similar form.
 The Network Layer is Layer 3 of the seven-layer OSI model of
  computer networking.

 The Network Layer is responsible for routing packets delivery including
  routing through intermediate routers, whereas the Data Link Layer is
  responsible for Media Access Control, Flow Control and Error
  Checking.

 The Network Layer provides the functional and procedural means of
  transferring variable length data sequences from a source to a
  destination host via one or more networks while maintaining the
  quality of service functions.
Connection model(connectionless communication)
 For example, IP is connectionless, in that a frame can travel
  from a sender to a recipient without the recipient having to
  send an acknowledgement.

Host addressing
 Every host in the network needs to have a unique address
  which determines where it is. This address will normally be
  assigned from a hierarchical system.
OSI MODEL
BASIC REQUIREMENT OF PROTOCOL
 Data formats for data exchange. In digital message bit strings are exchanged.
  The bit strings are divided in fields and each field carries information relevant
  to the protocol. Conceptually the bit string is divided into two parts called the
  header area and the data area.

 Address formats for data exchange. The addresses are used to identify both the
  sender and the intended receiver(s).

 Address mapping. Sometimes protocols need to map addresses of one scheme
  on addresses of another scheme. For instance to translate a logical IP address
  specified by the application to a hardware address.

 Routing. When systems are not directly connected, intermediary systems along
  the route to the intended receiver(s) need to forward messages (instead of
  discarding them) on behalf of the sender.
 Detection of transmission errors is necessary, because no network is
  error-free. Bits of the bit string become corrupted or lost.

 Acknowledgements of correct reception of packets by the receiver are
  usually used to prevent the sender from retransmitting the packets.
  Some protocols, notably datagram protocols like the Internet Protocol
  (IP), do not acknowledge.

 Loss of information - timeouts and retries. Sometimes packets are lost
  on the network or suffer from long delays. To cope with this, a sender
  expects an acknowledgement of correct reception from the receiver
  within a certain amount of time.

 Direction of information flow needs to be addressed if transmissions
  can only occur in one direction at a time (half-duplex links). To gain
  control of the link a sender must wait until the line becomes idle and
  then send a message indicating its wish to do so.
 Sequence control. We have seen that long bitstrings are divided in
  pieces, that are send on the network individually. The pieces may get
  'lost' on the network or arrive out of sequence, because the pieces can
  take different routes to their destination.

 Flow control is needed when the sender transmits faster than the
  receiver can process the transmissions or when the network becomes
  congested. Sometimes, arrangements can be made to slow down the
  sender, but in many cases this is outside the control of the protocol.

 Getting the data across is only part of the problem. The data received
  has to be evaluated in the context of the progress of the
  conversation, so a protocol has to specify rules describing the context
  and explaining whether the (form of the) data fits this context or not.
EX: ENTHERNET PROTOCOL
  Ethernet was invented at Xerox PARC in the early 1970s. It has gained
   widespread use on LANs and became standardized as IEEE standard
   802.3.To connect to a LAN, a computer has to be equipped with an
   Ethernet network interface card.

  Conceptually, all stations share a single communication channel called
   a shared bus. Transmissions on this channel are received by all stations
   at (nearly) the same time. The hardware provides no indication to the
   sender about whether the transmission was delivered and is therefore
   called a best-effort delivery mechanism.

  Stations wanting to transmit, wait for the channel to become free and
   then start transmitting one single frame and then stop for a small
   amount of time before transmitting a next frame to allow others to
   transmit.
INTERNET PROTOCOL
 The Internet Protocol (IP) is the principal communications protocol
  used for relaying datagram (packets) across an internetwork using the
  Internet Protocol Suite. Responsible for routing packets across network
  boundaries, it is the primary protocol that establishes the Internet.

 As a consequence of this design, the Internet Protocol only provides best
  effort delivery and its service can also be characterized as unreliable. In
  network architectural language it is a connection-less protocol, in contrast
  to so-called connection-oriented modes of transmission.

The lack of reliability allows any of the following fault events to occur:
 data corruption
 lost data packets
 duplicate arrival
 out-of-order packet delivery
 The Internet Protocol is responsible for addressing
  hosts and routing datagram (packets) from a
  source host to the destination host across one or
  more IP networks.
 For this purpose the Internet Protocol defines an
  addressing system that has two functions.
 Addresses identify hosts and provide a logical
  location service.
IPv4
 Internet Protocol version 4 (IPv4) is the fourth revision in the development
  of the Internet Protocol (IP) and it is the first version of the protocol to be
  widely deployed.

 Together with IPv6, it is at the core of standards-based internetworking
  methods of the Internet. IPv4 is still by far the most widely deployed Internet
  Layer protocol. As of 2011, IPv6 deployment is still in its infancy.

 IPv4 uses 32-bit (four-byte) addresses, which limits the address space to
  4,294,967,296 (232) possible unique addresses. However, some are
  reserved for special purposes such as private networks (~18 million
  addresses) or multicast addresses (~270 million addresses).

 IPv4 addresses may simply be written in any notation expressing a 32-bit
  integer value, but for human convenience, they are most often written in dot-
  decimal notation, which consists of the four octets of the address expressed
  separately in decimal and separated by periods.
BEST DELIVERY
 Best effort delivery describes a network service in which the network does
  not provide any guarantees that data is delivered or that a user is given a
  guaranteed quality of service level or a certain priority.

