INTRODUCTION
WHAT IS OSI?
OSI MODEL
TYPES OF LAYERS
PHYSICAL LAYER
DATA LINK LAYER
NETWORK LAYER
TRANSPORT LAYER
SESSION LAYER
PRESENTATION LAYER
APPLICATION LAYER
The data link layer, or layer 2, is the second layer of the seven-layer OSI model of computer networking. This layer is the protocol layer that transfers data between adjacent network nodes in a wide area network (WAN) or between nodes on the same local area network (LAN) segment.
INTRODUCTION
WHAT IS OSI?
OSI MODEL
TYPES OF LAYERS
PHYSICAL LAYER
DATA LINK LAYER
NETWORK LAYER
TRANSPORT LAYER
SESSION LAYER
PRESENTATION LAYER
APPLICATION LAYER
The data link layer, or layer 2, is the second layer of the seven-layer OSI model of computer networking. This layer is the protocol layer that transfers data between adjacent network nodes in a wide area network (WAN) or between nodes on the same local area network (LAN) segment.
TCP/IP have 5 layers, whereas OSI model have 7 layers in its Model. TCP/IP is known for the secured connection and comunication. I have explained all functions and definitions of layers in TCP/IP Model
OSI layers describes how the data can be send from one parties to another during data communication. it also gives the detailed information of how the data functionally divided into small pieces and reaches the destination.
Although the OSI reference model is universally recognized, the historical and technical open standard of the Internet is Transmission Control Protocol / Internet Protocol (TCP/IP).
The TCP/IP reference model and the TCP/IP protocol stack make data communication possible between any two computers, anywhere in the world, at nearly the speed of light.
Protocols And IP suite PPT
Contents are
History
TCP/IP Suite Layer
a} Network Interface
b} Internet Layer
c} Transport Layer
d} Application Layer
3.Comparison of OSI and IP
The network layer is responsible for routing packets from the source to destination. The routing algorithm is the piece of software that decides where a packet goes next (e.g., which output line, or which node on a broadcast channel).For connectionless networks, the routing decision is made for each datagram. For connection-oriented networks, the decision is made once, at circuit setup time.
Routing Issues
The routing algorithm must deal with the following issues:
Correctness and simplicity: networks are never taken down; individual parts (e.g., links, routers) may fail, but the whole network should not.
Stability: if a link or router fails, how much time elapses before the remaining routers recognize the topology change? (Some never do..)
Fairness and optimality: an inherently intractable problem. Definition of optimality usually doesn't consider fairness. Do we want to maximize channel usage? Minimize average delay?
When we look at routing in detail, we'll consider both adaptive--those that take current traffic and topology into consideration--and nonadaptive algorithms.
TCP/IP have 5 layers, whereas OSI model have 7 layers in its Model. TCP/IP is known for the secured connection and comunication. I have explained all functions and definitions of layers in TCP/IP Model
OSI layers describes how the data can be send from one parties to another during data communication. it also gives the detailed information of how the data functionally divided into small pieces and reaches the destination.
Although the OSI reference model is universally recognized, the historical and technical open standard of the Internet is Transmission Control Protocol / Internet Protocol (TCP/IP).
The TCP/IP reference model and the TCP/IP protocol stack make data communication possible between any two computers, anywhere in the world, at nearly the speed of light.
Protocols And IP suite PPT
Contents are
History
TCP/IP Suite Layer
a} Network Interface
b} Internet Layer
c} Transport Layer
d} Application Layer
3.Comparison of OSI and IP
The network layer is responsible for routing packets from the source to destination. The routing algorithm is the piece of software that decides where a packet goes next (e.g., which output line, or which node on a broadcast channel).For connectionless networks, the routing decision is made for each datagram. For connection-oriented networks, the decision is made once, at circuit setup time.
Routing Issues
The routing algorithm must deal with the following issues:
Correctness and simplicity: networks are never taken down; individual parts (e.g., links, routers) may fail, but the whole network should not.
