SlideShare a Scribd company logo
1 of 51
UNIT 1 : INTRODUCTION TO
NETWORK
DATATRANSMISSION MODES
NETWORK SOFTWARE- PROTOCOL HIERARCHY
• The number of layers, the name of each layer, the contents of each layer, and the
function of each layer differ from network to network.
• The purpose of each layer is to offer certain services to the higher layers, shielding
those layers from the details of how the offered services are actually implemented.
• In a sense, each layer is a kind of virtual machine, offering certain services to the layer
above it. -This concept is actually a familiar one and used throughout computer science,
where it is variously known as information hiding, abstract data types, data
encapsulation, and object-oriented programming.
• The fundamental idea is that a particular piece of software (or hardware) provides a
service to its users but keeps the details of its internal state and algorithms hidden from
them.
• A protocol is an agreement between the communicating parties on how communication
is to proceed.
The translator then gives the message to a secretary
for transmission, for example, by email (the layer 1
protocol). When the message arrives at the other
secretary, it is passed to the local translator, who
translates it into French and passes it across the 2/3
interface to the second philosopher. Note that each
protocol is completely independent of the other ones
as long as the interfaces are not changed. The
translators can switch from Dutch to, say, Finnish, at
will, provided that they both agree and neither
changes his interface with either layer 1 or layer3.
Similarly, the secretaries can switch from email to
telephone without disturbing (or even informing) the
other layers. Each process may add some
information intended only for its peer. This
information is not passed up to the layer above
• Theprocesses comprising the corresponding layers on different machines
are called peers.
• Thepeers may be processes, hardware devices, or even human beings.
In other words, it is the peers that communicate by using the protocol.
• In reality, no data are directly transferred from layer n on one machine
to layer non another machine.
• Instead, each layer passes data and control information to the layer
immediately below it, until the lowest layer is reached.
• Below layer 1 is the physical medium through which actual
communication occurs. In Fig, virtual communication is shown by dotted
lines and physical communication by solid lines.
INTERFACE
1.Adjacent-layer interaction on the same computer - On a single
computer, one layer provides a service to a higher layer. The
software or hardware that implements the higher layer requests that
the next lower layer perform the needed function.
2.Same-layer interaction on different computers-The two
computers use a protocol to communicate with the same layer on
another computer. The protocol defined by each layer usesa
header that is transmitted between the computers, to communicate
what each computer wants to do.
• A set of layers and protocols is called a Network Architecture. The
specification of an architecture must contain enough information to
allow an implementer to write the program or build the hardware
for each layer so that it will correctly obey the appropriate
protocol.
• The details of the implementation nor the specification of the
interfaces is part of the architecture because these are hidden
away inside the machines and not visible from the outside. It is not
even necessary that the interfaces on all machines in a network be
the same, provided that each machine can correctly use all the
protocols. A list of protocols used by a certain system, one protocol
per layer, is called a protocol stack.
• A message, M, is produced by an application process running in layer 5
and given to layer 4 for transmission.
• Layer 4 puts a header in front of the message to identify the message
and passes the result to layer 3. Theheader includes control information,
suchas sequence numbers, to allow layer 4 on the destination machine to
deliver messagesin the right order if the lower layers do not maintain
sequence.
• In some layers, headers can also contain sizes, times, and other control
fields. layer 3 must break up the incoming messages into smaller units,
packets, prepending a layer 3 header to each packet.
• In this example, M is split into two parts, M1 and M2. Layer 3 decides
which of the outgoing lines to use and passes the packets to layer 2.
• Layer 2 adds not only a header to each piece, but also a trailer,
and gives the resulting unit to layer 1 for physical transmission.
• At the receiving machine the message moves upward, from layer to
layer, with headers being stripped off as it progresses. The
important thing to understand about Fig. is the relation between
the virtual and actual communication and the difference between
protocols and interfaces.
DESIGN ISSUESFORTHELAYERSOF COMPUTER
NETWORKS
• A number of design issues exist for the layer to layer approach of computer
networks. Some of the main design issues are as follows:
Reliability
• Network channels and components may be unreliable, resulting in loss of bits while
data transfer. So, an important design issue is to make sure that the information
transferred is not distorted.
Scalability
• Networks are continuously evolving. The sizes are continually increasing leading to
congestion. Also, when new technologies are applied to the added components, it
may lead to incompatibility issues. Hence, the design should be done so that the
networks are scalable and can accommodate such additions and alterations.
Addressing
• At a particular time, innumerable messages are being transferred between
large numbers of computers. So, a naming or addressing system should exist
so that each layer can identify the sender and receivers of each message.
Error Control
• Unreliable channels introduce a number of errors in the data streams that are
communicated. So, the layers need to agree upon common error detection and
error correction methods so as to protect data packets while they are
transferred.
Flow Control
• If the rate at which data is produced by the sender is higher than the rate at
which data is received by the receiver, there are chances of overflowing the
receiver. So, a proper flow control mechanism needs to be implemented.
Resource Allocation
• Computer networks provide services in the form of network resources to the
end users. The main design issue is to allocate and deallocate resources to
processes. The allocation/deallocation should occur so that minimal
interference among the hosts occurs and there is optimal usage of the
resources.
Statistical Multiplexing
• It is not feasible to allocate a dedicated path for each message while it is being
transferred from the source to the destination. So, the data channel needs to be
multiplexed, so as to allocate a fraction of the bandwidth or time to each host.
Routing
• There may be multiple paths from the source to the destination. Routing involves
