Professional Documents
Culture Documents
When I say the term protocol, it means set of rules or that whenever some issues happen we know where the
set of standards in the computer industry. responsibility lies.
The protocol concept was introduced to standardize
networks in a way that allowed multi-vendor systems, Same thing applies to computer networks. While
prior to this you would only be able to have one vendor transmitting data across the network there is a room for
network as the devices could not communicate with too many complex problems such as,
other vendor devices. Hardware failure.
Optional************************************** A computer or router may fail either because
********************************************* the hardware fails or because the operating
****** system crashes.
A network transmission link may fail or
Not long ago there was a strong battle between popular
accidentally become disconnected.
industries IBM and digital corp. to become leading Network Congestion.
computer manufacturer. But there was a problem, Although all hardware and software operates
these manufacturers manufactured devices which were correctly, networks have finite capacity that can
not compatible with each other. So if you have bought a be exceeded.
computer of IBM you have to buy a monitor printer and Packet Delay/ Packet Loss.
everything only from IBM. Similarly, if have a processor Data Corruption.
from digital corp. it only supported the accessories from Electrical or magnetic interference or hardware
the same company. There were many companies who failures can cause transmission errors that
bought both products from both the companies one corrupt the contents of transmitted data;
used in accounts department and other in transport interference can be especially severe on
departments but the problem was they could not wireless networks.
communicate with each other or share data. Data Duplication/Inverted Arrivals.
********************************************* Networks that offer multiple routes may deliver
********************************************* packets out of sequence or may deliver
****** duplicates of packets.
That’s when the International Organization for
Standardization known as ISO decided there was a need So many complex aspects exist. It is impossible to write
for standard. That’s how concept of protocols came into a single protocol specification that will handle them all.
picture. Hence we use multiple protocols, each of which
manages a part of the problem.
Why multiple protocols?
So, ok we needed protocols for defining set of rules but Protocols are implemented using protocol software.
why not a single protocol can handle everything? Why Protocol softwares are designed in such a way that it
use multiple protocol? detects and diagnoses the issues. Protocol software
Let’s take a realistic example, consider an office where follows layered approach to handle multiple protocols.
employees are categorized into different groups within
the organization. We will be having accounts ISO developed OSI which is an acronym for Open
department, maintenance department, CEO, managers, System Interconnect which is more commonly known as
developers etc. When your salary is not credited we will OSI reference model. At the same time, a competing
know that is a bank related issue which will be dealt by standard TCP/IP introduced by defense dept. of US
accounts manager. Now if the office is not clean then came into picture. The TCP/IP model is more like a
we know that is the responsibility with the maintenance stripped down version of an OSI model and because it’s
dept. Having such different designations is to divide more relevant, it went on to become industry standard.
File transfer is done with the help of FTP
The model suggests dividing the network protocol into protocol, web surfing is done with the help of
layers, each of which solve part of the network HTTP or HTTPS protocol, for emails SMTP
communication problem. We need to know what works protocol is used and for virtual terminals telnet
at what stage. So tomorrow if something doesn’t work, is used.
instead of troubleshooting the entire thing we know So application layer provides services for
where exactly to look into. That is why we have a network applications with the help of protocols
layered approach. to perform user activities
Presentation layer:
X.25 Presentation layer performs three basic functions
X.25 is a protocol suite developed by ITU. X.25 was translation, compression and encryption/decryption.
adopted by public data networks. Considering X.25 will Presentation layer receives data from
help explain ISO layering. application layer this data is in the form of
In the X.25 view, a network operates much like a
characters and numbers, presentation layer
telephone system. A network consists of packet
switches that contain the intelligence needed to route convert these characters and numbers to
packets. Computers do not attach directly to machine understandable binary. This function is
communication wires of the network. Instead, each called translation.
computer attaches to one of the packet switches using Before data is transmitted presentation layer
a serial communication line. In one sense, the does data compression and it can be lossy or
connection between a host and an X.25 packet switch is lossless data. Data compression is very helpful
a miniature network consisting of one serial link. The
in real-time video and audio streaming to
host must follow a complicated procedure to transfer
packets across the network. Layers of the protocol maintain the integrity of data before
standard depicts how a packet travels across the transmission.
network to reach the destination. Data is encrypted to enhance the security of
sensitive data at sender side and at receiver
ISO 7-Layer model side data is decrypted. SSL protocol or Secure
Sockets Layer protocol is used in presentation
OSI model is designed to understand how the data is layer for encryption and decryption.
transferred from one computer device to another Session Layer:
computer device in the network. Session layer helps in setting up and
Protocol suites- A set of related protocols that are establishing, managing and terminating
designed for compatibility. connections between devices.