Stability: if a link or router fails, how much time elapses before the remaining routers recognize the topology change? (Some never do..)
Fairness and optimality: an inherently intractable problem. Definition of optimality usually doesn't consider fairness. Do we want to maximize channel usage? Minimize average delay?
When we look at routing in detail, we'll consider both adaptive--those that take current traffic and topology into consideration--and nonadaptive algorithms.
This is a presentation on a paper published on the social network and its impact. This was assigned to us in our statistics course work. It is a 17page long fully matured paper on the topic. Anyone interested in the topic can use it as a reference. Anyone who wants to give a presentation on Social Networking will also find benefit from it.
To Download this PPT click on the link below:-
http://www29.zippyshare.com/v/14569917/file.html
Networking
Computer network
Types of network
Personal Area Networks (PANs)
Local Area Networks (LANs)
Metropolitan Area Networks (MANs)
Wide Area Networks (WANs)
Classification of Network Architecture
Client-server architecture
Peer-to-peer architecture
Hybrid architecture
Network topology
Bus Topology
Star Topology
Ring Topology
Mesh Topology
Tree Topology
Hybrid Topology
Network effects. It’s one of the most important concepts for business in general and especially for tech businesses, as it’s the key dynamic behind many successful software-based companies. Understanding network effects not only helps build better products, but it helps build moats and protect software companies against competitors’ eating away at their margins.
Yet what IS a network effect? How do we untangle the nuances of 'network effects' with 'marketplaces' and 'platforms'? What’s the difference between network effects, virality, supply-side economies of scale? And how do we know a company has network effects?
Most importantly, what questions can entrepreneurs and product managers ask to counter the wishful thinking and sometimes faulty assumption behind the belief that “if we build it, they will come” … and instead go about more deterministically creating network effects in their business? Because it's not a winner-take-all market by accident.
OSI stands for Open Systems Interconnection. It has been developed by ISO – ‘International Organization of Standardization‘, in the year 1984. It is a 7 layer architecture with each layer having specific functionality to perform.
The International Standards Organization (ISO) developed the Open Systems Interconnection (OSI) model. It divides network communication into seven layers. ... Layers 5-7, called the the upper layers, contain application-level data
#imannjeet #mannjeet mn
The open system interconnection model, better known as the OSI Model, is a network map that was originally developed as a universal standard for creating networks. But instead of serving as a model with agreed-upon protocols that would be used worldwide, the OSI model has become a teaching tool that shows how different tasks within a network should be handled in order to promote error-free data transmission.
This Presentation consists of the detailed analysis of OSI & TCP/IP Model used for data transmission in Computer Network. It is very beneficial for any BTech, BCA, MCA, MTech students, or who is interested in networking field.
This is a notes about basic introduction of OSI Model & TCP/IP Model. It contain details about the seven layers of the OSI Model which are Application layer, Presentation Layer, Session Layer, Transport Layer, Network Layer, Data Link Layer, Physical Layer
fundamentals of software engineering.this unit covers all the aspects of software engineering coding standards and naming them and code inspectionna an d various testing methods and
FUNDAMENTALS OF software developement and a detail outcome of the software based on the project management and the various metrics and measurements development in software engineering
fundamentals of software engineering a deep study of diagrams DFD ER use case Activity and many others functional and non functional requirements listed required by customer
Working with user accounts,modification,deletion and creating a group its policies and share and printer sharing over a network and windows server backup 2008
Courier management system project report.pdfKamal Acharya
It is now-a-days very important for the people to send or receive articles like imported furniture, electronic items, gifts, business goods and the like. People depend vastly on different transport systems which mostly use the manual way of receiving and delivering the articles. There is no way to track the articles till they are received and there is no way to let the customer know what happened in transit, once he booked some articles. In such a situation, we need a system which completely computerizes the cargo activities including time to time tracking of the articles sent. This need is fulfilled by Courier Management System software which is online software for the cargo management people that enables them to receive the goods from a source and send them to a required destination and track their status from time to time.