choosing an optimal path among all possible paths, in terms of cost and time. There
are several routing algorithms that are used in network systems.
Security
• A major factor of data communication is to defend it against threats like
eavesdropping and surreptitious alteration of messages. So, there should be
adequate mechanisms to prevent unauthorized access to data through authentication
and cryptography.
CONNECTION ORIENTEDAND CONNECTIONLESS
SERVICES
• These are the two services given by the layers to layers above them. These
services are:
Connection Oriented Service
Connectionless Services
Connection Oriented Services
• There is a sequence of operation to be followed by the users of connection
oriented service. These are:
Connection is established.
Information is sent.
Connection is released.
• In connection oriented service we have to establish a connection before
starting the communication. When connection is established, we send the
message or the information and then we release the connection.
• Connection oriented service is more reliable than connectionless service. We
can send the message in connection oriented service if there is an error at the
receivers end. Example of connection oriented is TCP(Transmission Control
Protocol) protocol.
CONNECTION LESSSERVICES
• It is similar to the postal services, as it carries the full address where the
message (letter) is to be carried. Each message is routed independently from
source to destination. The order of message sent can be different from the
order received.
• In connectionless the data is transferred in one direction from source to
destination without checking that destination is still there or not or if it
prepared to accept the message. Authentication is not needed in this. Example
of Connectionless service is UDP(User Datagram Protocol) protocol.
DIFFERENCE:CONNECTION ORIENTEDAND
CONNECTIONLESSSERVICE
• In connection oriented service authentication is needed, while
connectionless service does not need any authentication.
• Connection oriented protocol makes a connection and checks whether
message is received or not and sends again if an error occurs, while
connectionless service protocol does not guarantees a message delivery.
• Connection oriented service is more reliable than connectionless service.
• Connection oriented service interface is stream based and
connectionless is message based.
WHAT ARESERVICEPRIMITIVES?
• A service is formally specified by a set of primitives (operations) available to
a user process to access the service. These primitives tell the service to
perform some action or report on an action taken by a peer entity. If the
protocol stack is located in the operating system, as it often is, the primitives
are normally system calls. These calls cause a trap to kernel mode, which then
turns control of the machine over to the operating system to send the
necessary packets. The set of primitives available depends on the nature of
the service being provided. The primitives for connection-oriented service are
different from those of connection-less service. There are five types of service
primitives :
• LISTEN: When a server is ready to accept an incoming connection it executes
the LISTENprimitive. It blocks waiting for an incoming connection.
• CONNECT : It connects the server by establishing a connection. Response is
awaited.
• RECIEVE:Then the RECIEVEcall blocks the server.
• SEND: Then the client executes SENDprimitive to transmit its request followed
by the execution of RECIEVEto get the reply. Send the message.
• DISCONNECT : This primitive is used for terminating the connection. After this
primitive one can't send any message. When the client sends DISCONNECT
packet then the server also sends the DISCONNECT packet to acknowledge
the client. When the server package is received by client then the process is
terminated.
CONNECTION ORIENTEDSERVICEPRIMITIVES
LISTEN Block waiting for an incoming connection
CONNETION Establish a connection with a waiting peer
RECEIVE Block waiting for an incoming message
SEND Sending a message to the peer
DISCONNECT Terminate a connection
There are 5 types of primitives for Connection Oriented Service :
CONNECTIONLESSSERVICEPRIMITIVES
THEREARE4 TYPESOF PRIMITIVESFORCONNECTIONLESSORIENTEDSERVICE:
UNIDATA This primitive sends a packet of data
FACILITY,REPORT Primitive for enquiring about the performance of the
network, like delivery statistics.
RELATIONSHIPOF SERVICESTO PROTOCOL
• In this section we will learn about how services and protocols are related and why
they are so important for each other.
•
What are Services?
• These are the operations that a layer can provide to the layer above it in the OSI
Reference model. It defines the operation and states a layer is ready to perform but
it does not specify anything about the implementation of these operations.
PROTOCOLS
These are set of rules that govern the format and meaning of frames, messages or packets that are
exchanged between the server and client.
NETWORK MODELS
• The most important reference models are:
• OSI reference model.
• TCP/IP reference model.
INTRODUCTION TO ISO-OSI MODEL
International Organization for Standardization (IOS) In 1984, the ISO
released a revision of this model and called it the Open Systems Interconnection
(OSI) reference model. The 1984 revision has become an international standard
and serves as a guide for networking. The concept of a seven layer model was
provided by the work of Charles Bachman.
The OSI reference model represents the seven layers of the process by which data is
packaged and transmitted from a sending application through the physical wires to the
receiving application. Each Specifying particular network functions. OSI defines a large
collection of protocols that allow computers to communicate.
OSI Model is a set of protocols that define standardize Data commutation process.
The lower 4 layers (transport, network, data link and physical —Layers 4, 3, 2, and 1) are
concerned with the flow of data from end to end through the network.
The upper three layers of the OSI model (application, presentation and session— Layers 7,
6 and 5) are orientated more toward services to the applications.
In the table below, we have specified the protocols used
and the data unit exchanged by each layer of the OSI
Model.
APPLICATION LAYER
• User Support Layer 7 provides an interface between the communications software and any
applications that need to communicate outside the computer . application layer is the OSI
layer that is closestto the user.
• TheOSI model describes how information or data makes its way from application
programmes (suchas spreadsheets) through a network medium (suchas wire) to another
application programme located on another network.
• Application-layer protocols can be programs in themselves,suchas File Transfer Protocol
(FTP),or they can be used by other programs, suchas Simple Mail Transfer Protocol (SMTP),
used by moste-mail programs, to redirect data to the network.
• Theuserapplication itself does not reside at the Application layer – the protocol does. The
