This document discusses layered network models, specifically the OSI model and TCP/IP model. It provides an overview of each layer in both models and their functions. The key points are:
- The OSI model defines 7 layers that break communication into smaller parts to simplify the process and allow different hardware/software to work together.
- The TCP/IP model has 4 layers - application, transport, internet, and network access. It is used widely on the internet.
- Each layer adds header information to data as it moves down the stack. This encapsulation allows communication between layers and across networks.
It Shows Two Types of Transmission Modes.
Serial & Parallel And Also three Type of Serial Transmission.
which is Synchronous Asynchronous & Isochronous.
TCP/IP model with their 4 layer
1. Network access layer.
2. Internet layer
3. Transport layer
4. Application layer
and each layer has its own protocols.
It Shows Two Types of Transmission Modes.
Serial & Parallel And Also three Type of Serial Transmission.
which is Synchronous Asynchronous & Isochronous.
TCP/IP model with their 4 layer
1. Network access layer.
2. Internet layer
3. Transport layer
4. Application layer
and each layer has its own protocols.
This presentation is a basic insight into the Application Layer Protocols i.e. Http & Https. I was asked to do this as a part of an interview round in one of the networking company.
-Kudos
Harshad Taware
Bangalore ,India
Although the OSI reference model is universally recognized, the historical and technical open standard of the Internet is Transmission Control Protocol / Internet Protocol (TCP/IP).
The TCP/IP reference model and the TCP/IP protocol stack make data communication possible between any two computers, anywhere in the world, at nearly the speed of light.
The Open Systems Interconnection model (OSI model) is a conceptual model that characterizes and standardizes the communication functions of a telecommunication or computing system without regard to their underlying internal structure and technology. Its goal is the interoperability of diverse communication systems with standard protocols. The model partitions a communication system into abstraction layers. The original version of the model defined seven layers.
OSI layers describes how the data can be send from one parties to another during data communication. it also gives the detailed information of how the data functionally divided into small pieces and reaches the destination.
This presentation is a basic insight into the Application Layer Protocols i.e. Http & Https. I was asked to do this as a part of an interview round in one of the networking company.
-Kudos
Harshad Taware
Bangalore ,India
Although the OSI reference model is universally recognized, the historical and technical open standard of the Internet is Transmission Control Protocol / Internet Protocol (TCP/IP).
The TCP/IP reference model and the TCP/IP protocol stack make data communication possible between any two computers, anywhere in the world, at nearly the speed of light.
The Open Systems Interconnection model (OSI model) is a conceptual model that characterizes and standardizes the communication functions of a telecommunication or computing system without regard to their underlying internal structure and technology. Its goal is the interoperability of diverse communication systems with standard protocols. The model partitions a communication system into abstraction layers. The original version of the model defined seven layers.
OSI layers describes how the data can be send from one parties to another during data communication. it also gives the detailed information of how the data functionally divided into small pieces and reaches the destination.
A computer network is defined as the interconnection of two or more computers. It is done to enable the computers to communicate and share available resources.
Components of computer network
Network benefits
Disadvantages of computer network
Classification by their geographical area
Network classification by their component role
Types of servers
Power point presentation on osi model.
A good presentation cover all topics.
