A research paper on the concept of network layer explaining its terminologies, uses, and functionalities.
This paper was presented by me as an NTCC report in 2nd Year of B.Tech Computer Science.
This document is a project report on computer networking prepared by Surender Singh for his summer training. It provides an introduction to networking and covers topics such as network types (LAN and WAN), network models (OSI model), networking cables, devices, IP addressing, routing, firewalls, wireless networks, and ISDN. The report defines what a computer network is, outlines the requirements and benefits of networking, and describes different network components and concepts at a high level.
Ethernet is a widely used local area network technology that operates at the Physical and Data Link layers of the OSI model. It uses CSMA/CD access method to share the transmission medium and detect collisions. Key Ethernet standards include 10Base-T, 100Base-TX, 1000Base-T, and 10GBase-T for copper cable, as well as 100Base-FX and 1000Base-LX for fiber-optic cable. Switches help improve network performance by segmenting collision domains and enabling full-duplex transmissions.
This document provides an overview of networking and internetworking concepts. It defines what a network is and some common network protocols like TCP/IP. It discusses how network speed is measured by bit rate and latency. It then covers local area networks, wide area networks, and the internet. The document explains the purpose of networks for file sharing, communication, and remote program execution. It also discusses network messaging and different network service models like the OSI reference model and TCP/IP model. Finally, it provides a simplified example of how the TCP/IP protocol functions to route a packet from a source to destination across multiple routers.
The document provides information about the CCNA certification exam, including the exam number, total marks, duration, passing score, question types, and benefits of obtaining the certification. It also discusses common networking devices like hubs, switches, routers, and network interface cards. Finally, it covers networking topics such as network topologies, the OSI model, TCP/IP protocols, WANs, LANs, and the IEEE 802 standards.
The document discusses various networking topologies, cable types, connectors and wiring standards. It covers standard cable types like CAT3, CAT5, CAT5e, CAT6 and their properties. Common connector types like RJ-11, RJ-45, BNC and SC are identified. Wiring standards like 568A and 568B are explained. Different physical media like coaxial cable, twisted pair cable and fiber optic cable are described in detail.
The document discusses internetworking and how to build an internet from the ground up. It describes how different networking technologies are interconnected through protocols like TCP/IP which allow communication across heterogeneous networks by smoothing out differences. Layered models and protocols are explained, including how packets are routed from one network to another through gateways and fragmented if needed to traverse networks with different maximum transmission units.
The OSI model is a 7-layer architecture developed by ISO for data communication between devices on a network. It describes the functions of each layer, from the physical layer defining electrical specifications to the application layer providing services to end users. Each layer has a specific role such as framing data, routing, reliability, or implementing protocols. Data moves down the layers at the sending device and up at the receiving device with each layer building upon the functions of the layer below.
A computer network connects devices that can communicate using common standards. Devices exchange resources and services by communicating. Networks expand by connecting devices like switches or hubs, which serve as central points for computers to connect to. The OSI model describes network functions in 7 layers, while the TCP/IP model has 4 layers. Encapsulation is the process of adding headers and trailers to data as it passes through layers. Frames, packets, and segments refer to encapsulated data at different layers. Ethernet defines physical and data link standards, using MAC addresses to deliver frames. IP addresses identify devices, while private addresses are non-routable. Switches inspect traffic and make forwarding decisions for each port, unlike hubs which broadcast to all
This document is a project report on computer networking prepared by Surender Singh for his summer training. It provides an introduction to networking and covers topics such as network types (LAN and WAN), network models (OSI model), networking cables, devices, IP addressing, routing, firewalls, wireless networks, and ISDN. The report defines what a computer network is, outlines the requirements and benefits of networking, and describes different network components and concepts at a high level.
Ethernet is a widely used local area network technology that operates at the Physical and Data Link layers of the OSI model. It uses CSMA/CD access method to share the transmission medium and detect collisions. Key Ethernet standards include 10Base-T, 100Base-TX, 1000Base-T, and 10GBase-T for copper cable, as well as 100Base-FX and 1000Base-LX for fiber-optic cable. Switches help improve network performance by segmenting collision domains and enabling full-duplex transmissions.
This document provides an overview of networking and internetworking concepts. It defines what a network is and some common network protocols like TCP/IP. It discusses how network speed is measured by bit rate and latency. It then covers local area networks, wide area networks, and the internet. The document explains the purpose of networks for file sharing, communication, and remote program execution. It also discusses network messaging and different network service models like the OSI reference model and TCP/IP model. Finally, it provides a simplified example of how the TCP/IP protocol functions to route a packet from a source to destination across multiple routers.
The document provides information about the CCNA certification exam, including the exam number, total marks, duration, passing score, question types, and benefits of obtaining the certification. It also discusses common networking devices like hubs, switches, routers, and network interface cards. Finally, it covers networking topics such as network topologies, the OSI model, TCP/IP protocols, WANs, LANs, and the IEEE 802 standards.
The document discusses various networking topologies, cable types, connectors and wiring standards. It covers standard cable types like CAT3, CAT5, CAT5e, CAT6 and their properties. Common connector types like RJ-11, RJ-45, BNC and SC are identified. Wiring standards like 568A and 568B are explained. Different physical media like coaxial cable, twisted pair cable and fiber optic cable are described in detail.
The document discusses internetworking and how to build an internet from the ground up. It describes how different networking technologies are interconnected through protocols like TCP/IP which allow communication across heterogeneous networks by smoothing out differences. Layered models and protocols are explained, including how packets are routed from one network to another through gateways and fragmented if needed to traverse networks with different maximum transmission units.