user interacts with the application, which in turn interacts with the application protocol.
Examples of Application layer protocols include:
• FTP
,via an FTPclient
• HTTP
,via a web browser
• POP3 and SMTP
, via an email client
• Telnet
The Application layer provides a variety of functions:
• Identifies communication partners
• Determines resource availability
• Synchronizes communication
PRESENTATIONLAYER: USERSUPPORT
• This layer’s main purpose is to define and negotiate data formats, suchas
ASCII text, EBCDICtext, binary, BCD,and JPEG.Encryption also is defined by
OSI as a presentation layer service. The presentation layer is responsible for
converting protocols, translating the data, encrypting the data, changing or
converting the character set, and expanding graphics commands. The
presentation layer also manages data compression to reduce the number of
bits that need to be transmitted.
• The Presentation layer (Layer-6) controls the formatting and syntax of user
data for the application layer. Thisensures that data from the sending
application can be understood by the receiving application.
• Standards have been developed for the formatting of data types, suchas
text, images, audio, and video. Examples of Presentation layer formats
include:
• • Text - TXT,ASCII, EBCDIC
• • Images - GIF, JPG, JPEG,MPEG
• • Audio - MIDI, MP3, WAV
• • Movies - MPEG, AVI, MOV
PRESENTATIONLAYER: USERSUPPORT
• If two devices do not support the same format or syntax, the Presentation
layer can provide conversion or translation services to facilitate
communication.
• Additionally, the Presentation layer can perform encryption and compression
of data, as required. However, these functions can also be performed at
lower layers as well. For example, the Network layer can perform encryption,
using IPSec
SESSIONLAYER:USERSUPPORT
• The session layer defines how to start, control, and end conversations (called
sessions).This includes the control and management of multiple bidirectional
messages so that the application can be notified if only some of a series of
messages are completed. This allows the presentation layer to have a
seamless view of an incoming stream of data.
• The session layer is responsible for managing this dialog. It performs name
recognition and other functions, suchas security, that are needed to allow two
applications to communicate over the network.
• Sessions communication falls under one of three categories:
• Full-Duplex – simultaneous two-way communication
• Half-Duplex – two-way communication, but not simultaneous
• Simplex – one-way communication
• Many modern protocol suites, suchas TCP/IP
, do not implement Session layer
protocols. Connection management is often controlled by lower layers, suchas
the Transport layer.
TCP/IP REFERENCEMODEL
• TCP/IP means Transmission Control Protocol and Internet Protocol. It is the
network model used in the current Internet architecture as well. Protocols are
set of rules which govern every possible communication over a network. These
protocols describe the movement of data between the source and destination
or the internet. They also offer simple naming and addressing schemes.
• Protocols and networks in the TCP/IP model:
•
OVERVIEW OF TCP/IP REFERENCEMODEL
• TCP/IP that is Transmission Control Protocol and Internet Protocol was developed by
Department of Defence's Project Research Agency (ARPA, later DARPA)as a part
of a research project of network interconnection to connect remote machines.
• The features that stood out during the research, which led to making the TCP/IP
reference model were:
• Support for a flexible architecture. Adding more machines to a network was easy.
• The network was robust, and connections remained intact untill the source and
destination machines were functioning.
• The overall idea was to allow one application on one computer to talk to(send data
packets) another application running on different computer.
DIFFERENTLAYERSOF TCP/IP REFERENCEMODEL
• Below we have discussed the 4 layers that form the TCP/IP reference model:
LAYER1: HOST-TO-NETWORK LAYER
• Lowest layer of the all.
• Protocol is used to connect to the host, so that the packets can be sent over it.
• Varies from host to host and network to network.
LAYER2: INTERNETLAYER
• Selection of a packet switching network which is based on a connectionless
internetwork layer is called a internet layer.
• It is the layer which holds the whole architecture together.
• It helps the packet to travel independently to the destination.
• Order in which packets are received is different from the way they are sent.
• IP (Internet Protocol) is used in this layer.
• The various functions performed by the Internet Layer are:
• Delivering IP packets
• Performing routing
• Avoiding congestion
LAYER3: TRANSPORTLAYER
• It decides if data transmission should be on parallel path or single path.
• Functions suchas multiplexing, segmenting or splitting on the data is done by
transport layer.
• The applications can read and write to the transport layer.
• Transport layer adds header information to the data.
• Transport layer breaks the message (data) into small units so that they are
handled more efficiently by the network layer.
• Transport layer also arrange the packets to be sent, in sequence.
LAYER4: APPLICATION LAYER
• TheTCP/IP specifications described a lot of applications that were at the top of the protocol
stack. Someof them were TELNET,FTP,SMTP,DNS etc.
• TELNETis a two-way communication protocol which allows connecting to a remote machine
and run applications on it.
• FTP(File Transfer Protocol) is a protocol, that allows File transfer amongst computer users
connected over a network. It is reliable, simple and efficient.
• SMTP(Simple Mail Transport Protocol) is a protocol, which is used to transport electronic mail
between a source and destination, directed via a route.
• DNS(Domain Name Server) resolves an IP address into a textual address for Hosts connected
over a network.
• It allows peer entities to carry conversation.
• It defines two end-to-end protocols: TCPand UDP
• TCP(Transmission Control Protocol): It is a reliable connection-oriented protocol which handles byte-
stream from source to destination without error and flow control.
• UDP(User-Datagram Protocol): It is an unreliable connection-less protocol that do not want TCPs,
sequencing and flow control. Eg: One-shot request-reply kind of service.
MERITSOF TCP/IP MODEL
• It operated independently.
• It is scalable.
• Client/server architecture.
• Supports a number of routing protocols.
• Can be used to establish a connection between two computers.
DEMERITSOF TCP/IP
• In this, the transport layer does not guarantee delivery of packets.
• The model cannot be used in any other application.
• Replacing protocol is not easy.
• It has not clearly separated its services, interfaces and protocols.
Chapter 2 computer network PPT CN-1.pptx
Chapter 2 computer network PPT CN-1.pptx
Chapter 2 computer network PPT CN-1.pptx

