SlideShare a Scribd company logo
1 of 25
Shubham KhedekarShubham Khedekar
Introduction TCP/IPIntroduction TCP/IP
 The Internet Protocol Suite (commonly known
as TCP/IP) is the set of communications
protocols used for the Internet and other similar
networks.
 It is named from two of the most important protocols
in it:
 Transmission Control Protocol (TCP) and
 Internet Protocol (IP), which were the first two
networking protocols defined in this standard.
APPLICATION LAYER
 This layer is comparable to the application,
presentation, and session layers of the OSI model all
combined into one.
 It provides a way for applications to have access to
networked services.
 It is widely-known layer for the exchange of user
information
 The Hypertext Transfer Protocol (HTTP) is used to
transfer files that make up the Web pages of the
World Wide Web.
 The File Transfer Protocol (FTP) is used for
interactive file transfer.
 The Simple Mail Transfer Protocol (SMTP) is used
for the transfer of mail messages and attachments.
 Presentation Layer does Encryption-Decryption and
Compression-Decompression of Data.
 This layer allows a process to add checkpoints which
are considered as synchronization points into stream of
data.
TRANSPORT LAYER
 This layer acts as the delivery service used by the
application layer.
 Two protocols used are TCP and UDP.
 The choice is made based on the application's
transmission reliability requirements.
 The transport layer also handles all error detection
and recovery.
 It uses checksums, acknowledgements, and timeouts
to control transmissions and end to end verification.
 Unlike the OSI model, TCP/IP treats reliability as an
end-to-end problem
 TCP provides a one-to-one, connection-oriented,
reliable communications service.
 UDP provides a one-to-one or one-to-many,
connectionless, unreliable communications service.
 A message is divided into segments; each segment
contains sequence number, which enables this layer
in reassembling the message.
 Message is reassembled correctly upon arrival at the
destination and replaces packets which were lost in
transmission.
 Connection Control : It includes 2 types :
1. Connectionless Transport Layer : Each segment is
considered as an independent packet and delivered
to the transport layer at the destination machine.
2. Connection Oriented Transport Layer : Before
delivering packets, connection is made with
transport layer at the destination machine.
NETWORK LAYER
 This layer is also known as Internet Layer. The main
purpose of this layer is to organize or handle the
movement of data on network.
 By movement of data, we generally mean routing of
data over the network.
 This layer is responsible for addressing, packaging,
and routing functions.
 The core protocols of the Internet layer are IP, ARP,
ICMP, and IGMP.
 The Internet Protocol (IP) is a routable protocol
responsible for IP addressing, routing, and the
fragmentation and reassembly of packets.
 The Address Resolution Protocol (ARP) is
responsible for the resolution of the Internet layer
address to the Network Interface layer address such
as a hardware address.
 The Internet Control Message Protocol (ICMP) is
responsible for providing diagnostic functions and
reporting errors due to the unsuccessful delivery of IP
packets.
 The Internet Group Management Protocol (IGMP) is
responsible for the management of IP multicast
groups.
 It translates logical network address into physical
address. Concerned with circuit, message or packet
switching.
 Routers and gateways operate in the network layer.
DATA LINK LAYER
 Data link layer is most reliable node to node delivery
of data.
 It forms frames from the packets that are received
from network layer and gives it to physical layer.
 It also synchronizes the information which is to be
transmitted over the data. Error controlling is easily
done.
 Protocols of this layer determine which of the devices
has control over the link at any given time, when two
or more devices are connected to the same link.
 Error control is achieved by adding a trailer at the end
of the frame.
 Duplication of frames are also prevented by using this
mechanism.
 Frames are the streams of bits received from the
network layer into manageable data units.
 This division of stream of bits is done by Data Link
Layer.
 Switch and Bridge are used in this layer
PHYSICAL LAYER
 Physical layer is the lowest layer of all. It is
responsible for sending bits from one computer to
another.
 This layer is not concerned with the meaning of the
bits and deals with the physical connection
 This layer defines electrical and physical details
represented as 0 or a 1.
 This layer defines the rate of transmission which is
the number of bits per second.
 It deals with the synchronization of the transmitter
and receiver. The sender and receiver are
synchronized at bit level.
 Devices must be connected using the following
topologies: Mesh, Star, Ring and Bus.
 Physical Layer defines the direction of transmission
between two devices: Simplex, Half Duplex, Full
Duplex
 Deals with baseband and broadband transmission.
 Hubs and Repeater are used in this layer
TCP/IP Protocols With All Layer Description