Let's start with the topmost layer. Just before a session or a connection is
Application layer: established with the server, server performs a
Application layer is used by network function called authentication.
applications. After authenticating the user, authorization is
Network application means computer checked. Authorization is the process to
applications that use internet like Google determine if you have permission to access a
Chrome Firefox Skype etc. file.
The web browser is a network application Session layer keeps a track of which data packet
running in your PC. It does not reside in the belongs to which file either text file or image
application layer but it uses application layer file and tracks where the received data packet
protocols HTTP or HTTPS to do web surfing not go. So session layer helps in session
only web browser but all Network applications management authentication and authorization
including outlook, Skype etc. all are dependent Layer below session layer is transport layer.
on application layer protocols to function.
Transport layer: Protocols of transport layer are-
Transport layer controls the reliability of o Transmission control protocol or TCP
communication through segmentation, flow o User Datagram Protocol or UDP
control and error control Transport layer performs 2 types of services
Segmentation o Connection Oriented Transmission
o Data received from session layer is o Connectionless Transmission
divided into small data units called Connection oriented transmission is done via TCP while
segments Connection less transmission is done via UDP. UDP is
o Each segment contains a source and faster than TCP because it does not provide any
destination port number and a feedback whether data was really delivered whereas
sequence number TCP provides a feedback therefore lost data can be re-
o Port number helps to direct each transmitted. UDP is used where it does not matter
segment to the correct application and whether we have received all data for example online
sequence number helps to reassemble streaming, movies, songs, games etc. on the other hand
segments in the correct order to form TCP is used we're full data delivery is must for example
correct message at the receiver world wide web email FTP etc.
Flow control Transport layer passes data segments through the
o Transport layer controls the amount of network layer.
data being transmitted Network layer:
Consider our mobile is connected to a Network layer works for the transmission of
server. Suppose, server can transmit the received data segments from one
data maximum at 100 Mbps and our computer to another located in different
mobile can process data maximum at networks.
10 Mbps, say we are downloading a file Data units in the network layer are called data
from the server but server starts packets.
sending data at 50 Mbps which is It is the layer where routers reside.
greater than the rate our mobile can The functions of network layer are logical
process so mobile phone with the help addressing, routing and path determination
of transport layer can tell the server to Logical Addressing- IP addressing done in
slow down data transmission rate up to network layer is called logical addressing.
10 Mbps so that no data gets lost. Every computer in a network at a unique IP
Similarly, if server is sending data at 5 address. Network layer assigns sender and
Mbps mobile phone tells the server to receiver’s IP address to each segment to form
increase data transmission rate to 10 an IP packet. IP addresses are assigned to
Mbps to maintain system performance. ensure that each data packet can reach the
Error control correct destination
o Transport layer also helps in error Routing- A method of moving data packet from
control if some data does not arrive the source to destination and it is based on the
destination transport layer uses logical address format of ipv4 or ipv6.
automatic repeat request schemes to Path determination- A computer can be
retransmit the lost or corrupted data connected to internet server for a computer in
o A group of bits called checksum is a number of ways. Choosing the best possible
added to each segment by the path for data delivery from source to
transport layer to find out the received destination is called path determination.
corrupted segment Data link layer:
Receives data packet from network layer. moves through higher layers. Finally data is
Data packets contain IP addresses of sender moved to application layer. Application layer
and receiver. protocols makes the sender's message visible in
There are two kinds of addressing logical the application in the receivers computer
addressing and physical addressing screen.
Logical addressing is done at network layer
where sender and receivers IP addresses are
assigned to each segment to form a data
packet
Physical addressing is done at data link layer
where MAC addresses of sender and receiver
are assigned to each data packet to form a
frame
MAC address is a 12 digit alphanumeric
number embedded in network interface card of
your computer by your computer manufacturer
Data unit in data link layer is called frame TCP/IP model
Locus of intelligence: