why and how Protocol layering is done in TCP/IP protocol suite, how multiplexing and demultiplexing can be done in different protocol layers in TCP\IP.
Although the OSI reference model is universally recognized, the historical and technical open standard of the Internet is Transmission Control Protocol / Internet Protocol (TCP/IP).
The TCP/IP reference model and the TCP/IP protocol stack make data communication possible between any two computers, anywhere in the world, at nearly the speed of light.
INTRODUCTION
WHAT IS OSI?
OSI MODEL
TYPES OF LAYERS
PHYSICAL LAYER
DATA LINK LAYER
NETWORK LAYER
TRANSPORT LAYER
SESSION LAYER
PRESENTATION LAYER
APPLICATION LAYER
Although the OSI reference model is universally recognized, the historical and technical open standard of the Internet is Transmission Control Protocol / Internet Protocol (TCP/IP).
The TCP/IP reference model and the TCP/IP protocol stack make data communication possible between any two computers, anywhere in the world, at nearly the speed of light.
INTRODUCTION
WHAT IS OSI?
OSI MODEL
TYPES OF LAYERS
PHYSICAL LAYER
DATA LINK LAYER
NETWORK LAYER
TRANSPORT LAYER
SESSION LAYER
PRESENTATION LAYER
APPLICATION LAYER
TCP/IP model with their 4 layer
1. Network access layer.
2. Internet layer
3. Transport layer
4. Application layer
and each layer has its own protocols.
Here you will learn:
How to Connect two or more devices to share data and information.
What is OSI Model?
Introduction to OSI Model
What is Physical Layer?
Devices used Physical Layer
What is Signal?
Types of Signals?
Analog Signals
Digital SIgnals
What is Transmission Medium?
What Is Switch in Networking?
Networking 7 Layers.
.
Please like and comments your Question and suggestion?
Inter-Process Communication in distributed systemsAya Mahmoud
Inter-Process Communication is at the heart of all distributed systems, so we need to know the ways that processes can exchange information.
Communication in distributed systems is based on Low-level message passing as offered by the underlying network.
The network layer is responsible for routing packets from the source to destination. The routing algorithm is the piece of software that decides where a packet goes next (e.g., which output line, or which node on a broadcast channel).For connectionless networks, the routing decision is made for each datagram. For connection-oriented networks, the decision is made once, at circuit setup time.
Routing Issues
The routing algorithm must deal with the following issues:
Correctness and simplicity: networks are never taken down; individual parts (e.g., links, routers) may fail, but the whole network should not.
Stability: if a link or router fails, how much time elapses before the remaining routers recognize the topology change? (Some never do..)
Fairness and optimality: an inherently intractable problem. Definition of optimality usually doesn't consider fairness. Do we want to maximize channel usage? Minimize average delay?
When we look at routing in detail, we'll consider both adaptive--those that take current traffic and topology into consideration--and nonadaptive algorithms.
Difference between OSI Layer & TCP/IP LayerNetwax Lab
Difference between OSI Layer & TCP/IP Layer
TCP/IP OSI
It has 4 layers. It has 7 layers.
TCP/IP Protocols are considered to be standards
around which the internet has developed.
OSI Model however is a "generic, protocolindependent standard."
Follows Vertical Approach Follows Horizontal Approach
In TCP/IP Model, Transport Layer does not
Guarantees delivery of packets.
In OSI Model, Transport Layer Guarantees
delivery of packets.
TCP/IP model with their 4 layer
1. Network access layer.
2. Internet layer
3. Transport layer
4. Application layer
and each layer has its own protocols.
Here you will learn:
How to Connect two or more devices to share data and information.
What is OSI Model?
Introduction to OSI Model
What is Physical Layer?
Devices used Physical Layer
What is Signal?
Types of Signals?
Analog Signals
Digital SIgnals
What is Transmission Medium?
What Is Switch in Networking?
Networking 7 Layers.
.
Please like and comments your Question and suggestion?
Inter-Process Communication in distributed systemsAya Mahmoud
Inter-Process Communication is at the heart of all distributed systems, so we need to know the ways that processes can exchange information.
Communication in distributed systems is based on Low-level message passing as offered by the underlying network.
The network layer is responsible for routing packets from the source to destination. The routing algorithm is the piece of software that decides where a packet goes next (e.g., which output line, or which node on a broadcast channel).For connectionless networks, the routing decision is made for each datagram. For connection-oriented networks, the decision is made once, at circuit setup time.
