SlideShare a Scribd company logo
Computer Networks
Mr.M.N.Potdar
Assistant Professor
Department of E&TC Engineering
SBGI, Miraj
1
2.2
LAYERED TASKS
We use the concept of layers in our daily life. As an
example, let us consider two friends who
communicate through postal mail. The process of
sending a letter to a friend would be complex if
there were no services available from the post
office.
Sender, Receiver, and Carrier
Hierarchy
Topics discussed in this section:
Tasks involved in sending a letter
2.4
2-2 THE OSI MODEL
Established in 1947, the International Standards
Organization (ISO) is a multinational body
dedicated to worldwide agreement on international
standards. An ISO standard that covers all aspects
of network communications is the Open Systems
Interconnection (OSI) model. It was first introduced
in the late 1970s.
Layered Architecture
Peer-to-Peer Processes
Encapsulation
Topics discussed in this section:
2.5
ISO is the organization.
OSI is the model.
Note
2.6
Figure 2.2 Seven layers of the OSI model
2.7
Figure 2.3 The interaction between layers in the OSI model
2.8
Figure 2.4 An exchange using the OSI model
2.9
2-3 LAYERS IN THE OSI MODEL
In this section we briefly describe the functions of
each layer in the OSI model.
Physical Layer
Data Link Layer
Network Layer
Transport Layer
Session Layer
Presentation Layer
Application Layer
Topics discussed in this section:
5/8/2024
kksgautam@Shivaji.du.ac.in 2.10
Figure 2.5 Physical layer
2.11
The physical layer is responsible for movements of
individual bits from one hop (node) to the next.
Note
2.12
Figure 2.6 Data link layer
2.13
The data link layer is responsible for moving
frames from one hop (node) to the next.
Note
5/8/2024 2.14
Figure 2.7 Hop-to-hop delivery
2.15
Figure 2.8 Network layer
2.16
The network layer is responsible for the
delivery of individual packets from
the source host to the destination host.
Note
2.17
Figure 2.9 Source-to-destination delivery
2.18
Figure 2.10 Transport layer
2.19
The transport layer is responsible for the delivery
of a message from one process to another.
Note
2.20
Figure 2.11 Reliable process-to-process delivery of a message
2.21
Figure 2.12 Session layer
2.22
The session layer is responsible for dialog
control and synchronization.
Note
2.23
Figure 2.13 Presentation layer
2.24
The presentation layer is responsible for translation,
compression, and encryption.
Note
5/8/2024
kksgautam@Shivaji.du.ac.in 2.25
Figure 2.14 Application layer
2.26
The application layer is responsible for
providing services to the user.
Note
2.27
Figure 2.15 Summary of layers
2.28
2-4 TCP/IP PROTOCOL SUITE
The layers in the TCP/IP protocol suite do not
exactly match those in the OSI model. The original
TCP/IP protocol suite was defined as having four
layers: host-to-network, internet, transport, and
application. However, when TCP/IP is compared to
OSI, we can say that the TCP/IP protocol suite is
made of five layers: physical, data link, network,
transport, and application.
Physical and Data Link Layers
Network Layer
Transport Layer
Application Layer
Topics discussed in this section:
2.29
Figure 2.16 TCP/IP and OSI model
2.30
2-5 ADDRESSING
Four levels of addresses are used in an internet
employing the TCP/IP protocols: physical, logical,
port, and specific.
Physical Addresses
Logical Addresses
Port Addresses
Specific Addresses
Topics discussed in this section:
2.31
Figure 2.17 Addresses in TCP/IP
2.32
Figure 2.18 Relationship of layers and addresses in TCP/IP
2.33
In Figure 2.19 a node with physical address 10
sends a frame to a node with physical address 87.
The two nodes are connected by a link (bus
topology LAN). As the figure shows, the computer
with physical address 10 is the sender, and the
computer with physical address 87 is the receiver.
Example 2.1
2.34
Figure 2.19 Physical addresses
2.35
Most local-area networks use a 48-bit (6-byte)
physical address written as 12 hexadecimal digits;
every byte (2 hexadecimal digits) is separated by a
colon, as shown below:
Example 2.2
07:01:02:01:2C:4B
A 6-byte (12 hexadecimal digits) physical address.
2.36
Figure 2.20 shows a part of an internet with two
routers connecting three LANs. Each device
(computer or router) has a pair of addresses
(logical and physical) for each connection. In this
case, each computer is connected to only one link
and therefore has only one pair of addresses. Each
router, however, is connected to three networks
(only two are shown in the figure). So each router
has three pairs of addresses, one for each
connection.
Example 2.3
2.37
Figure 2.20 IP addresses
2.38
Figure 2.21 shows two computers communicating
via the Internet. The sending computer is running
three processes at this time with port addresses a,
b, and c. The receiving computer is running two
processes at this time with port addresses j and k.
Process a in the sending computer needs to
communicate with process j in the receiving
computer. Note that although physical addresses
change from hop to hop, logical and port addresses
remain the same from the source to destination.
Example 2.4
5/8/2024 2.39
Figure 2.21 Port addresses
2.40
The physical addresses will change from hop to hop,
but the logical addresses usually remain the same.
Note
2.41
Example 2.5
A port address is a 16-bit address represented by
one decimal number as shown.
753
A 16-bit port address represented
as one single number.
2.42
2-2 THE OSI MODEL
Established in 1947, the International Standards
Organization (ISO) is a multinational body
dedicated to worldwide agreement on international
standards. An ISO standard that covers all aspects
of network communications is the Open Systems
Interconnection (OSI) model. It was first introduced
in the late 1970s.
Layered Architecture
Peer-to-Peer Processes
Encapsulation
Topics discussed in this section:
7 Application
6
Presentation
5 Session
4 Transport
1 Physical
2 Data Link
3 Network
INTRODUCTION
43
7 Application
6
Presentation
5 Session
4 Transport
1 Physical
2 Data Link
3 Network
NETWORK GOALS
The two main benefits of networking computers are…
Communications
Information can be distributed very quickly, such as
email and video conferencing.
Saving Money
Resources such as information, software, and
hardware can be shared.
CPUs and hard disks can be pooled together to
create a more powerful machine.
44
7 Application
6
Presentation
5 Session
4 Transport
1 Physical
2 Data Link
3 Network
APPLICATIONS
A lot of things we take for granted are the result of
computer networks.
• Email
• Chat
• Web sites
• Sharing of documents and pictures
• Accessing a centralized database of information