For any other type of ppt's or pdf's to be created on demand contact -dhawalm8@gmail.com
mob. no-7023419969
Detecting of routng misbehavion in hybrid wireless networks used and acknowle...AAKASH S
The succeeding wireless network is Hybrid Wireless Networks. It can provide Quality of Service (QoS) requirements in real time
transmission for wireless application. But it stream including critical mission application like military use or emergency
recovery. Hybrid wireless networks is unified mobile ad-hoc network (MANET) and wireless infrastructure networks. It inherits
invalid reservation and race condition problem in Mobile ad-hoc network (MANET). Whereas open medium and wide
distribution of node make vulnerable to malicious attackers in Hybrid wireless networks. How to secure routing in Hybrid
wireless networks. In this paper, we propose a Enhanced Adaptive ACKnowledgment (EAACK)-implement a new intrusiondetection
system for Hybrid wireless networks. It protect Hybrid wireless networks from attacks that have higher malicious
behavior detection rate. Analytical and simulation result based on the real human mobility mode. EAACK can provide high secure performance in terms of Intrusion-detection, overhead, transmission delay
A secure qos distributed routing protocol for hybrid wireless networksAAKASH S
The succeeding wireless network is Hybrid Wireless Networks. It can provide Quality of Service
(QoS) requirements in real time transmission for wireless application. But it stream including critical mission
application like military use or emergency recovery. Hybrid wireless networks is unified mobile ad-hoc network
(MANET) and wireless infrastructure networks. It inherits invalid reservation and race condition problem in
Mobile ad-hoc network (MANET). Whereas open medium and wide distribution of node make vulnerable to
malicious attackers in Hybrid wireless networks. How to secure the Quality of Service (QoS) routing in Hybrid
wireless networks. In this paper, we propose a Secure QoS-Oriented Distributed routing protocol (SQOD) to
upgrade the secure Quality of Service (QoS) routing in Hybrid wireless networks. SQOD contain two
contrivances: 1.QoS-Oriented Distributed Routing Protocol (QOD)-to reduce transmission delay, transmission
time. And also increase wireless network transmission throughput. 2. Enhanced Adaptive ACKnowledgment
(EAACK)-implement a new intrusion-detection system for Hybrid wireless networks. It protect Hybrid wireless
networks from attacks that have higher malicious behavior detection rate. Analytical and simulation result
based on the real human mobility mode. SQOD can provide high secure performance in terms of Intrusion detection,overhead, transmission delay.
The migration to wireless network from wired network
has been a global trend in the past few decades. The mobility
and scalability brought by wireless network made it possible in
many applications. Among all the contemporary wireless networks,
Mobile Ad hoc NETwork (MANET) is one of the most
important and unique applications. On the contrary to traditional
network architecture, MANET does not require a fixed network
infrastructure; every single node works as both a transmitter and
a receiver. Nodes communicate directly with each other when they
are both within the same communication range. Otherwise, they
rely on their neighbors to relay messages. The self-configuring
ability of nodes in MANET made it popular among criticalmission
applications like military use or emergency recovery. However,
the open medium and wide distribution of nodes make MANET
vulnerable to malicious attackers. In this case, it is crucial to
develop efficient intrusion-detection mechanisms to protect
MANET from attacks. With the improvements of the technology
and cut in hardware costs, we are witnessing a current trend of
expanding MANETs into industrial applications. To adjust to such
trend, we strongly believe that it is vital to address its potential
security issues. In this paper, we propose and implement a new
intrusion-detection system named Enhanced Adaptive ACKnowledgment
(EAACK) specially designed for MANETs. Compared
to contemporary approaches, EAACK demonstrates higher malicious-
behavior-detection rates in certain circumstances while does
not greatly affect the network performances.
A SECURE QOS ROUTING PROTCOL FOR HYBRID WIRELESS NETWORKSAAKASH S
A wireless hybrid network is integrates a mobile wireless ad-hoc network and a wireless infrastructure
It proven the better alternative for next generation Wireless network
It popular among critical mission applications like military use or emergency recovery
However, the open medium and wide distribution of nodes make HWN vulnerable to malicious attackers
In this case, it is crucial to develop efficient intrusion-detection mechanisms to protect HWN from attacks
What is IDS?
Software or hardware device
Monitors network or hosts for:
Malware (viruses, trojans, worms)
Network attacks via vulnerable ports
Host based attacks, e.g. privilege escalation
What is in an IDS?
An IDS normally consists of:
Various sensors based within the network or on hosts
These are responsible for generating the security events
A central engine
This correlates the events and uses heuristic techniques and rules to create alerts
A console
To enable an administrator to monitor the alerts and configure/tune the sensors
Different types of IDS
Network IDS (NIDS)
Examines all network traffic that passes the NIC that the sensor is running on
Host based IDS (HIDS)
An agent on the host that monitors host activities and log files
Stack-Based IDS
An agent on the host that monitors all of the packets that leave or enter the host
Can monitor a specific protocol(s) (e.g. HTTP for webserver)
Hybrid networks is integrate MANETs and infrastructure wireless networks
It have proven to be a better network structure for the next generation networks
It can act Base station and Ad hoc according to the environment conditions
The widespread use of mobile devices the increasing demand for mobile multimedia streaming services
The future of real time need of high Quality of Service (QoS) support in wireless and mobile networking environments
The QoS support reduces end to end transmission delay and enhances throughput to guarantee the seamless communication between mobile devices and wireless infrastructures
Specifically, infrastructure networks improve the scalability of MANETs, while MANETs automatically establish self-organizing networks, extending the coverage of the infrastructure networks
To find a QoS path between source and destination, Which satisfies
The QoS requirements for each admitted connection and
Optimizes the use of network resources
Quality encompasses the data loss, latency, jitter, efficient use of network resources,..