The OSI model is a 7-layer architecture developed by ISO for data communication between devices on a network. It describes the functions of each layer, from the physical layer defining electrical specifications to the application layer providing services to end users. Each layer has a specific role such as framing data, routing, reliability, or implementing protocols. Data moves down the layers at the sending device and up at the receiving device with each layer building upon the functions of the layer below.
A computer network connects devices that can communicate using common standards. Devices exchange resources and services by communicating. Networks expand by connecting devices like switches or hubs, which serve as central points for computers to connect to. The OSI model describes network functions in 7 layers, while the TCP/IP model has 4 layers. Encapsulation is the process of adding headers and trailers to data as it passes through layers. Frames, packets, and segments refer to encapsulated data at different layers. Ethernet defines physical and data link standards, using MAC addresses to deliver frames. IP addresses identify devices, while private addresses are non-routable. Switches inspect traffic and make forwarding decisions for each port, unlike hubs which broadcast to all
Virtual private networks (VPNs) allow users to securely access remote networks via the internet. There are several types of VPNs including remote access, intranet, and extranet VPNs. VPNs use protocols like IPSec, PPTP, and L2TP to securely tunnel and encrypt network traffic. Components include security protocols, appliances like firewalls, and authentication methods. VPNs provide benefits to companies like extending networks, boosting productivity, improving security, and scaling easily. Quality of service ensures acceptable response times when accessing applications remotely. VPN usage is growing as more companies adopt the technology for its cost efficiency and secure remote access abilities.
1. What is Data Communication?
2. What is a network?
3. What is Node?
4. What is a network interface card (NIC)?
5. Types of Computer Networks
6. What is a MAC Address?
7. What Types of Addressing?
8. What is a port?
9. What are the different port numbers?
10.What is Hub?
11.What is Router?
12.What is a Bridge?
13.What is Gateway?
14.What is Brouter?
15.What is OSI Model?
16.What is the OSI model (Open Systems Interconnection)?
17.7 layers of the OSI model?
18.What Is the TCP/IP Model?
19.What Is the TCP/IP Model?
20.Classification of IP address Addressing?
This is Data Communication Lecture Assignment. Here discussed about many topics above the subject. I am really learned more from Data Communication subject. Specially thanks to Dear Respectable Sir Pranab Bandhu Nath
This document provides an overview of networking concepts including:
- Definitions of a network, LAN, MAN, WAN and their characteristics.
- Explanations of common network topologies like bus, star, ring and their advantages/disadvantages.
- Descriptions of common networking hardware like switches, routers, hubs, bridges and their functions.
- Explanations of protocols like TCP, UDP, IP, DNS and their roles in networking.
- Discussions of other topics like cabling, addressing schemes and standards.
The document serves as a comprehensive introduction to fundamental networking topics at both the conceptual and technical levels.
The document provides an introduction to networking concepts and Cisco technologies. It defines networking and network topology, discusses the OSI model and TCP/IP, and describes common network devices like switches, routers, and firewalls. It also covers IP addressing, routing protocols, and basic router and switch configuration.
1) Network standards define guidelines for how computers connect to networks and transmit data, specifying aspects like the connection medium, speeds, and cable/wireless technologies. Common standards include Ethernet (802.3), broadband (802.7), fiber optic (802.8), and wireless (802.11).
2) Protocols establish communication rules between devices on a network, ensuring proper data sequencing and delivery. Major protocols are HTTP (web access), SMTP (email), FTP (file transfer), TCP (data delivery), and IP (addressing).
3) Standards and protocols work together to regulate network connections and communications between computers.
The document discusses various topics related to computer networking such as:
1. It differentiates between an internet, which connects millions of computers globally through a network of networks, and a network, which connects computers locally.
2. It describes internetworking as connecting computer networks through gateways, resulting in an internetwork or internet. The Internet Protocol establishes internetworking on the internet.
3. It provides details on HDLC frames, which use flags to mark the beginning and end, and contain address, control and information fields for transmitting data between network points.
The document discusses network protocols and related standards. It introduces the OSI Reference Model, which defines seven layers of network functionality standardized by ISO to enable communication between systems. These layers include the physical, data link, network, transport, session, presentation, and application layers. The document also discusses IEEE 802 network specifications and various protocols like TCP/IP, NetBEUI, and others. It provides an overview of each OSI layer and their functions in network communication.
The document provides an introduction to TCP/IP networking and the Internet. It explains that the Internet is a global network of interconnected computers that allows users to access documents, images, videos, and more from anywhere in the world. It describes how the Internet works using TCP/IP, which breaks files into packets that are routed through networks and reassembled at their destination. The document contrasts TCP, which provides reliable connections, and UDP, which sends independent data packets without guarantees of delivery.
This document provides an overview of wireless networks and protocols. It discusses wireless personal area networks (WPANs) such as Bluetooth and infrared, wireless local area networks (WLANs) using IEEE 802.11 standards, and wireless metropolitan area networks (WMANs) such as WiMAX. For WLANs, it describes wireless access points, common network architectures, and media access control protocols including carrier sense multiple access with collision avoidance (CSMA/CA) and carrier sense multiple access with collision detection (CSMA/CD).