• Mobile workers
45
7 Application
6
Presentation
5 Session
4 Transport
1 Physical
2 Data Link
3 Network
NETWORK STRUCTURE
The subnet interconnects hosts.
Subnet
Carries messages from host to host. It is made up
of telecommunication lines (i.e. circuits, channels,
trunks) and switching elements (i.e. IMPs, routers).
Hosts
End user machines or computers.
Q: Is the host part of the subnet?
46
7 Application
6
Presentation
5 Session
4 Transport
1 Physical
2 Data Link
3 Network
NETWORK ARCHITECTURES
A set of layers and protocols is called the network
architecture.
1. Protocol Hierarchies
Networks are organized as layers to reduce design
complexity. Each layer offers services to the higher
layers. Between adjacent layers is an interface.
Services – connection oriented and
connectionless.
Interface – defines which primitives and services
the lower layer will offer to the upper layer.
Primitives – operations such as request, indicate,
response, confirm.
47
7 Application
6
Presentation
5 Session
4 Transport
1 Physical
2 Data Link
3 Network
NETWORK ARCHITECTURES
2. Design Issues for the Layers
• Mechanism for connection establishment
• Rules for data transfer
• Error control
• Fast sender swamping a slow receiver
• Inability of processes to accept long messages
• Routing in the case of multiple paths
48
7 Application
6
Presentation
5 Session
4 Transport
1 Physical
2 Data Link
3 Network
OSI REFERENCE MODEL
The Open Systems Interconnection is the model
developed by the International Standards Organization.
Benefits
• Interconnection of different systems (open)
• Not limited to a single vendor solution
Negative Aspect
• Systems might be less secure
• Systems might be less stable
49
7 Application
6
Presentation
5 Session
4 Transport
1 Physical
2 Data Link
3 Network
OSI REFERENCE MODEL
1. Physical Layer
a) Convert the logical 1’s and 0’s coming from
layer 2 into electrical signals.
b) Transmission of the electrical signals over a
communication channel.
Main topics:
• Transmission mediums
• Encoding
• Modulation
• RS232 and RS422 standards
• Repeaters
• Hubs (multi-port repeater)
50
7 Application
6
Presentation
5 Session
4 Transport
1 Physical
2 Data Link
3 Network
OSI REFERENCE MODEL
2. Data Link Layer
a) Error control to compensate for the
imperfections of the physical layer.
b) Flow control to keep a fast sender from
swamping a slow receiver.
Main topics:
• Framing methods
• Error detection and correction methods
• Flow control
• Frame format
• IEEE LAN standards
• Bridges
• Switches (multi-port bridges)
51
7 Application
6
Presentation
5 Session
4 Transport
1 Physical
2 Data Link
3 Network
OSI REFERENCE MODEL
3. Network Layer
a) Controls the operation of the subnet.
b) Routing packets from source to destination.
c) Logical addressing.
Main topics:
• Internetworking
• Routing algorithms
• Internet Protocol (IP) addressing
• Routers
52
7 Application
6
Presentation
5 Session
4 Transport
1 Physical
2 Data Link
3 Network
OSI REFERENCE MODEL
4. Transport Layer
a) Provides additional Quality of Service.
b) Heart of the OSI model.
Main topics:
• Connection-oriented and connectionless services
• Transmission Control Protocol (TCP)
• User Datagram Protocol (UDP)
53
7 Application
6
Presentation
5 Session
4 Transport
1 Physical
2 Data Link
3 Network
OSI REFERENCE MODEL
5. Session Layer
a) Allows users on different machines to establish
sessions between them.
b) One of the services is managing dialogue
control.
c) Token management.
d) Synchronization.
54
7 Application
6
Presentation
5 Session
4 Transport
1 Physical
2 Data Link
3 Network
OSI REFERENCE MODEL
6. Presentation Layer
a) Concerned with the syntax and semantics of the
information.
b) Preserves the meaning of the information.
c) Data compression.
d) Data encryption.
55
7
Application
6
Presentation
5 Session
4 Transport
1 Physical
2 Data Link
3 Network
OSI REFERENCE MODEL
7. Application Layer
a) Provides protocols that are commonly needed.
Main topics:
• File Transfer Protocol (FTP)
• HyperText Transfer Protocol (HTTP)
• Simple Mail Transfer Protocol (SMTP)
• Simple Network Management Protocol (SNMP)
• Network File System (NFS)
• Telnet
56
7 Application
6
Presentation
5 Session
4 Transport
1 Physical
2 Data Link
3 Network
SERVICES
Each layer provides services to the layer above it.
1. Terminologies
Entities – active elements in each layer (e.g.
process, intelligent I/O chip).
Peer Entities – entities in the same layer on
different machines.
Service Provider – Layer N.
Service User – Layer N + 1.
Service Access Points – places where layer N + 1
can access services offered by layer N.
57
7 Application
6
Presentation
5 Session
4 Transport
1 Physical
2 Data Link
3 Network
SERVICES
2. Connection-Oriented and Connectionless
Connection-Oriented – before data is sent, the
service from the sending computer must establish
a connection with the receiving computer.
Connectionless – data can be sent at any time by
the service from the sending computer.
Q: Is downloading a music file from the Internet
connection-oriented or connectionless?
Q: Is email connection-oriented or connectionless?
58
7 Application
6
Presentation
5 Session
4 Transport
1 Physical
2 Data Link
3 Network
SERVICES
3. Service Primitives
Request – entity wants the service to do some
work
Indicate – entity is to be informed about an event
Response – entity responds to an event
Confirm – entity is to be informed about its request
Sending Computer Receiving Computer
3 Network
1. request
3 Network
2. indicate 3. response
4. confirm
4 Transport 4 Transport
59
7 Application
6
Presentation
5 Session
4 Transport
1 Physical
2 Data Link
3 Network
BANDWIDTH
The capacity of the medium to transmit data.
Analog Bandwidth
• Measurement is in Hertz (Hz) or cycles/sec.
Digital Bandwidth
• Measurement is in bits per second (bps).
Q: Is 100MHz = 100Mbps?
Q: Is 100Mbps = 100MBps?
60
7 Application
6
Presentation
5 Session
4 Transport
1 Physical
2 Data Link
3 Network
TRANSMISSION MEDIA
1. Guided
Data is sent via a wire or optical cable.
Twisted Pair
Two copper wires are twisted together to reduce
the effect of crosstalk noise. (e.g. Cat5, UTP, STP)
Baseband Coaxial Cable
A 50-ohm cable used for digital transmission. Used
in 10Base2 and 10Base5.
Broadband Coaxial Cable
A 75-ohm cable used for analog transmission such
as Cable TV.
61
7 Application
6
Presentation
5 Session
4 Transport
1 Physical
2 Data Link
3 Network
TRANSMISSION MEDIA
Fiber Optic Cables
Two general types are multimode and single mode.
In multimode, light is reflected internally. Light
source is an LED.