More Related Content

What's hot

Connection( less & oriented)
Connection( less & oriented)Connection( less & oriented)
Connection( less & oriented)ymghorpade
 
Osi model vs TCP/IP
Osi model vs TCP/IPOsi model vs TCP/IP
Osi model vs TCP/IPMannu Khani
 
Protocols and the TCP/IP Protocol Suite
Protocols and the TCP/IP Protocol SuiteProtocols and the TCP/IP Protocol Suite
Protocols and the TCP/IP Protocol SuiteAtharaw Deshmukh
 
Multiple Access Protocal
Multiple Access ProtocalMultiple Access Protocal
Multiple Access Protocaltes31
 
Guided Transmission Media
Guided Transmission MediaGuided Transmission Media
Guided Transmission Mediaasrabatool
 
TCP- Transmission Control Protocol
TCP-  Transmission Control Protocol TCP-  Transmission Control Protocol
TCP- Transmission Control Protocol Akhil .B
 
TCP/IP 3-way Handshake
TCP/IP 3-way Handshake TCP/IP 3-way Handshake
TCP/IP 3-way Handshake Alok Tripathi
 
Transmission Control Protocol (TCP)
Transmission Control Protocol (TCP)Transmission Control Protocol (TCP)
Transmission Control Protocol (TCP)k33a
 
Computer network switching
Computer network switchingComputer network switching
Computer network switchingShivani Godha
 
iso osi model
 iso osi model iso osi model
iso osi modelvishnu1204
 
Internetworking
InternetworkingInternetworking
InternetworkingRaghu nath
 
Chapter 4 data link layer
Chapter 4 data link layerChapter 4 data link layer
Chapter 4 data link layerNaiyan Noor
 

What's hot (20)

Application Layer
Application Layer Application Layer
Application Layer
 
Osi model
Osi modelOsi model
Osi model
 
Connection( less & oriented)
Connection( less & oriented)Connection( less & oriented)
Connection( less & oriented)
 
Osi model vs TCP/IP
Osi model vs TCP/IPOsi model vs TCP/IP
Osi model vs TCP/IP
 
Protocols and the TCP/IP Protocol Suite
Protocols and the TCP/IP Protocol SuiteProtocols and the TCP/IP Protocol Suite
Protocols and the TCP/IP Protocol Suite
 
Multiple Access Protocal
Multiple Access ProtocalMultiple Access Protocal
Multiple Access Protocal
 
Transport layer protocol
Transport layer protocolTransport layer protocol
Transport layer protocol
 
Guided Transmission Media
Guided Transmission MediaGuided Transmission Media
Guided Transmission Media
 
Transport layer
Transport layer Transport layer
Transport layer
 
IPv4 Addressing
 IPv4 Addressing   IPv4 Addressing
IPv4 Addressing
 
TCP- Transmission Control Protocol
TCP-  Transmission Control Protocol TCP-  Transmission Control Protocol
TCP- Transmission Control Protocol
 
TCP/IP 3-way Handshake
TCP/IP 3-way Handshake TCP/IP 3-way Handshake
TCP/IP 3-way Handshake
 
Transmission Control Protocol (TCP)
Transmission Control Protocol (TCP)Transmission Control Protocol (TCP)
Transmission Control Protocol (TCP)
 
OSI Model
OSI ModelOSI Model
OSI Model
 
Computer network switching
Computer network switchingComputer network switching
Computer network switching
 
iso osi model
 iso osi model iso osi model
iso osi model
 
Internetworking
InternetworkingInternetworking
Internetworking
 
Chapter 4 data link layer
Chapter 4 data link layerChapter 4 data link layer
Chapter 4 data link layer
 