Networking Concepts Lesson 06 - Protocols - Eric VanderburgEric Vanderburg
This document summarizes networking concepts related to protocols. It discusses how protocols enable communication by sending data in small packets with headers containing source/destination, sequence numbers, and payload data. Packet types include unicast, broadcast, and multicast. Common protocol suites are described like TCP/IP, IPX/SPX, and AppleTalk. Specific protocols are also outlined at each layer of the OSI model including transport protocols like TCP and network protocols like IPv4. Concepts such as subnetting, supernetting, NAT, DHCP, and IPv6 addresses are also summarized.
The document discusses TCP/IP and the OSI model. It provides details on:
- TCP/IP consisting of rules for protocol used with IP to send data between computers over the Internet. IP handles delivery while TCP tracks data transmission.
- The 7-layer OSI model with layers grouped into physical/data link, network/transport, and application/presentation/session. Layers define communication details and encapsulation/decapsulation of data.
- Common data units including segments, packets, datagrams, frames, cells, and bits/bytes. Encapsulation adds headers at each layer.
- Other topics covered include IP addressing, domain name servers, URLs, wireless networks, Wi-Fi, WiMax
Computer networks allow computing devices to connect and share resources. A network consists of connected devices like computers, printers, and servers. It uses communication hardware and protocols to transmit data. Common network hardware includes hubs, switches, routers, and cables. Networks can be configured in various topologies like bus, star, ring, or mesh. Networks are also classified based on their scope - a local area network (LAN) connects devices within a building, while a wide area network (WAN) spans a larger geographic area. Key roles are clients, which initiate data requests, and servers, which provide resources and services to clients.
Slides for protocol layering and network applicationsjajinekkanti
why and how Protocol layering is done in TCP/IP protocol suite, how multiplexing and demultiplexing can be done in different protocol layers in TCP\IP.
OSI Reference Model and TCP/IP (Lecture #3 ET3003 Sem1 2014/2015)Tutun Juhana
This document provides an overview of the OSI model and TCP/IP protocol suite for computer networks. It describes the seven layers of the OSI model from the physical layer to the application layer and their functions. It then explains that while the OSI model was intended as a standard, TCP/IP became dominant in practice. The four layers of the TCP/IP protocol suite are also outlined - the physical and data link layers have no standard protocols, while the network layer uses IP and the transport layer includes TCP and UDP. The application layer combines functions from several OSI layers.
The document provides an overview of networking concepts for a networking and computer science diploma program. It discusses topics like network fundamentals, OSI and TCP/IP models, network media, protocols, addressing schemes, and application layer functionality. The course covers these topics through lectures, exams, and a take-home assignment to help students understand basic networking principles.
The document discusses network reference models and the OSI and TCP/IP models. It provides details on each layer of the OSI model and its functions. The key points are that reference models divide network communication into simpler components, provide standardization, and prevent changes in one layer from affecting others. The OSI model has 7 layers and separates network functions into upper layers for applications and lower layers for data transmission. The TCP/IP model is based on widely used TCP and IP protocols.
The document discusses network layer models. It describes the seven layers of the OSI model and the four layers of the TCP/IP model. It explains how each layer functions, such as the physical layer transmitting signals and the application layer enabling programs like web browsers. It then compares the two models, noting similarities like layered structures but also differences like OSI having more defined layers and TCP/IP being more practical. The purpose of network layer models is to help understand complex network interactions by breaking them into standardized, interconnected layers.
Virtual private networks (VPNs) allow users to securely access remote networks via the internet. There are several types of VPNs including remote access, intranet, and extranet VPNs. VPNs use protocols like IPSec, PPTP, and L2TP to securely tunnel and encrypt network traffic. Components include security protocols, appliances like firewalls, and authentication methods. VPNs provide benefits to companies like extending networks, boosting productivity, improving security, and scaling easily. Quality of service ensures acceptable response times when accessing applications remotely. VPN usage is growing as more companies adopt the technology for its cost efficiency and secure remote access abilities.
1. What is Data Communication?
2. What is a network?
3. What is Node?
4. What is a network interface card (NIC)?
5. Types of Computer Networks
6. What is a MAC Address?
7. What Types of Addressing?
8. What is a port?
9. What are the different port numbers?
10.What is Hub?
11.What is Router?
12.What is a Bridge?
13.What is Gateway?
14.What is Brouter?
15.What is OSI Model?
16.What is the OSI model (Open Systems Interconnection)?
17.7 layers of the OSI model?
18.What Is the TCP/IP Model?
19.What Is the TCP/IP Model?
20.Classification of IP address Addressing?
This is Data Communication Lecture Assignment. Here discussed about many topics above the subject. I am really learned more from Data Communication subject. Specially thanks to Dear Respectable Sir Pranab Bandhu Nath
This document provides an overview of networking concepts including:
- Definitions of a network, LAN, MAN, WAN and their characteristics.
- Explanations of common network topologies like bus, star, ring and their advantages/disadvantages.
- Descriptions of common networking hardware like switches, routers, hubs, bridges and their functions.
- Explanations of protocols like TCP, UDP, IP, DNS and their roles in networking.
- Discussions of other topics like cabling, addressing schemes and standards.
The document serves as a comprehensive introduction to fundamental networking topics at both the conceptual and technical levels.
The document provides an introduction to networking concepts and Cisco technologies. It defines networking and network topology, discusses the OSI model and TCP/IP, and describes common network devices like switches, routers, and firewalls. It also covers IP addressing, routing protocols, and basic router and switch configuration.