QoS mechanisms for unfairness: managing queuing behavior, shaping traffic, control admission, routing, …
Usually, a hybrid network has widespread base stations
The data transmission in hybrid networks has two features:
An AP can be a source or a destination to any mobile node
It allows a stream to have anycast transmission along multiple transmission paths to its destination through base stations
The number of transmission hops between a mobile node and an AP is small
It enables a source node to connect to an AP through an intermediate node
Qo s oriented distributed routing protocols : anna university 2nd review pptAAKASH S
To find a QoS path between source and destination, Which satisfies
The QoS requirements for each admitted connection and
Optimizes the use of network resources
Quality encompasses the data loss, latency, jitter, efficient use of network resources,..
QoS mechanisms for unfairness: managing queuing behavior, shaping traffic, control admission, routing, …
Usually, a hybrid network has widespread base stations
The data transmission in hybrid networks has two features:
An AP can be a source or a destination to any mobile node
It allows a stream to have anycast transmission along multiple transmission paths to its destination through base stations
The number of transmission hops between a mobile node and an AP is small
It enables a source node to connect to an AP through an intermediate node
In this paper introduce the QoS-Oriented Distributed routing protocol(QOD)
This QOD protocol makes five contributions:
QoS-guaranteed neighbor selection algorithm
Distributed packet scheduling algorithm
Mobility-based segment resizing algorithm
Soft-deadline based forwarding scheduling algorithm
Data redundancy elimination based transmission
CP7301 Software Process and Project Management notesAAKASH S
UNIT I DEVELOPMENT LIFE CYCLE PROCESSES 9
Overview of software development life cycle – introduction to processes – Personal Software
Process (PSP) – Team software process (TSP) – Unified processes – agile processes –
choosing the right process Tutorial: Software development using PSP
20
UNIT II REQUIREMENTS MANAGEMENT 9
Functional requirements and quality attributes – elicitation techniques – Quality Attribute
Workshops (QAW) – analysis, prioritization, and trade-off – Architecture Centric
Development Method (ACDM) – requirements documentation and specification – change
management – traceability of requirements
Tutorial: Conduct QAW, elicit, analyze, prioritize, and document requirements using ACDM
UNIT III ESTIMATION, PLANNING, AND TRACKING 9
Identifying and prioritizing risks – risk mitigation plans – estimation techniques – use case
points – function points – COCOMO II – top-down estimation – bottom-up estimation – work
breakdown structure – macro and micro plans – planning poker – wideband delphi –
documenting the plan – tracking the plan – earned value method (EVM)
Tutorial: Estimation, planning, and tracking exercises
UNIT IV CONFIGURATION AND QUALITY MANAGEMENT 9
identifying artifacts to be configured – naming conventions and version control –
configuration control – quality assurance techniques – peer reviews – Fegan inspection –
unit, integration, system, and acceptance testing – test data and test cases – bug tracking –
causal analysis
Tutorial: version control exercises, development of test cases, causal analysis of defects
UNIT V SOFTWARE PROCESS DEFINITION AND MANAGEMENT 9
Process elements – process architecture – relationship between elements – process
modeling – process definition techniques – ETVX (entry-task-validation-exit) – process
baselining – process assessment and improvement – CMMI – Six Sigma
Tutorial: process measurement exercises, process definition using ETVX
CMMI (Capability Maturity Model Integration) is a proven industry framework to improve product quality and development efficiency for both hardware and software
Network simulator 2 :
Object-oriented, discrete event driven network simulator
It was normally used in wired & wireless protocol
Written in C++ and OTcl
Network simulator 2 :
Object-oriented, discrete event driven network simulator
It was normally used in wired & wireless protocol
Written in C++ and OTcl
Saudi Arabia stands as a titan in the global energy landscape, renowned for its abundant oil and gas resources. It's the largest exporter of petroleum and holds some of the world's most significant reserves. Let's delve into the top 10 oil and gas projects shaping Saudi Arabia's energy future in 2024.