Routing Issues
The routing algorithm must deal with the following issues:
Correctness and simplicity: networks are never taken down; individual parts (e.g., links, routers) may fail, but the whole network should not.
Stability: if a link or router fails, how much time elapses before the remaining routers recognize the topology change? (Some never do..)
Fairness and optimality: an inherently intractable problem. Definition of optimality usually doesn't consider fairness. Do we want to maximize channel usage? Minimize average delay?
When we look at routing in detail, we'll consider both adaptive--those that take current traffic and topology into consideration--and nonadaptive algorithms.
Difference between OSI Layer & TCP/IP LayerNetwax Lab
Difference between OSI Layer & TCP/IP Layer
TCP/IP OSI
It has 4 layers. It has 7 layers.
TCP/IP Protocols are considered to be standards
around which the internet has developed.
OSI Model however is a "generic, protocolindependent standard."
Follows Vertical Approach Follows Horizontal Approach
In TCP/IP Model, Transport Layer does not
Guarantees delivery of packets.
In OSI Model, Transport Layer Guarantees
delivery of packets.
Course material from my Object-Oriented Development course.This presentation covers the design phase and focuses on a variety of software design principles.
Social network analysis is the application of network theory to the modeling and analysis of social systems. Free MP3 Podcast reveals how to use social media to sell more stuff. Find out more at www.sociamigo.com/mp3
Definition
A decentralized type of wireless network, allowing people and devices to seamlessly internetwork in areas with no pre-existing communication infrastructure, It can turn the dream of networking at any place and at time into reality. We are almost there by the way .Ex- Bluetooth enabled mobile phones such as 3G, laptops, handheld digital devices, personal digital assistants, or wearable computers
Application and Network Orchestration using Heat & ToscaNati Shalom
The buzzwords Neutron, Heat, and TOSCA are spoken about quite often when it comes to the OpenStack - and many of us are still trying to make sense of the terminology and its place in the OpenStack world.
Where OpenStack Neutron provides APIs for creating network elements, OpenStack Heat provides an orchestration engine for automating the setup and configuration of OpenStack infrastructure, while TOSCA is a standard for templating and defining application topology and policies (that form the basis for Heat). In this context, it really makes sense to put these all together to achieve application and network automation for OpenStack on steroids.
In this session we will learn how we can use the robust combination of Heat and TOSCA to configure and control resources on Nova and Neutron in order to automate the network configuration as part of the application deployment.
The session will include a demo and code examples that show how you can configure virtual networks, attach public IPs, set up security groups, set up load balancing and automatically scale up/down and more. You will leave this session understanding where Neutron meets Heat and TOSCA.
This talk was delivered as part of OpenStack Paris summit - 2014 - http://openstacksummitnovember2014paris.sched.org/event/2b85b682ccaf3a5961e463b61e2403f8#.VFeuG_TF8mc
Chapter 10: Objectives
--------------------------------------------------
By the end of this chapter, you will be able to:
Explain how the functions of the application layer, session layer, and presentation layer work together to provide network services to end user applications.
Describe how common application layer protocols interact with end user applications.
Describe, at a high level, common application layer protocols that provide Internet services to end-users, including WWW services and email.
Describe application layer protocols that provide IP addressing services, including DNS and DHCP.
Describe the features and operation of well-known application layer protocols that allow for file sharing services, including: FTP, File Sharing Services, SMB protocol.
Explain how data is moved across the network, from opening an application to receiving data.
Yaser Rahmati | یاسر رحمتی
Rahmati Academy | آکادمی رحمتی
www.yaser-rahmati.ir
www.rahmati-academy.ir
This presentation is about:
Uses of Networking.
Various types of networking.
Applications used for networking.
Methods of network security.
Methods of communication -2G,3G,4G,Fiber Optics
Transmission Media.
Various types of protocols.
Cloud Computing
Protection against Viruses.