In single mode, the light propagates in a straight
line. Light source come from expensive laser
diodes. Faster and longer distances as compared
to multimode.
* Fiber optic cables are difficult to tap (higher security)
and are normally used for backbone cabling. 62
7 Application
6
Presentation
5 Session
4 Transport
1 Physical
2 Data Link
3 Network
TRANSMISSION MEDIA
2. Unguided
Data is sent through the air.
Line-of-sight
Transmitter and receiver must “see” each other,
such as a terrestrial microwave system.
Communication Satellites
A big microwave repeater in the sky. Data is
broadcasted, and can be “pirated.”
Radio
Term used to include all frequency bands, such as
FM, UHF, and VHF television.
63
7 Application
6
Presentation
5 Session
4 Transport
1 Physical
2 Data Link
3 Network
ANALOG TRANSMISSION
1. Modulation
Modulating a sine wave carrier to convey data.
Amplitude Modulation (AM)
Amplitude is increased/decreased while frequency
remains constant.
Frequency Modulation (FM)
Frequency is increased/decreased while amplitude
remains constant.
Phase Modulation
Wave is shifted, while amplitude and frequency
remains constant.
64
7 Application
6
Presentation
5 Session
4 Transport
1 Physical
2 Data Link
3 Network
ANALOG TRANSMISSION
2. Modems
A device that accepts digital signals and outputs a
modulated carrier wave, and vice versa.
It is used to interconnect the digital computer to the
analog telephone network.
* Modems for PC’s can be external or internal.
* Nokia makes modems for leased line connections.
65
7 Application
6
Presentation
5 Session
4 Transport
1 Physical
2 Data Link
3 Network
ANALOG TRANSMISSION
3. RS-232 and RS-449
Two well known physical layer standards.
RS-232
• 20 kbps
• Cables up to 15 meters
• Unbalanced transmission (common ground)
RS-422
• 2 Mbps at 60 meters
• 1 Mbps at 100 meters
• Balanced transmission (a pair of wires for Tx, Rx)
66
7 Application
6
Presentation
5 Session
4 Transport
1 Physical
2 Data Link
3 Network
DIGITAL TRANSMISSION
1. Encoding Schemes
Converting logical data into electrical signals
suitable for transmission.
Manchester
• Mid bit transition for clock synchronization and
data
• Logic 0 = high to low transition
• Logic 1 = low to high transition
Differential Manchester
• Mid bit transition for clock synchronization only
• Logic 0 = transition at the beginning of each bit
period
• Logic 1 = no transition at the beginning of each
bit period
67
7 Application
6
Presentation
5 Session
4 Transport
1 Physical
2 Data Link
3 Network
DIGITAL TRANSMISSION
2. Repeaters and Hubs
These are physical layer devices.
Repeaters
• Restores the strength of an attenuated signal.
• Used to increase the transmission distance.
• Does not filter data traffic.
Hubs
• Multi-port repeater.
• Interconnects several computers.
• Does not filter data traffic.
* Picture from 3com.com
68
7 Application
6
Presentation
5 Session
4 Transport
1 Physical
2 Data Link
3 Network
NETWORK LAYER
69
7 Application
6
Presentation
5 Session
4 Transport
1 Physical
2 Data Link
3 Network
OVERVIEW
1. Routing Algorithms
• Shortest Path
• Flooding
• Flow-based
• Distance Vector
• Link State
• Hierarchical
• Broadcast
• Multicast
• Routing for Mobile Hosts
2. Congestion control
3. IP Addressing
4. Routers
70
7 Application
6
Presentation
5 Session
4 Transport
1 Physical
2 Data Link
3 Network
ROUTING ALGORITHMS
1. Shortest Path
A
C
D
B
E
F
2
2
2
1
2
1
1
3
3 2
B(A,2)
A(-,-)
E(A,2)
C(B,3)
D(E,3)
F(E,4)
A – E – D – F
A – E – F is the answer.
71
7 Application
6
Presentation
5 Session
4 Transport
1 Physical
2 Data Link
3 Network
ROUTING ALGORITHMS
2. Flooding
IMP
B
Packet
Packet to IMP C
Packet to IMP D
Packet to IMP E
To prevent packets from circulating indefinitely, a
packet has a hop counter. Every time a packet arrives
at an IMP, the hop counter is decrease by 1. Once the
hop counter of a packet reaches 0, the packet is
discarded.
72
7 Application
6
Presentation
5 Session
4 Transport
1 Physical
2 Data Link
3 Network
IP ADDRESSING
Format
x x x x x x x x . x x x x x x x x . x x x x x x x x . x x x x x x x x
where x is either 0 or 1
Example 1:
1 1 1 1 1 1 1 1 . 1 1 1 1 1 1 1 1 . 0 0 0 0 0 0 0 0 . 0 0 0 0 0 0 0 0
255.255.0.0
Example 2:
1 1 1 1 1 1 1 1 . 1 1 1 1 1 1 1 1 . 1 0 0 0 0 0 0 0 . 0 0 0 0 0 0 0 0
255.255.192.0
73
7 Application
6
Presentation
5 Session
4 Transport
1 Physical
2 Data Link
3 Network
IP ADDRESSING
Network Address
Example 1:
IP address of computer 180.100.7.1
Mask 255.255.0.0
Network address 180.100.0.0
Example 2:
IP address of computer 180.100.7.1
Mask 255.255.255.0
Network address 180.100.7.0
Example 3:
IP address of computer 180.100.7.2
Mask 255.255.192.0
Network address 180.100.0.0
74
7 Application
6
Presentation
5 Session
4 Transport
1 Physical
2 Data Link
3 Network
IP ADDRESSING
Mask
Valid mask are contiguous 1’s from left to right.
Examples:
Valid
255.0.0.0
255.255.0.0
255.255.255.0
Invalid
255.1.0.0
255.0.255.0
255.255.64.0
200.255.0.0
75
7 Application
6
Presentation
5 Session
4 Transport
1 Physical
2 Data Link
3 Network
IP ADDRESSING
Subnets
The Internet is running out of IP address. One solution
is to subnet a network address.
This is done by borrowing host bits to be used as
network bits.
Example:
Class B mask 255.255.0.0
Borrowing 1 bit gives a subnet mask of 255.255.128.0
Borrowing 2 bits gives a subnet mask of 255.255.192.0
Borrowing 3 bits gives a subnet mask of 255.255.224.0
Borrowing 4 bits gives a subnet mask of 255.255.240.0
76
7 Application
6
Presentation
5 Session
4 Transport
1 Physical
2 Data Link
3 Network
IP ADDRESSING
Example:
Given an IP address of 180.200.0.0, subnet by
borrowing 4 bits.
Subnet mask = 255.255.240.0
The 4 bits borrowed are value 128, 64, 32, 16. This will
create 16 sub networks, where the first and last will be
unusable.
Sub network address:
180.200.0.0
180.200.16.0
180.200.32.0
180.200.48.0
180.200.64.0
etc…
5/8/2024
kksgautam@Shivaji.du.ac.in 77
7 Application
6
Presentation
5 Session
4 Transport
1 Physical
2 Data Link
3 Network
IP ADDRESSING
The first 3 usable sub networks are:
180.200.16.0
180.200.32.0
180.200.48.0
For sub network 180.200.16.0, the valid IP address
are:
180.200.16.1 to 180.200.31.254
Directed broadcast address is:
180.200.31.255
78
7 Application
6
Presentation
5 Session
4 Transport
1 Physical
2 Data Link
3 Network
ROUTERS
A layer 3 device that is used to interconnect 2 or more
logical networks.
Can filter broadcast traffic, preventing broadcast traffic
from one network from reaching another network.
180.200.0.0 202.5.3.0
79
Reference
 Forouzan, B.A. Data Communicaiton and Networking, McGraw- Hill Education.
Global edition 5e(© 2013).
80