Cosmetic shop management system project report.pdfKamal Acharya
Buying new cosmetic products is difficult. It can even be scary for those who have sensitive skin and are prone to skin trouble. The information needed to alleviate this problem is on the back of each product, but it's thought to interpret those ingredient lists unless you have a background in chemistry.
Instead of buying and hoping for the best, we can use data science to help us predict which products may be good fits for us. It includes various function programs to do the above mentioned tasks.
Data file handling has been effectively used in the program.
The automated cosmetic shop management system should deal with the automation of general workflow and administration process of the shop. The main processes of the system focus on customer's request where the system is able to search the most appropriate products and deliver it to the customers. It should help the employees to quickly identify the list of cosmetic product that have reached the minimum quantity and also keep a track of expired date for each cosmetic product. It should help the employees to find the rack number in which the product is placed.It is also Faster and more efficient way.
CFD Simulation of By-pass Flow in a HRSG module by R&R Consult.pptxR&R Consult
CFD analysis is incredibly effective at solving mysteries and improving the performance of complex systems!
Here's a great example: At a large natural gas-fired power plant, where they use waste heat to generate steam and energy, they were puzzled that their boiler wasn't producing as much steam as expected.
R&R and Tetra Engineering Group Inc. were asked to solve the issue with reduced steam production.
An inspection had shown that a significant amount of hot flue gas was bypassing the boiler tubes, where the heat was supposed to be transferred.
R&R Consult conducted a CFD analysis, which revealed that 6.3% of the flue gas was bypassing the boiler tubes without transferring heat. The analysis also showed that the flue gas was instead being directed along the sides of the boiler and between the modules that were supposed to capture the heat. This was the cause of the reduced performance.
Based on our results, Tetra Engineering installed covering plates to reduce the bypass flow. This improved the boiler's performance and increased electricity production.
It is always satisfying when we can help solve complex challenges like this. Do your systems also need a check-up or optimization? Give us a call!
Work done in cooperation with James Malloy and David Moelling from Tetra Engineering.
More examples of our work https://www.r-r-consult.dk/en/cases-en/
Hierarchical Digital Twin of a Naval Power SystemKerry Sado
A hierarchical digital twin of a Naval DC power system has been developed and experimentally verified. Similar to other state-of-the-art digital twins, this technology creates a digital replica of the physical system executed in real-time or faster, which can modify hardware controls. However, its advantage stems from distributing computational efforts by utilizing a hierarchical structure composed of lower-level digital twin blocks and a higher-level system digital twin. Each digital twin block is associated with a physical subsystem of the hardware and communicates with a singular system digital twin, which creates a system-level response. By extracting information from each level of the hierarchy, power system controls of the hardware were reconfigured autonomously. This hierarchical digital twin development offers several advantages over other digital twins, particularly in the field of naval power systems. The hierarchical structure allows for greater computational efficiency and scalability while the ability to autonomously reconfigure hardware controls offers increased flexibility and responsiveness. The hierarchical decomposition and models utilized were well aligned with the physical twin, as indicated by the maximum deviations between the developed digital twin hierarchy and the hardware.
Final project report on grocery store management system..pdfKamal Acharya
In today’s fast-changing business environment, it’s extremely important to be able to respond to client needs in the most effective and timely manner. If your customers wish to see your business online and have instant access to your products or services.
Online Grocery Store is an e-commerce website, which retails various grocery products. This project allows viewing various products available enables registered users to purchase desired products instantly using Paytm, UPI payment processor (Instant Pay) and also can place order by using Cash on Delivery (Pay Later) option. This project provides an easy access to Administrators and Managers to view orders placed using Pay Later and Instant Pay options.
