This document provides an overview of computer networks, the OSI model, TCP/IP model, and related protocols. It discusses:
- The 7 layers of the OSI model and the functions of each layer.
- How packets are encapsulated as they pass through each layer of the OSI model.
- Similarities and differences between the OSI model and TCP/IP model.
- Key protocols associated with each layer including TCP, UDP, IP, ICMP, ARP/RARP.
- Concepts such as addressing schemes, encapsulation, connection establishment and termination.
The document uses diagrams and explanations to concisely describe the layers, protocols, and fundamental concepts relating to computer network models and
TCP/IP have 5 layers, whereas OSI model have 7 layers in its Model. TCP/IP is known for the secured connection and comunication. I have explained all functions and definitions of layers in TCP/IP Model
Although the OSI reference model is universally recognized, the historical and technical open standard of the Internet is Transmission Control Protocol / Internet Protocol (TCP/IP).
The TCP/IP reference model and the TCP/IP protocol stack make data communication possible between any two computers, anywhere in the world, at nearly the speed of light.
TCP/IP have 5 layers, whereas OSI model have 7 layers in its Model. TCP/IP is known for the secured connection and comunication. I have explained all functions and definitions of layers in TCP/IP Model
Although the OSI reference model is universally recognized, the historical and technical open standard of the Internet is Transmission Control Protocol / Internet Protocol (TCP/IP).
The TCP/IP reference model and the TCP/IP protocol stack make data communication possible between any two computers, anywhere in the world, at nearly the speed of light.
The data link layer, or layer 2, is the second layer of the seven-layer OSI model of computer networking. This layer is the protocol layer that transfers data between adjacent network nodes in a wide area network (WAN) or between nodes on the same local area network (LAN) segment.
INTRODUCTION
WHAT IS OSI?
OSI MODEL
TYPES OF LAYERS
PHYSICAL LAYER
DATA LINK LAYER
NETWORK LAYER
TRANSPORT LAYER
SESSION LAYER
PRESENTATION LAYER
APPLICATION LAYER
The TCP/IP protocol system is used by virtually every modern data network to quickly and reliably move data from node to node. This presentation covers what TCP/IP is, what it does, it’s most important features, and how it was developed.
IPv4 (Internet Protocol Version 4). This silde will give u all information about IPv4.
Hope so you like it Freinds.
and
Sorry if i can fulfill ur wish in the given IPv4 Presentation.
The data link layer, or layer 2, is the second layer of the seven-layer OSI model of computer networking. This layer is the protocol layer that transfers data between adjacent network nodes in a wide area network (WAN) or between nodes on the same local area network (LAN) segment.
INTRODUCTION
WHAT IS OSI?
OSI MODEL
TYPES OF LAYERS
PHYSICAL LAYER
DATA LINK LAYER
NETWORK LAYER
TRANSPORT LAYER
SESSION LAYER
PRESENTATION LAYER
APPLICATION LAYER
The TCP/IP protocol system is used by virtually every modern data network to quickly and reliably move data from node to node. This presentation covers what TCP/IP is, what it does, it’s most important features, and how it was developed.
IPv4 (Internet Protocol Version 4). This silde will give u all information about IPv4.
Hope so you like it Freinds.
and
Sorry if i can fulfill ur wish in the given IPv4 Presentation.
-Definition of Information Security
-Evolution of Information Security
-Basics Principles of Information Security
-Critical Concepts of Information Security
-Components of the Information System
-Balancing Information Security and Access
-Implementing IT Security
-The system Development Life cycle
-Security professional in the organization
Cloud and Virtualization (Using Virtualization to form Clouds)Rubal Sagwal
-Cloud
-Underlying technology pieces from which cloud computing -Infrastructure is built
-Characteristics of Cloud
-Types of cloud services (SaaS, IaaS and PaaS)
-Cloud deployment models
-Virtualization
-Using Virtualization to form Clouds
Entity type
Entity sets
Attributes and keys
Relationship model
Mapping Constraints
The ER Model
Cardinality Constraints
Generalization, Specialization and Aggregation
ER Diagram & Database design with the ER Model
Introduction
Relational Model
Concepts
Characteristics
Database Models, Client-Server Architecture, Distributed Database and Classif...Rubal Sagwal
Introduction to Data Models
-Hierarchical Model
-Network Model
-Relational Model
-Client/Server Architecture
Introduction to Distributed Database
Classification of DBMS
Overview of Data Base Systems Concepts and ArchitectureRubal Sagwal
Data
Data Hierarchy
Introduction of Database
DBMS
Characteristics of database approach
Advantages of DBMS
Data models
Schemas, Three schema architecture:
-The external level
-The conceptual level and
-The internal level.
