The document discusses network models and protocol layering. It describes the TCP/IP model which consists of five layers - application, transport, network, data link, and physical. It also mentions the OSI model. Each layer in the TCP/IP model has specific responsibilities like the application layer supporting network applications, the transport layer handling end-to-end data transfer, the network layer routing data, the data link layer transferring data between neighboring elements, and the physical layer dealing with transmission of raw bits. Layering allows for modularity and abstraction which helps manage network complexity.
01 Overview of Data Communication and NetworkingMeenakshi Paul
Data communications: Components, Data representation and data flow, Networks: Network criteria, physical structures, Network Models, categories of network, network types, Internet history, standards and administration.
INTERNET PROTOCOL (IP)
, Datagram Format
, Fragmentation
, Options
, Security of IPv4 Datagrams
,ICMPv4
, MESSAGES
, Debugging Tools
, ICMP Checksum
, MOBILE IP
, Addressing
, Agents
, Three Phases
, Inefficiency in Mobile IP
01 Overview of Data Communication and NetworkingMeenakshi Paul
Data communications: Components, Data representation and data flow, Networks: Network criteria, physical structures, Network Models, categories of network, network types, Internet history, standards and administration.
INTERNET PROTOCOL (IP)
, Datagram Format
, Fragmentation
, Options
, Security of IPv4 Datagrams
,ICMPv4
, MESSAGES
, Debugging Tools
, ICMP Checksum
, MOBILE IP
, Addressing
, Agents
, Three Phases
, Inefficiency in Mobile IP
In this slide I explain What is Data Communication and Networks and its Applications And also explain Physical Topology, Types of Physical Topologies, Categories of Networks that is LAN, WAN, MAN and coverage of Networks etc.
In this slide I explain What is Data Communication and Networks and its Applications And also explain Physical Topology, Types of Physical Topologies, Categories of Networks that is LAN, WAN, MAN and coverage of Networks etc.
Protocol layer
OSI model description details
post office protocol version 3 (pop3)
these three topics are describe in this slide.
this slide made by zakirul islam.
Points Covered
UNIT 1:
1. The Internet Architecture
2. Networking Devices
3. OSI Model
4. TCP/IP Model
5. Topologies
6. Types of Networks with diagrams.
7.
UNIT 2:
1. X.25
2. Frame Relay
3. FDDI
4. Token Ring
5. Bluetooth
6. RFID
7. Asynchronous Transfer Mode (ATM)
UNIT 3:
1. Data Link Layer
2. Error Control
3. Flow Control
4. Types of services provided to the network layer
UNIT 4:
1. Classful IP Addressing
2. Difference between IPV4 and IPV6
3. Piggybacking
4. Methods to improve QoS
5. Subnet, subnet mask, Private IP, Public IP and NAT
6. Congestion Control and how it works in TCP
7. TCP and UDP
8. Explain TCP with its header format
9. Socket
UNIT 5:
1. Application Layer
2. DNS
3. SMTP
4. POP3
5. HTTP
6. URL
7. FTP
8. Basic functions of e-mail system
9. HTTP,FTP Difference
UNIT 6:
1. Network Security Goals
2. Public key Encryption/Decryption
3. Public and Private key Encryption
4. What is a firewall? Mention the types of firewalls
5. Steps followed in creating digital signature
6. Differentiate between digital signature and digital certificate
Binary addition, Binary subtraction, Negative number representation, Subtraction using 1’s complement and 2’s complement, Binary multiplication and division, Arithmetic in octal, hexadecimal number system, BCD and Excess – 3 arithmetic
Numbering system, binary number system, octal number system, decimal number system, hexadecimal number system.
Code conversion, Conversion from one number system to another, floating point numbers
Introduction to the Data Link Layer, Types of errors, redundancy and coding. Block coding, Error detection, error correction. Linear block codes. Cyclic codes(CRC), Checksum method.