More Related Content

Similar to Chapter 2 computer network PPT CN-1.pptx

Similar to Chapter 2 computer network PPT CN-1.pptx (20)

934 Ch1 Networks
934 Ch1  Networks934 Ch1  Networks
934 Ch1 Networks
 
Chap 2 network models
Chap 2 network modelsChap 2 network models
Chap 2 network models
 
Distributed Systems - Information Technology
Distributed Systems - Information TechnologyDistributed Systems - Information Technology
Distributed Systems - Information Technology
 
Network internet
Network internetNetwork internet
Network internet
 
Networks internet
Networks internetNetworks internet
Networks internet
 
OSI MODEL
OSI MODEL OSI MODEL
OSI MODEL
 
Network fundamentals
Network fundamentalsNetwork fundamentals
Network fundamentals
 
Computer networks unit i
Computer networks    unit iComputer networks    unit i
Computer networks unit i
 
Cn
CnCn
Cn
 
Assignment 1,computer networks-317
Assignment 1,computer networks-317Assignment 1,computer networks-317
Assignment 1,computer networks-317
 
Osi
OsiOsi
Osi
 
Osi model
Osi modelOsi model
Osi model
 
Networks software
Networks softwareNetworks software
Networks software
 
ch01.ppt
ch01.pptch01.ppt
ch01.ppt
 
OSI &TCP/IP Model
OSI &TCP/IP ModelOSI &TCP/IP Model
OSI &TCP/IP Model
 
Inter-Process Communication in distributed systems
Inter-Process Communication in distributed systemsInter-Process Communication in distributed systems
Inter-Process Communication in distributed systems
 
Introduction to Computer Networks.
Introduction to Computer Networks.Introduction to Computer Networks.
Introduction to Computer Networks.
 
DS Unit-4-Communication .pdf
DS Unit-4-Communication .pdfDS Unit-4-Communication .pdf
DS Unit-4-Communication .pdf
 
Networks: The Big Picture
Networks: The Big PictureNetworks: The Big Picture
Networks: The Big Picture
 
basics of computer network
basics of computer networkbasics of computer network
basics of computer network
 

Recently uploaded

OSVC_Meta-Data based Simulation Automation to overcome Verification Challenge...
OSVC_Meta-Data based Simulation Automation to overcome Verification Challenge...OSVC_Meta-Data based Simulation Automation to overcome Verification Challenge...
OSVC_Meta-Data based Simulation Automation to overcome Verification Challenge...Soham Mondal
 
What are the advantages and disadvantages of membrane structures.pptx
What are the advantages and disadvantages of membrane structures.pptxWhat are the advantages and disadvantages of membrane structures.pptx
What are the advantages and disadvantages of membrane structures.pptxwendy cai
 
ZXCTN 5804 / ZTE PTN / ZTE POTN / ZTE 5804 PTN / ZTE POTN 5804 ( 100/200 GE Z...
ZXCTN 5804 / ZTE PTN / ZTE POTN / ZTE 5804 PTN / ZTE POTN 5804 ( 100/200 GE Z...ZXCTN 5804 / ZTE PTN / ZTE POTN / ZTE 5804 PTN / ZTE POTN 5804 ( 100/200 GE Z...
ZXCTN 5804 / ZTE PTN / ZTE POTN / ZTE 5804 PTN / ZTE POTN 5804 ( 100/200 GE Z...ZTE
 
College Call Girls Nashik Nehal 7001305949 Independent Escort Service Nashik
College Call Girls Nashik Nehal 7001305949 Independent Escort Service NashikCollege Call Girls Nashik Nehal 7001305949 Independent Escort Service Nashik
College Call Girls Nashik Nehal 7001305949 Independent Escort Service NashikCall Girls in Nagpur High Profile
 
Software and Systems Engineering Standards: Verification and Validation of Sy...
Software and Systems Engineering Standards: Verification and Validation of Sy...Software and Systems Engineering Standards: Verification and Validation of Sy...
Software and Systems Engineering Standards: Verification and Validation of Sy...VICTOR MAESTRE RAMIREZ
 
Gurgaon ✡️9711147426✨Call In girls Gurgaon Sector 51 escort service
Gurgaon ✡️9711147426✨Call In girls Gurgaon Sector 51 escort serviceGurgaon ✡️9711147426✨Call In girls Gurgaon Sector 51 escort service
Gurgaon ✡️9711147426✨Call In girls Gurgaon Sector 51 escort servicejennyeacort
 
Biology for Computer Engineers Course Handout.pptx
Biology for Computer Engineers Course Handout.pptxBiology for Computer Engineers Course Handout.pptx
Biology for Computer Engineers Course Handout.pptxDeepakSakkari2
 
Decoding Kotlin - Your guide to solving the mysterious in Kotlin.pptx
Decoding Kotlin - Your guide to solving the mysterious in Kotlin.pptxDecoding Kotlin - Your guide to solving the mysterious in Kotlin.pptx
Decoding Kotlin - Your guide to solving the mysterious in Kotlin.pptxJoão Esperancinha
 
power system scada applications and uses
power system scada applications and usespower system scada applications and uses
power system scada applications and usesDevarapalliHaritha
 
GDSC ASEB Gen AI study jams presentation
GDSC ASEB Gen AI study jams presentationGDSC ASEB Gen AI study jams presentation
GDSC ASEB Gen AI study jams presentationGDSCAESB
 
VIP Call Girls Service Hitech City Hyderabad Call +91-8250192130
VIP Call Girls Service Hitech City Hyderabad Call +91-8250192130VIP Call Girls Service Hitech City Hyderabad Call +91-8250192130
VIP Call Girls Service Hitech City Hyderabad Call +91-8250192130Suhani Kapoor
 
Model Call Girl in Narela Delhi reach out to us at 🔝8264348440🔝
Model Call Girl in Narela Delhi reach out to us at 🔝8264348440🔝Model Call Girl in Narela Delhi reach out to us at 🔝8264348440🔝
Model Call Girl in Narela Delhi reach out to us at 🔝8264348440🔝soniya singh
 
Architect Hassan Khalil Portfolio for 2024
Architect Hassan Khalil Portfolio for 2024Architect Hassan Khalil Portfolio for 2024
Architect Hassan Khalil Portfolio for 2024hassan khalil
 
Microscopic Analysis of Ceramic Materials.pptx
Microscopic Analysis of Ceramic Materials.pptxMicroscopic Analysis of Ceramic Materials.pptx
Microscopic Analysis of Ceramic Materials.pptxpurnimasatapathy1234
 
High Profile Call Girls Nagpur Meera Call 7001035870 Meet With Nagpur Escorts
High Profile Call Girls Nagpur Meera Call 7001035870 Meet With Nagpur EscortsHigh Profile Call Girls Nagpur Meera Call 7001035870 Meet With Nagpur Escorts
High Profile Call Girls Nagpur Meera Call 7001035870 Meet With Nagpur EscortsCall Girls in Nagpur High Profile
 