Tcp IP Model
Tcp IP ModelTcp IP Model
Tcp IP Model
 
Routing
RoutingRouting
Routing
 

Similar to TCP/IP Protocols With All Layer Description

Similar to TCP/IP Protocols With All Layer Description (20)

Topology Chapter 2.pptx
Topology Chapter 2.pptxTopology Chapter 2.pptx
Topology Chapter 2.pptx
 
Computer Network Unit-1 ppt
Computer Network Unit-1 pptComputer Network Unit-1 ppt
Computer Network Unit-1 ppt
 
OSI MODEL
OSI MODEL OSI MODEL
OSI MODEL
 
seven layer OSI model
seven layer OSI modelseven layer OSI model
seven layer OSI model
 
computer network OSI layer
computer network OSI layercomputer network OSI layer
computer network OSI layer
 
Unit 1 introduction
Unit 1 introductionUnit 1 introduction
Unit 1 introduction
 
CCNA Report
CCNA ReportCCNA Report
CCNA Report
 
Ta 104-tcp
Ta 104-tcpTa 104-tcp
Ta 104-tcp
 
Osi model
Osi modelOsi model
Osi model
 
OSI Model.It was created in 1983 by osi.
OSI Model.It was created in 1983 by osi.OSI Model.It was created in 1983 by osi.
OSI Model.It was created in 1983 by osi.
 
Osi , tcp/ip protocol and Addressing
Osi , tcp/ip protocol and Addressing Osi , tcp/ip protocol and Addressing
Osi , tcp/ip protocol and Addressing
 
01 pengenalan
01 pengenalan01 pengenalan
01 pengenalan
 
L 1
L   1L   1
L 1
 
OSI &TCP/IP Model
OSI &TCP/IP ModelOSI &TCP/IP Model
OSI &TCP/IP Model
 
Assignment3
Assignment3Assignment3
Assignment3
 
Osi model
Osi modelOsi model
Osi model
 
four
fourfour
four
 
OSI MODEL AND ITS LAYERS FUNCTION
OSI  MODEL AND ITS LAYERS FUNCTIONOSI  MODEL AND ITS LAYERS FUNCTION
OSI MODEL AND ITS LAYERS FUNCTION
 
computer network and chapter 7 OSI layers.pptx
computer network and chapter 7 OSI layers.pptxcomputer network and chapter 7 OSI layers.pptx
computer network and chapter 7 OSI layers.pptx
 
OSI Model
OSI ModelOSI Model
OSI Model
 

More from Shubham Khedekar

Holacracy : The New Approach
Holacracy : The New Approach Holacracy : The New Approach
Holacracy : The New Approach Shubham Khedekar
 
Henry Fayol Principles for ITC Limited
Henry Fayol Principles for ITC LimitedHenry Fayol Principles for ITC Limited
Henry Fayol Principles for ITC LimitedShubham Khedekar
 
Service Product Marketing (Banking)
Service Product Marketing (Banking)Service Product Marketing (Banking)
Service Product Marketing (Banking)Shubham Khedekar
 
Environmental Analysis of Telecom Company
Environmental Analysis of Telecom CompanyEnvironmental Analysis of Telecom Company
Environmental Analysis of Telecom CompanyShubham Khedekar
 

More from Shubham Khedekar (7)

Business Level Strategies
Business Level StrategiesBusiness Level Strategies
Business Level Strategies
 
IMS based IPTV
IMS based IPTVIMS based IPTV
IMS based IPTV
 
Holacracy : The New Approach
Holacracy : The New Approach Holacracy : The New Approach
Holacracy : The New Approach
 
Henry Fayol Principles for ITC Limited
Henry Fayol Principles for ITC LimitedHenry Fayol Principles for ITC Limited
Henry Fayol Principles for ITC Limited
 
Service Product Marketing (Banking)
Service Product Marketing (Banking)Service Product Marketing (Banking)
Service Product Marketing (Banking)
 
Environmental Analysis of Telecom Company
Environmental Analysis of Telecom CompanyEnvironmental Analysis of Telecom Company
Environmental Analysis of Telecom Company
 