Cosmetic shop management system project report.pdfKamal Acharya
Buying new cosmetic products is difficult. It can even be scary for those who have sensitive skin and are prone to skin trouble. The information needed to alleviate this problem is on the back of each product, but it's thought to interpret those ingredient lists unless you have a background in chemistry.
Instead of buying and hoping for the best, we can use data science to help us predict which products may be good fits for us. It includes various function programs to do the above mentioned tasks.
Data file handling has been effectively used in the program.
The automated cosmetic shop management system should deal with the automation of general workflow and administration process of the shop. The main processes of the system focus on customer's request where the system is able to search the most appropriate products and deliver it to the customers. It should help the employees to quickly identify the list of cosmetic product that have reached the minimum quantity and also keep a track of expired date for each cosmetic product. It should help the employees to find the rack number in which the product is placed.It is also Faster and more efficient way.
Automobile Management System Project Report.pdfKamal Acharya
The proposed project is developed to manage the automobile in the automobile dealer company. The main module in this project is login, automobile management, customer management, sales, complaints and reports. The first module is the login. The automobile showroom owner should login to the project for usage. The username and password are verified and if it is correct, next form opens. If the username and password are not correct, it shows the error message.
When a customer search for a automobile, if the automobile is available, they will be taken to a page that shows the details of the automobile including automobile name, automobile ID, quantity, price etc. “Automobile Management System” is useful for maintaining automobiles, customers effectively and hence helps for establishing good relation between customer and automobile organization. It contains various customized modules for effectively maintaining automobiles and stock information accurately and safely.
When the automobile is sold to the customer, stock will be reduced automatically. When a new purchase is made, stock will be increased automatically. While selecting automobiles for sale, the proposed software will automatically check for total number of available stock of that particular item, if the total stock of that particular item is less than 5, software will notify the user to purchase the particular item.
Also when the user tries to sale items which are not in stock, the system will prompt the user that the stock is not enough. Customers of this system can search for a automobile; can purchase a automobile easily by selecting fast. On the other hand the stock of automobiles can be maintained perfectly by the automobile shop manager overcoming the drawbacks of existing system.
TECHNICAL TRAINING MANUAL GENERAL FAMILIARIZATION COURSEDuvanRamosGarzon1
AIRCRAFT GENERAL
The Single Aisle is the most advanced family aircraft in service today, with fly-by-wire flight controls.
The A318, A319, A320 and A321 are twin-engine subsonic medium range aircraft.
The family offers a choice of engines
Explore the innovative world of trenchless pipe repair with our comprehensive guide, "The Benefits and Techniques of Trenchless Pipe Repair." This document delves into the modern methods of repairing underground pipes without the need for extensive excavation, highlighting the numerous advantages and the latest techniques used in the industry.
Learn about the cost savings, reduced environmental impact, and minimal disruption associated with trenchless technology. Discover detailed explanations of popular techniques such as pipe bursting, cured-in-place pipe (CIPP) lining, and directional drilling. Understand how these methods can be applied to various types of infrastructure, from residential plumbing to large-scale municipal systems.
Ideal for homeowners, contractors, engineers, and anyone interested in modern plumbing solutions, this guide provides valuable insights into why trenchless pipe repair is becoming the preferred choice for pipe rehabilitation. Stay informed about the latest advancements and best practices in the field.
Forklift Classes Overview by Intella PartsIntella Parts
Discover the different forklift classes and their specific applications. Learn how to choose the right forklift for your needs to ensure safety, efficiency, and compliance in your operations.
For more technical information, visit our website https://intellaparts.com
Saudi Arabia stands as a titan in the global energy landscape, renowned for its abundant oil and gas resources. It's the largest exporter of petroleum and holds some of the world's most significant reserves. Let's delve into the top 10 oil and gas projects shaping Saudi Arabia's energy future in 2024.