 Conventional telephone networks are not based on best-effort communication,
  but on circuit switching. During the connection phase of a new call, resources
  are reserved in the telephone exchanges, or the user is informed that the call is
  blocked due to lack of free capacity.

 The mailman will make his "best effort" to try to deliver a message, but the
  delivery may be delayed if too many letters arrive to a postal office suddenly.
  The sender is not informed if a letter has been delivered successfully.

 However, the best-effort paradigm is to some extent abandoned on the
  Internet. Modern IP routers provide mechanisms for differentiated or
  guaranteed quality of service to certain data flows, based on for example the
  IntServ or DiffServ protocols.
ADDRESSING
 It is a common misunderstanding that addresses ending with an octet of 0 or
  255 can never be assigned to hosts.

 In glassful addressing (now obsolete with the advent of CIDR), there are only
  three possible subnet masks: Class A, 255.0.0.0 or /8; Class B, 255.255.0.0 or /16;
  and Class C, 255.255.255.0 or /24.

 However, this does not mean that every addresses ending in 255 cannot be used
  as a host address. For example, in the case of a Class B subnet
  192.168.0.0/255.255.0.0 (or 192.168.0.0/16), equivalent to the address range
  192.168.0.0–192.168.255.255, the broadcast address is 192.168.255.255.

 However, one can assign 192.168.1.255, 192.168.2.255, etc. (though this can cause
  confusion). Also, 192.168.0.0 is the network identifier and so cannot be
  assigned, but 192.168.1.0, 192.168.2.0, etc. can be assigned (though this can also
  cause confusion).
PACKET STRUCTURE
Header
 The fields in the header are packed with the most significant byte first (big
  endian), and for the diagram and discussion, the most significant bits are
  considered to come first (MSB 0 bit numbering). The most significant bit is
  numbered 0, so the version field is actually found in the four most significant
  bits of the first byte, for example.




Version
 The first header field in an IP packet is the four-bit version field. For IPv4, this
  has a value of 4 (hence the name IPv4).
PACKET STRUCTURE
GROUPING DEVICE IN NETWORK & HIERARHICAL
ADDRESSING
GROUPING DEVICE IN NETWORK & HIERARHICAL
ADDRESSING
GROUPING DEVICE IN NETWORK & HIERARHICAL
ADDRESSING
GROUPING DEVICE IN NETWORK & HIERARHICAL
ADDRESSING
FUNDAMENTAL OF ROUTER,NEXT HOP,ADDRESS &
               PACKET FOWARDING




   .
FUNDAMENTAL OF ROUTER,NEXT HOP,ADDRESS
& PACKET FOWARDING


 Route assignment, route choice, or traffic assignment concerns
  the selection of routes (alternative called paths) between origins and
  destinations in transportation networks. It is the fourth step in the
  conventional transportation forecasting model, following Trip
  Generation, Destination Choice, and Mode Choice.

 The zonal interchange analysis of trip distribution provides origin-
  destination trip tables. Mode choice analysis tells which travelers will
  use which mode.
PROBLEM WHEN USING MANY DEVICES IN A NETWORK

  The packets are passed to the router and waiting to
   be deployed.
  Host doesn’t know how to deliver the data.
  Because the delivery of data is done by the
   gateway.
  This will result in communication problems.
ROUTER

 Process of taking a URL endpoint and decomposing it into
  parameters to determine which module, controller, and
  action of that controller should receive the request.

 Routes may be used numerous times to create a chain or
  user defined application.

 A module name may be specified as the first path element.
ROUTING TABLE
PACKET TRANSFER USING ROUTER
ROUTING PROTOCOL
 The purpose of routing protocols is to tell the
  hardware between the transmitter and receiver where
  to send all the pieces of a network transmission.
 Routing protocol shares this information first among
  immediate neighbors, and then throughout the
  network.
 This way, routers gain knowledge of the topology of
  the network.
SUMMARY
 Understand the role of the network layer as it function
  communication from one end device to another end
  device.

 Explain the purpose of the Hierarchical Addressing of
  device and how this allows the communication between
  network.

 Understand the Fundamentals of Routes, Next Hop
  Addresses and Packet Forwarding

More Related Content

What's hot

OSI model (7 LAYER )
OSI model (7 LAYER )OSI model (7 LAYER )
OSI model (7 LAYER )AAKASH S
 
Network access layer security protocol
Network access layer security protocolNetwork access layer security protocol
Network access layer security protocolKirti Ahirrao
 
Network essentials chapter 3
Network essentials  chapter 3Network essentials  chapter 3
Network essentials chapter 3Raghu nath
 
Basic Networking Network
Basic Networking NetworkBasic Networking Network
Basic Networking NetworkJGrace Johnny
 
Osi protocols
Osi protocolsOsi protocols
Osi protocolsAli Usman
 
Protocol
ProtocolProtocol
ProtocolShi Na
 
Orientation to Computer Networks
Orientation to Computer NetworksOrientation to Computer Networks
Orientation to Computer NetworksMukesh Chinta
 
Networking interview questions and answers
Networking interview questions and answersNetworking interview questions and answers
Networking interview questions and answersAmit Tiwari
 
Networking Concepts Lesson 06 - Protocols - Eric Vanderburg
Networking Concepts Lesson 06 - Protocols - Eric VanderburgNetworking Concepts Lesson 06 - Protocols - Eric Vanderburg
Networking Concepts Lesson 06 - Protocols - Eric VanderburgEric Vanderburg
 