Oppo Marketing Strategies
Oppo Marketing StrategiesOppo Marketing Strategies
Oppo Marketing Strategies
 

Recently uploaded

Project Based Learning (A.I).pptx detail explanation
Project Based Learning (A.I).pptx detail explanationProject Based Learning (A.I).pptx detail explanation
Project Based Learning (A.I).pptx detail explanationkaushalgiri8080
 
Short Story: Unveiling the Reasoning Abilities of Large Language Models by Ke...
Short Story: Unveiling the Reasoning Abilities of Large Language Models by Ke...Short Story: Unveiling the Reasoning Abilities of Large Language Models by Ke...
Short Story: Unveiling the Reasoning Abilities of Large Language Models by Ke...kellynguyen01
 
EY_Graph Database Powered Sustainability
EY_Graph Database Powered SustainabilityEY_Graph Database Powered Sustainability
EY_Graph Database Powered SustainabilityNeo4j
 
(Genuine) Escort Service Lucknow | Starting ₹,5K To @25k with A/C 🧑🏽‍❤️‍🧑🏻 89...
(Genuine) Escort Service Lucknow | Starting ₹,5K To @25k with A/C 🧑🏽‍❤️‍🧑🏻 89...(Genuine) Escort Service Lucknow | Starting ₹,5K To @25k with A/C 🧑🏽‍❤️‍🧑🏻 89...
(Genuine) Escort Service Lucknow | Starting ₹,5K To @25k with A/C 🧑🏽‍❤️‍🧑🏻 89...gurkirankumar98700
 
The Real-World Challenges of Medical Device Cybersecurity- Mitigating Vulnera...
The Real-World Challenges of Medical Device Cybersecurity- Mitigating Vulnera...The Real-World Challenges of Medical Device Cybersecurity- Mitigating Vulnera...
The Real-World Challenges of Medical Device Cybersecurity- Mitigating Vulnera...ICS
 
Unveiling the Tech Salsa of LAMs with Janus in Real-Time Applications
Unveiling the Tech Salsa of LAMs with Janus in Real-Time ApplicationsUnveiling the Tech Salsa of LAMs with Janus in Real-Time Applications
Unveiling the Tech Salsa of LAMs with Janus in Real-Time ApplicationsAlberto González Trastoy
 
KnowAPIs-UnknownPerf-jaxMainz-2024 (1).pptx
KnowAPIs-UnknownPerf-jaxMainz-2024 (1).pptxKnowAPIs-UnknownPerf-jaxMainz-2024 (1).pptx
KnowAPIs-UnknownPerf-jaxMainz-2024 (1).pptxTier1 app
 
Advancing Engineering with AI through the Next Generation of Strategic Projec...
Advancing Engineering with AI through the Next Generation of Strategic Projec...Advancing Engineering with AI through the Next Generation of Strategic Projec...
Advancing Engineering with AI through the Next Generation of Strategic Projec...OnePlan Solutions
 
Building Real-Time Data Pipelines: Stream & Batch Processing workshop Slide
Building Real-Time Data Pipelines: Stream & Batch Processing workshop SlideBuilding Real-Time Data Pipelines: Stream & Batch Processing workshop Slide
Building Real-Time Data Pipelines: Stream & Batch Processing workshop SlideChristina Lin
 
Unit 1.1 Excite Part 1, class 9, cbse...
Unit 1.1 Excite Part 1, class 9, cbse...Unit 1.1 Excite Part 1, class 9, cbse...
Unit 1.1 Excite Part 1, class 9, cbse...aditisharan08
 
What is Binary Language? Computer Number Systems
What is Binary Language?  Computer Number SystemsWhat is Binary Language?  Computer Number Systems
What is Binary Language? Computer Number SystemsJheuzeDellosa
 
Der Spagat zwischen BIAS und FAIRNESS (2024)
Der Spagat zwischen BIAS und FAIRNESS (2024)Der Spagat zwischen BIAS und FAIRNESS (2024)
Der Spagat zwischen BIAS und FAIRNESS (2024)OPEN KNOWLEDGE GmbH
 