Comparison of DOD and OSI Model in the Internet Communicationijtsrd
The Internet protocol suite is the computer networking model and set of communications protocols used on the Internet and similar computer networks. It is commonly known as TCP IP, because it's most important protocols, the Transmission Control Protocol TCP and the Internet Protocol IP , were the first networking protocols defined in this standard. Often also called the Internet model, it was originally also known as the DoD model, because the development of the networking model was funded by DARPA, an agency of the United States Department of Defense. TCP IP provides end to end connectivity specifying how data should be packetized, addressed, transmitted, routed and received at the destination. This functionality is organized into four abstraction layers which are used to sort all related protocols according to the scope of networking involved. From lowest to highest, the layers are the link layer, containing communication technologies for a single network segment link the internet layer, connecting hosts across independent networks, thus establishing internetworking the transport layer handling host to host communication and the application layer, which provides process to process application data exchange. Our aim is describe operation and models of TCP IP suite in data communication networking. Ei Ei Khaing "Comparison of DOD and OSI Model in the Internet Communication" Published in International Journal of Trend in Scientific Research and Development (ijtsrd), ISSN: 2456-6470, Volume-3 | Issue-5 , August 2019, URL: https://www.ijtsrd.com/papers/ijtsrd27834.pdfPaper URL: https://www.ijtsrd.com/computer-science/computer-network/27834/comparison-of-dod-and-osi-model-in-the-internet-communication/ei-ei-khaing
A framework that helps to understand complex network interactions. It is the part of the Internet communications process where these connections occur, by sending packets of data back and forth between different networks. There are two models that are widely referenced today: OSI and TCP/IP. The concepts are similar, but the layers themselves differ between the two models.
Power point presentation on osi model.
A good presentation cover all topics.
For any other type of ppt's or pdf's to be created on demand contact -dhawalm8@gmail.com
mob. no-7023419969
Saudi Arabia stands as a titan in the global energy landscape, renowned for its abundant oil and gas resources. It's the largest exporter of petroleum and holds some of the world's most significant reserves. Let's delve into the top 10 oil and gas projects shaping Saudi Arabia's energy future in 2024.
Vaccine management system project report documentation..pdfKamal Acharya
The Division of Vaccine and Immunization is facing increasing difficulty monitoring vaccines and other commodities distribution once they have been distributed from the national stores. With the introduction of new vaccines, more challenges have been anticipated with this additions posing serious threat to the already over strained vaccine supply chain system in Kenya.
TECHNICAL TRAINING MANUAL GENERAL FAMILIARIZATION COURSEDuvanRamosGarzon1
AIRCRAFT GENERAL
The Single Aisle is the most advanced family aircraft in service today, with fly-by-wire flight controls.
The A318, A319, A320 and A321 are twin-engine subsonic medium range aircraft.
The family offers a choice of engines
Water scarcity is the lack of fresh water resources to meet the standard water demand. There are two type of water scarcity. One is physical. The other is economic water scarcity.
NO1 Uk best vashikaran specialist in delhi vashikaran baba near me online vas...Amil Baba Dawood bangali
Contact with Dawood Bhai Just call on +92322-6382012 and we'll help you. We'll solve all your problems within 12 to 24 hours and with 101% guarantee and with astrology systematic. If you want to take any personal or professional advice then also you can call us on +92322-6382012 , ONLINE LOVE PROBLEM & Other all types of Daily Life Problem's.Then CALL or WHATSAPP us on +92322-6382012 and Get all these problems solutions here by Amil Baba DAWOOD BANGALI
#vashikaranspecialist #astrologer #palmistry #amliyaat #taweez #manpasandshadi #horoscope #spiritual #lovelife #lovespell #marriagespell#aamilbabainpakistan #amilbabainkarachi #powerfullblackmagicspell #kalajadumantarspecialist #realamilbaba #AmilbabainPakistan #astrologerincanada #astrologerindubai #lovespellsmaster #kalajaduspecialist #lovespellsthatwork #aamilbabainlahore#blackmagicformarriage #aamilbaba #kalajadu #kalailam #taweez #wazifaexpert #jadumantar #vashikaranspecialist #astrologer #palmistry #amliyaat #taweez #manpasandshadi #horoscope #spiritual #lovelife #lovespell #marriagespell#aamilbabainpakistan #amilbabainkarachi #powerfullblackmagicspell #kalajadumantarspecialist #realamilbaba #AmilbabainPakistan #astrologerincanada #astrologerindubai #lovespellsmaster #kalajaduspecialist #lovespellsthatwork #aamilbabainlahore #blackmagicforlove #blackmagicformarriage #aamilbaba #kalajadu #kalailam #taweez #wazifaexpert #jadumantar #vashikaranspecialist #astrologer #palmistry #amliyaat #taweez #manpasandshadi #horoscope #spiritual #lovelife #lovespell #marriagespell#aamilbabainpakistan #amilbabainkarachi #powerfullblackmagicspell #kalajadumantarspecialist #realamilbaba #AmilbabainPakistan #astrologerincanada #astrologerindubai #lovespellsmaster #kalajaduspecialist #lovespellsthatwork #aamilbabainlahore #Amilbabainuk #amilbabainspain #amilbabaindubai #Amilbabainnorway #amilbabainkrachi #amilbabainlahore #amilbabaingujranwalan #amilbabainislamabad
Democratizing Fuzzing at Scale by Abhishek Aryaabh.arya
Presented at NUS: Fuzzing and Software Security Summer School 2024
This keynote talks about the democratization of fuzzing at scale, highlighting the collaboration between open source communities, academia, and industry to advance the field of fuzzing. It delves into the history of fuzzing, the development of scalable fuzzing platforms, and the empowerment of community-driven research. The talk will further discuss recent advancements leveraging AI/ML and offer insights into the future evolution of the fuzzing landscape.