Data Independence
Database languages and Interfaces
Roles of Database Administrator
Principles of Virtualization - Introduction to Virtualization Software Rubal Sagwal
Introduction to virtualization Software:
-Introduction to Vsphere
-ESXi
- Types of Hyper-visor
-VCenter Server
-Vsphere client
-Introduction to HYPER-V.
Prepare and Manage Remote Applications through Virtualization Rubal Sagwal
Prepare and manage remote applications:
-Configuring application sharing
-Package applications for deployment by using RemoteApp
-Installing and configuring the RD Session Host Role Service on the server
Managing Virtual Hard Disk and Virtual Machine ResourcesRubal Sagwal
Managing Virtual Hard Disk and Virtual Machine Resources:
-Creating and managing virtual hard disks
-Configuring virtual machine resources including network resources
-Preparing host machines
-Create, deploy, and maintain images.
Configure and Manage Virtualization on different Platforms Rubal Sagwal
Configure and Manage Virtualization on different Platforms:
-Configure the BIOS to support hardware virtualization
-Install and configure Windows Virtual PC
-Installing Windows Virtual PC on various platforms (32-bit, 64-bit)
Virtualization Uses - Server Consolidation Rubal Sagwal
Server Consolidation.
Why do we need Server Consolidation and what are the outcomes?
Benefits of Server consolidation
How to do server consolidation?
Server product architecture:
1. Virtual Machine
2. Guest OS
3. Host OS
What are server consolidation consideration?
Types of server consolidation.
Benefits of VMware over Server Consolidation.
VMware infrastructure.
Disaster recovery and backup plan.
Basics of Virtualization:
What is Virtual and Virtualization?
Why do we need Virtualization?
Benefits of Virtualization.
Before and after Virtualization.
How Virtualization works?
Virtual Machines.
VMware
Types of Virtualization:
1. Server Virtualization
2. Storage virtualization
3. I/O virtualization
4. Network virtualization
5. Client virtualization
6. Desktop virtualization
7. Application Virtualization
NO1 Uk best vashikaran specialist in delhi vashikaran baba near me online vas...Amil Baba Dawood bangali
Contact with Dawood Bhai Just call on +92322-6382012 and we'll help you. We'll solve all your problems within 12 to 24 hours and with 101% guarantee and with astrology systematic. If you want to take any personal or professional advice then also you can call us on +92322-6382012 , ONLINE LOVE PROBLEM & Other all types of Daily Life Problem's.Then CALL or WHATSAPP us on +92322-6382012 and Get all these problems solutions here by Amil Baba DAWOOD BANGALI
#vashikaranspecialist #astrologer #palmistry #amliyaat #taweez #manpasandshadi #horoscope #spiritual #lovelife #lovespell #marriagespell#aamilbabainpakistan #amilbabainkarachi #powerfullblackmagicspell #kalajadumantarspecialist #realamilbaba #AmilbabainPakistan #astrologerincanada #astrologerindubai #lovespellsmaster #kalajaduspecialist #lovespellsthatwork #aamilbabainlahore#blackmagicformarriage #aamilbaba #kalajadu #kalailam #taweez #wazifaexpert #jadumantar #vashikaranspecialist #astrologer #palmistry #amliyaat #taweez #manpasandshadi #horoscope #spiritual #lovelife #lovespell #marriagespell#aamilbabainpakistan #amilbabainkarachi #powerfullblackmagicspell #kalajadumantarspecialist #realamilbaba #AmilbabainPakistan #astrologerincanada #astrologerindubai #lovespellsmaster #kalajaduspecialist #lovespellsthatwork #aamilbabainlahore #blackmagicforlove #blackmagicformarriage #aamilbaba #kalajadu #kalailam #taweez #wazifaexpert #jadumantar #vashikaranspecialist #astrologer #palmistry #amliyaat #taweez #manpasandshadi #horoscope #spiritual #lovelife #lovespell #marriagespell#aamilbabainpakistan #amilbabainkarachi #powerfullblackmagicspell #kalajadumantarspecialist #realamilbaba #AmilbabainPakistan #astrologerincanada #astrologerindubai #lovespellsmaster #kalajaduspecialist #lovespellsthatwork #aamilbabainlahore #Amilbabainuk #amilbabainspain #amilbabaindubai #Amilbabainnorway #amilbabainkrachi #amilbabainlahore #amilbabaingujranwalan #amilbabainislamabad
Welcome to WIPAC Monthly the magazine brought to you by the LinkedIn Group Water Industry Process Automation & Control.