Immunizing Image Classifiers Against Localized Adversary Attacksgerogepatton
This paper addresses the vulnerability of deep learning models, particularly convolutional neural networks
(CNN)s, to adversarial attacks and presents a proactive training technique designed to counter them. We
introduce a novel volumization algorithm, which transforms 2D images into 3D volumetric representations.
When combined with 3D convolution and deep curriculum learning optimization (CLO), itsignificantly improves
the immunity of models against localized universal attacks by up to 40%. We evaluate our proposed approach
using contemporary CNN architectures and the modified Canadian Institute for Advanced Research (CIFAR-10
and CIFAR-100) and ImageNet Large Scale Visual Recognition Challenge (ILSVRC12) datasets, showcasing
accuracy improvements over previous techniques. The results indicate that the combination of the volumetric
input and curriculum learning holds significant promise for mitigating adversarial attacks without necessitating
adversary training.
Industrial Training at Shahjalal Fertilizer Company Limited (SFCL)MdTanvirMahtab2
This presentation is about the working procedure of Shahjalal Fertilizer Company Limited (SFCL). A Govt. owned Company of Bangladesh Chemical Industries Corporation under Ministry of Industries.
About
Indigenized remote control interface card suitable for MAFI system CCR equipment. Compatible for IDM8000 CCR. Backplane mounted serial and TCP/Ethernet communication module for CCR remote access. IDM 8000 CCR remote control on serial and TCP protocol.
• Remote control: Parallel or serial interface.
• Compatible with MAFI CCR system.
• Compatible with IDM8000 CCR.
• Compatible with Backplane mount serial communication.
• Compatible with commercial and Defence aviation CCR system.
• Remote control system for accessing CCR and allied system over serial or TCP.
• Indigenized local Support/presence in India.
• Easy in configuration using DIP switches.
Technical Specifications
Indigenized remote control interface card suitable for MAFI system CCR equipment. Compatible for IDM8000 CCR. Backplane mounted serial and TCP/Ethernet communication module for CCR remote access. IDM 8000 CCR remote control on serial and TCP protocol.
Key Features
Indigenized remote control interface card suitable for MAFI system CCR equipment. Compatible for IDM8000 CCR. Backplane mounted serial and TCP/Ethernet communication module for CCR remote access. IDM 8000 CCR remote control on serial and TCP protocol.
• Remote control: Parallel or serial interface
• Compatible with MAFI CCR system
• Copatiable with IDM8000 CCR
• Compatible with Backplane mount serial communication.
• Compatible with commercial and Defence aviation CCR system.
• Remote control system for accessing CCR and allied system over serial or TCP.
• Indigenized local Support/presence in India.
Application
• Remote control: Parallel or serial interface.
• Compatible with MAFI CCR system.
• Compatible with IDM8000 CCR.
• Compatible with Backplane mount serial communication.
• Compatible with commercial and Defence aviation CCR system.
• Remote control system for accessing CCR and allied system over serial or TCP.
• Indigenized local Support/presence in India.
• Easy in configuration using DIP switches.
3. Index
1. OSI model & function of each
Layer.
2. TCP/ IP model.
3. Connection oriented v/s
Connectionless approach.
4. Comparison of OSI & TCP/IP
Models.
3
4. 1.OSI model & function of each Layer.
There are many users who use computer
network and are located all over the world.
For national and worldwide data
communication, systems must be developed
which are compatible to communicate with
each other.
ISO has developed this.
4
5. ISO stands for International organization of
Standardization.
This is called a model for Open System
Interconnection (OSI) and is commonly
known as OSI model.
The ISO-OSI model is a seven layer (7
Layer)architecture developed in 1984
5
6. To reduce the design complexity, most of the
networks are organized as a series of layers or
levels, each one build upon one below it.
The basic idea of a layered architecture is to
divide the design into small pieces.
Each layer adds to the services provided by the
lower layers in such a way that the highest
layer is provided has a full set of services.
6
7. The basic elements of a layered model are
services
protocols
and interfaces.
A service is a set of actions that a layer offers to
another (higher) layer.
A Protocol is a set of rules that a layer uses to
exchange information.