More Related Content

Similar to OSI model ,Layers in OSI model, Detail .pptx

Lecture 1.ppt
Lecture 1.pptLecture 1.ppt
Lecture 1.ppt
AmirKhan877722
 
ch02.ppt
ch02.pptch02.ppt
ch02.ppt
PreeT362092
 
Ch02
Ch02Ch02
02 Network Models
02 Network Models02 Network Models
02 Network Models
Ahmar Hashmi
 
Network Models in Networking.
Network Models in Networking.Network Models in Networking.
Network Models in Networking.
Mohammad Uzair Akram 
 
Lecture 1 osi model
Lecture 1 osi modelLecture 1 osi model
Lecture 1 osi model
HossenMehedee
 
Ch2 v1
Ch2 v1Ch2 v1
Data Communication And Networking - Network Models
Data Communication And Networking - Network ModelsData Communication And Networking - Network Models
Data Communication And Networking - Network Models
Avijeet Negel
 
ch2_v1.ppt
ch2_v1.pptch2_v1.ppt
ch2_v1.ppt
AlphaKoiSylvester
 
dcn 2.ppt
dcn 2.pptdcn 2.ppt
dcn 2.ppt
Gayathiri42
 
ANAND1.ppt
ANAND1.pptANAND1.ppt
ANAND1.ppt
ssuser5044d8
 
ch2_v1.ppt
ch2_v1.pptch2_v1.ppt
ch2_v1.ppt
Mohd Saifudeen
 
ch2_v1.ppt
ch2_v1.pptch2_v1.ppt
ch2_v1.ppt
YCreation
 
ch2_v1.pptx
ch2_v1.pptxch2_v1.pptx
ch2_v1.pptx
mail2murutech1
 
All about Network Models under Data Communications
All about Network Models under Data CommunicationsAll about Network Models under Data Communications
All about Network Models under Data Communications
Johnny Jean Tigas
 
ch2_v1.ppt
ch2_v1.pptch2_v1.ppt
ch2_v1.ppt
SanaMateen7
 
Model Jaringan network jaringan komputer.pdf
Model Jaringan network jaringan komputer.pdfModel Jaringan network jaringan komputer.pdf
Model Jaringan network jaringan komputer.pdf
galfinprihardiputra0
 

Similar to OSI model ,Layers in OSI model, Detail .pptx (20)

Lecture 1.ppt
Lecture 1.pptLecture 1.ppt
Lecture 1.ppt
 
ch02.ppt
ch02.pptch02.ppt
ch02.ppt
 
1
11
1
 
Ch02
Ch02Ch02
Ch02
 
02 Network Models
02 Network Models02 Network Models
02 Network Models
 
Network Models in Networking.
Network Models in Networking.Network Models in Networking.
Network Models in Networking.
 
1
11
1
 
Lecture 1 osi model
Lecture 1 osi modelLecture 1 osi model
Lecture 1 osi model
 
Ch2 v1
Ch2 v1Ch2 v1
Ch2 v1
 
Data Communication And Networking - Network Models
Data Communication And Networking - Network ModelsData Communication And Networking - Network Models
Data Communication And Networking - Network Models
 
ch2_v1.ppt
ch2_v1.pptch2_v1.ppt
ch2_v1.ppt
 
dcn 2.ppt
dcn 2.pptdcn 2.ppt
dcn 2.ppt
 
ANAND1.ppt
ANAND1.pptANAND1.ppt
ANAND1.ppt
 
ch2_v1.ppt
ch2_v1.pptch2_v1.ppt
ch2_v1.ppt
 
Ch2 v1
Ch2 v1Ch2 v1
Ch2 v1
 
ch2_v1.ppt
ch2_v1.pptch2_v1.ppt
ch2_v1.ppt
 
ch2_v1.pptx
ch2_v1.pptxch2_v1.pptx
ch2_v1.pptx
 
All about Network Models under Data Communications
All about Network Models under Data CommunicationsAll about Network Models under Data Communications
All about Network Models under Data Communications
 
ch2_v1.ppt
ch2_v1.pptch2_v1.ppt
ch2_v1.ppt
 
Model Jaringan network jaringan komputer.pdf
Model Jaringan network jaringan komputer.pdfModel Jaringan network jaringan komputer.pdf
Model Jaringan network jaringan komputer.pdf
 

Recently uploaded

Solid waste management & Types of Basic civil Engineering notes by DJ Sir.pptx
Solid waste management & Types of Basic civil Engineering notes by DJ Sir.pptxSolid waste management & Types of Basic civil Engineering notes by DJ Sir.pptx
Solid waste management & Types of Basic civil Engineering notes by DJ Sir.pptx
Denish Jangid
 
Cambridge International AS A Level Biology Coursebook - EBook (MaryFosbery J...
Cambridge International AS  A Level Biology Coursebook - EBook (MaryFosbery J...Cambridge International AS  A Level Biology Coursebook - EBook (MaryFosbery J...
Cambridge International AS A Level Biology Coursebook - EBook (MaryFosbery J...
AzmatAli747758
 
How to Create Map Views in the Odoo 17 ERP
How to Create Map Views in the Odoo 17 ERPHow to Create Map Views in the Odoo 17 ERP
How to Create Map Views in the Odoo 17 ERP
Celine George
 
Additional Benefits for Employee Website.pdf
Additional Benefits for Employee Website.pdfAdditional Benefits for Employee Website.pdf
Additional Benefits for Employee Website.pdf
joachimlavalley1
 
Palestine last event orientationfvgnh .pptx
Palestine last event orientationfvgnh .pptxPalestine last event orientationfvgnh .pptx
Palestine last event orientationfvgnh .pptx
RaedMohamed3
 
How to Split Bills in the Odoo 17 POS Module
How to Split Bills in the Odoo 17 POS ModuleHow to Split Bills in the Odoo 17 POS Module
How to Split Bills in the Odoo 17 POS Module
Celine George
 
PART A. Introduction to Costumer Service
PART A. Introduction to Costumer ServicePART A. Introduction to Costumer Service
PART A. Introduction to Costumer Service
PedroFerreira53928
 
Extraction Of Natural Dye From Beetroot (Beta Vulgaris) And Preparation Of He...
Extraction Of Natural Dye From Beetroot (Beta Vulgaris) And Preparation Of He...Extraction Of Natural Dye From Beetroot (Beta Vulgaris) And Preparation Of He...
Extraction Of Natural Dye From Beetroot (Beta Vulgaris) And Preparation Of He...
SachinKumar945617
 
Embracing GenAI - A Strategic Imperative
Embracing GenAI - A Strategic ImperativeEmbracing GenAI - A Strategic Imperative
Embracing GenAI - A Strategic Imperative
Peter Windle
 