In this month's edition, along with this month's industry news to celebrate the 13 years since the group was created we have articles including
A case study of the used of Advanced Process Control at the Wastewater Treatment works at Lleida in Spain
A look back on an article on smart wastewater networks in order to see how the industry has measured up in the interim around the adoption of Digital Transformation in the Water Industry.
Forklift Classes Overview by Intella PartsIntella Parts
Discover the different forklift classes and their specific applications. Learn how to choose the right forklift for your needs to ensure safety, efficiency, and compliance in your operations.
For more technical information, visit our website https://intellaparts.com
Vaccine management system project report documentation..pdfKamal Acharya
The Division of Vaccine and Immunization is facing increasing difficulty monitoring vaccines and other commodities distribution once they have been distributed from the national stores. With the introduction of new vaccines, more challenges have been anticipated with this additions posing serious threat to the already over strained vaccine supply chain system in Kenya.
Saudi Arabia stands as a titan in the global energy landscape, renowned for its abundant oil and gas resources. It's the largest exporter of petroleum and holds some of the world's most significant reserves. Let's delve into the top 10 oil and gas projects shaping Saudi Arabia's energy future in 2024.
Quality defects in TMT Bars, Possible causes and Potential Solutions.PrashantGoswami42
Maintaining high-quality standards in the production of TMT bars is crucial for ensuring structural integrity in construction. Addressing common defects through careful monitoring, standardized processes, and advanced technology can significantly improve the quality of TMT bars. Continuous training and adherence to quality control measures will also play a pivotal role in minimizing these defects.
COLLEGE BUS MANAGEMENT SYSTEM PROJECT REPORT.pdfKamal Acharya
The College Bus Management system is completely developed by Visual Basic .NET Version. The application is connect with most secured database language MS SQL Server. The application is develop by using best combination of front-end and back-end languages. The application is totally design like flat user interface. This flat user interface is more attractive user interface in 2017. The application is gives more important to the system functionality. The application is to manage the student’s details, driver’s details, bus details, bus route details, bus fees details and more. The application has only one unit for admin. The admin can manage the entire application. The admin can login into the application by using username and password of the admin. The application is develop for big and small colleges. It is more user friendly for non-computer person. Even they can easily learn how to manage the application within hours. The application is more secure by the admin. The system will give an effective output for the VB.Net and SQL Server given as input to the system. The compiled java program given as input to the system, after scanning the program will generate different reports. The application generates the report for users. The admin can view and download the report of the data. The application deliver the excel format reports. Because, excel formatted reports is very easy to understand the income and expense of the college bus. This application is mainly develop for windows operating system users. In 2017, 73% of people enterprises are using windows operating system. So the application will easily install for all the windows operating system users. The application-developed size is very low. The application consumes very low space in disk. Therefore, the user can allocate very minimum local disk space for this application.