Networking-basics
Networking-basicsNetworking-basics
Networking-basicsRaj Alam
 
Ccn(Data communication and networking) edited solution-manual suitable to be ...
Ccn(Data communication and networking) edited solution-manual suitable to be ...Ccn(Data communication and networking) edited solution-manual suitable to be ...
Ccn(Data communication and networking) edited solution-manual suitable to be ...Vishal kakade
 

What's hot (20)

2010fall ch6 uugantsetseg
2010fall ch6 uugantsetseg2010fall ch6 uugantsetseg
2010fall ch6 uugantsetseg
 
Osi model in networking
Osi model in networkingOsi model in networking
Osi model in networking
 
Dod & osi model
Dod & osi modelDod & osi model
Dod & osi model
 
Iap final
Iap finalIap final
Iap final
 
OSI model (7 LAYER )
OSI model (7 LAYER )OSI model (7 LAYER )
OSI model (7 LAYER )
 
Network access layer security protocol
Network access layer security protocolNetwork access layer security protocol
Network access layer security protocol
 
Network essentials chapter 3
Network essentials  chapter 3Network essentials  chapter 3
Network essentials chapter 3
 
Basic Networking Network
Basic Networking NetworkBasic Networking Network
Basic Networking Network
 
Osi model
Osi modelOsi model
Osi model
 
Osi protocols
Osi protocolsOsi protocols
Osi protocols
 
2nd
2nd2nd
2nd
 
Computer network
Computer networkComputer network
Computer network
 
Protocol
ProtocolProtocol
Protocol
 
Orientation to Computer Networks
Orientation to Computer NetworksOrientation to Computer Networks
Orientation to Computer Networks
 
Networking interview questions and answers
Networking interview questions and answersNetworking interview questions and answers
Networking interview questions and answers
 
Networks software
Networks softwareNetworks software
Networks software
 
Networking Concepts Lesson 06 - Protocols - Eric Vanderburg
Networking Concepts Lesson 06 - Protocols - Eric VanderburgNetworking Concepts Lesson 06 - Protocols - Eric Vanderburg
Networking Concepts Lesson 06 - Protocols - Eric Vanderburg
 
Networking-basics
Networking-basicsNetworking-basics
Networking-basics
 
OSI Network Reference Model
OSI Network Reference ModelOSI Network Reference Model
OSI Network Reference Model
 
Ccn(Data communication and networking) edited solution-manual suitable to be ...
Ccn(Data communication and networking) edited solution-manual suitable to be ...Ccn(Data communication and networking) edited solution-manual suitable to be ...
Ccn(Data communication and networking) edited solution-manual suitable to be ...
 

Viewers also liked

Viewers also liked (6)

Tutorial transmission line details
Tutorial transmission line detailsTutorial transmission line details
Tutorial transmission line details
 
Csc339 – lecture 2 network fundamental
Csc339 – lecture 2 network fundamentalCsc339 – lecture 2 network fundamental
Csc339 – lecture 2 network fundamental
 
01. network topologies & cable
01. network topologies & cable01. network topologies & cable
01. network topologies & cable
 
Lan technologies
Lan technologiesLan technologies
Lan technologies
 
DITEC - Fundamentals in Networking
DITEC - Fundamentals in NetworkingDITEC - Fundamentals in Networking
DITEC - Fundamentals in Networking
 
Hfc d coaxial fiber optic
Hfc d coaxial fiber opticHfc d coaxial fiber optic
Hfc d coaxial fiber optic
 

Similar to Network fundamental

TCP IP PowerPoint presentation download.
TCP IP PowerPoint presentation download.TCP IP PowerPoint presentation download.
TCP IP PowerPoint presentation download.rp5373568
 
SYBSC IT COMPUTER NETWORKS UNIT I Network Models
SYBSC IT COMPUTER NETWORKS UNIT I Network ModelsSYBSC IT COMPUTER NETWORKS UNIT I Network Models
SYBSC IT COMPUTER NETWORKS UNIT I Network ModelsArti Parab Academics
 
Networking fundamentals
Networking  fundamentalsNetworking  fundamentals
Networking fundamentalsThe Avi Sharma
 
Data Communication IPv6, Ethernet, OSI Model, Transmission Impairments
Data Communication IPv6, Ethernet, OSI Model, Transmission ImpairmentsData Communication IPv6, Ethernet, OSI Model, Transmission Impairments
Data Communication IPv6, Ethernet, OSI Model, Transmission ImpairmentsShefa Idrees
 
Exploration network chapter_5_modified
Exploration network chapter_5_modifiedExploration network chapter_5_modified
Exploration network chapter_5_modifiedrajesh531
 
Internet protocols Report Slides
Internet protocols Report SlidesInternet protocols Report Slides
Internet protocols Report SlidesBassam Kanber
 
Reference models in Networks: OSI & TCP/IP
Reference models in Networks: OSI & TCP/IPReference models in Networks: OSI & TCP/IP
Reference models in Networks: OSI & TCP/IPMukesh Chinta
 
Unit_I_Computer Networks 4.pdf
Unit_I_Computer Networks 4.pdfUnit_I_Computer Networks 4.pdf
Unit_I_Computer Networks 4.pdfArumugam90
 
Network the 4th layer
Network the 4th layerNetwork the 4th layer
Network the 4th layerkachbourimed
 
Network essentials chapter 2
Network essentials  chapter 2Network essentials  chapter 2
Network essentials chapter 2Raghu nath
 
Automation Networking By Shivam Singh
Automation Networking By Shivam SinghAutomation Networking By Shivam Singh
Automation Networking By Shivam SinghShivam Singh
 
ETE405-lec7.ppt
ETE405-lec7.pptETE405-lec7.ppt
ETE405-lec7.pptmashiur
 

Similar to Network fundamental (20)

TCP IP PowerPoint presentation download.
TCP IP PowerPoint presentation download.TCP IP PowerPoint presentation download.
TCP IP PowerPoint presentation download.
 