In order to develop an e-commerce website, a number of Technologies must be studied and understood. These include multi-tiered architecture, server and client-side scripting techniques, implementation technologies, programming language (such as PHP, HTML, CSS, JavaScript) and MySQL relational databases. This is a project with the objective to develop a basic website where a consumer is provided with a shopping cart website and also to know about the technologies used to develop such a website.
This document will discuss each of the underlying technologies to create and implement an e- commerce website.
3. What is layering in Networked computing?
Breaks down communication into smaller, simpler parts.
4. Why a layered model?
Easier to teach communication process.
Speeds development, changes in one layer does not
affect how the other levels works.
Standardization across manufactures.
Allows different hardware and software to work
together.
Reduces complexity
6. The OSI Model
OSI “ Open Systems Interconnection".
OSI model was first introduced in 1984 by the International
Organization for Standardization (ISO).
Outlines WHAT needs to be done to send data from one computer to
another.
Not HOW it should be done.
Protocols stacks handle how data is prepared for transmittal (to be
transmitted)
In the OSI model, The specification needed
are contained in 7 different layers that interact with each other.
7. What is “THE MODEL?”
Commonly referred to as the OSI reference model.
The OSI model
is a theoretical blueprint that helps us understand how data gets
from one user’s computer to another.
It is also a model that helps develop standards so that all of our
hardware and software talks nicely to each other.
It aids standardization of networking technologies by providing an
organized structure for hardware and software developers to
follow, to insure there products are compatible with current and
future technologies.
8. 7 Layer OSI Model
Why use a reference model?
Serves as an outline of rules for how protocols can be used to allow
communication between computers.
Each layer has its own function and provides support to other layers.
Other reference models are in use.
Most well known is the TCP/IP reference model.
We will compare OSI and TCP/IP models
As computing requirements increased, the network modeling had to
evolve to meet ever increasing demands of larger networks and
multiple venders.
Problems and technology advances also added to the demands for
changes in network modeling.
9. Evolution of the 7-Layers
Single Layer Model - First Communication Between Computer Devices
Dedicated copper wire or radio link
Hardware & software inextricably intertwined
Single specification for all aspects of communication
Hardware
&
Software
Hardware
&
Software
DEVICE A DEVICE B
1
10. Evolution of the 7-Layers (1)
Application
Technical
Standards
Two Layer Model
Application
Technical
Standards
Problem: Applications were being developed to run over ever-increasing number
of media/signaling systems.
Solution: Separate application aspects from technical (signaling and routing)
aspects
Application Layer: Concerned with user interface, file access and file transfer
1
11. Evolution of the 7-Layers (3)
Application
Network
Physical
Data-Link
Application
• Four Layer Model - Network connectivity inherently requires travel over
intermediate devices (nodes)
• Technical Standards Level divided into Network, Data-link and Physical
Layers
Network
Physical
Data-Link
1
12. Evolution of the 7-Layers (3) cont.
• Physical Layer
–Describes physical aspects of network: cards, wires, etc
–Specifies interconnect topologies and devices
• Network Layer
–Defines a standard method for operating between nodes
–Address scheme is defined (IP)
–Accounts for varying topologies
• Data-Link
–Works with Network Layer to translate logical addresses (IP) into hardware
addresses (MAC) for transmission
–Defines a single link protocol for transfer between two nodes
13. Evolution of the 7-Layers (4)
Application
Transport
Network
Physical
Data-Link
Application
Transport
Network
Physical
Data-Link
1
• Five Layer Model – Increase Quality of Service (QOS)
•Variable levels of data integrity in network
•Additional data exchanges to ensure connectivity over worst conditions
•Became the Transport Layer
14. Evolution of the 7-Layers (5)
Application
Session
Transport
Network
Physical
Data-Link
Application
Session
Transport
Network
Physical
Data-Link
• Six Layer Model - Dialogue Control and Dialogue Separation
– Means of synchronizing transfer of data packets
– Allows for checkpointing to see if data arrives (at nodes and end
stations)
– Became Session Layer
1
15. Evolution of the 7-Layers (6)
Application
Presentation
Session
Transport
Network
Data-Link
Physical
Application
Presentation
Session
Transport
Network
Data-Link
Physical
• The Seven Layer OSI Model - Addition of Management and Security
– Standardizing notation or syntax for application messages (abstract syntax)
– 1
Set of encoding rules (transfer syntax)
– Became the Presentation Layer
19. Session Layer
Allows applications to
maintain an ongoing session
Where is it on my computer?