Professional Resume Template for Software Developers
Professional Resume Template for Software DevelopersProfessional Resume Template for Software Developers
Professional Resume Template for Software DevelopersVinodh Ram
 
The Essentials of Digital Experience Monitoring_ A Comprehensive Guide.pdf
The Essentials of Digital Experience Monitoring_ A Comprehensive Guide.pdfThe Essentials of Digital Experience Monitoring_ A Comprehensive Guide.pdf
The Essentials of Digital Experience Monitoring_ A Comprehensive Guide.pdfkalichargn70th171
 
Optimizing AI for immediate response in Smart CCTV
Optimizing AI for immediate response in Smart CCTVOptimizing AI for immediate response in Smart CCTV
Optimizing AI for immediate response in Smart CCTVshikhaohhpro
 
Try MyIntelliAccount Cloud Accounting Software As A Service Solution Risk Fre...
Try MyIntelliAccount Cloud Accounting Software As A Service Solution Risk Fre...Try MyIntelliAccount Cloud Accounting Software As A Service Solution Risk Fre...
Try MyIntelliAccount Cloud Accounting Software As A Service Solution Risk Fre...MyIntelliSource, Inc.
 
ODSC - Batch to Stream workshop - integration of Apache Spark, Cassandra, Pos...
ODSC - Batch to Stream workshop - integration of Apache Spark, Cassandra, Pos...ODSC - Batch to Stream workshop - integration of Apache Spark, Cassandra, Pos...
ODSC - Batch to Stream workshop - integration of Apache Spark, Cassandra, Pos...Christina Lin
 
cybersecurity notes for mca students for learning
cybersecurity notes for mca students for learningcybersecurity notes for mca students for learning
cybersecurity notes for mca students for learningVitsRangannavar
 
chapter--4-software-project-planning.ppt
chapter--4-software-project-planning.pptchapter--4-software-project-planning.ppt
chapter--4-software-project-planning.pptkotipi9215
 
DNT_Corporate presentation know about us
DNT_Corporate presentation know about usDNT_Corporate presentation know about us
DNT_Corporate presentation know about usDynamic Netsoft
 

Recently uploaded (20)

Project Based Learning (A.I).pptx detail explanation
Project Based Learning (A.I).pptx detail explanationProject Based Learning (A.I).pptx detail explanation
Project Based Learning (A.I).pptx detail explanation
 
Short Story: Unveiling the Reasoning Abilities of Large Language Models by Ke...
Short Story: Unveiling the Reasoning Abilities of Large Language Models by Ke...Short Story: Unveiling the Reasoning Abilities of Large Language Models by Ke...
Short Story: Unveiling the Reasoning Abilities of Large Language Models by Ke...
 
EY_Graph Database Powered Sustainability
EY_Graph Database Powered SustainabilityEY_Graph Database Powered Sustainability
EY_Graph Database Powered Sustainability
 
(Genuine) Escort Service Lucknow | Starting ₹,5K To @25k with A/C 🧑🏽‍❤️‍🧑🏻 89...
(Genuine) Escort Service Lucknow | Starting ₹,5K To @25k with A/C 🧑🏽‍❤️‍🧑🏻 89...(Genuine) Escort Service Lucknow | Starting ₹,5K To @25k with A/C 🧑🏽‍❤️‍🧑🏻 89...
(Genuine) Escort Service Lucknow | Starting ₹,5K To @25k with A/C 🧑🏽‍❤️‍🧑🏻 89...
 
The Real-World Challenges of Medical Device Cybersecurity- Mitigating Vulnera...
The Real-World Challenges of Medical Device Cybersecurity- Mitigating Vulnera...The Real-World Challenges of Medical Device Cybersecurity- Mitigating Vulnera...
The Real-World Challenges of Medical Device Cybersecurity- Mitigating Vulnera...
 
