The document discusses different network models and their key differences. A client-server network uses centralized servers to store data and respond to client requests. In a peer-to-peer network, each node acts as both a client and server by sharing its own resources and consuming resources from other nodes. The document also covers congestion in networks and different techniques for congestion control, including open loop methods like adjusting transmission policies and closed loop methods that react to congestion like backpressure.
Protocol layer
OSI model description details
post office protocol version 3 (pop3)
these three topics are describe in this slide.
this slide made by zakirul islam.
Protocol layer
OSI model description details
post office protocol version 3 (pop3)
these three topics are describe in this slide.
this slide made by zakirul islam.
OSI stands for Open Systems Interconnection. It has been developed by ISO – ‘International Organization of Standardization‘, in the year 1984. It is a 7 layer architecture with each layer having specific functionality to perform.
A document about TCP/IP and OSI would typically cover two major networking models: the TCP/IP model and the OSI model. These models are both conceptual frameworks that describe the layers of communication protocols that are necessary for data to be transmitted over a network.
The TCP/IP model is a four-layer model that is used by the Internet. It includes the Application layer, Transport layer, Internet layer, and Network Access layer. Each layer has a specific function, such as providing application-level services, ensuring reliable data transmission, routing packets over the Internet, and controlling the physical transmission of data over the network.
The OSI model, on the other hand, is a seven-layer model that was developed by the International Organization for Standardization (ISO). It includes the Application layer, Presentation layer, Session layer, Transport layer, Network layer, Data Link layer, and Physical layer. Each layer in this model also has a specific function, such as formatting data for presentation, managing communication sessions between network nodes, and managing physical connections between network devices.
In a document about TCP/IP and OSI, you might find information on the similarities and differences between the two models, the advantages and disadvantages of each model, and examples of how each model is used in real-world networking scenarios. You might also find information on specific protocols that are used within each model, such as TCP, UDP, IP, and Ethernet, and how these protocols work together to facilitate communication between network devices.
how does the OSI Model relate to the seven domains of an IT infrastr.pdfmohammedfootwear
how does the OSI Model relate to the seven domains of an IT infrastructure?
Solution
Seven layers/domains of I.T Infrastructure are as follows:
1.The User Domain -This defines the people who access
an organization’s or Institution\'s information system.
2.The Workstation Domain - This is where most users
connect to the IT infrastructure. It can be a
desktop computer,laptop,i-pad or any device that connects
to your network.
3.the LAN Domain - is a collection of computers
connected to one another or to a common
connection medium (makes use of servers ,hub). Network connection
mediums can include wires, fiber optic cables, or
radio waves.
4.The LAN to WAN Domain - is where the IT
infrastructure links to a wide area network and
the Internet.(we make use of routers ,firewalls etc)
5.The WAN Domain -The Wide area network connects remote locations.
WAN services can include dedicated Internet
access and also managed services for customer’s
routers and firewalls .
7.The Remote Access Domain - This domain allows remote
users to connect to the organization’s IT infrastructure. The
scope of this domain is limited to remote access
via the Internet and IP communications.
8. The System/ Application Domain -This domain holds all the
mission-critical systems, applications, as well as data.
It is very important for businesses to protect each of these seven domains.
It only takes one unprotected domain for an attacker to gain access to private data of the users
connected to the network.
The OSI reference model has 7 layers .
7th layer:Application Layer
This layer is closest to the user.
• It provides network services to the user’s applications.
Examples of application layer functionality include:
• gives Support for file transfers
• provides Ability to print on a network
• allows Electronic mail
• allows Electronic messaging
• Allowing browsing the World Wide Web
6th layer:Presentation Layer
• Thislayer as the name suggests ensures that the information/data that the application
layer of one system sends out is readable by the application layer of
another system.
• If required , the presentation layer translates between multiple data
formats by using a common format.
• It provides encryption as well as compression of data.