SYBSC IT COMPUTER NETWORKS UNIT I Network Models
SYBSC IT COMPUTER NETWORKS UNIT I Network ModelsSYBSC IT COMPUTER NETWORKS UNIT I Network Models
SYBSC IT COMPUTER NETWORKS UNIT I Network Models
 
CCNA Report
CCNA ReportCCNA Report
CCNA Report
 
matdid018951.ppt
matdid018951.pptmatdid018951.ppt
matdid018951.ppt
 
Lecture 3- tcp-ip
Lecture  3- tcp-ipLecture  3- tcp-ip
Lecture 3- tcp-ip
 
Bhargava Presentation.ppt
Bhargava Presentation.pptBhargava Presentation.ppt
Bhargava Presentation.ppt
 
Bhargava Presentation.ppt
Bhargava Presentation.pptBhargava Presentation.ppt
Bhargava Presentation.ppt
 
Networking fundamentals
Networking  fundamentalsNetworking  fundamentals
Networking fundamentals
 
Data Communication IPv6, Ethernet, OSI Model, Transmission Impairments
Data Communication IPv6, Ethernet, OSI Model, Transmission ImpairmentsData Communication IPv6, Ethernet, OSI Model, Transmission Impairments
Data Communication IPv6, Ethernet, OSI Model, Transmission Impairments
 
Exploration network chapter_5_modified
Exploration network chapter_5_modifiedExploration network chapter_5_modified
Exploration network chapter_5_modified
 
01 pengenalan
01 pengenalan01 pengenalan
01 pengenalan
 
Internet protocols Report Slides
Internet protocols Report SlidesInternet protocols Report Slides
Internet protocols Report Slides
 
Reference models in Networks: OSI & TCP/IP
Reference models in Networks: OSI & TCP/IPReference models in Networks: OSI & TCP/IP
Reference models in Networks: OSI & TCP/IP
 
Unit_I_Computer Networks 4.pdf
Unit_I_Computer Networks 4.pdfUnit_I_Computer Networks 4.pdf
Unit_I_Computer Networks 4.pdf
 
Network the 4th layer
Network the 4th layerNetwork the 4th layer
Network the 4th layer
 
Network essentials chapter 2
Network essentials  chapter 2Network essentials  chapter 2
Network essentials chapter 2
 
Automation Networking By Shivam Singh
Automation Networking By Shivam SinghAutomation Networking By Shivam Singh
Automation Networking By Shivam Singh
 
ETE405-lec7.ppt
ETE405-lec7.pptETE405-lec7.ppt
ETE405-lec7.ppt
 
four
fourfour
four
 
Osi model
Osi modelOsi model
Osi model
 

Recently uploaded

ECONOMIC CONTEXT - LONG FORM TV DRAMA - PPT
ECONOMIC CONTEXT - LONG FORM TV DRAMA - PPTECONOMIC CONTEXT - LONG FORM TV DRAMA - PPT
ECONOMIC CONTEXT - LONG FORM TV DRAMA - PPTiammrhaywood
 
Introduction to AI in Higher Education_draft.pptx
Introduction to AI in Higher Education_draft.pptxIntroduction to AI in Higher Education_draft.pptx
Introduction to AI in Higher Education_draft.pptxpboyjonauth
 
HỌC TỐT TIẾNG ANH 11 THEO CHƯƠNG TRÌNH GLOBAL SUCCESS ĐÁP ÁN CHI TIẾT - CẢ NĂ...
HỌC TỐT TIẾNG ANH 11 THEO CHƯƠNG TRÌNH GLOBAL SUCCESS ĐÁP ÁN CHI TIẾT - CẢ NĂ...HỌC TỐT TIẾNG ANH 11 THEO CHƯƠNG TRÌNH GLOBAL SUCCESS ĐÁP ÁN CHI TIẾT - CẢ NĂ...
HỌC TỐT TIẾNG ANH 11 THEO CHƯƠNG TRÌNH GLOBAL SUCCESS ĐÁP ÁN CHI TIẾT - CẢ NĂ...Nguyen Thanh Tu Collection
 
ENGLISH 7_Q4_LESSON 2_ Employing a Variety of Strategies for Effective Interp...
ENGLISH 7_Q4_LESSON 2_ Employing a Variety of Strategies for Effective Interp...ENGLISH 7_Q4_LESSON 2_ Employing a Variety of Strategies for Effective Interp...
ENGLISH 7_Q4_LESSON 2_ Employing a Variety of Strategies for Effective Interp...JhezDiaz1
 
Employee wellbeing at the workplace.pptx
Employee wellbeing at the workplace.pptxEmployee wellbeing at the workplace.pptx
Employee wellbeing at the workplace.pptxNirmalaLoungPoorunde1
 