A Interface is communication between the
layers. 7
9. Layer 1,2 and 3 that is physical ,data and
network layers are Network Support
Layers.
Layers 5,6 and 7 that is session,presentation
and application layers are User Support
Layer.
Transport Layer links the network support
layers and user support layers.
9
11. Physical Layer:Layer 1
Physical layer is the lowest layer of all. It is
responsible for sending bits from one
computer to another. This layer is not
concerned with the meaning of the bits and
deals with the physical connection to the
network and with transmission.
This layer defines electrical and physical
details represented as 0 or a 1
11
12. Functions of Physical Layer:
Representation of Bits: Data in this layer
consists of stream of bits.
Data Rate: This layer defines the rate of
transmission which is the number of bits per
second.
12
13. Synchronization: It deals with the
synchronization of the transmitter and receiver.
Interface: The physical layer defines the
transmission interface between devices and
transmission medium.
13
14. Line Configuration: This layer connects
devices with the medium: Point to Point
configuration and Multipoint configuration.
Topologies: Devices must be connected using
the following topologies: Mesh, Star, Ring
and Bus.
14
15. Transmission Modes: Physical Layer defines
the direction of transmission between two
devices: Simplex, Half Duplex, Full Duplex.
Deals with baseband and broadband
transmission.
15
16. Data Layer:Layer 2:
Data link layer is most reliable node to node
delivery of data. It forms frames from the
packets that are received from network layer
and gives it to physical layer.
Error controlling is easily done. Error detection
bits are used by the data link layer. It also
corrects the errors.
16
17. FUNCTIONS OF DATA LINK LAYER:
Framing: Frames are the streams of bits
received from the network layer into
manageable data units.
Physical Addressing: The Data Link layer
adds a header to the frame in order to define
physical address of the sender or receiver of the
frame, if the frames are to be distributed to
different systems on the network.
17
18. Flow Control: A flow control mechanism to
avoid a fast transmitter from running a slow
receiver by buffering the extra bit is
provided by flow control. This prevents
traffic jam at the receiver side.
Error Control: Error control is achieved by
adding a trailer at the end of the frame.
Duplication of frames are also prevented by
using this mechanism
18
19. Access Control: Protocols of this layer
determine which of the devices has control
over the link at any given time.
19
20. Two Parts of Data Link Layer
Data link layer is divided into two subparts
1.Logical Link Control Layer (LLC)
2.Media Access Control Layer (MAC)
20
21. Data Link Layer:LLC and MAC
LLC:Logical Link Control layer is the upper
layer of the two in data link layer.
Essential for the communications between
devices.
Supports connection oriented and
connectionless services both.
MAC:Media Access Control is the lower
layer.
It is responsible for providing a method for
station to gain access to the medium. 21
22. Layer 3: The Network Layer :
It routes the signal through different
channels from one node to other.
It acts as a network controller. It manages
the Subnet traffic.It decides by which route
data should take.
It divides the outgoing messages into
packets.
22
23. Functions of Network Layer:Layer 3
It translates logical network address into
physical address.
Routers and gateways operate in the
network layer. Mechanism is provided by
Network Layer for routing the packets to
final destination.
Connection services are provided.
Breaks larger packets into small packets.
23
24. Layer 4:Transport Layer
It decides if data transmission should be on
parallel path or single path.
It receives messages from the Session layer
above it, convert the message into smaller
units and passes it on to the Network layer.
Transport layer breaks the message (data)
into small units so that they are handled
more efficiently by the network layer.
24
25. Function of Transport Layer:Layer 4
Service Point Addressing : Transport
Layer header includes service point address
which is port address.
Segmentation and Reassembling : A
message is divided into segments; each
segment contains sequence number, which
enables this layer in reassembling the
message.
25
26. 26
Flow Control : In this layer, flow control is
performed end to end.
Error Control : Error Control is performed end to
end in this layer to ensure that the complete
message arrives at the receiving transport layer
without any error. Error Correction is done
through retransmission.