Event Management System Vb Net Project Report.pdfKamal Acharya
In present era, the scopes of information technology growing with a very fast .We do not see any are untouched from this industry. The scope of information technology has become wider includes: Business and industry. Household Business, Communication, Education, Entertainment, Science, Medicine, Engineering, Distance Learning, Weather Forecasting. Carrier Searching and so on.
My project named “Event Management System” is software that store and maintained all events coordinated in college. It also helpful to print related reports. My project will help to record the events coordinated by faculties with their Name, Event subject, date & details in an efficient & effective ways.
In my system we have to make a system by which a user can record all events coordinated by a particular faculty. In our proposed system some more featured are added which differs it from the existing system such as security.
Hybrid optimization of pumped hydro system and solar- Engr. Abdul-Azeez.pdffxintegritypublishin
Advancements in technology unveil a myriad of electrical and electronic breakthroughs geared towards efficiently harnessing limited resources to meet human energy demands. The optimization of hybrid solar PV panels and pumped hydro energy supply systems plays a pivotal role in utilizing natural resources effectively. This initiative not only benefits humanity but also fosters environmental sustainability. The study investigated the design optimization of these hybrid systems, focusing on understanding solar radiation patterns, identifying geographical influences on solar radiation, formulating a mathematical model for system optimization, and determining the optimal configuration of PV panels and pumped hydro storage. Through a comparative analysis approach and eight weeks of data collection, the study addressed key research questions related to solar radiation patterns and optimal system design. The findings highlighted regions with heightened solar radiation levels, showcasing substantial potential for power generation and emphasizing the system's efficiency. Optimizing system design significantly boosted power generation, promoted renewable energy utilization, and enhanced energy storage capacity. The study underscored the benefits of optimizing hybrid solar PV panels and pumped hydro energy supply systems for sustainable energy usage. Optimizing the design of solar PV panels and pumped hydro energy supply systems as examined across diverse climatic conditions in a developing country, not only enhances power generation but also improves the integration of renewable energy sources and boosts energy storage capacities, particularly beneficial for less economically prosperous regions. Additionally, the study provides valuable insights for advancing energy research in economically viable areas. Recommendations included conducting site-specific assessments, utilizing advanced modeling tools, implementing regular maintenance protocols, and enhancing communication among system components.
About
Indigenized remote control interface card suitable for MAFI system CCR equipment. Compatible for IDM8000 CCR. Backplane mounted serial and TCP/Ethernet communication module for CCR remote access. IDM 8000 CCR remote control on serial and TCP protocol.
• Remote control: Parallel or serial interface.
• Compatible with MAFI CCR system.
• Compatible with IDM8000 CCR.
• Compatible with Backplane mount serial communication.
• Compatible with commercial and Defence aviation CCR system.
• Remote control system for accessing CCR and allied system over serial or TCP.
• Indigenized local Support/presence in India.
• Easy in configuration using DIP switches.
Technical Specifications
Indigenized remote control interface card suitable for MAFI system CCR equipment. Compatible for IDM8000 CCR. Backplane mounted serial and TCP/Ethernet communication module for CCR remote access. IDM 8000 CCR remote control on serial and TCP protocol.
Key Features
Indigenized remote control interface card suitable for MAFI system CCR equipment. Compatible for IDM8000 CCR. Backplane mounted serial and TCP/Ethernet communication module for CCR remote access. IDM 8000 CCR remote control on serial and TCP protocol.