Workstation and Server
Service (MS)
Windows Client for
NetWare (NetWare)
3
20. Transport Layer
Provides reliable data
delivery
It’s the TCP in TCP/IP
Receives info from upper
layers and segments it into
packets
Can provide error detection
and correction 3
21. Figure 2.9 Transport layer
The transport layer is responsible for
the delivery of a message from one
process to another.
22. Network Layer
Provides network-wide addressing
and a mechanism to move packets
between networks (routing)
Responsibilities:
Network addressing
Routing
Example:
IP from TCP/IP 3
23. Network layer
The network layer is responsible for
the delivery of individual packets from
the source host to the destination host.
24. Network Addresses
Network-wide addresses
Used to transfer data across subnets
Used by routers for packet forwarding
Example:
IP Address
Where is it on my computer?
TCP/IP Software
25. Data Link Layer
Places data and retrieves it
from the physical layer and
provides error detection
capabilities
3
26. Data link layer
The data link layer is responsible for
moving frames from one hop (node) to
the next.
27. Sub-layers of the Data Link Layer
MAC (Media Access Control)
Gives data to the NIC
Controls access to the media through:
CSMA/CD Carrier Sense Multiple Access/Collision
Detection
Token passing
LLC (Logical Link Layer)
Manages the data link interface (or Service Access Points
(SAPs))
Can detect some transmission errors using a Cyclic
Redundancy Check (CRC). If the packet is bad the LLC will
request the sender to resend that particular packet.
28. Physical Layer
Determines the specs for
all physical components
Cabling
Interconnect methods
(topology / devices)
Data encoding (bits to waves)
Electrical properties
Examples:
Ethernet (IEEE 802.3)
Token Ring (IEEE 802.5)
Wireless (IEEE 802.11b)
3
29. Physical layer
The physical layer is responsible
for the movement of individual bits
from one hop (node) to the next.
30. Physical Layer (cont’d)
What are the Physical Layer components on my
computer?
NIC
Network Interface Card
Has a unique 12 character Hexadecimal number permanently
burned into it at the manufacturer.
The number is the MAC Address/Physical address of a
computer
Cabling
Twister Pair
Fiber Optic
Coax Cable
31. How Does It All Work Together
Each layer contains a Protocol Data Unit (PDU)
PDU’s are used for peer-to-peer contact between
corresponding layers.
Data is handled by the top three layers, then
Segmented by the Transport layer.
The Network layer places it into packets and the
Data Link frames the packets for transmission.
Physical layer converts it to bits and sends it out
over the media.
The receiving computer reverses the process
using the information contained in the PDU.
2
33. Data Encapsulation In TCP/IP
At each layer in the TCP/IP protocol stack
Outgoing data is packaged and identified for delivery to the layer underneath
PDU – Packet Data Unit – the “envelop” information attached to a packet at
a particular TCP/IP protocol
e.g. header and trailer
Header
PDU’s own particular opening component
Identifies the protocol in use, the sender and intended recipient
Trailer (or packet trailer)
Provides data integrity checks for the payload
38. The Postal Analogy
How would the OSI compare to the regular Post Office
Application
A- Write a 20 page letter to a foreign country.
P- Translate the letter so the receiver can read it.
S- Insure the intended recipient can receive letter.
T- Separate and number pages. Like registered mail,
tracks delivery and requests another package if one is
“lost” or “damaged” in the mail.
N- Postal Center sorting letters by zip code to route
them closer to destination.
D- Local Post Office determining which vehicles to
deliver letters.
P- Physical Trucks, Planes, Rail, autos, etc which carry
letter between stations.
Presentation
Session
Transport
Network
Data-Link
Physical
39. Remembering the 7 Layers
7 - Application All
6 - Presentation People
5 - Session Seem
4 - Transport To
3 - Network Need
2 - Data Link Data
1 - Physical Processing
40. TCP/IP model development
The late-60s The Defense Advance Research
Projects Agency (DARPA) originally
developed Transmission Control
Protocol/Internet Protocol (TCP/IP) to
interconnect various defense department
computer networks.