Theory building, What Is a Theory? , What Are the Goals of Theory?, Research Concepts, Constructs, Propositions, Variables, and Hypotheses, Research Concepts and Constructs, Research Propositions and Hypotheses, Understanding Theory, Verifying Theory, Theory Building, The Scientific Method
Information Systems and Knowledge ManagementMeenakshi Paul
Information Systems and Knowledge
Management, Information, data and Intelligence, The Characteristics of Valuable Information, Relevance, Quality, Timeliness, Completeness, Knowledge Management, Global Information Systems, Decision Support Systems, Databases and Data Warehousing, Input Management, Computerized Data Archives Networks and Electronic Data Interchange, The Internet and Research
The Role of Business Research, The Nature of Business Research, Business Research Defined, Applied and Basic Business Research , The Scientific method, Managerial Value of business Research, Identifying Problems or Opportunities, Diagnosing and Assessing Problems or Opportunities, Selecting and Implementing a Course of Action, Evaluating the Course of Action, When Is Business Research Needed?, Time Constraints, Availability of Data, Nature of the Decision, Benefits versus Costs, Business Research in the Twenty-First Century, Communication Technologies, Global Business Research
Analog Transmission, data communication
Digital-to-analog conversion, analog-to-analog conversion, Digital to Digital conversion, Analog to Digital Conversion, Amplitude Shift Keying , Frequency Shift Keying, Phase Shift Keying,Quadrature Amplitude Modulation, Amplitude Modulation (AM), Frequency Modulation (FM), Phase Modulation (PM)
The Art Pastor's Guide to Sabbath | Steve ThomasonSteve Thomason
What is the purpose of the Sabbath Law in the Torah. It is interesting to compare how the context of the law shifts from Exodus to Deuteronomy. Who gets to rest, and why?
Unit 8 - Information and Communication Technology (Paper I).pdfThiyagu K
This slides describes the basic concepts of ICT, basics of Email, Emerging Technology and Digital Initiatives in Education. This presentations aligns with the UGC Paper I syllabus.
Instructions for Submissions thorugh G- Classroom.pptxJheel Barad
This presentation provides a briefing on how to upload submissions and documents in Google Classroom. It was prepared as part of an orientation for new Sainik School in-service teacher trainees. As a training officer, my goal is to ensure that you are comfortable and proficient with this essential tool for managing assignments and fostering student engagement.
How to Split Bills in the Odoo 17 POS ModuleCeline George
Bills have a main role in point of sale procedure. It will help to track sales, handling payments and giving receipts to customers. Bill splitting also has an important role in POS. For example, If some friends come together for dinner and if they want to divide the bill then it is possible by POS bill splitting. This slide will show how to split bills in odoo 17 POS.
Students, digital devices and success - Andreas Schleicher - 27 May 2024..pptxEduSkills OECD
Andreas Schleicher presents at the OECD webinar ‘Digital devices in schools: detrimental distraction or secret to success?’ on 27 May 2024. The presentation was based on findings from PISA 2022 results and the webinar helped launch the PISA in Focus ‘Managing screen time: How to protect and equip students against distraction’ https://www.oecd-ilibrary.org/education/managing-screen-time_7c225af4-en and the OECD Education Policy Perspective ‘Students, digital devices and success’ can be found here - https://oe.cd/il/5yV
Synthetic Fiber Construction in lab .pptxPavel ( NSTU)
Synthetic fiber production is a fascinating and complex field that blends chemistry, engineering, and environmental science. By understanding these aspects, students can gain a comprehensive view of synthetic fiber production, its impact on society and the environment, and the potential for future innovations. Synthetic fibers play a crucial role in modern society, impacting various aspects of daily life, industry, and the environment. ynthetic fibers are integral to modern life, offering a range of benefits from cost-effectiveness and versatility to innovative applications and performance characteristics. While they pose environmental challenges, ongoing research and development aim to create more sustainable and eco-friendly alternatives. Understanding the importance of synthetic fibers helps in appreciating their role in the economy, industry, and daily life, while also emphasizing the need for sustainable practices and innovation.
Operation “Blue Star” is the only event in the history of Independent India where the state went into war with its own people. Even after about 40 years it is not clear if it was culmination of states anger over people of the region, a political game of power or start of dictatorial chapter in the democratic setup.