Students, digital devices and success - Andreas Schleicher - 27 May 2024..pptx
Students, digital devices and success - Andreas Schleicher - 27 May 2024..pptxStudents, digital devices and success - Andreas Schleicher - 27 May 2024..pptx
Students, digital devices and success - Andreas Schleicher - 27 May 2024..pptx
EduSkills OECD
 
1.4 modern child centered education - mahatma gandhi-2.pptx
1.4 modern child centered education - mahatma gandhi-2.pptx1.4 modern child centered education - mahatma gandhi-2.pptx
1.4 modern child centered education - mahatma gandhi-2.pptx
JosvitaDsouza2
 
How to Break the cycle of negative Thoughts
How to Break the cycle of negative ThoughtsHow to Break the cycle of negative Thoughts
How to Break the cycle of negative Thoughts
Col Mukteshwar Prasad
 
NLC-2024-Orientation-for-RO-SDO (1).pptx
NLC-2024-Orientation-for-RO-SDO (1).pptxNLC-2024-Orientation-for-RO-SDO (1).pptx
NLC-2024-Orientation-for-RO-SDO (1).pptx
ssuserbdd3e8
 
2024.06.01 Introducing a competency framework for languag learning materials ...
2024.06.01 Introducing a competency framework for languag learning materials ...2024.06.01 Introducing a competency framework for languag learning materials ...
2024.06.01 Introducing a competency framework for languag learning materials ...
Sandy Millin
 
special B.ed 2nd year old paper_20240531.pdf
special B.ed 2nd year old paper_20240531.pdfspecial B.ed 2nd year old paper_20240531.pdf
special B.ed 2nd year old paper_20240531.pdf
Special education needs
 
Supporting (UKRI) OA monographs at Salford.pptx
Supporting (UKRI) OA monographs at Salford.pptxSupporting (UKRI) OA monographs at Salford.pptx
Supporting (UKRI) OA monographs at Salford.pptx
Jisc
 
MARUTI SUZUKI- A Successful Joint Venture in India.pptx
MARUTI SUZUKI- A Successful Joint Venture in India.pptxMARUTI SUZUKI- A Successful Joint Venture in India.pptx
MARUTI SUZUKI- A Successful Joint Venture in India.pptx
bennyroshan06
 
Unit 2- Research Aptitude (UGC NET Paper I).pdf
Unit 2- Research Aptitude (UGC NET Paper I).pdfUnit 2- Research Aptitude (UGC NET Paper I).pdf
Unit 2- Research Aptitude (UGC NET Paper I).pdf
Thiyagu K
 
aaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaa
aaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaa
aaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaa
siemaillard
 
How libraries can support authors with open access requirements for UKRI fund...
How libraries can support authors with open access requirements for UKRI fund...How libraries can support authors with open access requirements for UKRI fund...
How libraries can support authors with open access requirements for UKRI fund...
Jisc
 

Recently uploaded (20)

Solid waste management & Types of Basic civil Engineering notes by DJ Sir.pptx
Solid waste management & Types of Basic civil Engineering notes by DJ Sir.pptxSolid waste management & Types of Basic civil Engineering notes by DJ Sir.pptx
Solid waste management & Types of Basic civil Engineering notes by DJ Sir.pptx
 
Cambridge International AS A Level Biology Coursebook - EBook (MaryFosbery J...
Cambridge International AS  A Level Biology Coursebook - EBook (MaryFosbery J...Cambridge International AS  A Level Biology Coursebook - EBook (MaryFosbery J...
Cambridge International AS A Level Biology Coursebook - EBook (MaryFosbery J...
 
How to Create Map Views in the Odoo 17 ERP
How to Create Map Views in the Odoo 17 ERPHow to Create Map Views in the Odoo 17 ERP
How to Create Map Views in the Odoo 17 ERP
 
Additional Benefits for Employee Website.pdf
Additional Benefits for Employee Website.pdfAdditional Benefits for Employee Website.pdf
Additional Benefits for Employee Website.pdf
 
Palestine last event orientationfvgnh .pptx
Palestine last event orientationfvgnh .pptxPalestine last event orientationfvgnh .pptx
Palestine last event orientationfvgnh .pptx
 
How to Split Bills in the Odoo 17 POS Module
How to Split Bills in the Odoo 17 POS ModuleHow to Split Bills in the Odoo 17 POS Module
How to Split Bills in the Odoo 17 POS Module
 
PART A. Introduction to Costumer Service
PART A. Introduction to Costumer ServicePART A. Introduction to Costumer Service
PART A. Introduction to Costumer Service
 
Extraction Of Natural Dye From Beetroot (Beta Vulgaris) And Preparation Of He...
Extraction Of Natural Dye From Beetroot (Beta Vulgaris) And Preparation Of He...Extraction Of Natural Dye From Beetroot (Beta Vulgaris) And Preparation Of He...
Extraction Of Natural Dye From Beetroot (Beta Vulgaris) And Preparation Of He...
 
Embracing GenAI - A Strategic Imperative
Embracing GenAI - A Strategic ImperativeEmbracing GenAI - A Strategic Imperative
Embracing GenAI - A Strategic Imperative
 
Students, digital devices and success - Andreas Schleicher - 27 May 2024..pptx
Students, digital devices and success - Andreas Schleicher - 27 May 2024..pptxStudents, digital devices and success - Andreas Schleicher - 27 May 2024..pptx
Students, digital devices and success - Andreas Schleicher - 27 May 2024..pptx
 
1.4 modern child centered education - mahatma gandhi-2.pptx
1.4 modern child centered education - mahatma gandhi-2.pptx1.4 modern child centered education - mahatma gandhi-2.pptx
1.4 modern child centered education - mahatma gandhi-2.pptx
 
How to Break the cycle of negative Thoughts
How to Break the cycle of negative ThoughtsHow to Break the cycle of negative Thoughts
How to Break the cycle of negative Thoughts
 
NLC-2024-Orientation-for-RO-SDO (1).pptx
NLC-2024-Orientation-for-RO-SDO (1).pptxNLC-2024-Orientation-for-RO-SDO (1).pptx
NLC-2024-Orientation-for-RO-SDO (1).pptx
 
2024.06.01 Introducing a competency framework for languag learning materials ...
2024.06.01 Introducing a competency framework for languag learning materials ...2024.06.01 Introducing a competency framework for languag learning materials ...
2024.06.01 Introducing a competency framework for languag learning materials ...
 
special B.ed 2nd year old paper_20240531.pdf
special B.ed 2nd year old paper_20240531.pdfspecial B.ed 2nd year old paper_20240531.pdf
special B.ed 2nd year old paper_20240531.pdf
 
Supporting (UKRI) OA monographs at Salford.pptx
Supporting (UKRI) OA monographs at Salford.pptxSupporting (UKRI) OA monographs at Salford.pptx
Supporting (UKRI) OA monographs at Salford.pptx
 
MARUTI SUZUKI- A Successful Joint Venture in India.pptx
MARUTI SUZUKI- A Successful Joint Venture in India.pptxMARUTI SUZUKI- A Successful Joint Venture in India.pptx
MARUTI SUZUKI- A Successful Joint Venture in India.pptx
 
Unit 2- Research Aptitude (UGC NET Paper I).pdf
Unit 2- Research Aptitude (UGC NET Paper I).pdfUnit 2- Research Aptitude (UGC NET Paper I).pdf
Unit 2- Research Aptitude (UGC NET Paper I).pdf
 
aaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaa
aaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaa
aaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaa
 
How libraries can support authors with open access requirements for UKRI fund...
How libraries can support authors with open access requirements for UKRI fund...How libraries can support authors with open access requirements for UKRI fund...
How libraries can support authors with open access requirements for UKRI fund...
 