Oxy acetylene welding presentation note.
Oxy acetylene welding presentation note.Oxy acetylene welding presentation note.
Oxy acetylene welding presentation note.eptoze12
 
VICTOR MAESTRE RAMIREZ - Planetary Defender on NASA's Double Asteroid Redirec...
VICTOR MAESTRE RAMIREZ - Planetary Defender on NASA's Double Asteroid Redirec...VICTOR MAESTRE RAMIREZ - Planetary Defender on NASA's Double Asteroid Redirec...
VICTOR MAESTRE RAMIREZ - Planetary Defender on NASA's Double Asteroid Redirec...VICTOR MAESTRE RAMIREZ
 
Heart Disease Prediction using machine learning.pptx
Heart Disease Prediction using machine learning.pptxHeart Disease Prediction using machine learning.pptx
Heart Disease Prediction using machine learning.pptxPoojaBan
 

Recently uploaded (20)

OSVC_Meta-Data based Simulation Automation to overcome Verification Challenge...
OSVC_Meta-Data based Simulation Automation to overcome Verification Challenge...OSVC_Meta-Data based Simulation Automation to overcome Verification Challenge...
OSVC_Meta-Data based Simulation Automation to overcome Verification Challenge...
 
What are the advantages and disadvantages of membrane structures.pptx
What are the advantages and disadvantages of membrane structures.pptxWhat are the advantages and disadvantages of membrane structures.pptx
What are the advantages and disadvantages of membrane structures.pptx
 
ZXCTN 5804 / ZTE PTN / ZTE POTN / ZTE 5804 PTN / ZTE POTN 5804 ( 100/200 GE Z...
ZXCTN 5804 / ZTE PTN / ZTE POTN / ZTE 5804 PTN / ZTE POTN 5804 ( 100/200 GE Z...ZXCTN 5804 / ZTE PTN / ZTE POTN / ZTE 5804 PTN / ZTE POTN 5804 ( 100/200 GE Z...
ZXCTN 5804 / ZTE PTN / ZTE POTN / ZTE 5804 PTN / ZTE POTN 5804 ( 100/200 GE Z...
 
College Call Girls Nashik Nehal 7001305949 Independent Escort Service Nashik
College Call Girls Nashik Nehal 7001305949 Independent Escort Service NashikCollege Call Girls Nashik Nehal 7001305949 Independent Escort Service Nashik
College Call Girls Nashik Nehal 7001305949 Independent Escort Service Nashik
 
Software and Systems Engineering Standards: Verification and Validation of Sy...
Software and Systems Engineering Standards: Verification and Validation of Sy...Software and Systems Engineering Standards: Verification and Validation of Sy...
Software and Systems Engineering Standards: Verification and Validation of Sy...
 
Gurgaon ✡️9711147426✨Call In girls Gurgaon Sector 51 escort service
Gurgaon ✡️9711147426✨Call In girls Gurgaon Sector 51 escort serviceGurgaon ✡️9711147426✨Call In girls Gurgaon Sector 51 escort service
Gurgaon ✡️9711147426✨Call In girls Gurgaon Sector 51 escort service
 
Biology for Computer Engineers Course Handout.pptx
Biology for Computer Engineers Course Handout.pptxBiology for Computer Engineers Course Handout.pptx
Biology for Computer Engineers Course Handout.pptx
 
Decoding Kotlin - Your guide to solving the mysterious in Kotlin.pptx
Decoding Kotlin - Your guide to solving the mysterious in Kotlin.pptxDecoding Kotlin - Your guide to solving the mysterious in Kotlin.pptx
Decoding Kotlin - Your guide to solving the mysterious in Kotlin.pptx
 
power system scada applications and uses
power system scada applications and usespower system scada applications and uses
power system scada applications and uses
 
GDSC ASEB Gen AI study jams presentation
GDSC ASEB Gen AI study jams presentationGDSC ASEB Gen AI study jams presentation
GDSC ASEB Gen AI study jams presentation
 
VIP Call Girls Service Hitech City Hyderabad Call +91-8250192130
VIP Call Girls Service Hitech City Hyderabad Call +91-8250192130VIP Call Girls Service Hitech City Hyderabad Call +91-8250192130
VIP Call Girls Service Hitech City Hyderabad Call +91-8250192130
 
Model Call Girl in Narela Delhi reach out to us at 🔝8264348440🔝
Model Call Girl in Narela Delhi reach out to us at 🔝8264348440🔝Model Call Girl in Narela Delhi reach out to us at 🔝8264348440🔝
Model Call Girl in Narela Delhi reach out to us at 🔝8264348440🔝
 
Architect Hassan Khalil Portfolio for 2024
Architect Hassan Khalil Portfolio for 2024Architect Hassan Khalil Portfolio for 2024
Architect Hassan Khalil Portfolio for 2024
 
★ CALL US 9953330565 ( HOT Young Call Girls In Badarpur delhi NCR
★ CALL US 9953330565 ( HOT Young Call Girls In Badarpur delhi NCR★ CALL US 9953330565 ( HOT Young Call Girls In Badarpur delhi NCR
★ CALL US 9953330565 ( HOT Young Call Girls In Badarpur delhi NCR
 
Microscopic Analysis of Ceramic Materials.pptx
Microscopic Analysis of Ceramic Materials.pptxMicroscopic Analysis of Ceramic Materials.pptx
Microscopic Analysis of Ceramic Materials.pptx
 
🔝9953056974🔝!!-YOUNG call girls in Rajendra Nagar Escort rvice Shot 2000 nigh...
🔝9953056974🔝!!-YOUNG call girls in Rajendra Nagar Escort rvice Shot 2000 nigh...🔝9953056974🔝!!-YOUNG call girls in Rajendra Nagar Escort rvice Shot 2000 nigh...
🔝9953056974🔝!!-YOUNG call girls in Rajendra Nagar Escort rvice Shot 2000 nigh...
 