The people of Punjab felt alienated from main stream due to denial of their just demands during a long democratic struggle since independence. As it happen all over the word, it led to militant struggle with great loss of lives of military, police and civilian personnel. Killing of Indira Gandhi and massacre of innocent Sikhs in Delhi and other India cities was also associated with this movement.
Welcome to TechSoup New Member Orientation and Q&A (May 2024).pdfTechSoup
In this webinar you will learn how your organization can access TechSoup's wide variety of product discount and donation programs. From hardware to software, we'll give you a tour of the tools available to help your nonprofit with productivity, collaboration, financial management, donor tracking, security, and more.
Palestine last event orientationfvgnh .pptxRaedMohamed3
An EFL lesson about the current events in Palestine. It is intended to be for intermediate students who wish to increase their listening skills through a short lesson in power point.
2. Outline
2.1 PROTOCOL LAYERING
▫ 2.1.1 Scenarios
▫ 2.1.2 Principles of Protocol Layering
▫ 2.1.3 Logical Connections
2.2 TCP/IP PROTOCOL SUITE
▫ 2.2.1 Layered Architecture
▫ 2.2.2 Layers in the TCP/IP Protocol Suite
▫ 2.2.3 Description of Each Layer
2.3 THE OSI MODEL
▫ 2.3.1 OSI versus TCP/IP
▫ 2.3.2 Lack of OSI Model’s Success
2
3. Layered Tasks
• Computer networks are complex systems
▫ Tasks involve varieties of hardware and software
components, and protocols
• Networking task is divided into several subtasks,
or layers.
3
4. Why layering?
• Networks are complex!
• We need a way to organize the structure of
network functionalities and to reduce the
design complexities
• Benefits of layering
▫ Interoperability
▫ Reuse
▫ Hiding underlying details
2-4
5. Protocol interfaces
• Each protocol offers an interface to its users, and
expects one from the layers on which it builds
▫ Syntax and semantics
Data formats
Interface characteristics, e.g. IP service model
• Protocols build upon each other
▫ Add value
E.g., a reliable protocol running on top of IP
▫ Reuse
E.g., OS provides TCP, so apps don’t have to rewrite
2-5
6. Real World Example
• Communication between managers of two
companies
6
Communicate
7. Logical Connection
• Communication takes place thru many layers
7
Logical communication
Secretary:
types a letter
Delivery boy:
drops the letter
Secretary:
reads and reports
the message
Delivery boy:
takes the letter
Post office:
Processes and routes the letter
Postal truck
8. Network Model
• Network models are responsible or establishing
a connection among the sender and receiver and
transmitting the data.
• There are two computer network models on
which data communication process relies :
▫ OSI Model
▫ TCP/IP Model .
10
9. TCP/IP Model
• The TCP/IP model was developed prior to the OSI model.
• The TCP/IP model is not exactly similar to the OSI model.
• The TCP/IP model consists of five layers: the application layer,
transport layer, network layer, data link layer and physical
layer.
• The first four layers provide physical standards, network
interface, internetworking, and transport functions that
correspond to the first four layers of the OSI model and these
four layers are represented in TCP/IP model by a single layer
called the application layer.
• TCP/IP is a hierarchical protocol made up of interactive
modules, and each of them provides specific functionality.
11
10. TCP/Internet Layer Model
Application Layer
Transport Layer
Network Layer
Data Link Layer
Physical Layer
12
• The Internet Protocol Stack
User
Transmission
Medium
Hardware
Software
11. TCP/IP Model: the Internet model
Application
Transport
Network
Data link
Physical1
2
3
4
Network
Data link
Physical
Application
Transport
Network
Data link
Physical
5
• Each layer relies on services from layer below
• Each layer exports services to layer above
• Interface between layers defines interaction
▫ Hides implementation details
▫ Layers can change without disturbing other layers
2-13
12. TCP/IP Model: the Internet model
• Application: supporting network applications
▫ FTP, SMTP, HTTP
• Transport: application-application data transfer
▫ TCP, UDP
• Network: routing of datagrams from source to
destination. Node-node data transfer
▫ IP, routing protocols
• Data Link: data transfer between neighboring
network elements
▫ PPP, Ethernet
• Physical: bits “on the wire”
2-14
15. Application Layer
• It is the topmost layer in the TCP/IP model.