Student information management system project report ii.pdfKamal Acharya
Our project explains about the student management. This project mainly explains the various actions related to student details. This project shows some ease in adding, editing and deleting the student details. It also provides a less time consuming process for viewing, adding, editing and deleting the marks of the students.
Courier management system project report.pdfKamal Acharya
It is now-a-days very important for the people to send or receive articles like imported furniture, electronic items, gifts, business goods and the like. People depend vastly on different transport systems which mostly use the manual way of receiving and delivering the articles. There is no way to track the articles till they are received and there is no way to let the customer know what happened in transit, once he booked some articles. In such a situation, we need a system which completely computerizes the cargo activities including time to time tracking of the articles sent. This need is fulfilled by Courier Management System software which is online software for the cargo management people that enables them to receive the goods from a source and send them to a required destination and track their status from time to time.
1. Computer Networks
OSI Model and Protocols
Date:
Department of Computer Engineering
Presented By:
Rubal Sagwal
NIT, Kurukshetra
Department of Computer Engineering
1ADAD
2. Contents
• Introduction to Layers and Protocols.
• OSI Model
• OSI Model layer functioning.
• TCP/IP Model
• Addressing scheme
ADAD 2
6. OSI Model
• Open System Interconnection.
• Firstly introduced in 1970s.
• An open system is a set of protocols that allow any two
different systems to communicate.
• Protocols: Set of rules.
• OSI model itself is not a protocol, it is a model that
define protocols for network communication.
• Seven separate but related layers.
ADAD 6
8. Encapsulation
• A packet (header and data) at level 7 is
encapsulated in a packet at level 6.
• The whole packet at level 6 is encapsulated in a
packet at level 5 and so on.
ADAD 8
10. Organization of Layers
• 7 layers can be thought of belonging to three
subgroup.
• These are:
ADAD 10
Layer 1
• Physical
• Data link
• Network
Layer 2
• Transport
layer
Layer 3
• Session
• Presentation
• Application
11. 1. Physical Layer
Physical characteristics of interfaces and medium:
Define physical transmission medium (Guided or Unguided).
Interface between devices and transmission medium.
Representation of bits:
PL consist of bits (0s and 1s), so, data -> bits ->signals
(electrical or optical).
Data rate
Transmission rate (means the number of bits sent per
second).
Synchronization of bits:
Sender and receiver must not receive the same bit rate but
must be at same time (synchronized clock0.
ADAD 11
12. 1. Physical Layer
Line configuration:
Connection (point-to-point or multipoint) of devices to
the medium.
Physical topology:
Topological Structure (Bus, Star, Mesh etc)
Transmission mode:
Simplex, half-duplex or full duplex.
ADAD 12
13. 2. Data Link Layer
Framing:
Arranging bit streams into Data Frames.
Physical addressing (machine address):
Add header to the frame to define the sender and receiver of
the data packet.
Flow Control;
Not to overload receiver
Error Control:
Error Free
Access Control:
Which device has access to the link at specific time instance.
ADAD 13
15. 4. Transport Layer
Process-to-process delivery (applications)
Service-point addressing:
Send data to the correct process on particular computer.
Segmentation and reassembly
Divide into segments and assign sequence number.
Reassembly at destination according to sequence number.
Connection control
Connectionless or connection oriented
Flow control
Error control
Without damage, loss or duplication
ADAD 15
16. 5. Session Layer
It establish, maintains and synchronize the
interaction among communicating systems.
Dialog control (half-duplex or full duplex at
application level)
Synchronization
ADAD 16
17. 6. Presentation Layer
Semantics and Syntax
Translation:
Change the format according receivers end.
Encryption and Decryption
Compression
Reduce the size (Video, audio, images etc)
ADAD 17
18. 7. Application Layer
User Interface
File transfer, access and management
Mail services
Directory service (database)
ADAD 18
22. TCP/IP Layer Functioning
• PHYSICAL LAYER: Doesn’t define any specific
protocol, define physical structure.
• NETWORK LAYER: Supports internetworking
protocol (ARP, RARP, ICMP and IGMP).