Framing an Appropriate Research Question 6b9b26d93da94caf993c038d9efcdedb.pdf
Framing an Appropriate Research Question 6b9b26d93da94caf993c038d9efcdedb.pdfFraming an Appropriate Research Question 6b9b26d93da94caf993c038d9efcdedb.pdf
Framing an Appropriate Research Question 6b9b26d93da94caf993c038d9efcdedb.pdfUjwalaBharambe
 
Solving Puzzles Benefits Everyone (English).pptx
Solving Puzzles Benefits Everyone (English).pptxSolving Puzzles Benefits Everyone (English).pptx
Solving Puzzles Benefits Everyone (English).pptxOH TEIK BIN
 
How to do quick user assign in kanban in Odoo 17 ERP
How to do quick user assign in kanban in Odoo 17 ERPHow to do quick user assign in kanban in Odoo 17 ERP
How to do quick user assign in kanban in Odoo 17 ERPCeline George
 
Keynote by Prof. Wurzer at Nordex about IP-design
Keynote by Prof. Wurzer at Nordex about IP-designKeynote by Prof. Wurzer at Nordex about IP-design
Keynote by Prof. Wurzer at Nordex about IP-designMIPLM
 
Roles & Responsibilities in Pharmacovigilance
Roles & Responsibilities in PharmacovigilanceRoles & Responsibilities in Pharmacovigilance
Roles & Responsibilities in PharmacovigilanceSamikshaHamane
 
ECONOMIC CONTEXT - PAPER 1 Q3: NEWSPAPERS.pptx
ECONOMIC CONTEXT - PAPER 1 Q3: NEWSPAPERS.pptxECONOMIC CONTEXT - PAPER 1 Q3: NEWSPAPERS.pptx
ECONOMIC CONTEXT - PAPER 1 Q3: NEWSPAPERS.pptxiammrhaywood
 
How to Configure Email Server in Odoo 17
How to Configure Email Server in Odoo 17How to Configure Email Server in Odoo 17
How to Configure Email Server in Odoo 17Celine George
 
Judging the Relevance and worth of ideas part 2.pptx
Judging the Relevance  and worth of ideas part 2.pptxJudging the Relevance  and worth of ideas part 2.pptx
Judging the Relevance and worth of ideas part 2.pptxSherlyMaeNeri
 
call girls in Kamla Market (DELHI) 🔝 >༒9953330565🔝 genuine Escort Service 🔝✔️✔️
call girls in Kamla Market (DELHI) 🔝 >༒9953330565🔝 genuine Escort Service 🔝✔️✔️call girls in Kamla Market (DELHI) 🔝 >༒9953330565🔝 genuine Escort Service 🔝✔️✔️
call girls in Kamla Market (DELHI) 🔝 >༒9953330565🔝 genuine Escort Service 🔝✔️✔️9953056974 Low Rate Call Girls In Saket, Delhi NCR
 
Like-prefer-love -hate+verb+ing & silent letters & citizenship text.pdf
Like-prefer-love -hate+verb+ing & silent letters & citizenship text.pdfLike-prefer-love -hate+verb+ing & silent letters & citizenship text.pdf
Like-prefer-love -hate+verb+ing & silent letters & citizenship text.pdfMr Bounab Samir
 
AmericanHighSchoolsprezentacijaoskolama.
AmericanHighSchoolsprezentacijaoskolama.AmericanHighSchoolsprezentacijaoskolama.
AmericanHighSchoolsprezentacijaoskolama.arsicmarija21
 
ACC 2024 Chronicles. Cardiology. Exam.pdf
ACC 2024 Chronicles. Cardiology. Exam.pdfACC 2024 Chronicles. Cardiology. Exam.pdf
ACC 2024 Chronicles. Cardiology. Exam.pdfSpandanaRallapalli
 

Recently uploaded (20)

ECONOMIC CONTEXT - LONG FORM TV DRAMA - PPT
ECONOMIC CONTEXT - LONG FORM TV DRAMA - PPTECONOMIC CONTEXT - LONG FORM TV DRAMA - PPT
ECONOMIC CONTEXT - LONG FORM TV DRAMA - PPT
 
Introduction to AI in Higher Education_draft.pptx
Introduction to AI in Higher Education_draft.pptxIntroduction to AI in Higher Education_draft.pptx
Introduction to AI in Higher Education_draft.pptx
 
Model Call Girl in Tilak Nagar Delhi reach out to us at 🔝9953056974🔝
Model Call Girl in Tilak Nagar Delhi reach out to us at 🔝9953056974🔝Model Call Girl in Tilak Nagar Delhi reach out to us at 🔝9953056974🔝
Model Call Girl in Tilak Nagar Delhi reach out to us at 🔝9953056974🔝
 
HỌC TỐT TIẾNG ANH 11 THEO CHƯƠNG TRÌNH GLOBAL SUCCESS ĐÁP ÁN CHI TIẾT - CẢ NĂ...
HỌC TỐT TIẾNG ANH 11 THEO CHƯƠNG TRÌNH GLOBAL SUCCESS ĐÁP ÁN CHI TIẾT - CẢ NĂ...HỌC TỐT TIẾNG ANH 11 THEO CHƯƠNG TRÌNH GLOBAL SUCCESS ĐÁP ÁN CHI TIẾT - CẢ NĂ...
HỌC TỐT TIẾNG ANH 11 THEO CHƯƠNG TRÌNH GLOBAL SUCCESS ĐÁP ÁN CHI TIẾT - CẢ NĂ...
 