1) Network standards define guidelines for how computers connect to networks and transmit data, specifying aspects like the connection medium, speeds, and cable/wireless technologies. Common standards include Ethernet (802.3), broadband (802.7), fiber optic (802.8), and wireless (802.11).
2) Protocols establish communication rules between devices on a network, ensuring proper data sequencing and delivery. Major protocols are HTTP (web access), SMTP (email), FTP (file transfer), TCP (data delivery), and IP (addressing).
3) Standards and protocols work together to regulate network connections and communications between computers.
The document discusses various topics related to computer networking such as:
1. It differentiates between an internet, which connects millions of computers globally through a network of networks, and a network, which connects computers locally.
2. It describes internetworking as connecting computer networks through gateways, resulting in an internetwork or internet. The Internet Protocol establishes internetworking on the internet.
3. It provides details on HDLC frames, which use flags to mark the beginning and end, and contain address, control and information fields for transmitting data between network points.
The document discusses network protocols and related standards. It introduces the OSI Reference Model, which defines seven layers of network functionality standardized by ISO to enable communication between systems. These layers include the physical, data link, network, transport, session, presentation, and application layers. The document also discusses IEEE 802 network specifications and various protocols like TCP/IP, NetBEUI, and others. It provides an overview of each OSI layer and their functions in network communication.
The document provides an introduction to TCP/IP networking and the Internet. It explains that the Internet is a global network of interconnected computers that allows users to access documents, images, videos, and more from anywhere in the world. It describes how the Internet works using TCP/IP, which breaks files into packets that are routed through networks and reassembled at their destination. The document contrasts TCP, which provides reliable connections, and UDP, which sends independent data packets without guarantees of delivery.
This document provides an overview of wireless networks and protocols. It discusses wireless personal area networks (WPANs) such as Bluetooth and infrared, wireless local area networks (WLANs) using IEEE 802.11 standards, and wireless metropolitan area networks (WMANs) such as WiMAX. For WLANs, it describes wireless access points, common network architectures, and media access control protocols including carrier sense multiple access with collision avoidance (CSMA/CA) and carrier sense multiple access with collision detection (CSMA/CD).
Networking Concepts Lesson 06 - Protocols - Eric VanderburgEric Vanderburg
This document summarizes networking concepts related to protocols. It discusses how protocols enable communication by sending data in small packets with headers containing source/destination, sequence numbers, and payload data. Packet types include unicast, broadcast, and multicast. Common protocol suites are described like TCP/IP, IPX/SPX, and AppleTalk. Specific protocols are also outlined at each layer of the OSI model including transport protocols like TCP and network protocols like IPv4. Concepts such as subnetting, supernetting, NAT, DHCP, and IPv6 addresses are also summarized.
The document discusses TCP/IP and the OSI model. It provides details on:
- TCP/IP consisting of rules for protocol used with IP to send data between computers over the Internet. IP handles delivery while TCP tracks data transmission.
- The 7-layer OSI model with layers grouped into physical/data link, network/transport, and application/presentation/session. Layers define communication details and encapsulation/decapsulation of data.
- Common data units including segments, packets, datagrams, frames, cells, and bits/bytes. Encapsulation adds headers at each layer.
- Other topics covered include IP addressing, domain name servers, URLs, wireless networks, Wi-Fi, WiMax
Computer networks allow computing devices to connect and share resources. A network consists of connected devices like computers, printers, and servers. It uses communication hardware and protocols to transmit data. Common network hardware includes hubs, switches, routers, and cables. Networks can be configured in various topologies like bus, star, ring, or mesh. Networks are also classified based on their scope - a local area network (LAN) connects devices within a building, while a wide area network (WAN) spans a larger geographic area. Key roles are clients, which initiate data requests, and servers, which provide resources and services to clients.
Slides for protocol layering and network applicationsjajinekkanti
why and how Protocol layering is done in TCP/IP protocol suite, how multiplexing and demultiplexing can be done in different protocol layers in TCP\IP.
OSI Reference Model and TCP/IP (Lecture #3 ET3003 Sem1 2014/2015)Tutun Juhana
This document provides an overview of the OSI model and TCP/IP protocol suite for computer networks. It describes the seven layers of the OSI model from the physical layer to the application layer and their functions. It then explains that while the OSI model was intended as a standard, TCP/IP became dominant in practice. The four layers of the TCP/IP protocol suite are also outlined - the physical and data link layers have no standard protocols, while the network layer uses IP and the transport layer includes TCP and UDP. The application layer combines functions from several OSI layers.
The document provides an overview of networking concepts for a networking and computer science diploma program. It discusses topics like network fundamentals, OSI and TCP/IP models, network media, protocols, addressing schemes, and application layer functionality. The course covers these topics through lectures, exams, and a take-home assignment to help students understand basic networking principles.
The document discusses network reference models and the OSI and TCP/IP models. It provides details on each layer of the OSI model and its functions. The key points are that reference models divide network communication into simpler components, provide standardization, and prevent changes in one layer from affecting others. The OSI model has 7 layers and separates network functions into upper layers for applications and lower layers for data transmission. The TCP/IP model is based on widely used TCP and IP protocols.
The document discusses network layer models. It describes the seven layers of the OSI model and the four layers of the TCP/IP model. It explains how each layer functions, such as the physical layer transmitting signals and the application layer enabling programs like web browsers. It then compares the two models, noting similarities like layered structures but also differences like OSI having more defined layers and TCP/IP being more practical. The purpose of network layer models is to help understand complex network interactions by breaking them into standardized, interconnected layers.