• Remote control: Parallel or serial interface
• Compatible with MAFI CCR system
• Copatiable with IDM8000 CCR
• Compatible with Backplane mount serial communication.
• Compatible with commercial and Defence aviation CCR system.
• Remote control system for accessing CCR and allied system over serial or TCP.
• Indigenized local Support/presence in India.
Application
• Remote control: Parallel or serial interface.
• Compatible with MAFI CCR system.
• Compatible with IDM8000 CCR.
• Compatible with Backplane mount serial communication.
• Compatible with commercial and Defence aviation CCR system.
• Remote control system for accessing CCR and allied system over serial or TCP.
• Indigenized local Support/presence in India.
• Easy in configuration using DIP switches.
Explore the innovative world of trenchless pipe repair with our comprehensive guide, "The Benefits and Techniques of Trenchless Pipe Repair." This document delves into the modern methods of repairing underground pipes without the need for extensive excavation, highlighting the numerous advantages and the latest techniques used in the industry.
Learn about the cost savings, reduced environmental impact, and minimal disruption associated with trenchless technology. Discover detailed explanations of popular techniques such as pipe bursting, cured-in-place pipe (CIPP) lining, and directional drilling. Understand how these methods can be applied to various types of infrastructure, from residential plumbing to large-scale municipal systems.
Ideal for homeowners, contractors, engineers, and anyone interested in modern plumbing solutions, this guide provides valuable insights into why trenchless pipe repair is becoming the preferred choice for pipe rehabilitation. Stay informed about the latest advancements and best practices in the field.
Final project report on grocery store management system..pdfKamal Acharya
In today’s fast-changing business environment, it’s extremely important to be able to respond to client needs in the most effective and timely manner. If your customers wish to see your business online and have instant access to your products or services.
Online Grocery Store is an e-commerce website, which retails various grocery products. This project allows viewing various products available enables registered users to purchase desired products instantly using Paytm, UPI payment processor (Instant Pay) and also can place order by using Cash on Delivery (Pay Later) option. This project provides an easy access to Administrators and Managers to view orders placed using Pay Later and Instant Pay options.
In order to develop an e-commerce website, a number of Technologies must be studied and understood. These include multi-tiered architecture, server and client-side scripting techniques, implementation technologies, programming language (such as PHP, HTML, CSS, JavaScript) and MySQL relational databases. This is a project with the objective to develop a basic website where a consumer is provided with a shopping cart website and also to know about the technologies used to develop such a website.
This document will discuss each of the underlying technologies to create and implement an e- commerce website.
Courier management system project report.pdfKamal Acharya
It is now-a-days very important for the people to send or receive articles like imported furniture, electronic items, gifts, business goods and the like. People depend vastly on different transport systems which mostly use the manual way of receiving and delivering the articles. There is no way to track the articles till they are received and there is no way to let the customer know what happened in transit, once he booked some articles. In such a situation, we need a system which completely computerizes the cargo activities including time to time tracking of the articles sent. This need is fulfilled by Courier Management System software which is online software for the cargo management people that enables them to receive the goods from a source and send them to a required destination and track their status from time to time.
Sachpazis:Terzaghi Bearing Capacity Estimation in simple terms with Calculati...Dr.Costas Sachpazis
Terzaghi's soil bearing capacity theory, developed by Karl Terzaghi, is a fundamental principle in geotechnical engineering used to determine the bearing capacity of shallow foundations. This theory provides a method to calculate the ultimate bearing capacity of soil, which is the maximum load per unit area that the soil can support without undergoing shear failure. The Calculation HTML Code included.
2. Agenda
Applications
Need for Multiple Protocols
The Conceptual Layers of Protocol Software
Functionality of the Layers
ISO 7-Layer Reference Model
X.25 And its Relation to the ISO Model
The TCP/IP 5-Layer Reference Model
The Protocol Layering Principle
The Layering Principle Applied To A Network
Layering in Mesh Networks
Two Important Boundaries In The TCP/IP Model
Cross-Layer Optimizations
The Basic Idea Behind Multiplexing And Demultiplexing
2
3. Applications
The World Wide Web
Email
Online social networking
Streaming audio and video,
Instant messaging
File-sharing
Create the applications-powerful programming platforms and new devices
such as smartphones have created new opportunities to develop applications
quickly and to bring them to a large market.
Who operate or manage networks—mostly a behind-the-scenes job, but a
critical one and often a very complex one-network operators.