Unveiling the Tech Salsa of LAMs with Janus in Real-Time Applications
Unveiling the Tech Salsa of LAMs with Janus in Real-Time ApplicationsUnveiling the Tech Salsa of LAMs with Janus in Real-Time Applications
Unveiling the Tech Salsa of LAMs with Janus in Real-Time Applications
 
KnowAPIs-UnknownPerf-jaxMainz-2024 (1).pptx
KnowAPIs-UnknownPerf-jaxMainz-2024 (1).pptxKnowAPIs-UnknownPerf-jaxMainz-2024 (1).pptx
KnowAPIs-UnknownPerf-jaxMainz-2024 (1).pptx
 
Advancing Engineering with AI through the Next Generation of Strategic Projec...
Advancing Engineering with AI through the Next Generation of Strategic Projec...Advancing Engineering with AI through the Next Generation of Strategic Projec...
Advancing Engineering with AI through the Next Generation of Strategic Projec...
 
Building Real-Time Data Pipelines: Stream & Batch Processing workshop Slide
Building Real-Time Data Pipelines: Stream & Batch Processing workshop SlideBuilding Real-Time Data Pipelines: Stream & Batch Processing workshop Slide
Building Real-Time Data Pipelines: Stream & Batch Processing workshop Slide
 
Unit 1.1 Excite Part 1, class 9, cbse...
Unit 1.1 Excite Part 1, class 9, cbse...Unit 1.1 Excite Part 1, class 9, cbse...
Unit 1.1 Excite Part 1, class 9, cbse...
 
What is Binary Language? Computer Number Systems
What is Binary Language?  Computer Number SystemsWhat is Binary Language?  Computer Number Systems
What is Binary Language? Computer Number Systems
 
Der Spagat zwischen BIAS und FAIRNESS (2024)
Der Spagat zwischen BIAS und FAIRNESS (2024)Der Spagat zwischen BIAS und FAIRNESS (2024)
Der Spagat zwischen BIAS und FAIRNESS (2024)
 
Professional Resume Template for Software Developers
Professional Resume Template for Software DevelopersProfessional Resume Template for Software Developers
Professional Resume Template for Software Developers
 
The Essentials of Digital Experience Monitoring_ A Comprehensive Guide.pdf
The Essentials of Digital Experience Monitoring_ A Comprehensive Guide.pdfThe Essentials of Digital Experience Monitoring_ A Comprehensive Guide.pdf
The Essentials of Digital Experience Monitoring_ A Comprehensive Guide.pdf
 
Optimizing AI for immediate response in Smart CCTV
Optimizing AI for immediate response in Smart CCTVOptimizing AI for immediate response in Smart CCTV
Optimizing AI for immediate response in Smart CCTV
 
Try MyIntelliAccount Cloud Accounting Software As A Service Solution Risk Fre...
Try MyIntelliAccount Cloud Accounting Software As A Service Solution Risk Fre...Try MyIntelliAccount Cloud Accounting Software As A Service Solution Risk Fre...
Try MyIntelliAccount Cloud Accounting Software As A Service Solution Risk Fre...
 
ODSC - Batch to Stream workshop - integration of Apache Spark, Cassandra, Pos...
ODSC - Batch to Stream workshop - integration of Apache Spark, Cassandra, Pos...ODSC - Batch to Stream workshop - integration of Apache Spark, Cassandra, Pos...
ODSC - Batch to Stream workshop - integration of Apache Spark, Cassandra, Pos...
 
cybersecurity notes for mca students for learning
cybersecurity notes for mca students for learningcybersecurity notes for mca students for learning
cybersecurity notes for mca students for learning
 
chapter--4-software-project-planning.ppt
chapter--4-software-project-planning.pptchapter--4-software-project-planning.ppt
chapter--4-software-project-planning.ppt
 
DNT_Corporate presentation know about us
DNT_Corporate presentation know about usDNT_Corporate presentation know about us
DNT_Corporate presentation know about us
 