27. Layer 5: The Session Layer :
Session layer manages and synchronize the
conversation between two different
applications.
Transfer of data from source to destination
session layer streams of data are marked and
are resynchronized properly, so that the
ends of the messages are not cut and data
loss is avoided.
27
28. Functions of Session Layer:Layer 5
Dialog Control : This layer allows two
systems to start communication with each
other in half-duplex or full-duplex.
Synchronization : This layer allows a
process to add checkpoints which are
considered as synchronization points into
stream of data.
28
29. Example: If a system is sending a file of 800
pages, adding checkpoints after every 50
pages is recommended. This ensures that 50
page unit is successfully received and
acknowledged. This is beneficial at the time
of crash as if a crash happens at page
number 110; there is no need to retransmit 1
to 100 pages.
29
30. Layer 6: The Presentation Layer :
The primary goal of this layer is to take care
of the syntax and semantics of the
information exchanged between two
communicating systems.
Presentation layer takes care that the data is
sent in such a way that the receiver will
understand the information (data) and will
be able to use the data.
30
31. Functions of Presentation
Layer:Layer 6
Translation : Before being transmitted,
information in the form of characters and
numbers should be changed to bit streams.
Encryption : It carries out encryption at the
transmitter and decryption at the receiver.
Compression : It carries out data
compression to reduce the bandwidth of the
data to be transmitted. It is important in
transmitting multimedia such as audio,
video, text etc. 31
32. Layer 7: Application Layer :
It is the topmost layer.
Transferring of files disturbing the results to the user is
also done in this layer. Mail services, directory services,
network resource etc are services provided by
application layer.
This layer mainly holds application programs to act
upon the received and to be sent data.
32
33. Functions of Application
Layer:Layer 7
Mail Services : This layer provides the basis
for E-mail forwarding and storage.
Directory Services : This layer provides
access for global information about various
services.
File Transfer, Access and Management
(FTAM) : It is a standard mechanism to
access files and manages it.
33
34. Protocols at Application Layer
HTTP:Hyper Text Transfer Protocol
FTP:File Transfer Protocol
SMTP:Simple Mail Transfer Protocol
NFS:Network File Services
NVT:Network Virtual Terminal
34
35. Merits of OSI
OSI model distinguishes well between the
services, interfaces and protocols.
Protocols of OSI model are very well hidden.
Protocols can be replaced by new protocols
as technology changes.
Supports connection oriented services as
well as connectionless service.
35
36. Demerits of OSI
Model was devised before the invention of
protocols.
Fitting of protocols is tedious task.
It is just used as a reference model.
36
37. 2.TCP/IP MODEL
TCP/IP means Transmission Control
Protocol and Internet Protocol. It is the
network model used in the current Internet
architecture as well. Protocols are set of
rules which govern every possible
communication over a network. These
protocols describe the movement of data
between the source and destination or the
internet. These protocols offer simple
naming and addressing schemes.
37
38. TCP/IP that is Transmission Control
Protocol and Internet Protocol was
developed by Department of Defence's
Project Research Agency (ARPA, later
DARPA) as a part of a research project of
network interconnection to connect remote
machines.
38
39. Flexible architecture: Adding more
machines to a network was easy.
Robust:Connections remained intact
untill the source and destination machines
were functioning.
Communication:The overall idea was to
allow one application on one computer
send data packets another application
running on different computer.
39
41. Layer 1: Host-to-network Layer
Lowest layer of the all.
Protocol is used to connect to the host, so
that the packets can be sent over it.
Varies from host to host and network to
network.
41
42. Layer 2: Internet layer
Selection of a packet switching network
which is based on a connectionless
internetwork layer is called a internet layer.
It is the layer which holds the whole
architecture together.
It helps the packet to travel independently
to the destination.
Order in which packets are received is
different from the way they are sent.
IP (Internet Protocol) is used in this layer.
42
43. Layer 3: Transport Layer
It decides if data transmission should be on
parallel path or single path.