Finally, there are those who design and build the devices and protocols that
collectively make up the Internet.
3
4. Classes of Applications
Web
Presents simple interface
Users view pages full of textual and graphical objects and click on objects that
they want to learn more about, and a corresponding new page appears.
Uniform Resource Locator (URL),
For example,
http://www.cs.princeton.edu/˜llp/index.htm.
Message exchange includes up to six messages to translate the server
name(www.cs.princeton.edu) IP address (128.112.136.35)
Three messages to set up a Transmission Control Protocol (TCP) connection
between your browser and the server.
Four messages for your browser to send the HTTP “GET”
request and the server to respond with the requested page.
Four messages to tear down the TCP connection.
4
5. Streaming audio and video
Services such as video on demand and Internet radio use this technology.
The delivery of audio and video has some important differences from
fetching a simple web page of text and images.
For example, No need to download an entire video file—a process that might
take minutes to hours—before watching the first scene.
Streaming audio and video implies a more timely transfer of messages from
sender to receiver, and the receiver displays the video or plays the audio
pretty much as it arrives.
Audio and video streams in a continuous ,skipped sounds or stalled video is
not acceptable.
By contrast, a page of text can be delivered and read in bits and pieces.
5
6. Real-time audio and video
Tighter timing constraints than streaming applications.
Ex: Skype™ or a videoconferencing application, the interactions among
the participants must be timely.
Interactive applications usually entail audio and/or video flows in both
directions, while a streaming application is most likely sending video or
audio in only one direction.
Videoconferencing tools that run over the Internet have since the early
1990s but have achieved much more widespread in the last 2 years.
Fitting the video content into a relatively low bandwidth network, for
example, making sure that the video and audio remain in sync and arrive in
time.
6
8. Protocol layering
The Need For Multiple Protocols
Protocols allow one to specify or understand communication without
knowing the details of a particular vendor’s network hardware.
Network communication is a complex problem with many aspects:
Hardware failure
Hosts, routers
Network congestion
Networks have finite capacity
Packet delay or Packet loss
Data corruption
Electrical, magnetic interferences
HW failure
Data duplication or Inverted Arrivals
8
9. Program translation has been partitioned into 4 sub problems identified with
software that handles each sub problem.
Compiler, assembler, link editor and loader.
Two things are clear here that:
1. It should be clear that pieces of translation software must agree on the exact
format of data passed between them.
2. The four parts of the translator form a linear sequence in which output from
the compiler becomes input to the assembler, and so on.
9
10. The Conceptual Layers of Protocol
Software
Network
Layer n
…
Layer 2
Layer 1
Layer n
…
Layer 2
Layer 1
Sender Receiver
The modules of
Protocol SW
are on each
machine
stacked
vertically into
layers
10
11. Functionality of the Layers
How many layers should be created ?
What functionality should reside in each layer ?
The questions are not easy to answer for several reasons:
Given a set of goals and constraints governing a particular communication
problem.
Reliable transmission.
The design of network architecture and the organization of the protocol software
are interrelated.
11
12. ISO 7-Layer Reference Model
Service –says
what a layer
does.
Interface –says
how to access
the service.
Protocol –says
how the service
is implemented.
12
13. X.25 And its Relation to the ISO Model
International Telecommunications Union(ITU).
In the X.25 view ,a network operates much like a telephone system.
Layers of the protocol standard specify various aspects of the network as
follows:
Physical layer:
*physical interconnection between computers and network packet
switches.
*Includes electrical characteristics of voltage and current.
Data link layer:
*specifies how data travels b/w a computer & packet switch to which it
connects.
*unit of data-frame.
* includes error detection.
* includes timeout mechanism.
13
14. 14
Network layer:
*Unit of data-Packets.
* includes the concepts of destination addressing and forwarding.
Transport layer:
* Unit of data-segments.
*provides end-to-end reliability.
Session layer:
*How protocol software can be organized to handle all the functionality
needed by applications programs.
*Ex: login and passwords, session and connection coordination.
Presentation layer:
* standardize the format of data that application programs send over a
network.
Application layer:
* includes application programs.
*Ex: E-mail, File transfer programs.
15. The TCP/IP 5-Layer Reference Model
Application
Transport
Internet
Network Interface
Physical
Messages or Streams
Transport Protocol Packets
IP Packets
Network-Specific Frames
Functionality
15
16. Layer 5: Application
Users invoke application programs that access services available across a
TCP/IP.