TCP/IP Protocols With All Layer Description

  • 2. Introduction TCP/IPIntroduction TCP/IP  The Internet Protocol Suite (commonly known as TCP/IP) is the set of communications protocols used for the Internet and other similar networks.  It is named from two of the most important protocols in it:  Transmission Control Protocol (TCP) and  Internet Protocol (IP), which were the first two networking protocols defined in this standard.
  • 3.
  • 4. APPLICATION LAYER  This layer is comparable to the application, presentation, and session layers of the OSI model all combined into one.  It provides a way for applications to have access to networked services.  It is widely-known layer for the exchange of user information
  • 5.  The Hypertext Transfer Protocol (HTTP) is used to transfer files that make up the Web pages of the World Wide Web.  The File Transfer Protocol (FTP) is used for interactive file transfer.  The Simple Mail Transfer Protocol (SMTP) is used for the transfer of mail messages and attachments.
  • 6.  Presentation Layer does Encryption-Decryption and Compression-Decompression of Data.  This layer allows a process to add checkpoints which are considered as synchronization points into stream of data.
  • 7.
  • 8. TRANSPORT LAYER  This layer acts as the delivery service used by the application layer.  Two protocols used are TCP and UDP.  The choice is made based on the application's transmission reliability requirements.  The transport layer also handles all error detection and recovery.
  • 9.  It uses checksums, acknowledgements, and timeouts to control transmissions and end to end verification.  Unlike the OSI model, TCP/IP treats reliability as an end-to-end problem  TCP provides a one-to-one, connection-oriented, reliable communications service.  UDP provides a one-to-one or one-to-many, connectionless, unreliable communications service.
  • 10.  A message is divided into segments; each segment contains sequence number, which enables this layer in reassembling the message.
  • 11.  Message is reassembled correctly upon arrival at the destination and replaces packets which were lost in transmission.  Connection Control : It includes 2 types : 1. Connectionless Transport Layer : Each segment is considered as an independent packet and delivered to the transport layer at the destination machine. 2. Connection Oriented Transport Layer : Before delivering packets, connection is made with transport layer at the destination machine.
  • 12. NETWORK LAYER  This layer is also known as Internet Layer. The main purpose of this layer is to organize or handle the movement of data on network.  By movement of data, we generally mean routing of data over the network.  This layer is responsible for addressing, packaging, and routing functions.
  • 13.  The core protocols of the Internet layer are IP, ARP, ICMP, and IGMP.  The Internet Protocol (IP) is a routable protocol responsible for IP addressing, routing, and the fragmentation and reassembly of packets.  The Address Resolution Protocol (ARP) is responsible for the resolution of the Internet layer address to the Network Interface layer address such as a hardware address.
  • 14.  The Internet Control Message Protocol (ICMP) is responsible for providing diagnostic functions and reporting errors due to the unsuccessful delivery of IP packets.  The Internet Group Management Protocol (IGMP) is responsible for the management of IP multicast groups.
  • 15.  It translates logical network address into physical address. Concerned with circuit, message or packet switching.  Routers and gateways operate in the network layer.
  • 16.
  • 17. DATA LINK LAYER  Data link layer is most reliable node to node delivery of data.  It forms frames from the packets that are received from network layer and gives it to physical layer.  It also synchronizes the information which is to be transmitted over the data. Error controlling is easily done.
  • 18.  Protocols of this layer determine which of the devices has control over the link at any given time, when two or more devices are connected to the same link.
  • 19.  Error control is achieved by adding a trailer at the end of the frame.  Duplication of frames are also prevented by using this mechanism.  Frames are the streams of bits received from the network layer into manageable data units.  This division of stream of bits is done by Data Link Layer.
  • 20.  Switch and Bridge are used in this layer
  • 21. PHYSICAL LAYER  Physical layer is the lowest layer of all. It is responsible for sending bits from one computer to another.  This layer is not concerned with the meaning of the bits and deals with the physical connection  This layer defines electrical and physical details represented as 0 or a 1.
  • 22.  This layer defines the rate of transmission which is the number of bits per second.  It deals with the synchronization of the transmitter and receiver. The sender and receiver are synchronized at bit level.  Devices must be connected using the following topologies: Mesh, Star, Ring and Bus.
  • 23.  Physical Layer defines the direction of transmission between two devices: Simplex, Half Duplex, Full Duplex
  • 24.  Deals with baseband and broadband transmission.  Hubs and Repeater are used in this layer