The Internet, an International Wide Area
Network, uses TCP/IP to connect networks
across the world.
41. 4 layers of the TCP/IP model
Layer 4: Application
Layer 3: Transport
Layer 2: Internet
Layer 1: Network access
It is important to note that some of the layers in tthhee TTCCPP//IIPP mmooddeell hhaavvee
tthhee ssaammee nnaammee aass llaayyeerrss iinn tthhee OOSSII mmooddeell..
DDoo nnoott ccoonnffuussee tthhee llaayyeerrss ooff tthhee ttwwoo mmooddeellss..
42. The network access layer
Concerned with all of the issues that an
IP packet requires to actually make the
physical link. All the details in the OSI
physical and data link layers.
Electrical, mechanical, procedural and
functional specifications.
Data rate, Distances, Physical connector.
Frames, physical addressing.
Synchronization, flow control, error
control.
43. The internet layer
Send source packets from any network on
the internetwork and have them arrive at
the destination independent of the path
and networks they took to get there.
Packets, Logical addressing.
Internet Protocol (IP).
Route , routing table, routing protocol.
44. The transport layer
The transport layer deals with the quality-of-service
issues of reliability, flow control, and
error correction.
Segments, data stream, datagram.
Connection oriented and connectionless.
Transmission control protocol (TCP).
User datagram protocol (UDP).
End-to-end flow control.
Error detection and recovery.
45. TCP/IP Reference Model (cont)
3. Transport layer (layer 3)
Allows end-to-end communication
Connection establishment, error control, flow control
Two main protocols at this level
Transmission control protocol (TCP),
Connection oriented
Connection established before sending data
Reliable
user datagram protocol (UDP)
Connectionless
Sending data without establishing connection
Fast but unreliable
46. The application layer
Handles high-level protocols, issues of
representation, encoding, and dialog control.
The TCP/IP combines all application-related
issues into one layer, and assures this data is
properly packaged for the next layer.
FTP, HTTP, SMNP, DNS ...
Format of data, data structure, encode …
Dialog control, session management …
48. TCP/IP Reference Model
Layer
Application
Transport
Internet
Network Access
(Host-to-network)
Protocols
HTTP TELNET FTP SMTP SNMP
TCP UDP
IP ICMP
ETHERNET PACKET RADIO
49. Protocols at the application layer
HTTP:
browser and web server communication
FTP :
file transfer protocol
TELNET:
remote login protocol
POP3: Retrieve email
POP3 is designed to delete mail on the server as soon as the user has downloaded it
IMAP (Internet Message Access Protocol )
Retrieve emails,
retaining e-mail on the server and for organizing it in folders on the serve
50. Protocols at the transport layer
Transmission control protocol (TCP),
Connection oriented
Connection established before sending data
Reliable
user datagram protocol (UDP)
Connectionless
Sending data without establishing connection
Fast but unreliable
51. Protocol at the network layer
IP
Path selection ,
routing and addressing
ICMP (Internet Control Message Protocol )
sends error messages relying on IP
a requested service is not available
a host or router could not be reached
52. Protocols at the link layer
Ethernet
Uses CSMA/CD
Token Ring
53. Data Formats
Application data
data TCP
header data TCP
header data TCP
header
data TCP
header
IP
header
data TCP
header
IP
header
Ethernet
header
Ethernet
trailer
application
layer
transport
layer
network
layer
data link
layer
message
segment
packet
frame
54. Packet Encapsulation (TCP/IP)
The data is sent down the protocol stack
Each layer adds to the data by prepending headers
22Bytes 20Bytes 20Bytes 4Bytes
64 to 1500 Bytes
55. Comparing TCP/IP with OSI
OSI Model TCP/IP Hierarchy Protocols
7th
Application Layer
6th
Presentation Layer
5th
Session Layer
4th
Transport Layer
3rd
Network Layer
2nd
Link Layer
1st
Physical Layer
Application
Layer
Transport Layer
Network Layer
Link Layer
Link Layer : includes device driver and network interface card
Network Layer : handles the movement of packets, i.e. Routing
Transport Layer : provides a reliable flow of data between two hosts
Application Layer : handles the details of the particular application