• It is responsible for handling high-level protocols, issues of
representation.
• This layer allows the user to interact with the application.
• It facilitates the user to use the services of the network.
• It is used to develop network-based applications.
• It provides user services like user login, naming network devices,
formatting messages, and e-mails, transfer of files etc.
• When one application layer protocol wants to communicate with
another application layer, it forwards its data to the transport
layer.
17
16. Application Layer
• The only layer to interact with user
18
Responsible for providing services to the user
SMTP HTTP FTP SMTP HTTP FTP
Data
Data H5
Application
Layer
to Transport from Transport
Data H5
Data
Logical communication
17. Transport Layer
• The transport layer is a 4th layer from the top.
• It is responsible for end to end data transmission
service using connection oriented or either through
connection-less protocols.
• TCP and UDP are two transport layer protocols that
provide a different set of services to the network
layer.
• It provide multiplexing/demultiplexing service.
• It also provides other services such as reliable data
transfer, bandwidth guarantees, and delay
guarantees.
19
18. Transport Layer
• Duties/services
▫ Service-point addressing/Port Address
▫ Segmentation and reassembly
▫ Connection control
▫ Flow control (end-to-end)
▫ Error control (end-to-end)
20
Responsible for delivery of a message
from one process to another
19. Transport Layer Services
• Segmentation : Large data is divided into smaller segments at
the senders end and then these smaller segments are recombined in
exact format before it is received at receivers end.
• Error Control : Distortion, Un-delivery of data packets and noise in
data packets results in error and this is prevented using Transport
Layer too and this feature is called Error Control.
• Flow Control : Transport-Layer ensures that faster data transmission
and slow data absorption or slow data transmission and faster data
absorption must not occur.
• Transport-Layer performs Multiplexing & De-multiplexing.
• Connection Control: Connection oriented service using
TCP(Transmission Control Protocol) Protocol & Connection
less service using UDP(User Data-gram Protocol) Protocol are
performed by transport layer.
21
21. Network Layer
• Duties/services
▫ Logical addressing
▫ Routing
23
Responsible for the delivery of packets
from the original source to the destination
24. Data Link Layer
• Framing: The data link layer divides the stream of bits received from the network layer into
manageable data units called frames.
• Physical addressing: If frames are to be distributed to different systems on the network, the
data link layer adds a header to the frame to define the sender and/or receiver of the frame. If
the frame is intended for a system outside the sender's network, the receiver address is the
address of the device that connects the network to the next one.
• Flow control (hop-to-hop): A receiving node can receive the frames at a faster rate than it can
process the frame. Without flow control, the receiver's buffer can overflow, and frames can get
lost. To overcome this problem, the data link layer uses the flow control to prevent the sending
node on one side of the link from overwhelming the receiving node on another side of the link.
• Error control (hop-to-hop):The data link layer adds reliability to the physical layer by adding
mechanisms to detect and retransmit damaged or lost frames. It also uses a mechanism to
recognize duplicate frames. Error control is normally achieved through a trailer added to the
end of the frame.
• Access control:. When two or more devices are connected to the same link, data link layer
protocols are necessary to determine which device has control over the link at any given time.
26
25. Data Link Layer
27
Data Link
Layer
Data
from Network
to Physical
Data
to Network
from Physical
Data H2 Data H2
(frame)
T2 T2
Responsible for transmitting frames
from one hop (node) to the next
27. Data Link Layer
29
Network 1
Network 6
Network 5
1.1 1.2
6.6
6.1
6.3
5.7
5.2
Network 3
3.8
3.3
Data 1.15.7
97 32
25
79
62
54
74
12
88
Data 1.15.7 2597
Data 1.15.7 6279
Data 1.15.7 7454
R1
R3
R2
28. Physical Layer
• Physical Layer is the bottom-most layer.
• It is associated with the electrical, mechanical
and transmission media .