This document presents a LAN design project report for an organization with 70 users. It proposes a network with wired and wireless connectivity using Ethernet cables, switches, a router and access points. A central data server would be installed with antivirus software and connected to the network along with a DHCP server for dynamic IP address allocation. The network diagram and configurations are presented, along with the hardware, software and design guidelines required to implement the LAN.
The document discusses the CCNA certification exam including details about the exam such as number of questions, duration, passing score, and benefits of obtaining the certification. It also provides an overview of networking concepts including the purpose of networking, networking devices, network interface cards, hubs, switches, routers, network topologies, LANs/WANs, virtual private networks, bandwidth, the OSI model, and IEEE 802 standards.
The document discusses computer networks and their components. It begins by describing ARPANET, the precursor to the modern Internet, which was developed in the 1960s by the US Defense Department. It then outlines the goals of computer networks such as resource sharing, high reliability, inter-process communication, and flexible access. The key components of computer networks discussed include hardware like network interface cards, servers, clients, peers, hubs, switches, routers, and bridges. Software components include network operating systems, TCP/IP, and OSI. Common cable types for connecting devices in a network are also summarized.
The document discusses the CCNA certification exam and provides details about its format, benefits, and requirements. It then covers networking concepts like network devices, topologies, protocols, and the OSI model. Key points include that the CCNA exam tests knowledge of networking fundamentals, has multiple choice and simulation questions, and benefits career advancement. It also defines common network components, topologies, and each layer of the OSI model.
The document discusses the CCNA certification exam including details about the exam such as number of questions, duration, passing score, and benefits of obtaining the certification. It also provides information about networking devices, topologies, standards, and the OSI model layers. Key topics covered include switches, routers, network topologies like star and bus, IEEE 802 standards, and an explanation of each of the seven layers of the OSI model.
The document discusses the CCNA certification exam including details about the exam such as number of questions, duration, passing score, and benefits of obtaining the certification. It also provides information about networking devices, topologies, protocols, and the OSI model layers. Key topics covered include switches, routers, network topologies like star and bus, the 7 layers of the OSI model and what each layer is responsible for, and how data is encapsulated as it moves through the layers from physical to application.
Full video explained in Hindi
Check youtube channel -
The Avi Security
basic networking concepts is fundamental to a successful career in information technology. Networking technologies underlie all IT activities and a strong comprehension of the hardware and protocols used to create networks is essential to future success. In this training course, you will learn how to configure a workstation to connect to a network, analyze network traffic using a protocol analyzer, examine switch and router configurations, perform basic IPv4 addressing and subnetting, and research network security solutions. basic networking concepts is fundamental to a successful career in information technology. Networking technologies underlie all IT activities and a strong comprehension of the hardware and protocols used to create networks is essential to future success. In this training course, you will learn how to configure a workstation to connect to a network, analyze network traffic using a protocol analyzer, examine switch and router configurations, perform basic IPv4 addressing and subnetting, and research network security solutions.
Basic networking concepts is fundamental to a successful career in information technology. Networking technologies underlie all IT activities and a strong comprehension of the hardware and protocols used to create networks is essential to future success. In this training course, you will learn how to configure a workstation to connect to a network, analyze network traffic using a protocol analyzer, examine switch and router configurations, perform basic IPv4 addressing and subnetting, and research network security solutions.
This document discusses network architecture and design. It covers component architectures including addressing/routing, network management, performance, and security architectures. It describes common addressing mechanisms like sub-netting, super-netting, dynamic addressing, private vs public addressing, VLANs, IPv4 vs IPv6, and network address translation. For routing, it discusses strategies like unicast, broadcast, multicast, anycast and geocast as well as routing protocols like BGP, mobile IP, and IGP confederations. The document provides an overview of network architecture concepts.
Networking involves connecting electronic devices like computers to share resources and communicate. It allows devices to share internet access, hardware like printers, files and folders, and play multiplayer games. Networks use various topologies like star, bus or mesh to connect devices via physical cables or wireless links, and network protocols allow the connected devices to communicate according to shared rules.
This document provides an introduction to computer networks. It discusses the key components and layers of networks including local area networks (LANs), wide area networks (WANs), protocols, addressing, and models like OSI and TCP/IP. It explains how data is encapsulated as it travels from an application down the protocol stack and across physical networks. Key topics covered include network interfaces, protocols, addressing, data encapsulation, the OSI model layers, TCP/IP layers, and protocols like IP, TCP, UDP.
The document discusses key concepts of networking including the three basic elements required: network hardware, software, and protocols. It describes common network types like LAN, WAN, and MAN and compares peer-to-peer and server-based networks. The OSI reference model and TCP/IP model are explained along with common network devices, cabling, and IP addressing schemes.
The document is a training report submitted by Sagar Shashank summarizing his CCNA training completed at CETPA INFOTECH PVT. LTD. from June 20 to July 31, 2018. It includes an introduction to networking concepts and protocols like IP, ICMP, routing protocols, switching technologies and OSI model. The report contains detailed explanations of topics covered during the training along with declarations and acknowledgements.
This document provides an overview of network models, specifically comparing the OSI reference model and the TCP/IP model. It explains that both models are based on layering with different layers performing distinct functions. The seven layers of the OSI model and four layers of the TCP/IP model are defined along with examples of protocols used in each layer. Key concepts like encapsulation, addresses, broadcasts, and the client-server model are also summarized.