• Examples include JPEG, MPEG, ASCII, EBCDIC, HTML.
In short the Presentation layer does the following:
• Encryption and decryption of a message for security reasons.
• Compression and expansion of a message so that it travels efficiently from one application to
another application.
• Graphics formatting service
• Content translation service
• System-specific translation service
5th layer:Session Layer
This layer performs various functions including tracking the number of bytes that each end of
the session has acknowledged receiving from the other end of the session. This session layer
allows applications
functioning on devices to establish, manage, and terminate a dialog through a network. Session
layer
functionality includes:
• Virtual conne.
This is a notes about basic introduction of OSI Model & TCP/IP Model. It contain details about the seven layers of the OSI Model which are Application layer, Presentation Layer, Session Layer, Transport Layer, Network Layer, Data Link Layer, Physical Layer
Cosmetic shop management system project report.pdfKamal Acharya
Buying new cosmetic products is difficult. It can even be scary for those who have sensitive skin and are prone to skin trouble. The information needed to alleviate this problem is on the back of each product, but it's thought to interpret those ingredient lists unless you have a background in chemistry.
Instead of buying and hoping for the best, we can use data science to help us predict which products may be good fits for us. It includes various function programs to do the above mentioned tasks.
Data file handling has been effectively used in the program.
The automated cosmetic shop management system should deal with the automation of general workflow and administration process of the shop. The main processes of the system focus on customer's request where the system is able to search the most appropriate products and deliver it to the customers. It should help the employees to quickly identify the list of cosmetic product that have reached the minimum quantity and also keep a track of expired date for each cosmetic product. It should help the employees to find the rack number in which the product is placed.It is also Faster and more efficient way.
OSI stands for Open Systems Interconnection. It has been developed by ISO – ‘International Organization of Standardization‘, in the year 1984. It is a 7 layer architecture with each layer having specific functionality to perform.
A document about TCP/IP and OSI would typically cover two major networking models: the TCP/IP model and the OSI model. These models are both conceptual frameworks that describe the layers of communication protocols that are necessary for data to be transmitted over a network.
The TCP/IP model is a four-layer model that is used by the Internet. It includes the Application layer, Transport layer, Internet layer, and Network Access layer. Each layer has a specific function, such as providing application-level services, ensuring reliable data transmission, routing packets over the Internet, and controlling the physical transmission of data over the network.
The OSI model, on the other hand, is a seven-layer model that was developed by the International Organization for Standardization (ISO). It includes the Application layer, Presentation layer, Session layer, Transport layer, Network layer, Data Link layer, and Physical layer. Each layer in this model also has a specific function, such as formatting data for presentation, managing communication sessions between network nodes, and managing physical connections between network devices.
In a document about TCP/IP and OSI, you might find information on the similarities and differences between the two models, the advantages and disadvantages of each model, and examples of how each model is used in real-world networking scenarios. You might also find information on specific protocols that are used within each model, such as TCP, UDP, IP, and Ethernet, and how these protocols work together to facilitate communication between network devices.
how does the OSI Model relate to the seven domains of an IT infrastr.pdfmohammedfootwear
how does the OSI Model relate to the seven domains of an IT infrastructure?
Solution
Seven layers/domains of I.T Infrastructure are as follows:
1.The User Domain -This defines the people who access
an organization’s or Institution\'s information system.
2.The Workstation Domain - This is where most users
connect to the IT infrastructure. It can be a
desktop computer,laptop,i-pad or any device that connects
to your network.
3.the LAN Domain - is a collection of computers
connected to one another or to a common
connection medium (makes use of servers ,hub). Network connection
mediums can include wires, fiber optic cables, or
radio waves.
4.The LAN to WAN Domain - is where the IT
infrastructure links to a wide area network and
the Internet.(we make use of routers ,firewalls etc)
5.The WAN Domain -The Wide area network connects remote locations.
WAN services can include dedicated Internet
access and also managed services for customer’s
routers and firewalls .