OSI model ,Layers in OSI model, Detail .pptx

  • 2. 2.2 LAYERED TASKS We use the concept of layers in our daily life. As an example, let us consider two friends who communicate through postal mail. The process of sending a letter to a friend would be complex if there were no services available from the post office. Sender, Receiver, and Carrier Hierarchy Topics discussed in this section:
  • 3. Tasks involved in sending a letter
  • 4. 2.4 2-2 THE OSI MODEL Established in 1947, the International Standards Organization (ISO) is a multinational body dedicated to worldwide agreement on international standards. An ISO standard that covers all aspects of network communications is the Open Systems Interconnection (OSI) model. It was first introduced in the late 1970s. Layered Architecture Peer-to-Peer Processes Encapsulation Topics discussed in this section:
  • 5. 2.5 ISO is the organization. OSI is the model. Note
  • 6. 2.6 Figure 2.2 Seven layers of the OSI model
  • 7. 2.7 Figure 2.3 The interaction between layers in the OSI model
  • 8. 2.8 Figure 2.4 An exchange using the OSI model
  • 9. 2.9 2-3 LAYERS IN THE OSI MODEL In this section we briefly describe the functions of each layer in the OSI model. Physical Layer Data Link Layer Network Layer Transport Layer Session Layer Presentation Layer Application Layer Topics discussed in this section:
  • 11. 2.11 The physical layer is responsible for movements of individual bits from one hop (node) to the next. Note
  • 12. 2.12 Figure 2.6 Data link layer
  • 13. 2.13 The data link layer is responsible for moving frames from one hop (node) to the next. Note
  • 14. 5/8/2024 2.14 Figure 2.7 Hop-to-hop delivery
  • 16. 2.16 The network layer is responsible for the delivery of individual packets from the source host to the destination host. Note
  • 19. 2.19 The transport layer is responsible for the delivery of a message from one process to another. Note
  • 20. 2.20 Figure 2.11 Reliable process-to-process delivery of a message
  • 22. 2.22 The session layer is responsible for dialog control and synchronization. Note
  • 24. 2.24 The presentation layer is responsible for translation, compression, and encryption. Note
  • 26. 2.26 The application layer is responsible for providing services to the user. Note
  • 28. 2.28 2-4 TCP/IP PROTOCOL SUITE The layers in the TCP/IP protocol suite do not exactly match those in the OSI model. The original TCP/IP protocol suite was defined as having four layers: host-to-network, internet, transport, and application. However, when TCP/IP is compared to OSI, we can say that the TCP/IP protocol suite is made of five layers: physical, data link, network, transport, and application. Physical and Data Link Layers Network Layer Transport Layer Application Layer Topics discussed in this section:
  • 29. 2.29 Figure 2.16 TCP/IP and OSI model
  • 30. 2.30 2-5 ADDRESSING Four levels of addresses are used in an internet employing the TCP/IP protocols: physical, logical, port, and specific. Physical Addresses Logical Addresses Port Addresses Specific Addresses Topics discussed in this section:
  • 32. 2.32 Figure 2.18 Relationship of layers and addresses in TCP/IP
  • 33. 2.33 In Figure 2.19 a node with physical address 10 sends a frame to a node with physical address 87. The two nodes are connected by a link (bus topology LAN). As the figure shows, the computer with physical address 10 is the sender, and the computer with physical address 87 is the receiver. Example 2.1
  • 35. 2.35 Most local-area networks use a 48-bit (6-byte) physical address written as 12 hexadecimal digits; every byte (2 hexadecimal digits) is separated by a colon, as shown below: Example 2.2 07:01:02:01:2C:4B A 6-byte (12 hexadecimal digits) physical address.
  • 36. 2.36 Figure 2.20 shows a part of an internet with two routers connecting three LANs. Each device (computer or router) has a pair of addresses (logical and physical) for each connection. In this case, each computer is connected to only one link and therefore has only one pair of addresses. Each router, however, is connected to three networks (only two are shown in the figure). So each router has three pairs of addresses, one for each connection. Example 2.3
  • 37. 2.37 Figure 2.20 IP addresses
  • 38. 2.38 Figure 2.21 shows two computers communicating via the Internet. The sending computer is running three processes at this time with port addresses a, b, and c. The receiving computer is running two processes at this time with port addresses j and k. Process a in the sending computer needs to communicate with process j in the receiving computer. Note that although physical addresses change from hop to hop, logical and port addresses remain the same from the source to destination. Example 2.4
  • 39. 5/8/2024 2.39 Figure 2.21 Port addresses
  • 40. 2.40 The physical addresses will change from hop to hop, but the logical addresses usually remain the same. Note
  • 41. 2.41 Example 2.5 A port address is a 16-bit address represented by one decimal number as shown. 753 A 16-bit port address represented as one single number.
  • 42. 2.42 2-2 THE OSI MODEL Established in 1947, the International Standards Organization (ISO) is a multinational body dedicated to worldwide agreement on international standards. An ISO standard that covers all aspects of network communications is the Open Systems Interconnection (OSI) model. It was first introduced in the late 1970s. Layered Architecture Peer-to-Peer Processes Encapsulation Topics discussed in this section:
  • 43. 7 Application 6 Presentation 5 Session 4 Transport 1 Physical 2 Data Link 3 Network INTRODUCTION 43
  • 44. 7 Application 6 Presentation 5 Session 4 Transport 1 Physical 2 Data Link 3 Network NETWORK GOALS The two main benefits of networking computers are… Communications Information can be distributed very quickly, such as email and video conferencing. Saving Money Resources such as information, software, and hardware can be shared. CPUs and hard disks can be pooled together to create a more powerful machine. 44
  • 45. 7 Application 6 Presentation 5 Session 4 Transport 1 Physical 2 Data Link 3 Network APPLICATIONS A lot of things we take for granted are the result of computer networks. • Email • Chat • Web sites • Sharing of documents and pictures • Accessing a centralized database of information • Mobile workers 45
  • 46. 7 Application 6 Presentation 5 Session 4 Transport 1 Physical 2 Data Link 3 Network NETWORK STRUCTURE The subnet interconnects hosts. Subnet Carries messages from host to host. It is made up of telecommunication lines (i.e. circuits, channels, trunks) and switching elements (i.e. IMPs, routers). Hosts End user machines or computers. Q: Is the host part of the subnet? 46