This document provides an overview of computer networking concepts including the OSI and TCP/IP models. It describes the seven layers of the OSI model from physical to application layer and their responsibilities. It also summarizes the four layers of the TCP/IP model from network interface to application layer. The document compares the two models and explains that while they cover similar topics, the TCP/IP model does so with fewer layers and is more practical for locating specific protocols.
This document provides instructions on building a simple computer network. It describes how networking works from host-to-host communication using the OSI model. It defines the components of a network including hardware, software, end devices, and intermediary devices. It also discusses network structures such as local area networks (LANs) and wide area networks (WANs), Ethernet standards, and the roles of hubs and switches. The document concludes with an overview of the Cisco Internetwork Operating System used to configure and manage Cisco networking devices.
The document discusses network layering and protocols. It describes how layering decomposes complex network systems into more manageable components and provides a modular design. Protocols define rules for data communication, including syntax, semantics, and timing. Key elements of protocols include service interfaces and peer interfaces. The OSI model is presented as a standard with 7 layers from physical to application. TCP/IP is also summarized as a 4 layer model. Socket programming interfaces are introduced as the main way for applications to connect to networks.
Elevate Your Nonprofit's Online Presence_ A Guide to Effective SEO Strategies...TechSoup
Whether you're new to SEO or looking to refine your existing strategies, this webinar will provide you with actionable insights and practical tips to elevate your nonprofit's online presence.
This presentation was provided by Racquel Jemison, Ph.D., Christina MacLaughlin, Ph.D., and Paulomi Majumder. Ph.D., all of the American Chemical Society, for the second session of NISO's 2024 Training Series "DEIA in the Scholarly Landscape." Session Two: 'Expanding Pathways to Publishing Careers,' was held June 13, 2024.
How Barcodes Can Be Leveraged Within Odoo 17Celine George
In this presentation, we will explore how barcodes can be leveraged within Odoo 17 to streamline our manufacturing processes. We will cover the configuration steps, how to utilize barcodes in different manufacturing scenarios, and the overall benefits of implementing this technology.
How to Download & Install Module From the Odoo App Store in Odoo 17Celine George
Custom modules offer the flexibility to extend Odoo's capabilities, address unique requirements, and optimize workflows to align seamlessly with your organization's processes. By leveraging custom modules, businesses can unlock greater efficiency, productivity, and innovation, empowering them to stay competitive in today's dynamic market landscape. In this tutorial, we'll guide you step by step on how to easily download and install modules from the Odoo App Store.
Level 3 NCEA - NZ: A Nation In the Making 1872 - 1900 SML.pptHenry Hollis
The History of NZ 1870-1900.
Making of a Nation.
From the NZ Wars to Liberals,
Richard Seddon, George Grey,
Social Laboratory, New Zealand,
Confiscations, Kotahitanga, Kingitanga, Parliament, Suffrage, Repudiation, Economic Change, Agriculture, Gold Mining, Timber, Flax, Sheep, Dairying,
This presentation was provided by Rebecca Benner, Ph.D., of the American Society of Anesthesiologists, for the second session of NISO's 2024 Training Series "DEIA in the Scholarly Landscape." Session Two: 'Expanding Pathways to Publishing Careers,' was held June 13, 2024.
Andreas Schleicher presents PISA 2022 Volume III - Creative Thinking - 18 Jun...EduSkills OECD
Andreas Schleicher, Director of Education and Skills at the OECD presents at the launch of PISA 2022 Volume III - Creative Minds, Creative Schools on 18 June 2024.
1. A Project Report
On
Network layer
Submitted to
Amity University, Uttar Pradesh
In partial fulfillment of the requirements for the award of the degree
Of
Bachelor of Technology
In
Computer Science and Engineering
SUBMITTED BY: UNDER SUPERVISION OF:
Mr. Rishabh Shukla Ms. Nidhi Chandra
A2305216665 Dept. Of computer science
3CSE-3(Y) ASET, Noida
2. Declaration by the student
I, Rishabh Shukla student of B. Tech. (CSE) hereby declare that the project titled
“Network layer” which is submitted by me to Department of ASET, Amity University,
Uttar Pradesh, Noida, in partial fulfilment of requirements for the award of the degree of
Bachelor of Technology in Computer science, has not been previously formed the basis
for the award of any degree, diploma or other similar title or recognition. The Author
attests that permission has been obtained for the use of any copy righted material
appearing in the Dissertation / Project report other than brief excerpts requiring only
proper acknowledgment in scholarly writing and all such use is acknowledged.
Signature
Noida
Date
Name and Signature of Student
3. CERTIFICATE
This is to certify that Mr. Rishabh Shukla student of B.Tech. in Amity School of
Engineering and Technology has carried out the work presented in the project of the
term paper entitle ‘NETWORK LAYER’ as a part of the first year program of
Bachelor of Technology in Computer science & Engineering from Amity School of
Engineering and Technology, Amity University, Noida, Uttar Pradesh under my
supervision.
Ms. Nidhi Chandra
Dept. Of computer science
ASET, Noida.
4. ACKNOWLEDGEMENT
I would like to take this opportunity to express my gratitude towards all the people who
have in various ways helped in the successful completion of the project. I must convey
my gratitude to my project and faculty guide Ms. Nidhi Chandra for giving me the
constant source of inspiration and help in preparing the project, personally correcting
my work and providing encouragement throughout the project.
I also thank all my faculty members for steering me through the tough as
well as easy phases of the project in a result-oriented manner with concern attention.