7.The Remote Access Domain - This domain allows remote
users to connect to the organization’s IT infrastructure. The
scope of this domain is limited to remote access
via the Internet and IP communications.
8. The System/ Application Domain -This domain holds all the
mission-critical systems, applications, as well as data.
It is very important for businesses to protect each of these seven domains.
It only takes one unprotected domain for an attacker to gain access to private data of the users
connected to the network.
The OSI reference model has 7 layers .
7th layer:Application Layer
This layer is closest to the user.
• It provides network services to the user’s applications.
Examples of application layer functionality include:
• gives Support for file transfers
• provides Ability to print on a network
• allows Electronic mail
• allows Electronic messaging
• Allowing browsing the World Wide Web
6th layer:Presentation Layer
• Thislayer as the name suggests ensures that the information/data that the application
layer of one system sends out is readable by the application layer of
another system.
• If required , the presentation layer translates between multiple data
formats by using a common format.
• It provides encryption as well as compression of data.
• Examples include JPEG, MPEG, ASCII, EBCDIC, HTML.
In short the Presentation layer does the following:
• Encryption and decryption of a message for security reasons.
• Compression and expansion of a message so that it travels efficiently from one application to
another application.
• Graphics formatting service
• Content translation service
• System-specific translation service
5th layer:Session Layer
This layer performs various functions including tracking the number of bytes that each end of
the session has acknowledged receiving from the other end of the session. This session layer
allows applications
functioning on devices to establish, manage, and terminate a dialog through a network. Session
layer
functionality includes:
• Virtual conne.
This is a notes about basic introduction of OSI Model & TCP/IP Model. It contain details about the seven layers of the OSI Model which are Application layer, Presentation Layer, Session Layer, Transport Layer, Network Layer, Data Link Layer, Physical Layer
Cosmetic shop management system project report.pdfKamal Acharya
Buying new cosmetic products is difficult. It can even be scary for those who have sensitive skin and are prone to skin trouble. The information needed to alleviate this problem is on the back of each product, but it's thought to interpret those ingredient lists unless you have a background in chemistry.
Instead of buying and hoping for the best, we can use data science to help us predict which products may be good fits for us. It includes various function programs to do the above mentioned tasks.
Data file handling has been effectively used in the program.
The automated cosmetic shop management system should deal with the automation of general workflow and administration process of the shop. The main processes of the system focus on customer's request where the system is able to search the most appropriate products and deliver it to the customers. It should help the employees to quickly identify the list of cosmetic product that have reached the minimum quantity and also keep a track of expired date for each cosmetic product. It should help the employees to find the rack number in which the product is placed.It is also Faster and more efficient way.
About
Indigenized remote control interface card suitable for MAFI system CCR equipment. Compatible for IDM8000 CCR. Backplane mounted serial and TCP/Ethernet communication module for CCR remote access. IDM 8000 CCR remote control on serial and TCP protocol.
• Remote control: Parallel or serial interface.
• Compatible with MAFI CCR system.
• Compatible with IDM8000 CCR.
• Compatible with Backplane mount serial communication.
• Compatible with commercial and Defence aviation CCR system.
• Remote control system for accessing CCR and allied system over serial or TCP.
• Indigenized local Support/presence in India.
• Easy in configuration using DIP switches.
Technical Specifications
Indigenized remote control interface card suitable for MAFI system CCR equipment. Compatible for IDM8000 CCR. Backplane mounted serial and TCP/Ethernet communication module for CCR remote access. IDM 8000 CCR remote control on serial and TCP protocol.
Key Features
Indigenized remote control interface card suitable for MAFI system CCR equipment. Compatible for IDM8000 CCR. Backplane mounted serial and TCP/Ethernet communication module for CCR remote access. IDM 8000 CCR remote control on serial and TCP protocol.