  • 47. 7 Application 6 Presentation 5 Session 4 Transport 1 Physical 2 Data Link 3 Network NETWORK ARCHITECTURES A set of layers and protocols is called the network architecture. 1. Protocol Hierarchies Networks are organized as layers to reduce design complexity. Each layer offers services to the higher layers. Between adjacent layers is an interface. Services – connection oriented and connectionless. Interface – defines which primitives and services the lower layer will offer to the upper layer. Primitives – operations such as request, indicate, response, confirm. 47
  • 48. 7 Application 6 Presentation 5 Session 4 Transport 1 Physical 2 Data Link 3 Network NETWORK ARCHITECTURES 2. Design Issues for the Layers • Mechanism for connection establishment • Rules for data transfer • Error control • Fast sender swamping a slow receiver • Inability of processes to accept long messages • Routing in the case of multiple paths 48
  • 49. 7 Application 6 Presentation 5 Session 4 Transport 1 Physical 2 Data Link 3 Network OSI REFERENCE MODEL The Open Systems Interconnection is the model developed by the International Standards Organization. Benefits • Interconnection of different systems (open) • Not limited to a single vendor solution Negative Aspect • Systems might be less secure • Systems might be less stable 49
  • 50. 7 Application 6 Presentation 5 Session 4 Transport 1 Physical 2 Data Link 3 Network OSI REFERENCE MODEL 1. Physical Layer a) Convert the logical 1’s and 0’s coming from layer 2 into electrical signals. b) Transmission of the electrical signals over a communication channel. Main topics: • Transmission mediums • Encoding • Modulation • RS232 and RS422 standards • Repeaters • Hubs (multi-port repeater) 50
  • 51. 7 Application 6 Presentation 5 Session 4 Transport 1 Physical 2 Data Link 3 Network OSI REFERENCE MODEL 2. Data Link Layer a) Error control to compensate for the imperfections of the physical layer. b) Flow control to keep a fast sender from swamping a slow receiver. Main topics: • Framing methods • Error detection and correction methods • Flow control • Frame format • IEEE LAN standards • Bridges • Switches (multi-port bridges) 51
  • 52. 7 Application 6 Presentation 5 Session 4 Transport 1 Physical 2 Data Link 3 Network OSI REFERENCE MODEL 3. Network Layer a) Controls the operation of the subnet. b) Routing packets from source to destination. c) Logical addressing. Main topics: • Internetworking • Routing algorithms • Internet Protocol (IP) addressing • Routers 52
  • 53. 7 Application 6 Presentation 5 Session 4 Transport 1 Physical 2 Data Link 3 Network OSI REFERENCE MODEL 4. Transport Layer a) Provides additional Quality of Service. b) Heart of the OSI model. Main topics: • Connection-oriented and connectionless services • Transmission Control Protocol (TCP) • User Datagram Protocol (UDP) 53
  • 54. 7 Application 6 Presentation 5 Session 4 Transport 1 Physical 2 Data Link 3 Network OSI REFERENCE MODEL 5. Session Layer a) Allows users on different machines to establish sessions between them. b) One of the services is managing dialogue control. c) Token management. d) Synchronization. 54
  • 55. 7 Application 6 Presentation 5 Session 4 Transport 1 Physical 2 Data Link 3 Network OSI REFERENCE MODEL 6. Presentation Layer a) Concerned with the syntax and semantics of the information. b) Preserves the meaning of the information. c) Data compression. d) Data encryption. 55
  • 56. 7 Application 6 Presentation 5 Session 4 Transport 1 Physical 2 Data Link 3 Network OSI REFERENCE MODEL 7. Application Layer a) Provides protocols that are commonly needed. Main topics: • File Transfer Protocol (FTP) • HyperText Transfer Protocol (HTTP) • Simple Mail Transfer Protocol (SMTP) • Simple Network Management Protocol (SNMP) • Network File System (NFS) • Telnet 56
  • 57. 7 Application 6 Presentation 5 Session 4 Transport 1 Physical 2 Data Link 3 Network SERVICES Each layer provides services to the layer above it. 1. Terminologies Entities – active elements in each layer (e.g. process, intelligent I/O chip). Peer Entities – entities in the same layer on different machines. Service Provider – Layer N. Service User – Layer N + 1. Service Access Points – places where layer N + 1 can access services offered by layer N. 57
  • 58. 7 Application 6 Presentation 5 Session 4 Transport 1 Physical 2 Data Link 3 Network SERVICES 2. Connection-Oriented and Connectionless Connection-Oriented – before data is sent, the service from the sending computer must establish a connection with the receiving computer. Connectionless – data can be sent at any time by the service from the sending computer. Q: Is downloading a music file from the Internet connection-oriented or connectionless? Q: Is email connection-oriented or connectionless? 58
  • 59. 7 Application 6 Presentation 5 Session 4 Transport 1 Physical 2 Data Link 3 Network SERVICES 3. Service Primitives Request – entity wants the service to do some work Indicate – entity is to be informed about an event Response – entity responds to an event Confirm – entity is to be informed about its request Sending Computer Receiving Computer 3 Network 1. request 3 Network 2. indicate 3. response 4. confirm 4 Transport 4 Transport 59
  • 60. 7 Application 6 Presentation 5 Session 4 Transport 1 Physical 2 Data Link 3 Network BANDWIDTH The capacity of the medium to transmit data. Analog Bandwidth • Measurement is in Hertz (Hz) or cycles/sec. Digital Bandwidth • Measurement is in bits per second (bps). Q: Is 100MHz = 100Mbps? Q: Is 100Mbps = 100MBps? 60
  • 61. 7 Application 6 Presentation 5 Session 4 Transport 1 Physical 2 Data Link 3 Network TRANSMISSION MEDIA 1. Guided Data is sent via a wire or optical cable. Twisted Pair Two copper wires are twisted together to reduce the effect of crosstalk noise. (e.g. Cat5, UTP, STP) Baseband Coaxial Cable A 50-ohm cable used for digital transmission. Used in 10Base2 and 10Base5. Broadband Coaxial Cable A 75-ohm cable used for analog transmission such as Cable TV. 61
  • 62. 7 Application 6 Presentation 5 Session 4 Transport 1 Physical 2 Data Link 3 Network TRANSMISSION MEDIA Fiber Optic Cables Two general types are multimode and single mode. In multimode, light is reflected internally. Light source is an LED. In single mode, the light propagates in a straight line. Light source come from expensive laser diodes. Faster and longer distances as compared to multimode. * Fiber optic cables are difficult to tap (higher security) and are normally used for backbone cabling. 62