• TRANSPORT LAYER: Responsible for delivery of
message from a process to another process (TCP
and UDP).
• APPLICATION LAYER: Is a combination of Session,
Presentation and Application Layer of OSI Model.
ADAD 22
24. Relationship of layers and Addresses in TCP/IP
ADAD 24
• SPECIFIC ADDRESS
• (Processes)
Application
Layer
• PORT ADDRESS
• (SCTP, TCP, UDP)Transport Layer
• LOGICAL ADDRESS
• (IP and other protocols)Network Layer
• PHYSIAL ADDRESS
• (Underlying physical Networks)
Host-to-
network
25. Physical Address
• Address of a node as defined by LAN or WAN.
• Included in the frame used by DLL (Data link layer).
• Address format depends upon network.
ADAD 25
26. Logical Address
• IP Address.
• Used for Universal Communication.
• Identify each host uniquely in a network.
• Currently is 32 bit address.
ADAD 26
27. Port Address
• Process Address.
• For example: Computer A can communicate with computer
B by using TALNET. At the same time A can communicate
with C using File transfer Protocol. For these process to
receive data simultaneously we need method to label the
process, i.e Port Address.
ADAD 27
31. Delivery Process
1. Node-to-Node Delivery: The Data link layer is responsible
for delivery of frames between two neighboring nodes
over a link, called node-to-node delivery.
2. Host-to-Host: Network layer is responsible for delivery of
datagrams between two hosts.
3. Process-to-Process: Transport layer is responsible for
delivery of data from process-to-process (application
program).
ADAD 31
32. Connectionless Vs Connection Oriented
Connectionless
• For sending data from
source to destination, no
need to establish any
connection.
• Packets are not
numbered; they may be
delayed or lost may
arrive out of sequence.
• No acknowledgement.
• Ex: UDP
Connection Oriented
• Connection is first
established between the
sender and the receiver.
• Data are transferred.
• Connection is released.
• Ex: TCP and SCTP.
ADAD 32
33. UDP
• User Datagram Protocol.
• Connectionless Protocol and Unreliable (No flow and error
control).
• Then why are we using it?
• Very simple protocol.
• If a process wants to send a small message and does not care much
about reliability.
• For small message (no need to generate any connection).
• Multicasting
ADAD 33
34. Well known port used by UDP
• Command for Unix:
$grep ftp /etc/services
ftp 21/udp
ADAD 34
Port Protocol Description
7 Echo Print a received datagram back to sender.
9 Discard Discards any datagram that is received.
11 User Active user.
13 Daytime Returns the date and time
53 Nameserver Domain Name Service
35. User datagram of UDP
• UDP packets called User Datagrams, have fixed size header of 8
bytes. Fields are as follows:
1. Source Port Number: Used by process running on the source
host.
• 16 bit long (range from 0 to 216 = 65535)
2. Destination Port Number: used by the process running on
destination host.
• 16 bit long.
3. Length: 16-bit long (0 to 65535).
• Define the length of user datagram header plus data.
UDP datagram length field is not that much important because it is
encapsulated within IP packet.
4. Checksum: for detection of error.
ADAD 35
36. Operation of UDP
• Connectionless Services: it means each datagram sent by
UDP is independent datagram.
• There is no relationship between the different user datagram even
if they are coming from same source process or going to same
destination.
• Are not numbered (nothing common).
• No connection establishment, no termination.
• Can’t send stream of data and chop them into different related
datagrams.
• Only for short messages that can fit into one datagram.
• Flow and Error Control: Very simple and unreliable.
• No flow control hence no windows, can overflow.
• Sender doesn’t know message has lost or duplicate, except a small
checksum that is not enough.
• Encapsulation and Decapsulation: within IP datagram.
ADAD 36
37. Use of UDP
• Suitable for process that requires simple request-
response communication, like FTP.
• Suitable for a process with internal flow and error
control like Trivial File Transfer Protocol (which has
its own error and flow control).
• Suitable for multicasting.
• Used for route updating protocol.
ADAD 37
38. TCP
• Transmission Control Protocol.