• Remote control: Parallel or serial interface
• Compatible with MAFI CCR system
• Copatiable with IDM8000 CCR
• Compatible with Backplane mount serial communication.
• Compatible with commercial and Defence aviation CCR system.
• Remote control system for accessing CCR and allied system over serial or TCP.
• Indigenized local Support/presence in India.
Application
• Remote control: Parallel or serial interface.
• Compatible with MAFI CCR system.
• Compatible with IDM8000 CCR.
• Compatible with Backplane mount serial communication.
• Compatible with commercial and Defence aviation CCR system.
• Remote control system for accessing CCR and allied system over serial or TCP.
• Indigenized local Support/presence in India.
• Easy in configuration using DIP switches.
Industrial Training at Shahjalal Fertilizer Company Limited (SFCL)MdTanvirMahtab2
This presentation is about the working procedure of Shahjalal Fertilizer Company Limited (SFCL). A Govt. owned Company of Bangladesh Chemical Industries Corporation under Ministry of Industries.
Water scarcity is the lack of fresh water resources to meet the standard water demand. There are two type of water scarcity. One is physical. The other is economic water scarcity.
Explore the innovative world of trenchless pipe repair with our comprehensive guide, "The Benefits and Techniques of Trenchless Pipe Repair." This document delves into the modern methods of repairing underground pipes without the need for extensive excavation, highlighting the numerous advantages and the latest techniques used in the industry.
Learn about the cost savings, reduced environmental impact, and minimal disruption associated with trenchless technology. Discover detailed explanations of popular techniques such as pipe bursting, cured-in-place pipe (CIPP) lining, and directional drilling. Understand how these methods can be applied to various types of infrastructure, from residential plumbing to large-scale municipal systems.
Ideal for homeowners, contractors, engineers, and anyone interested in modern plumbing solutions, this guide provides valuable insights into why trenchless pipe repair is becoming the preferred choice for pipe rehabilitation. Stay informed about the latest advancements and best practices in the field.
Courier management system project report.pdfKamal Acharya
It is now-a-days very important for the people to send or receive articles like imported furniture, electronic items, gifts, business goods and the like. People depend vastly on different transport systems which mostly use the manual way of receiving and delivering the articles. There is no way to track the articles till they are received and there is no way to let the customer know what happened in transit, once he booked some articles. In such a situation, we need a system which completely computerizes the cargo activities including time to time tracking of the articles sent. This need is fulfilled by Courier Management System software which is online software for the cargo management people that enables them to receive the goods from a source and send them to a required destination and track their status from time to time.
Sachpazis:Terzaghi Bearing Capacity Estimation in simple terms with Calculati...Dr.Costas Sachpazis
Terzaghi's soil bearing capacity theory, developed by Karl Terzaghi, is a fundamental principle in geotechnical engineering used to determine the bearing capacity of shallow foundations. This theory provides a method to calculate the ultimate bearing capacity of soil, which is the maximum load per unit area that the soil can support without undergoing shear failure. The Calculation HTML Code included.
Final project report on grocery store management system..pdfKamal Acharya
In today’s fast-changing business environment, it’s extremely important to be able to respond to client needs in the most effective and timely manner. If your customers wish to see your business online and have instant access to your products or services.
Online Grocery Store is an e-commerce website, which retails various grocery products. This project allows viewing various products available enables registered users to purchase desired products instantly using Paytm, UPI payment processor (Instant Pay) and also can place order by using Cash on Delivery (Pay Later) option. This project provides an easy access to Administrators and Managers to view orders placed using Pay Later and Instant Pay options.
In order to develop an e-commerce website, a number of Technologies must be studied and understood. These include multi-tiered architecture, server and client-side scripting techniques, implementation technologies, programming language (such as PHP, HTML, CSS, JavaScript) and MySQL relational databases. This is a project with the objective to develop a basic website where a consumer is provided with a shopping cart website and also to know about the technologies used to develop such a website.