Raw materials used in Herbal Cosmetics.pptx
Raw materials used in Herbal Cosmetics.pptxRaw materials used in Herbal Cosmetics.pptx
Raw materials used in Herbal Cosmetics.pptx
 
ENGLISH 7_Q4_LESSON 2_ Employing a Variety of Strategies for Effective Interp...
ENGLISH 7_Q4_LESSON 2_ Employing a Variety of Strategies for Effective Interp...ENGLISH 7_Q4_LESSON 2_ Employing a Variety of Strategies for Effective Interp...
ENGLISH 7_Q4_LESSON 2_ Employing a Variety of Strategies for Effective Interp...
 
Employee wellbeing at the workplace.pptx
Employee wellbeing at the workplace.pptxEmployee wellbeing at the workplace.pptx
Employee wellbeing at the workplace.pptx
 
Framing an Appropriate Research Question 6b9b26d93da94caf993c038d9efcdedb.pdf
Framing an Appropriate Research Question 6b9b26d93da94caf993c038d9efcdedb.pdfFraming an Appropriate Research Question 6b9b26d93da94caf993c038d9efcdedb.pdf
Framing an Appropriate Research Question 6b9b26d93da94caf993c038d9efcdedb.pdf
 
Solving Puzzles Benefits Everyone (English).pptx
Solving Puzzles Benefits Everyone (English).pptxSolving Puzzles Benefits Everyone (English).pptx
Solving Puzzles Benefits Everyone (English).pptx
 
How to do quick user assign in kanban in Odoo 17 ERP
How to do quick user assign in kanban in Odoo 17 ERPHow to do quick user assign in kanban in Odoo 17 ERP
How to do quick user assign in kanban in Odoo 17 ERP
 
Keynote by Prof. Wurzer at Nordex about IP-design
Keynote by Prof. Wurzer at Nordex about IP-designKeynote by Prof. Wurzer at Nordex about IP-design
Keynote by Prof. Wurzer at Nordex about IP-design
 
Roles & Responsibilities in Pharmacovigilance
Roles & Responsibilities in PharmacovigilanceRoles & Responsibilities in Pharmacovigilance
Roles & Responsibilities in Pharmacovigilance
 
ECONOMIC CONTEXT - PAPER 1 Q3: NEWSPAPERS.pptx
ECONOMIC CONTEXT - PAPER 1 Q3: NEWSPAPERS.pptxECONOMIC CONTEXT - PAPER 1 Q3: NEWSPAPERS.pptx
ECONOMIC CONTEXT - PAPER 1 Q3: NEWSPAPERS.pptx
 
How to Configure Email Server in Odoo 17
How to Configure Email Server in Odoo 17How to Configure Email Server in Odoo 17
How to Configure Email Server in Odoo 17
 
Judging the Relevance and worth of ideas part 2.pptx
Judging the Relevance  and worth of ideas part 2.pptxJudging the Relevance  and worth of ideas part 2.pptx
Judging the Relevance and worth of ideas part 2.pptx
 
call girls in Kamla Market (DELHI) 🔝 >༒9953330565🔝 genuine Escort Service 🔝✔️✔️
call girls in Kamla Market (DELHI) 🔝 >༒9953330565🔝 genuine Escort Service 🔝✔️✔️call girls in Kamla Market (DELHI) 🔝 >༒9953330565🔝 genuine Escort Service 🔝✔️✔️
call girls in Kamla Market (DELHI) 🔝 >༒9953330565🔝 genuine Escort Service 🔝✔️✔️
 
Like-prefer-love -hate+verb+ing & silent letters & citizenship text.pdf
Like-prefer-love -hate+verb+ing & silent letters & citizenship text.pdfLike-prefer-love -hate+verb+ing & silent letters & citizenship text.pdf
Like-prefer-love -hate+verb+ing & silent letters & citizenship text.pdf
 
9953330565 Low Rate Call Girls In Rohini Delhi NCR
9953330565 Low Rate Call Girls In Rohini  Delhi NCR9953330565 Low Rate Call Girls In Rohini  Delhi NCR
9953330565 Low Rate Call Girls In Rohini Delhi NCR
 
AmericanHighSchoolsprezentacijaoskolama.
AmericanHighSchoolsprezentacijaoskolama.AmericanHighSchoolsprezentacijaoskolama.
AmericanHighSchoolsprezentacijaoskolama.
 
ACC 2024 Chronicles. Cardiology. Exam.pdf
ACC 2024 Chronicles. Cardiology. Exam.pdfACC 2024 Chronicles. Cardiology. Exam.pdf
ACC 2024 Chronicles. Cardiology. Exam.pdf
 