• Physical layer deals with all the physical devices
that can be used for data communication.
30
The physical layer is responsible for movements of
individual bits from one hop (node) to the next
30. Physical Layer Functions
• Physical characteristics of interfaces and medium
• Representation of bits: Data consists of a stream of
bits (sequence of 0s or 1s) with no interpretation.
• Data rate: The number of bits sent per second.
• Synchronization of bits: the sender and the receiver
clocks must be synchronized.
• Line configuration: Point to Point or Multipoint
• Physical topology: Bus/ Star/Mesh…
• Transmission mode: Simplex/Half/Full
32
31. The Big Picture
33
L5 data H5
L4 data H4
L3 data H3
L2 dataT2 H2
0111011010101001010101001
L5 data H5
L4 data H4
L3 data H3
L2 dataT2 H2
0111010101010010101010101
5
4
3
2
1
5
4
3
2
1
Transmission medium
34. Protocol Suites
• A set of protocols must be constructed
▫ to ensure that the resulting communication
system is complete and efficient
• Each protocol should handle a part of
communication not handled by other protocols
• How can we guarantee that protocols work well
together?
▫ Instead of creating each protocol in isolation,
protocols are designed in complete, cooperative
sets called suites or families
36
36
35. Internet Protocol Suite
37
Layer Protocols
Application HTTP, FTP, Telnet, SMTP, ...
Transport TCP, UDP, SCTP, ...
Network IP (IPv4), IPv6, ICMP, IGMP, ...
Data Link Ethernet, Wi-Fi, PPP, ...
Physical RS-232, DSL, 10Base-T, ...
36. OSI Model
• OSI stands for Open System Interconnection.
• Before networks came into existence, computers could
only communicate from the same manufacturers.
• OSI was designed by ISO (International Organization for
Standardization) in late 1970’s.
• To break this barrier so that Computers from different
manufacturer could communicate with each other.
• OSI is a “Layered Approach”, which is a logical
representation of how Data Communication should
occur.
38
37. OSI Model
• OSI has 7 different layers
• Two new layers is added
▫ Presentation Layer
▫ Session Layer
• It is divided into two groups,
▫ Top 3 layers defines how
application within end
stations will communicate
with each other and with the
user (Software Layer).
▫ Bottom 4 layers defines how
actually data is transferred
(Hardware Layer).
▫ https://www.youtube.com/w
atch?v=fiMswfo45DQ
39
7.Application Layer
6.Presentation Layer
5.Session Layer
4.Transport Layer
3.Network Layer
2.Data Link Layer
1.Physical Layer
User
Transmission
Medium
38. Session Layer
• This layer is responsible for establishment of
connection, maintenance of sessions, authentication
and also ensures security.
• Duties/services
▫ Dialog Controller :
Allows the two processes to establish, use and terminate a
connection.
Communication in half-duplex or full-duplex.
▫ Synchronization :
allows a process to add checkpoints
data is re-synchronized
Session recovery
40
39. Presentation Layer
• A Presentation layer is mainly concerned with the
syntax and semantics of the information exchanged
between the two systems.
• It acts as a data translator for a network.
• This layer is a part of the operating system that
converts the data from one presentation format to
another format.
• The Presentation layer is also known as the syntax
layer.
41
40. Presentation Layer functions
• Duties/services
▫ Data translation: For example, ASCII to EBCDIC.
▫ Encryption/Decryption
▫ Compression: Reduces the number of bits that
need to be transmitted on the network.
42
42. OSI TCP/IP
It is developed by ISO (International
Standard Organization)
It is developed by ARPANET (Advanced
Research Project Agency Network).
OSI refers to Open Systems
Interconnection.
TCP refers to Transmission Control Protocol.
OSI follows a vertical approach. TCP/IP follows a horizontal approach.
In the OSI model, the transport layer is
only connection-oriented.
A layer of the TCP/IP model is both
connection-oriented and connectionless.
Session and presentation layers are a
part of the OSI model.
There is no session and presentation layer in
the TCP model.
TCP/IP is more reliable OSI is less reliable
45