This document will discuss each of the underlying technologies to create and implement an e- commerce website.
Immunizing Image Classifiers Against Localized Adversary Attacksgerogepatton
This paper addresses the vulnerability of deep learning models, particularly convolutional neural networks
(CNN)s, to adversarial attacks and presents a proactive training technique designed to counter them. We
introduce a novel volumization algorithm, which transforms 2D images into 3D volumetric representations.
When combined with 3D convolution and deep curriculum learning optimization (CLO), itsignificantly improves
the immunity of models against localized universal attacks by up to 40%. We evaluate our proposed approach
using contemporary CNN architectures and the modified Canadian Institute for Advanced Research (CIFAR-10
and CIFAR-100) and ImageNet Large Scale Visual Recognition Challenge (ILSVRC12) datasets, showcasing
accuracy improvements over previous techniques. The results indicate that the combination of the volumetric
input and curriculum learning holds significant promise for mitigating adversarial attacks without necessitating
adversary training.
Overview of the fundamental roles in Hydropower generation and the components involved in wider Electrical Engineering.
This paper presents the design and construction of hydroelectric dams from the hydrologist’s survey of the valley before construction, all aspects and involved disciplines, fluid dynamics, structural engineering, generation and mains frequency regulation to the very transmission of power through the network in the United Kingdom.
Author: Robbie Edward Sayers
Collaborators and co editors: Charlie Sims and Connor Healey.
(C) 2024 Robbie E. Sayers
TECHNICAL TRAINING MANUAL GENERAL FAMILIARIZATION COURSEDuvanRamosGarzon1
AIRCRAFT GENERAL
The Single Aisle is the most advanced family aircraft in service today, with fly-by-wire flight controls.
The A318, A319, A320 and A321 are twin-engine subsonic medium range aircraft.
The family offers a choice of engines
TECHNICAL TRAINING MANUAL GENERAL FAMILIARIZATION COURSE
Client Server Network and Peer to Peer.pptx
1. CLIENT SERVER
NETWORK AND PEER TO
PEER
NETWORK
CLIENT-SERVER NETWORK: THIS MODEL ARE BROADLY USED NETWORK MODEL. IN CLIENT-SERVER NETWORK, CLIENTS
AND SERVER ARE DIFFERENTIATED, SPECIFIC SERVER AND CLIENTS ARE PRESENT. IN CLIENT-SERVER NETWORK,
CENTRALIZED SERVER IS USED TO STORE THE DATA BECAUSE ITS MANAGEMENT IS CENTRALIZED. IN CLIENT-SERVER
NETWORK, SERVER RESPOND THE SERVICES WHICH IS REQUEST BY CLIENT.
2.
3. PEER-TO-PEER NETWORK:
• This model does not differentiate the clients and the servers, In this each and every node is itself client and server.
In Peer-to-Peer Network, Each and every node can do both request and respond for the services.
• Peer-to-peer networks are often created by collections of 12 or fewer machines. All of these computers use unique
security to keep their data, but they also share data with every other node.
• In peer-to-peer networks, the nodes both consume and produce resources. Therefore, as the number of nodes
grows, so does the peer-to-peer network’s capability for resource sharing. This is distinct from client-server networks
where an increase in nodes causes the server to become overloaded.
• It is challenging to give nodes in peer-to-peer networks proper security because they function as both clients and
servers. A denial of service attack may result from this.
• The majority of contemporary operating systems, including Windows and Mac OS, come with software to implement
peer
4.
5. DIFFERENCE BETWEEN CLIENT-SERVER AND
PEER-TO-PEER NETWORK:
S.NO Client-Server Network Peer-to-Peer Network
1.
In Client-Server Network,
Clients and server are
differentiated, Specific
server and clients are
present.
In Peer-to-Peer Network,
Clients and server are
not differentiated.
2.
Client-Server Network
focuses on information
sharing.
While Peer-to-Peer
Network focuses on
connectivity.