Application programs may send,sequence of individual messages or a
continuous stream of data.
Layer 4: Transport
Provide communication from one application to another.
Provides reliable delivery of data.
Layer 3: Internet
Handles communication from one computer to another.
Defines uniform format of packets forwarded across networks of different
technologies and rules for forwarding packets in routers.
Layer 2: Network Interface
Responsible for accepting IP packets and transmitting them over a specific
network.
Defines formats for carrying packets in hardware frames
Layer 1: Physical
16
17. 17
Protocol 1
Protocol 2
Protocol 3
Interface 1
Interface 2
Interface3
IP Module
A realistic view of protocol software with multiple network interfaces and
multiple protocols
Software Organization
Application
Transport
Internet
Network
interface
Physical
Hardware
app1 app3 app4 app5 app6app2
Network3Network2Network1
Conceptual Layers
18. Conceptual layers of protocols needed in computers and routers to
transfer a message from an application on computer A to an application
on computer B.
18
Transpor
t
Internet
Net Iface
Transpor
t
Internet
Net Iface
Net1 Net2 Net3
Internet
Net Iface
Internet
Net Iface
Send
er
Receiv
er
Computer
A
Computer B
Router
1
Router
2
19. Locus of Intelligence
19
In the original telephone network , all the intelligence was located in phone
switches. Ex: a microphone , earpiece & a mechanism used to dial.
By contrast, the TCP/IP protocols require attached computers to run transport
protocols and applications as well as layer 3 and layer2 protocols.
The fundamental concept is:
* TCP/IP protocols place much of intelligence in hosts – routers in the
Internet forward packets , but do not participate in higher-layer services.
20. The Protocol Layering Principle
20
Layered protocols are designed so that layer N at the destination receives
exactly the same object sent by layer N at the source.
The layering principle offers:
Protocol design independence:
* A protocol designers can focus on the message exchange for a given layer
with the assurance that lower layers will not alter the message.
* The key idea is that a transport protocol can be designed independent of
other protocols.
Definition of the end-to-end property:
* We say a protocol is end-to-end if and only if the layering principle applies
between the original source and ultimate destination.
* Other protocols are classified as machine-to-machine.
21. The Layering Principle Applied To A Network
Application
Transport
Internet
Network Interface
Host A Host B
Application
Transport
Internet
Network Interface
Physical net
Identica
l
messag
e
Identica
l
packet
Identical
IP packet
Identica
l
Frame
21
22. Layering in a tcp/ip internet environment
Application
Transport
Internet
Network Interface
Host A Host B
Application
Transport
Internet
Network Interface
Physical net1
Identica
l
messag
eIdentica
l
packet
Identical
IP packet
Identica
l
Frame
22 Physical net2
Identica
l
Frame
Network Interface
Internet Identical
IP packet
Router R
24. Two Important Boundaries In The TCP/IP Model
24
Application
Transport
Internet
Network
interface
Physical
Hardware
Conceptual Layers
Software outside the operating system
Software inside the operating system
Only Internet addresses used
Physical addresses used
Application programs and all protocol software from the internet layer
upward use only Internet addresses; addresses used by the network hardware
are isolated at lower layers.
Protocol
addresses
boundary
Operating
system
boundary
25. Cross-Layer Optimizations
25
Designer divides complex problem into subproblems and solve each one
independently. But the software that results from strict layering can be
extremely inefficient.
To optimize transfer, the transport layer should choose the largest packet size
that will allow one packet to travel in one network frame.
Strict layering will prevent the transport layer from optimizing transfers.
Implementers relax the strict layering scheme when building protocol software.
When allocating packet buffers, transport layer protocols can use the
information to optimize processing by leaving sufficient space for headers that
will be added by lower-layer protocols.
Similarly, lower-layer protocols often retain all the headers on an incoming
frame when passing the frame to higher-layer protocols.
26. The Basic Idea Behind Multiplexing And Demultiplexing
26
Demultiplexing
Based on Frame type
IP Module
ARP Module
RARP Module
Frame arrives
Illustration of frame demultiplexing that uses a type field in the frame
header .Demultiplexing is used with most networks,including Ethernet
and Wi-Fi.
27. Illustration of demultiplexing incoming IP packets based on the type field
in the IP header
27
IP Module
Datagram arrives
TCP Protocol
UDP Protocol
ICMP Protocol