Network fundamental

  • 1.
  • 2. TABLE OF CONTENT  INTRODUCTION  ROLE  OBJECTIVE  FUNCTION NETWORK LAYER  NETWORK LAYER PROTOCOL  OSI MODEL  BASIC REQUIREMENT OF PROTOCOL  EX:ENTHERNET PROTOCOL  INTERNET PROTOCOL  IPv4  BEST DELIVERY  ADDRESSING  PACKET STRUCTURE  PACKET TRANSFER  GROUPING DEVICES IN NETWORK& HIERARCHICAL ADDRESSING  FUNDAMENTAL OF ROUTE,NEXT HOP,ADDRESS AND PACKET FOWARDING  PROBLEM  ROUTER  SUMMARY
  • 3. INTRODUCTION  The protocols of the OSI model Network layer specify addressing and processes that enable Transport layer data to be packaged and transported. The Network layer encapsulation allows its contents to be passed to the destination within a network or on another network with minimum overhead.
  • 4. ROLE  Examining how it divides networks into groups of hosts to manage the flow of data packets within a network. We also consider how communication between networks is facilitated. This communication between networks is called routing.
  • 5. OBJECTIVE  Identify the role of the Network layer as it describes communication from one end device to another end device.  Examine the most common Network layer protocol, Internet Protocol (IP), and its features for providing connectionless and best-effort service.  Understand the principles used to guide the division, or grouping, of devices into networks.  Understand the hierarchical addressing of devices and how this allows communication between networks.  Understand the fundamentals of routes, next-hop addresses, and packet forwarding to a destination network.
  • 6. FUNCTION OF NETWORK LAYER  Connection model  Host addressing  Message forwarding
  • 7. NETWORK LAYER PROTOCOL • A communications protocol is a formal description of digital message formats and the rules for exchanging those messages in or between computing systems and in telecommunications. • Protocols may include signaling, authentication and error detection and correction capabilities. • Communicating systems use well-defined formats for exchanging messages. Describes the syntax, semantics, and synchronization of communication.
  • 8.  A programming language describes the same for computations, so there is a close analogy between protocols and programming languages: protocols are to communications what programming languages are to computations.  Protocol exists in Network Layer:  IPv4/IPv6, Internet Protocol  DVMRP, Distance Vector Multicast Routing Protocol  ICMP, Internet Control Message Protocol  IGMP, Internet Group Multicast Protocol  PIM-SM, Protocol Independent Multicast Sparse Mode  PIM-DM, Protocol Independent Multicast Dense Mode  IPsec, Internet Protocol Security  IPX, Internetwork Packet Exchange  RIP, Routing Information Protocol  DDP, Datagram Delivery Protocol  The level of a sub-document determines the class it belongs to. The sub-documents belonging to a class all provide similar functionality and, when form follows function, have similar form.
  • 9.  The Network Layer is Layer 3 of the seven-layer OSI model of computer networking.  The Network Layer is responsible for routing packets delivery including routing through intermediate routers, whereas the Data Link Layer is responsible for Media Access Control, Flow Control and Error Checking.  The Network Layer provides the functional and procedural means of transferring variable length data sequences from a source to a destination host via one or more networks while maintaining the quality of service functions.
  • 10. Connection model(connectionless communication)  For example, IP is connectionless, in that a frame can travel from a sender to a recipient without the recipient having to send an acknowledgement. Host addressing  Every host in the network needs to have a unique address which determines where it is. This address will normally be assigned from a hierarchical system.
  • 12. BASIC REQUIREMENT OF PROTOCOL  Data formats for data exchange. In digital message bit strings are exchanged. The bit strings are divided in fields and each field carries information relevant to the protocol. Conceptually the bit string is divided into two parts called the header area and the data area.  Address formats for data exchange. The addresses are used to identify both the sender and the intended receiver(s).  Address mapping. Sometimes protocols need to map addresses of one scheme on addresses of another scheme. For instance to translate a logical IP address specified by the application to a hardware address.  Routing. When systems are not directly connected, intermediary systems along the route to the intended receiver(s) need to forward messages (instead of discarding them) on behalf of the sender.
  • 13.  Detection of transmission errors is necessary, because no network is error-free. Bits of the bit string become corrupted or lost.  Acknowledgements of correct reception of packets by the receiver are usually used to prevent the sender from retransmitting the packets. Some protocols, notably datagram protocols like the Internet Protocol (IP), do not acknowledge.  Loss of information - timeouts and retries. Sometimes packets are lost on the network or suffer from long delays. To cope with this, a sender expects an acknowledgement of correct reception from the receiver within a certain amount of time.  Direction of information flow needs to be addressed if transmissions can only occur in one direction at a time (half-duplex links). To gain control of the link a sender must wait until the line becomes idle and then send a message indicating its wish to do so.
  • 14.  Sequence control. We have seen that long bitstrings are divided in pieces, that are send on the network individually. The pieces may get 'lost' on the network or arrive out of sequence, because the pieces can take different routes to their destination.  Flow control is needed when the sender transmits faster than the receiver can process the transmissions or when the network becomes congested. Sometimes, arrangements can be made to slow down the sender, but in many cases this is outside the control of the protocol.  Getting the data across is only part of the problem. The data received has to be evaluated in the context of the progress of the conversation, so a protocol has to specify rules describing the context and explaining whether the (form of the) data fits this context or not.
  • 15. EX: ENTHERNET PROTOCOL  Ethernet was invented at Xerox PARC in the early 1970s. It has gained widespread use on LANs and became standardized as IEEE standard 802.3.To connect to a LAN, a computer has to be equipped with an Ethernet network interface card.  Conceptually, all stations share a single communication channel called a shared bus. Transmissions on this channel are received by all stations at (nearly) the same time. The hardware provides no indication to the sender about whether the transmission was delivered and is therefore called a best-effort delivery mechanism.  Stations wanting to transmit, wait for the channel to become free and then start transmitting one single frame and then stop for a small amount of time before transmitting a next frame to allow others to transmit.