3.
In Client-Server Network,
Centralized server is
used to store the data.
While in Peer-to-Peer
Network, Each peer has
its own data.
6. 1.4 OSI MODEL
- RESPONSIBILITIES OF EACH LAYER
• OSI stands for Open Systems Interconnection. It has been developed by ISO –
‘International Organization for Standardization‘, in the year 1984. It is a 7-layer
architecture with each layer having specific functionality to perform. All these 7
layers work collaboratively to transmit the data from one person to another
across the globe.
7.
8. •
• Layers of OSI Model
1. Physical Layer
2. Data Link Layer
3. Network Layer
4. Transport Layer
5. Session Layer
6. Presentation Layer
7. Application Layer
9. LAYER 1- PHYSICAL LAYER
• The lowest layer of the OSI reference model is the physical layer. It is responsible for the
actual physical connection between the devices. The physical layer contains information
in the form of bits. It is responsible for transmitting individual bits from one node to the
next. When receiving data, this layer will get the signal received and convert it into 0s and
1s and send them to the Data Link layer, which will put the frame back together.
10. • The Functions of the Physical Layer
• Bit synchronization: The physical layer provides the synchronization of the bits by providing a
clock. This clock controls both sender and receiver thus providing synchronization at the bit
level.
• Bit rate control: The Physical layer also defines the transmission rate i.e. the number of bits sent
per second.
• Physical topologies: Physical layer specifies how the different, devices/nodes are arranged in a
network i.e. bus, star, or mesh topology.
• Transmission mode: Physical layer also defines how the data flows between the two connected
devices. The various transmission modes possible are Simplex, half-duplex and full-duplex.
11. LAYER 2- DATA LINK LAYER (DLL)
• The data link layer is responsible for the node-to-node delivery of the message. The main function of this layer is to make sure data transfer
is error-free from one node to another, over the physical layer. When a packet arrives in a network, it is the responsibility of the DLL to
transmit it to the Host using its MAC address.
The Data Link Layer is divided into two sublayers:
1. Logical Link Control (LLC)
2. Media Access Control (MAC)
• The packet received from the Network layer is further divided into frames depending on the frame size of the NIC(Network Interface Card).
DLL also encapsulates Sender and Receiver’s MAC address in the header.
• The Receiver’s MAC address is obtained by placing an ARP(Address Resolution Protocol) request onto the wire asking “Who has that IP
address?” and the destination host will reply with its MAC address.
• The Functions of the Data Link Layer
• Framing: Framing is a function of the data link layer. It provides a way for a sender to transmit a set of bits that are meaningful to the
receiver. This can be accomplished by attaching special bit patterns to the beginning and end of the frame.
• Physical addressing: After creating frames, the Data link layer adds physical addresses (MAC addresses) of the sender and/or receiver in the
header of each frame.
• Error control: The data link layer provides the mechanism of error control in which it detects and retransmits damaged or lost frames.
• Flow Control: The data rate must be constant on both sides else the data may get corrupted thus, flow control coordinates the amount of
data that can be sent before receiving an acknowledgment.
• Access control: When a single communication channel is shared by multiple devices, the MAC sub-layer of the data link layer helps to
determine which device has control over the channel at a given time.
12. LAYER 3- NETWORK LAYER
• The network layer works for the transmission of data from one host to the other located in
different networks. It also takes care of packet routing i.e. selection of the shortest path to
transmit the packet, from the number of routes available. The sender & receiver’s IP
addresses are placed in the header by the network layer.
• The Functions of the Network Layer
• Routing: The network layer protocols determine which route is suitable from source to
destination. This function of the network layer is known as routing.
• Logical Addressing: To identify each device on Internetwork uniquely, the network layer
defines an addressing scheme. The sender & receiver’s IP addresses are placed in the
header by the network layer. Such an address distinguishes each device uniquely and
universally.