High Profile Call Girls Nagpur Meera Call 7001035870 Meet With Nagpur Escorts
High Profile Call Girls Nagpur Meera Call 7001035870 Meet With Nagpur EscortsHigh Profile Call Girls Nagpur Meera Call 7001035870 Meet With Nagpur Escorts
High Profile Call Girls Nagpur Meera Call 7001035870 Meet With Nagpur Escorts
 
Oxy acetylene welding presentation note.
Oxy acetylene welding presentation note.Oxy acetylene welding presentation note.
Oxy acetylene welding presentation note.
 
VICTOR MAESTRE RAMIREZ - Planetary Defender on NASA's Double Asteroid Redirec...
VICTOR MAESTRE RAMIREZ - Planetary Defender on NASA's Double Asteroid Redirec...VICTOR MAESTRE RAMIREZ - Planetary Defender on NASA's Double Asteroid Redirec...
VICTOR MAESTRE RAMIREZ - Planetary Defender on NASA's Double Asteroid Redirec...
 
Heart Disease Prediction using machine learning.pptx
Heart Disease Prediction using machine learning.pptxHeart Disease Prediction using machine learning.pptx
Heart Disease Prediction using machine learning.pptx
 

Chapter 2 computer network PPT CN-1.pptx

  • 1. UNIT 1 : INTRODUCTION TO NETWORK
  • 3. NETWORK SOFTWARE- PROTOCOL HIERARCHY • The number of layers, the name of each layer, the contents of each layer, and the function of each layer differ from network to network. • The purpose of each layer is to offer certain services to the higher layers, shielding those layers from the details of how the offered services are actually implemented. • In a sense, each layer is a kind of virtual machine, offering certain services to the layer above it. -This concept is actually a familiar one and used throughout computer science, where it is variously known as information hiding, abstract data types, data encapsulation, and object-oriented programming. • The fundamental idea is that a particular piece of software (or hardware) provides a service to its users but keeps the details of its internal state and algorithms hidden from them. • A protocol is an agreement between the communicating parties on how communication is to proceed.
  • 4.
  • 5.
  • 6. The translator then gives the message to a secretary for transmission, for example, by email (the layer 1 protocol). When the message arrives at the other secretary, it is passed to the local translator, who translates it into French and passes it across the 2/3 interface to the second philosopher. Note that each protocol is completely independent of the other ones as long as the interfaces are not changed. The translators can switch from Dutch to, say, Finnish, at will, provided that they both agree and neither changes his interface with either layer 1 or layer3. Similarly, the secretaries can switch from email to telephone without disturbing (or even informing) the other layers. Each process may add some information intended only for its peer. This information is not passed up to the layer above
  • 7. • Theprocesses comprising the corresponding layers on different machines are called peers. • Thepeers may be processes, hardware devices, or even human beings. In other words, it is the peers that communicate by using the protocol. • In reality, no data are directly transferred from layer n on one machine to layer non another machine. • Instead, each layer passes data and control information to the layer immediately below it, until the lowest layer is reached. • Below layer 1 is the physical medium through which actual communication occurs. In Fig, virtual communication is shown by dotted lines and physical communication by solid lines.
  • 8. INTERFACE 1.Adjacent-layer interaction on the same computer - On a single computer, one layer provides a service to a higher layer. The software or hardware that implements the higher layer requests that the next lower layer perform the needed function. 2.Same-layer interaction on different computers-The two computers use a protocol to communicate with the same layer on another computer. The protocol defined by each layer usesa header that is transmitted between the computers, to communicate what each computer wants to do.
  • 9. • A set of layers and protocols is called a Network Architecture. The specification of an architecture must contain enough information to allow an implementer to write the program or build the hardware for each layer so that it will correctly obey the appropriate protocol. • The details of the implementation nor the specification of the interfaces is part of the architecture because these are hidden away inside the machines and not visible from the outside. It is not even necessary that the interfaces on all machines in a network be the same, provided that each machine can correctly use all the protocols. A list of protocols used by a certain system, one protocol per layer, is called a protocol stack.
  • 10.
  • 11. • A message, M, is produced by an application process running in layer 5 and given to layer 4 for transmission. • Layer 4 puts a header in front of the message to identify the message and passes the result to layer 3. Theheader includes control information, suchas sequence numbers, to allow layer 4 on the destination machine to deliver messagesin the right order if the lower layers do not maintain sequence. • In some layers, headers can also contain sizes, times, and other control fields. layer 3 must break up the incoming messages into smaller units, packets, prepending a layer 3 header to each packet. • In this example, M is split into two parts, M1 and M2. Layer 3 decides which of the outgoing lines to use and passes the packets to layer 2.
  • 12. • Layer 2 adds not only a header to each piece, but also a trailer, and gives the resulting unit to layer 1 for physical transmission. • At the receiving machine the message moves upward, from layer to layer, with headers being stripped off as it progresses. The important thing to understand about Fig. is the relation between the virtual and actual communication and the difference between protocols and interfaces.
  • 13. DESIGN ISSUESFORTHELAYERSOF COMPUTER NETWORKS • A number of design issues exist for the layer to layer approach of computer networks. Some of the main design issues are as follows: Reliability • Network channels and components may be unreliable, resulting in loss of bits while data transfer. So, an important design issue is to make sure that the information transferred is not distorted. Scalability • Networks are continuously evolving. The sizes are continually increasing leading to congestion. Also, when new technologies are applied to the added components, it may lead to incompatibility issues. Hence, the design should be done so that the networks are scalable and can accommodate such additions and alterations.
  • 14. Addressing • At a particular time, innumerable messages are being transferred between large numbers of computers. So, a naming or addressing system should exist so that each layer can identify the sender and receivers of each message. Error Control • Unreliable channels introduce a number of errors in the data streams that are communicated. So, the layers need to agree upon common error detection and error correction methods so as to protect data packets while they are transferred.