  • 63. 7 Application 6 Presentation 5 Session 4 Transport 1 Physical 2 Data Link 3 Network TRANSMISSION MEDIA 2. Unguided Data is sent through the air. Line-of-sight Transmitter and receiver must “see” each other, such as a terrestrial microwave system. Communication Satellites A big microwave repeater in the sky. Data is broadcasted, and can be “pirated.” Radio Term used to include all frequency bands, such as FM, UHF, and VHF television. 63
  • 64. 7 Application 6 Presentation 5 Session 4 Transport 1 Physical 2 Data Link 3 Network ANALOG TRANSMISSION 1. Modulation Modulating a sine wave carrier to convey data. Amplitude Modulation (AM) Amplitude is increased/decreased while frequency remains constant. Frequency Modulation (FM) Frequency is increased/decreased while amplitude remains constant. Phase Modulation Wave is shifted, while amplitude and frequency remains constant. 64
  • 65. 7 Application 6 Presentation 5 Session 4 Transport 1 Physical 2 Data Link 3 Network ANALOG TRANSMISSION 2. Modems A device that accepts digital signals and outputs a modulated carrier wave, and vice versa. It is used to interconnect the digital computer to the analog telephone network. * Modems for PC’s can be external or internal. * Nokia makes modems for leased line connections. 65
  • 66. 7 Application 6 Presentation 5 Session 4 Transport 1 Physical 2 Data Link 3 Network ANALOG TRANSMISSION 3. RS-232 and RS-449 Two well known physical layer standards. RS-232 • 20 kbps • Cables up to 15 meters • Unbalanced transmission (common ground) RS-422 • 2 Mbps at 60 meters • 1 Mbps at 100 meters • Balanced transmission (a pair of wires for Tx, Rx) 66
  • 67. 7 Application 6 Presentation 5 Session 4 Transport 1 Physical 2 Data Link 3 Network DIGITAL TRANSMISSION 1. Encoding Schemes Converting logical data into electrical signals suitable for transmission. Manchester • Mid bit transition for clock synchronization and data • Logic 0 = high to low transition • Logic 1 = low to high transition Differential Manchester • Mid bit transition for clock synchronization only • Logic 0 = transition at the beginning of each bit period • Logic 1 = no transition at the beginning of each bit period 67
  • 68. 7 Application 6 Presentation 5 Session 4 Transport 1 Physical 2 Data Link 3 Network DIGITAL TRANSMISSION 2. Repeaters and Hubs These are physical layer devices. Repeaters • Restores the strength of an attenuated signal. • Used to increase the transmission distance. • Does not filter data traffic. Hubs • Multi-port repeater. • Interconnects several computers. • Does not filter data traffic. * Picture from 3com.com 68
  • 69. 7 Application 6 Presentation 5 Session 4 Transport 1 Physical 2 Data Link 3 Network NETWORK LAYER 69
  • 70. 7 Application 6 Presentation 5 Session 4 Transport 1 Physical 2 Data Link 3 Network OVERVIEW 1. Routing Algorithms • Shortest Path • Flooding • Flow-based • Distance Vector • Link State • Hierarchical • Broadcast • Multicast • Routing for Mobile Hosts 2. Congestion control 3. IP Addressing 4. Routers 70
  • 71. 7 Application 6 Presentation 5 Session 4 Transport 1 Physical 2 Data Link 3 Network ROUTING ALGORITHMS 1. Shortest Path A C D B E F 2 2 2 1 2 1 1 3 3 2 B(A,2) A(-,-) E(A,2) C(B,3) D(E,3) F(E,4) A – E – D – F A – E – F is the answer. 71
  • 72. 7 Application 6 Presentation 5 Session 4 Transport 1 Physical 2 Data Link 3 Network ROUTING ALGORITHMS 2. Flooding IMP B Packet Packet to IMP C Packet to IMP D Packet to IMP E To prevent packets from circulating indefinitely, a packet has a hop counter. Every time a packet arrives at an IMP, the hop counter is decrease by 1. Once the hop counter of a packet reaches 0, the packet is discarded. 72
  • 73. 7 Application 6 Presentation 5 Session 4 Transport 1 Physical 2 Data Link 3 Network IP ADDRESSING Format x x x x x x x x . x x x x x x x x . x x x x x x x x . x x x x x x x x where x is either 0 or 1 Example 1: 1 1 1 1 1 1 1 1 . 1 1 1 1 1 1 1 1 . 0 0 0 0 0 0 0 0 . 0 0 0 0 0 0 0 0 255.255.0.0 Example 2: 1 1 1 1 1 1 1 1 . 1 1 1 1 1 1 1 1 . 1 0 0 0 0 0 0 0 . 0 0 0 0 0 0 0 0 255.255.192.0 73
  • 74. 7 Application 6 Presentation 5 Session 4 Transport 1 Physical 2 Data Link 3 Network IP ADDRESSING Network Address Example 1: IP address of computer 180.100.7.1 Mask 255.255.0.0 Network address 180.100.0.0 Example 2: IP address of computer 180.100.7.1 Mask 255.255.255.0 Network address 180.100.7.0 Example 3: IP address of computer 180.100.7.2 Mask 255.255.192.0 Network address 180.100.0.0 74
  • 75. 7 Application 6 Presentation 5 Session 4 Transport 1 Physical 2 Data Link 3 Network IP ADDRESSING Mask Valid mask are contiguous 1’s from left to right. Examples: Valid 255.0.0.0 255.255.0.0 255.255.255.0 Invalid 255.1.0.0 255.0.255.0 255.255.64.0 200.255.0.0 75
  • 76. 7 Application 6 Presentation 5 Session 4 Transport 1 Physical 2 Data Link 3 Network IP ADDRESSING Subnets The Internet is running out of IP address. One solution is to subnet a network address. This is done by borrowing host bits to be used as network bits. Example: Class B mask 255.255.0.0 Borrowing 1 bit gives a subnet mask of 255.255.128.0 Borrowing 2 bits gives a subnet mask of 255.255.192.0 Borrowing 3 bits gives a subnet mask of 255.255.224.0 Borrowing 4 bits gives a subnet mask of 255.255.240.0 76
  • 77. 7 Application 6 Presentation 5 Session 4 Transport 1 Physical 2 Data Link 3 Network IP ADDRESSING Example: Given an IP address of 180.200.0.0, subnet by borrowing 4 bits. Subnet mask = 255.255.240.0 The 4 bits borrowed are value 128, 64, 32, 16. This will create 16 sub networks, where the first and last will be unusable. Sub network address: 180.200.0.0 180.200.16.0 180.200.32.0 180.200.48.0 180.200.64.0 etc… 5/8/2024 kksgautam@Shivaji.du.ac.in 77
  • 78. 7 Application 6 Presentation 5 Session 4 Transport 1 Physical 2 Data Link 3 Network IP ADDRESSING The first 3 usable sub networks are: 180.200.16.0 180.200.32.0 180.200.48.0 For sub network 180.200.16.0, the valid IP address are: 180.200.16.1 to 180.200.31.254 Directed broadcast address is: 180.200.31.255 78
  • 79. 7 Application 6 Presentation 5 Session 4 Transport 1 Physical 2 Data Link 3 Network ROUTERS A layer 3 device that is used to interconnect 2 or more logical networks. Can filter broadcast traffic, preventing broadcast traffic from one network from reaching another network. 180.200.0.0 202.5.3.0 79
  • 80. Reference  Forouzan, B.A. Data Communicaiton and Networking, McGraw- Hill Education. Global edition 5e(© 2013). 80