Finally, I would like to thank my friends, family because it was their support,
encouragement and sources of knowledge are responsible for the success of this term
paper. If the support shown by the above members was not available then I doubt the
project would not be so easily completed by me.
5. CONTENTS
1. Abstract
2. Introduction
3. Network layer
4. Internetworking
5. IP prefix
6. IP forwarding
7. IP helper(DHCP AND ARP)
8. Packet fragmentation
9. Routing
10. Dijkstra’s algorithm
11. Conclusion
12. References
6. ABSTRACT
The layer, which controls the operation of the subnet is known as Network Layer. It is
the third layer in OSI model. It supervises host-to-host packet delivery – several
physical networks could separate hosts.
This layer helps in controlling the traffic in subnet network. It helps in identifying each
device uniquely to allow global communication. While the UDP and DHCP are the IP
helpers.
It decapsulates packets from one and encapsulates them for another network. Through
internetworking, we can connect different types of networks to send the packet where
packet fragmentation takes place.
The network layer provides the functional and procedural means of transferring data.
It determines the optimal route for sending a packet from one host to another and
encapsulate packets received from upper-layer protocols. The network layer responds
to issues service request to the data link layer and service requests from the transport
layer.
7. INTRODUCTION
The Open Systems Interconnection model (OSI) is created by International Standards
Organization as a framework, reference model to explain how different networking
technologies work together and interact.
It is categorized into seven logical layers. Each layer has specific functions. All layers
work together in the correct order to move data around a network.
8. NETWORK LAYER
Out of seven OSI layers, network layer serves at third place. We need network layer as
it sends frames between the hosts and it networks with links and switches. There are
various shortcomings as it fails at large networks as routing table blows off. Moreover,
it does not work across one link layer technology. The main functionality of network
layer is scaling, heterogeneity and bandwidth control.
SERVICES PROVIDED BY NETWORK LAYER TO TRANSPORT LAYER
The network-service model defines the characteristics of end-to-end transport of data
between one end of the network to the other, i.e. between sending and receiving end
systems.
1. DATAGRAMS ‘OR’ CONNECTIONLESS SERVICE
2. VIRTUAL CIRCUITS; CONNECTION ORIENTED SERVICE
Both models implement store and forward packet switching. When routers receive the
complete packet, they temporarily store it until forwarding.
DATAGRAM MODEL
The general name for packets containing a destination address.
Each router contains a forwarding table. Packets may take different paths between the
same source and destination.
9. VIRTUAL CIRCUIT MODEL
These packets contain a short label. (no global meaning and is unique for a link)
Phases:
The connection should set up and the path should be chosen.
Data transfer
Circuit is deleted
10. INTERNETWORKING
Internetworking is a method to connect a network to other networks through gateways
that provide a common route to information packets between networks.
Internetworking makes it possible for networks to make a data connection between
them, operated by different entities using a common data communication.
Pioneered by Vint Cerf and Robert E. Kahn, also known as “father of the internet".
WHY WE NEED INTERNETWORKING?
1. Difference in service models (datagram model or virtual circuit model)
2. Addressing
3. Quality of service
4. Packet size (Different link layer technology can handle different size packets)
5. Security (whether encrypted)
IPv4 (INTERNET PROTOCOL)
11. 1. Header
2. Version
Protocol version
3. IHL
32-bit bytes-header length
4. Type of service
It gives the combination of reliability and speed.
5. Total length
It tells the total length of the entire datagram.
6. Identification
All fragments have the same identity.
7. DF
Don't Fragment and destination cannot reassemble.
8. More Fragments
It means it is the last segment.
9. Fragment offset
Fragment number within a datagram, minimum of 8-byte fragments.
10. Time to live
11. Header checksum
Its function is to verify the headers.
12. Source and Destination Address
It is the 32-bit IP address of the source and the destination.
12. IP ADDRESSES AND IP PREFIXES
IPv4 uses 32-bit address and the IPv6 uses the 128-bit address. Regional Internet
Registries (RIRs) allocate chunks of address space as contiguous ranges of addresses,
each of which constitutes a "prefix". IP prefix is a contiguous range of addresses
containing a number of addresses that is a power of two and with the smallest address
being a multiple of that same power of two. The value of static IP address will not
change in the network while dynamic is always temporarily assigned when an internet
connection is made.
I.e. for example:128.12.0.0/16 is 128.12.0.0
More specific prefix has a longer prefix and smaller number of IP addresses.
Less specific prefix has a shorter prefix and a large number of IP addresses.
PUBLIC IP ADDRESSES
Has a valid destination on the global internet
They must be allocated to you before
IPv4 mostly exhausted time for Ipv6.
PUBLIC IP ADDRESSES
Can be freely within private networks (company, home)
for example:15.0.0.0/19
To connect private network to public network we need to connect public IP address and
NAT (Network address translation) to connect to the worldwide internet.
13. ALLOCATION OF PUBLIC IP ADDRESSES
IANA (Internet Assigned Network authority) delegates IP addresses to regional bodies
such as APNIC (Asia Pacific), RIPE (Europe), LACNIC (Latin America) etc.
Regional bodies delegate the IP addresses to companies in their region. Companies
Further provide it to their customers.
IP FORWARDING
It is a process used to determine the path used to send a packet or a datagram. In IP
forwarding one prefix contains all the IP addresses of the network. We can put the entire
entry for one prefix. To list the next hop for IP prefixes the Node uses a table.
LONGEST MATCHING PREFIX:
Prefixes in the table might overlap to overcome this longest matching forwarding rule is
followed. For each packet, find the longest prefix containing the destination address i.e.
the most specific entry.