  • 15. Flow Control • If the rate at which data is produced by the sender is higher than the rate at which data is received by the receiver, there are chances of overflowing the receiver. So, a proper flow control mechanism needs to be implemented. Resource Allocation • Computer networks provide services in the form of network resources to the end users. The main design issue is to allocate and deallocate resources to processes. The allocation/deallocation should occur so that minimal interference among the hosts occurs and there is optimal usage of the resources.
  • 16. Statistical Multiplexing • It is not feasible to allocate a dedicated path for each message while it is being transferred from the source to the destination. So, the data channel needs to be multiplexed, so as to allocate a fraction of the bandwidth or time to each host. Routing • There may be multiple paths from the source to the destination. Routing involves choosing an optimal path among all possible paths, in terms of cost and time. There are several routing algorithms that are used in network systems. Security • A major factor of data communication is to defend it against threats like eavesdropping and surreptitious alteration of messages. So, there should be adequate mechanisms to prevent unauthorized access to data through authentication and cryptography.
  • 17. CONNECTION ORIENTEDAND CONNECTIONLESS SERVICES • These are the two services given by the layers to layers above them. These services are: Connection Oriented Service Connectionless Services
  • 18. Connection Oriented Services • There is a sequence of operation to be followed by the users of connection oriented service. These are: Connection is established. Information is sent. Connection is released. • In connection oriented service we have to establish a connection before starting the communication. When connection is established, we send the message or the information and then we release the connection. • Connection oriented service is more reliable than connectionless service. We can send the message in connection oriented service if there is an error at the receivers end. Example of connection oriented is TCP(Transmission Control Protocol) protocol.
  • 19. CONNECTION LESSSERVICES • It is similar to the postal services, as it carries the full address where the message (letter) is to be carried. Each message is routed independently from source to destination. The order of message sent can be different from the order received. • In connectionless the data is transferred in one direction from source to destination without checking that destination is still there or not or if it prepared to accept the message. Authentication is not needed in this. Example of Connectionless service is UDP(User Datagram Protocol) protocol.
  • 20. DIFFERENCE:CONNECTION ORIENTEDAND CONNECTIONLESSSERVICE • In connection oriented service authentication is needed, while connectionless service does not need any authentication. • Connection oriented protocol makes a connection and checks whether message is received or not and sends again if an error occurs, while connectionless service protocol does not guarantees a message delivery. • Connection oriented service is more reliable than connectionless service. • Connection oriented service interface is stream based and connectionless is message based.
  • 21. WHAT ARESERVICEPRIMITIVES? • A service is formally specified by a set of primitives (operations) available to a user process to access the service. These primitives tell the service to perform some action or report on an action taken by a peer entity. If the protocol stack is located in the operating system, as it often is, the primitives are normally system calls. These calls cause a trap to kernel mode, which then turns control of the machine over to the operating system to send the necessary packets. The set of primitives available depends on the nature of the service being provided. The primitives for connection-oriented service are different from those of connection-less service. There are five types of service primitives :
  • 22. • LISTEN: When a server is ready to accept an incoming connection it executes the LISTENprimitive. It blocks waiting for an incoming connection. • CONNECT : It connects the server by establishing a connection. Response is awaited. • RECIEVE:Then the RECIEVEcall blocks the server. • SEND: Then the client executes SENDprimitive to transmit its request followed by the execution of RECIEVEto get the reply. Send the message. • DISCONNECT : This primitive is used for terminating the connection. After this primitive one can't send any message. When the client sends DISCONNECT packet then the server also sends the DISCONNECT packet to acknowledge the client. When the server package is received by client then the process is terminated.
  • 23. CONNECTION ORIENTEDSERVICEPRIMITIVES LISTEN Block waiting for an incoming connection CONNETION Establish a connection with a waiting peer RECEIVE Block waiting for an incoming message SEND Sending a message to the peer DISCONNECT Terminate a connection There are 5 types of primitives for Connection Oriented Service :
  • 24.
  • 25. CONNECTIONLESSSERVICEPRIMITIVES THEREARE4 TYPESOF PRIMITIVESFORCONNECTIONLESSORIENTEDSERVICE: UNIDATA This primitive sends a packet of data FACILITY,REPORT Primitive for enquiring about the performance of the network, like delivery statistics.
  • 26. RELATIONSHIPOF SERVICESTO PROTOCOL • In this section we will learn about how services and protocols are related and why they are so important for each other. • What are Services? • These are the operations that a layer can provide to the layer above it in the OSI Reference model. It defines the operation and states a layer is ready to perform but it does not specify anything about the implementation of these operations.
  • 27. PROTOCOLS These are set of rules that govern the format and meaning of frames, messages or packets that are exchanged between the server and client.
  • 28. NETWORK MODELS • The most important reference models are: • OSI reference model. • TCP/IP reference model.
  • 29. INTRODUCTION TO ISO-OSI MODEL International Organization for Standardization (IOS) In 1984, the ISO released a revision of this model and called it the Open Systems Interconnection (OSI) reference model. The 1984 revision has become an international standard and serves as a guide for networking. The concept of a seven layer model was provided by the work of Charles Bachman. The OSI reference model represents the seven layers of the process by which data is packaged and transmitted from a sending application through the physical wires to the receiving application. Each Specifying particular network functions. OSI defines a large collection of protocols that allow computers to communicate. OSI Model is a set of protocols that define standardize Data commutation process. The lower 4 layers (transport, network, data link and physical —Layers 4, 3, 2, and 1) are concerned with the flow of data from end to end through the network. The upper three layers of the OSI model (application, presentation and session— Layers 7, 6 and 5) are orientated more toward services to the applications.
  • 30.
  • 31. In the table below, we have specified the protocols used and the data unit exchanged by each layer of the OSI Model.