• Like UDP, use port numbers.
• Connection oriented (create virtual connection
between two TCPs to send data).
• Use flow and error control.
• Full duplex communication.
• Connection oriented and reliable protocol.
ADAD 38
39. TCP Services
1. Process-to-Process communication: Using port numbers.
ADAD 39
Port Protocol Description
7 Echo Print a received datagram back to sender.
9 Discard Discards any datagram that is received.
11 User Active user.
13 Daytime Returns the date and time
20 FTP, Data File transfer Protocol(data connection)
21 FTP, Control FTP (control connection)
25 SMTP Simple Mail Transfer Protocol
53 Nameserver Domain Name Service
80 HTTP Hypertext Transfer Protocol
40. TCP Services
2. Stream Delivery Services: Stream Oriented Protocol.
• Allow the sending process to deliver data as a stream of
bytes and allows to receiving process to obtain as a stream.
• Create an imaginary “tube” that carries their data across the
internet.
ADAD 40
41. TCP Services
Sending and Receiving Buffers: Because sending and
receiving processes may not write or read data at the same
speed TCP needs buffer for storage.
Useful in Segmentation also.
ADAD 41
42. TCP Features
1. Numbering System: No segment number but, Segment
Number=(Sequence number and Acknowledgement number).
2. Byte Numbers: store byte into sending buffer and number
them (generate random numbers between 0 to 2^35-1)
3. Sequence Number: After the byte no. sequence number is
assigned. SN number for each segment is the number of the
first byte carried in that segment.
4. Acknowledgement Number: Conform the byte is received. And
define the number of byte that next except to receive.
5. Flow control
6. Error control
7. Congestion Control
ADAD 42
44. TCP Segment Fields
1. Source Port Address: 16 bit; sender’s port number.
2. Destination Port Address: 16-bit; receiver’s port number.
3. Sequence Number: 32-bit; Define the number assigned to the first
byte of data contained that segment.
4. Acknowledgement Number: 32-bit; define byte number that the
receiver of the segment is expecting (X) to receive from the other
party then reply would be X+1.
5. Header Length: 4-bit; header can be between 20 to 60 bytes.
6. Reserved: 6-bit; reserved for future.
7. Window size: 16-bit; value is normally referred to as receiving
window.
8. Checksum
9. Urgent Pointer: Valid only if urgent flag is set.
10. Options: any optional data.
ADAD 44
45. TCP Segment Fields
7. Control: 6 different flags.
ADAD 45
Flag Description
URG 16-bit; valid only if urgent flag is set; is used when segment contains
some urgent data.
ACK Successful Acknowledgement.
PSH PUSH similar to URG; tells the receiver to process these packets as they
are received instead of buffering them.
RST Reset the connection.
SYN Synchronization flag, is used as a first step in establishing a 3-way
handshake between two hosts
FIN Finished; Terminate the connection.
46. A TCP Connection
• Connection Oriented – use a virtual path between source
and destination.
• All the segments belong to a message are sent over this
path.
• Use a single path for entire message; acknowledgement
process and retransmission of damaged or lost frames.
• Path is virtual not physical.
• Three phases: Three-Way Handshaking
1. Connection Establishment
2. Data Transfer
3. Connection Termination
ADAD 46
47. TCP Connection Establishment
• Full-Duplex Mode
• For transmission/ communication of data each party has to
take permission of receiver.
• The process works like:
1. The server program tells its TCP that it is ready to accept a
connection (if it is passive).
2. The client program issue a request for an active open.
3. A client that need to establish a connection tells to the particular
server that it need to generate a connection.
4. Starts Three-way handshaking process.
5. Each connection shows Sequence number, acknowledgement
number, control flags and window size.
ADAD 47
49. 1. TCP Connection Establishment Using Three-
way Handshake
1. Client send first SYN segment, in which SYN flag is set for
synchronization of sequence number.
2. Server send two flag bits set: SYN+ACK.
3. Client send just an ACK segment just to acknowledge of
second segment from server.
Now connection is established.
And ready to transfer data.
ADAD 49