Forward the packet to the next hop router for that prefix.
Distinction between hosts and router-
The router does the routing followed by forwarding while Hosts send the data traffic to
the nearest router.
Host forwarding table uses 0.0.0.0/0 as a default route that catches all IP addresses.
FLEXIBILITY OF THE LONGEST MATCHING PREFIX
To provide default behavior we can add a less specific prefix to the forwarding table.
It is used to send the traffic going outside an organization to a border router.
We can add the more specific prefix to provide a special behavior in case of security
where you want to send the packet to the longer path.
14. IP HELPERS
We did manual configurations to get the IP address in old days but now protocols are
used for automatically configuring addresses. This shifts the burden from the user to the
IT folks.
DHCP (Dynamic host configuration protocol) -
It is been around since 1993 and is now widely used to lease the IP address to the nodes
and provide other parameters like network prefix, the address of a local router, DNS
server etc.
It runs over UDP ports 67, 68 and is a client server application.
If a node lost its connection it will send a broadcast message to all hosts and it would be
received by the DHCP server to get it configured in ipv4 this message is in form of
255.255.255.255.
DHCP MESSAGES:
The client and the DHCP server must be in one IP hop. First, the client sends the
message call to discover to the server. The server responds it which is referred as offer
.then the host sends the request to the server that it likes to take that address. After that,
the server sends an acknowledgment to the host.
Once the lease is over, need to repeat the process.
15. ARP (Address resolution protocol) :
Sending an IP packet arises a problem because a node needs a link layer address to send
the frame over the local link and how to get the destination link address from the
destination IP address. This is provided by ARP.
Source
ethernet
Dest.
Ethernet
Source IP Dest. IP Payload
From ARP: From DHCP
ARP sits right on top of the link layer.it asks node with the target IP to identify itself
and uses the broadcast message.
ARP
ETHERNET
The node sends the request, which is broadcast. The target sends the reply.
There is discovery protocol that helps to find nodes each other like zero-conf, bonjour.
16. PACKET FRAGMENTATION
We use packet fragmentation to connect networks with different maximum packet sizes.
We either need to split the packets or discover the largest size to use.
Different networks have different maximum packet sizes called MTU (Maximum
Transmission Unit) . For example:
Ethernet 1.5K
WiFi 2.3K
We prefer large packets for efficiency. We will send few bits sending those headers and
routers have to process few packets to process same information.
There are two types to solve packet size solution. One is the fragmentation method
where we split large packets in the network if they are too big to send. The other is the
discovery method where the largest packet that fits on the network path and uses it.
IPv4 routers perform fragmentation while the IPv6 do not fragment and drop the packet
larger than MTU.
IPv4 Fragmentation
Routers fragment packet that is too large to forward. While
the receiving host reassembles to reduce a load on the router.
17. IPV4 FRAGMENTATION PROCEDURE:
*Routers split a packet that is too large. Typically break into large pieces.
*Copy IP header to pieces
*Adjust length on pieces
* Set offset to indicate position
*Set more fragments on all pieces except last.
Host receive if that means the packet has been fragmented and reassembles them.
Identification field link pieces together, MF tells receiver when it has all pieces.
18. ROUTING
ROUTING FORWARDING
Process of deciding in which process of sending
The direction the traffic should be sent. Packet on its way.
Spanning trees provides basic connectivity while routing uses all the links to find the
best path.
ALGORITHM PROPERTIES:
1. Correctness
2. Simplicity
3. Stability
4. Optimality
5. Scalability
6. Fairness
19. Further routing can be classified as :
*Adaptive Routing
It is centralized, adaptive and distributive.
*Nonadaptive routing
It uses the shortest routing using algorithms.
SHORTEST PATH ROUTING
It minimizes the number of hops along the path. Minimizes the mean packet delay and
maximizes the network throughput.
20. DIJKSTRA’S SHORTEST PATH ALGORITHM
In this process mark all the nodes with infinite distance except source.
Sink node=destination node
Working node=source node
1. Mark the working node permanent
2. Examine the adjacent nodes in turn
3. Examine the tentative nodes and mark the node with the node with the smallest
labelled value as permanent,
4. This node becomes the new working node.
Working node is not equal to sink.
5.Reconstruct the path backward from sink to source.
21. Conclusion
The Network layer is highly focused on getting the packet from source to destination.
Sometimes it does it through different networks where internetworking comes into play.
It has also been helpful for transport layer by providing datagram and virtual circuit
model.
The packets are fragmented when sending through different networks. While the IP
helpers ARP and DHCP shifts the burden of manual configuration from user to IT folks.
Routers help in sending packets over the network as it contains routing table. The
network layer must know the topology of the subnet and choose appropriate paths
through it.
22. References
1. Network Layer - https://en.wikipedia.org/wiki/Network_layerwww.cs.bgu.ac.il
2. Osi Model - https://en.wikipedia.org/wiki/OSI_model
3. https://web.cs.wpi.edu/~cs4514/b98/week4-nl/week4-nl.html
4. https://www.techopedia.com/definition/24204/network-layer
5. Yemini, Yechiam. "The OSI network management model." IEEE
Communications Magazine 31.5 (1993): 20-29.
6. Ge, Jian Xia, and Wen Ya Xiao. "Network layer network topology discovery
algorithm research." Applied Mechanics and Materials. Vol. 380. Trans Tech
Publications, 2013.