  • 32. APPLICATION LAYER • User Support Layer 7 provides an interface between the communications software and any applications that need to communicate outside the computer . application layer is the OSI layer that is closestto the user. • TheOSI model describes how information or data makes its way from application programmes (suchas spreadsheets) through a network medium (suchas wire) to another application programme located on another network. • Application-layer protocols can be programs in themselves,suchas File Transfer Protocol (FTP),or they can be used by other programs, suchas Simple Mail Transfer Protocol (SMTP), used by moste-mail programs, to redirect data to the network. • Theuserapplication itself does not reside at the Application layer – the protocol does. The user interacts with the application, which in turn interacts with the application protocol.
  • 33. Examples of Application layer protocols include: • FTP ,via an FTPclient • HTTP ,via a web browser • POP3 and SMTP , via an email client • Telnet The Application layer provides a variety of functions: • Identifies communication partners • Determines resource availability • Synchronizes communication
  • 34. PRESENTATIONLAYER: USERSUPPORT • This layer’s main purpose is to define and negotiate data formats, suchas ASCII text, EBCDICtext, binary, BCD,and JPEG.Encryption also is defined by OSI as a presentation layer service. The presentation layer is responsible for converting protocols, translating the data, encrypting the data, changing or converting the character set, and expanding graphics commands. The presentation layer also manages data compression to reduce the number of bits that need to be transmitted.
  • 35. • The Presentation layer (Layer-6) controls the formatting and syntax of user data for the application layer. Thisensures that data from the sending application can be understood by the receiving application. • Standards have been developed for the formatting of data types, suchas text, images, audio, and video. Examples of Presentation layer formats include: • • Text - TXT,ASCII, EBCDIC • • Images - GIF, JPG, JPEG,MPEG • • Audio - MIDI, MP3, WAV • • Movies - MPEG, AVI, MOV
  • 36. PRESENTATIONLAYER: USERSUPPORT • If two devices do not support the same format or syntax, the Presentation layer can provide conversion or translation services to facilitate communication. • Additionally, the Presentation layer can perform encryption and compression of data, as required. However, these functions can also be performed at lower layers as well. For example, the Network layer can perform encryption, using IPSec
  • 37. SESSIONLAYER:USERSUPPORT • The session layer defines how to start, control, and end conversations (called sessions).This includes the control and management of multiple bidirectional messages so that the application can be notified if only some of a series of messages are completed. This allows the presentation layer to have a seamless view of an incoming stream of data. • The session layer is responsible for managing this dialog. It performs name recognition and other functions, suchas security, that are needed to allow two applications to communicate over the network.
  • 38. • Sessions communication falls under one of three categories: • Full-Duplex – simultaneous two-way communication • Half-Duplex – two-way communication, but not simultaneous • Simplex – one-way communication • Many modern protocol suites, suchas TCP/IP , do not implement Session layer protocols. Connection management is often controlled by lower layers, suchas the Transport layer.
  • 39. TCP/IP REFERENCEMODEL • TCP/IP means Transmission Control Protocol and Internet Protocol. It is the network model used in the current Internet architecture as well. Protocols are set of rules which govern every possible communication over a network. These protocols describe the movement of data between the source and destination or the internet. They also offer simple naming and addressing schemes.
  • 40. • Protocols and networks in the TCP/IP model: •
  • 41. OVERVIEW OF TCP/IP REFERENCEMODEL • TCP/IP that is Transmission Control Protocol and Internet Protocol was developed by Department of Defence's Project Research Agency (ARPA, later DARPA)as a part of a research project of network interconnection to connect remote machines. • The features that stood out during the research, which led to making the TCP/IP reference model were: • Support for a flexible architecture. Adding more machines to a network was easy. • The network was robust, and connections remained intact untill the source and destination machines were functioning. • The overall idea was to allow one application on one computer to talk to(send data packets) another application running on different computer.
  • 42. DIFFERENTLAYERSOF TCP/IP REFERENCEMODEL • Below we have discussed the 4 layers that form the TCP/IP reference model:
  • 43. LAYER1: HOST-TO-NETWORK LAYER • Lowest layer of the all. • Protocol is used to connect to the host, so that the packets can be sent over it. • Varies from host to host and network to network.
  • 44. LAYER2: INTERNETLAYER • Selection of a packet switching network which is based on a connectionless internetwork layer is called a internet layer. • It is the layer which holds the whole architecture together. • It helps the packet to travel independently to the destination. • Order in which packets are received is different from the way they are sent. • IP (Internet Protocol) is used in this layer. • The various functions performed by the Internet Layer are: • Delivering IP packets • Performing routing • Avoiding congestion
  • 45. LAYER3: TRANSPORTLAYER • It decides if data transmission should be on parallel path or single path. • Functions suchas multiplexing, segmenting or splitting on the data is done by transport layer. • The applications can read and write to the transport layer. • Transport layer adds header information to the data. • Transport layer breaks the message (data) into small units so that they are handled more efficiently by the network layer. • Transport layer also arrange the packets to be sent, in sequence.
  • 46. LAYER4: APPLICATION LAYER • TheTCP/IP specifications described a lot of applications that were at the top of the protocol stack. Someof them were TELNET,FTP,SMTP,DNS etc. • TELNETis a two-way communication protocol which allows connecting to a remote machine and run applications on it. • FTP(File Transfer Protocol) is a protocol, that allows File transfer amongst computer users connected over a network. It is reliable, simple and efficient. • SMTP(Simple Mail Transport Protocol) is a protocol, which is used to transport electronic mail between a source and destination, directed via a route. • DNS(Domain Name Server) resolves an IP address into a textual address for Hosts connected over a network. • It allows peer entities to carry conversation. • It defines two end-to-end protocols: TCPand UDP • TCP(Transmission Control Protocol): It is a reliable connection-oriented protocol which handles byte- stream from source to destination without error and flow control. • UDP(User-Datagram Protocol): It is an unreliable connection-less protocol that do not want TCPs, sequencing and flow control. Eg: One-shot request-reply kind of service.
  • 47. MERITSOF TCP/IP MODEL • It operated independently. • It is scalable. • Client/server architecture. • Supports a number of routing protocols. • Can be used to establish a connection between two computers.
  • 48. DEMERITSOF TCP/IP • In this, the transport layer does not guarantee delivery of packets. • The model cannot be used in any other application. • Replacing protocol is not easy. • It has not clearly separated its services, interfaces and protocols.