13. LAYER 4- TRANSPORT LAYER
• The transport layer provides services to the application layer and takes services from the network
layer. The data in the transport layer is referred to as Segments. It is responsible for the End to End
Delivery of the complete message. The transport layer also provides the acknowledgment of the
successful data transmission and re-transmits the data if an error is found.
• At the sender’s side: The transport layer receives the formatted data from the upper layers,
performs Segmentation, and also implements Flow & Error control to ensure proper data
transmission. It also adds Source and Destination port numbers in its header and forwards the
segmented data to the Network Layer.
• Note: The sender needs to know the port number associated with the receiver’s application.
• Generally, this destination port number is configured, either by default or manually. For example,
when a web application requests a web server, it typically uses port number 80, because this is the
default port assigned to web applications. Many applications have default ports assigned.
• At the receiver’s side: Transport Layer reads the port number from its header and forwards the
Data which it has received to the respective application. It also performs sequencing and
reassembling of the segmented data.
14. LAYER 5- SESSION LAYER
• This layer is responsible for the establishment of connection, maintenance of sessions, and
authentication, and also ensures security.
• The Functions of the Session Layer
• Session establishment, maintenance, and termination: The layer allows the two
processes to establish, use and terminate a connection.
• Synchronization: This layer allows a process to add checkpoints that are considered
synchronization points in the data. These synchronization points help to identify the error
so that the data is re-synchronized properly, and ends of the messages are not cut
prematurely and data loss is avoided.
• Dialog Controller: The session layer allows two systems to start communication with each
other in half-duplex or full-duplex.
15. LAYER 6- PRESENTATION LAYER
• The presentation layer is also called the Translation layer. The data from the application
layer is extracted here and manipulated as per the required format to transmit over the
network.
• The Functions of the Presentation Layer are
• Translation: For example, ASCII to EBCDIC.
• Encryption/ Decryption: Data encryption translates the data into another form or code.
The encrypted data is known as the ciphertext and the decrypted data is known as plain
text. A key value is used for encrypting as well as decrypting data.
• Compression: Reduces the number of bits that need to be transmitted on the network.
16. LAYER 7- APPLICATION LAYER
• At the very top of the OSI Reference Model stack of layers, we find the Application layer which is
implemented by the network applications. These applications produce the data, which has to be
transferred over the network. This layer also serves as a window for the application services to access the
network and for displaying the received information to the user.
• Example: Application – Browsers, Skype Messenger, etc.
• Note: 1. The application Layer is also called Desktop Layer.
• 2. Device or Protocol Use : SMTP
• The Functions of the Application Layer are
• Network Virtual Terminal: It allows a user to log on to a remote host.
• FTAM- File transfer access and management : This application allows a user to
access file in a remote host, retrieve files in remote host and manage or
control files from a remote computer.
• Mail Services : Provide email service.
• Directory Services : This application provides distributed database sources
and access for global information about various objects and services.
17. CONGESTION
NETWORK PERFORMANCE
• Network Congestion occurs when the traffic flowing through a network exceeds its maximum capacity. In most
cases, congestion is a temporary issue with the network caused due to a sudden upsurge of traffic, however, sometimes, a
network is continually congested, indicating a deeper problem. End-users perceive network congestion as Network Slowdown
or a very large delay in processing requests.
• Network congestion is also a contributing factor in the following underlying issues:
• High Latency –
In a congested network, the time taken by a packet to reach its destination increases significantly, hence a higher latency rate
is observed.
• Connection timeouts –
Ideally, the service should wait for the arrival of packets but in several cases, the connection terminates due to timeout.
• Packet loss –
Many packets cannot reach their destination if the network is congested, and will be dropped eventually due to timeout.
18. • Causes of network congestion :
1. Excessive bandwidth consumption –
Certain users or devices on the network may occasionally utilize more bandwidth than the average user or device. This
can put a strain on the network and its routing equipment (routers, switches, and cables), causing network congestion.