Functions such as multiplexing, segmenting
or splitting on the data is done by transport
layer.
The applications can read and write to the
transport layer.
43
44. Transport layer adds header information to
the data.
Transport layer breaks the message (data)
into small units so that they are handled
more efficiently by the network layer.
Transport layer also arrange the packets to
be sent, in sequence.
44
45. Layer 4: Application Layer
The TCP/IP specifications described a lot of
applications that were at the top of the
protocol stack. Some of them were TELNET,
FTP, SMTP, DNS etc.
TELNET is a two-way communication
protocol which allows connecting to a
remote machine and run applications on it.
45
46. FTP(File Transfer Protocol) is a protocol,
that allows File transfer amongst computer
users connected over a network. It is
reliable, simple and efficient.
SMTP(Simple Mail Transport Protocol) is a
protocol, which is used to transport
electronic mail between a source and
destination, directed via a route.
DNS(Domain Name Server) resolves an IP
address into a textual address for Hosts
connected over a network.
46
49. Sr
no
Protocol Full Form Function
1 IP Internetwork Protocol Used by TCP/IP
2 ICMP Internet Control Message Protocol Control and error
messages
3 IGMP Internet Group Message Protocol Unicasting and
multicasting
4 ARP Address Resolution Protocol To know physical
address
5 RARP Reverse Address Resolution Protocol To know internet
address
6 TCP Transmission Control Protocol Connection
oriented and
reliable
7 UDP User Datagram Protocol Connectionless
and unreliable
49
50. 8 SMTP Simple Mail
Transfer
Protocol
Deals with e-
mails
9 FTP File Transfer
Protocol
Deals with files
10 TFTP Trivial File
Transfer
Protocol
Read and write
operations only
11 SNMP Simple Network
Management
Protocol
Managing the
network
12 TELNET Terminal
Network
Remote Login
50
51. 3.Connection Oriented and
Connectionless Services
These are the two services given by the layers to layers
above them. These services are :
1. Connection Oriented Service
2. Connectionless Services
51
52. Connection Oriented Services
There is a sequence of operation to be
followed by the users of connection oriented
service. These are:
Connection is established
Information is sent
Connection is released
52
53. In connection oriented service we have to
establish a connection before starting the
communication. When connection is
established we send the message or the
information and then we release the
connection.
Connection oriented service is more reliable
than connectionless service. We can send
the message in connection oriented service
if there is an error at the receivers end.
Example of connection oriented is TCP
(Transmission Control Protocol) protocol. 53
54. Connectionless Services
It is similar to the postal services, as it
carries the full address where the message
(letter) is to be carried. Each message is
routed independently from source to
destination. The order of message sent can
be different from the order received.
54
55. In connectionless the data is transferred in
one direction from source to destination
without checking that destination is still
there or not or if it prepared to accept the
message. Authentication is not needed in
this. Example of Connectionless service is
UDP (User Datagram Protocol) protocol.
55
56. Difference between Connection
Oriented and Connectionless
Services
Sr
no.
Connection
Oriented Services
Connectionless
Services
1. It needs
authentication.
It doesnot need
authentication.
2. It gurantees a
delivery
It doesnot gurantee a
delivery
3. It is more reliable It not that reliable
4. Connection Oriented
is stream based
Connectionless is
message based.
56
57. 4.Comparison of OSI Reference
Model and TCP/IP Reference Model
Sr
no
OSI TCP/IP
1. OSI model
Developed after
TCP/IP
TCP/IP model
Developed before OSI
2. OSI model has 7
layers
TCP/IP has 4 layers
3. OSI model
developed before
protocols of OSI
were developed
TCP/IP model
developed after
protocols of TCP/IP
were developed 57
58. 4. OSI differentiates
services,protocols and
interfaces.
TCP/IP doesn’t
differentiate
them.
5. Connection oriented and
connectionless in network
layer and connection
oriented in transport layer
in OSI model
Connection
oriented and
connectionless in
transport layer and
connection oriented
in network layer in
tcp/ip model
58