  • 16. INTERNET PROTOCOL  The Internet Protocol (IP) is the principal communications protocol used for relaying datagram (packets) across an internetwork using the Internet Protocol Suite. Responsible for routing packets across network boundaries, it is the primary protocol that establishes the Internet.  As a consequence of this design, the Internet Protocol only provides best effort delivery and its service can also be characterized as unreliable. In network architectural language it is a connection-less protocol, in contrast to so-called connection-oriented modes of transmission. The lack of reliability allows any of the following fault events to occur:  data corruption  lost data packets  duplicate arrival  out-of-order packet delivery
  • 17.  The Internet Protocol is responsible for addressing hosts and routing datagram (packets) from a source host to the destination host across one or more IP networks.  For this purpose the Internet Protocol defines an addressing system that has two functions.  Addresses identify hosts and provide a logical location service.
  • 18. IPv4  Internet Protocol version 4 (IPv4) is the fourth revision in the development of the Internet Protocol (IP) and it is the first version of the protocol to be widely deployed.  Together with IPv6, it is at the core of standards-based internetworking methods of the Internet. IPv4 is still by far the most widely deployed Internet Layer protocol. As of 2011, IPv6 deployment is still in its infancy.  IPv4 uses 32-bit (four-byte) addresses, which limits the address space to 4,294,967,296 (232) possible unique addresses. However, some are reserved for special purposes such as private networks (~18 million addresses) or multicast addresses (~270 million addresses).  IPv4 addresses may simply be written in any notation expressing a 32-bit integer value, but for human convenience, they are most often written in dot- decimal notation, which consists of the four octets of the address expressed separately in decimal and separated by periods.
  • 19.
  • 20. BEST DELIVERY  Best effort delivery describes a network service in which the network does not provide any guarantees that data is delivered or that a user is given a guaranteed quality of service level or a certain priority.  Conventional telephone networks are not based on best-effort communication, but on circuit switching. During the connection phase of a new call, resources are reserved in the telephone exchanges, or the user is informed that the call is blocked due to lack of free capacity.  The mailman will make his "best effort" to try to deliver a message, but the delivery may be delayed if too many letters arrive to a postal office suddenly. The sender is not informed if a letter has been delivered successfully.  However, the best-effort paradigm is to some extent abandoned on the Internet. Modern IP routers provide mechanisms for differentiated or guaranteed quality of service to certain data flows, based on for example the IntServ or DiffServ protocols.
  • 21. ADDRESSING  It is a common misunderstanding that addresses ending with an octet of 0 or 255 can never be assigned to hosts.  In glassful addressing (now obsolete with the advent of CIDR), there are only three possible subnet masks: Class A, 255.0.0.0 or /8; Class B, 255.255.0.0 or /16; and Class C, 255.255.255.0 or /24.  However, this does not mean that every addresses ending in 255 cannot be used as a host address. For example, in the case of a Class B subnet 192.168.0.0/255.255.0.0 (or 192.168.0.0/16), equivalent to the address range 192.168.0.0–192.168.255.255, the broadcast address is 192.168.255.255.  However, one can assign 192.168.1.255, 192.168.2.255, etc. (though this can cause confusion). Also, 192.168.0.0 is the network identifier and so cannot be assigned, but 192.168.1.0, 192.168.2.0, etc. can be assigned (though this can also cause confusion).
  • 22. PACKET STRUCTURE Header  The fields in the header are packed with the most significant byte first (big endian), and for the diagram and discussion, the most significant bits are considered to come first (MSB 0 bit numbering). The most significant bit is numbered 0, so the version field is actually found in the four most significant bits of the first byte, for example. Version  The first header field in an IP packet is the four-bit version field. For IPv4, this has a value of 4 (hence the name IPv4).
  • 24. GROUPING DEVICE IN NETWORK & HIERARHICAL ADDRESSING
  • 25. GROUPING DEVICE IN NETWORK & HIERARHICAL ADDRESSING
  • 26. GROUPING DEVICE IN NETWORK & HIERARHICAL ADDRESSING
  • 27. GROUPING DEVICE IN NETWORK & HIERARHICAL ADDRESSING
  • 28. FUNDAMENTAL OF ROUTER,NEXT HOP,ADDRESS & PACKET FOWARDING  .
  • 29. FUNDAMENTAL OF ROUTER,NEXT HOP,ADDRESS & PACKET FOWARDING  Route assignment, route choice, or traffic assignment concerns the selection of routes (alternative called paths) between origins and destinations in transportation networks. It is the fourth step in the conventional transportation forecasting model, following Trip Generation, Destination Choice, and Mode Choice.  The zonal interchange analysis of trip distribution provides origin- destination trip tables. Mode choice analysis tells which travelers will use which mode.
  • 30. PROBLEM WHEN USING MANY DEVICES IN A NETWORK  The packets are passed to the router and waiting to be deployed.  Host doesn’t know how to deliver the data.  Because the delivery of data is done by the gateway.  This will result in communication problems.
  • 31. ROUTER  Process of taking a URL endpoint and decomposing it into parameters to determine which module, controller, and action of that controller should receive the request.  Routes may be used numerous times to create a chain or user defined application.  A module name may be specified as the first path element.
  • 34. ROUTING PROTOCOL  The purpose of routing protocols is to tell the hardware between the transmitter and receiver where to send all the pieces of a network transmission.  Routing protocol shares this information first among immediate neighbors, and then throughout the network.  This way, routers gain knowledge of the topology of the network.
  • 35. SUMMARY  Understand the role of the network layer as it function communication from one end device to another end device.  Explain the purpose of the Hierarchical Addressing of device and how this allows the communication between network.  Understand the Fundamentals of Routes, Next Hop Addresses and Packet Forwarding