2. Poor subnet management –
For better resource management, a big network is divided into subnets. However, network congestion could arise if the
subnets are not scaled according to usage patterns and resource requirements.
3. Broadcast Storms –
A broadcast storm occurs when there is a sudden upsurge in the number of requests to a network. As a result, a network
may be unable to handle all of the requests at the same time.
4. Multicasting –
Multicasting occurs when a network allows multiple computers to communicate with each other at the same time. In
multicasting, a collision can occur when two packets are sent at the same time. Such frequent collisions may cause a
network to be congested.
5. Border Gateway Protocol –
All traffic is routed by BGP via the shortest possible path. However, while routing a packet, it doesn’t consider the amount
of traffic present in the route. In such scenarios, there is a possibility all the packets are being routed via the same route
which may lead to network congestion.
6. Too many devices –
19. CONGESTION CONTROL
• Congestion control refers to the techniques used to control or prevent
congestion. Congestion control techniques can be broadly classified into two
categories:
20.
21. OPEN LOOP CONGESTION CONTROL
OPEN LOOP CONGESTION CONTROL POLICIES ARE APPLIED TO PREVENT CONGESTION BEFORE IT HAPPENS. THE
CONGESTION CONTROL IS HANDLED EITHER BY THE SOURCE OR THE DESTINATION.
• Policies adopted by open loop congestion control –
1.Retransmission Policy :
It is the policy in which retransmission of the packets are taken care of. If the sender feels that
a sent packet is lost or corrupted, the packet needs to be retransmitted. This transmission may
increase the congestion in the network.
To prevent congestion, retransmission timers must be designed to prevent congestion and
also able to optimize efficiency.
22. 2. Window Policy :
The type of window at the sender’s side may also affect the congestion. Several packets in the Go-back-n window
are re-sent, although some packets may be received successfully at the receiver side. This duplication may increase
the congestion in the network and make it worse.
Therefore, Selective repeat window should be adopted as it sends the specific packet that may have been lost.
3 Discarding Policy :
A good discarding policy adopted by the routers is that the routers may prevent congestion and at the same time
partially discard the corrupted or less sensitive packages and also be able to maintain the quality of a message.
In case of audio file transmission, routers can discard less sensitive packets to prevent congestion and also
maintain the quality of the audio file.
4 Acknowledgment Policy :
Since acknowledgements are also the part of the load in the network, the acknowledgment policy imposed by the
receiver may also affect congestion. Several approaches can be used to prevent congestion related to
acknowledgment.
The receiver should send acknowledgement for N packets rather than sending acknowledgement for a single
packet. The receiver should send an acknowledgment only if it has to send a packet or a timer expires.
23. • 5 Admission Policy :
In admission policy a mechanism should be used to prevent congestion. Switches
in a flow should first check the resource requirement of a network flow before
transmitting it further. If there is a chance of a congestion or there is a congestion
in the network, router should deny establishing a virtual network connection to
prevent further congestion.
24. CLOSED LOOP CONGESTION CONTROL
• Closed loop congestion control techniques are used to treat or alleviate
congestion after it happens. Several techniques are used by different protocols;
some of them are:
25. • 1. Backpressure :
Backpressure is a technique in which a congested node stops receiving packets
from upstream node. This may cause the upstream node or nodes to become
congested and reject receiving data from above nodes. Backpressure is a node-
to-node congestion control technique that propagate in the opposite direction of
data flow. The backpressure technique can be applied only to virtual circuit where
each node has information of its above upstream node.
26. IN ABOVE DIAGRAM THE 3RD NODE IS CONGESTED AND STOPS RECEIVING
PACKETS AS A RESULT 2ND NODE MAY BE GET CONGESTED DUE TO SLOWING
DOWN OF THE OUTPUT DATA FLOW. SIMILARLY 1ST NODE MAY GET
CONGESTED AND INFORM THE SOURCE TO SLOW DOWN.