You are on page 1of 31

NETWORK LAYER

NETWORK LAYER
 It
is the 3rd layer of OSI model
 Packetizing

 Routing

 Congestion Control

 Traffic shaping
INTERDOMAIN AND INTRADOMAIN ROUTING
Intradomain Routing Interdomain Routing
 Routing within an AS  Routing between AS’s
 Ignores the Internet outside  Assumes that the Internet
the AS consists of a collection of
 Protocols for Intradomain interconnected AS’s
routing are also called  Protocols for interdomain
Interior Gateway routing are also called
Protocols or IGP’s. Exterior Gateway
 Popular protocols are Protocols or EGP’s.
 RIP (simple, old)  Routing protocols:
 OSPF (better)  BGP (more recent)

3
 Distance Vector Routing
 Link State Routing
IP Addresses
IP addresses are 32 bit numbers, most commonly represented in dotted decimal
notation (xxx.xxx.xxx.xxx).

Each decimal number represents eight bits of binary data, and therefore can
have a decimal value between 0 and 255.

IP addresses most commonly come as class A, B, or C.

Class D Class E address are used for multi-cast & research.


Class Range Allocation
A 1-126 N.H.H.H
B 128-191 N.N.H.H
C 192-223 N.N.N.H
D 224-239 Not applicable
E 240-255

N=Network H=Host

Note 1: 127.0.0.0 is a class A network, but is reserved for use as a loop back
address (typically 127.0.0.1).
Default subnet masks:
• Class A
11111111.00000000.00000000.00000000
255 .0 .0 .0

• Class B
11111111.11111111.00000000.00000000
255 .255 .0 .0

• Class C
11111111.11111111.11111111.00000000
255 .255 .255 .0
SUBNET MASK
 IP address: 190.138.23.45
 Subnet Mask: 255.255.0.0

 Network ID: 190.138.0.0


 Host ID: 23.45
Subnetting
Subnetting allows an organization with a single IP n/w address (Class A
/ClassB /ClassC) to have multiple subnetworks, thus allowing several
physical networks within the organization.

By organizing hosts into logical groups, subnetting can improve network


security and performance.

The default subnet mask does not create subnets.


SUBNET –HOW?
IP address: 192.16.10.120
subnet mask 255.255.255.224
a) Nos of subnets
b) Nos of host
c) Valid subnet
d) First valid host
e) Last valid host
f) Broadcast address
Transport layer design issues:
•It responds to service requests from the session layer
and issues service requests to the network layer.

•Manages end-to-end message delivery in network

•Provides reliable and sequential packet delivery


through error recovery and flow control mechanisms

•Provides robust and efficient communication whenever


there are crashes or problems in subnet.
PROCESS-TO-PROCESS DELIVERY
•There are two types of transmission

•Connection-Oriented Transmissions (TCP protocol)

•Connectionless Transmissions (UDP protocol)


SWITCHING TECHNIQUES
 Circuit Switching
 Packet Switching
 Virtual Circuit
 Datagram
SESSION LAYER
• The session layer is the fifth layer of the OSI model.

• Based on the transport layer, session layer uses the


services provided by the transport layer.
Session layer
 The Session layer is
responsible for the creation,
management, and termination
of sessions between systems.

 For example, a session might


be created for the purpose of
user authentication, or to
initiate a file transfer.
FUNCTIONS OF SESSION LAYER

 Dialog Control
 Token Management

 Synchronization
Presentation Layer
Functions
(1)Data Presentation
(2) Data Compression
(3) DATA SECURITY
What Is Cryptography?
 Cryptography -- from the Greek for “secret writing” --
is the mathematical “scrambling” of data so that only
someone with the necessary key can “unscramble” it.
Cryptography components

•The first component of cryptosystem is original set of


information called PLAINTEXT.
•The information that is not recognizable to common person is
called CIPHER.
CRYPTOGRAPHY - TYPES
1. Symmetric
2. Asymmetric
Secret-Key or Symmetric Cryptography

In symmetric-key cryptography, the same


key is used by the sender (for encryption)
and the receiver (for decryption). The key is
shared.
Asymmetric Cryptography
 Asymmetric cryptosystem use one key to encrypt
message and different key to decrypt it.
 Asymmetric cryptosystems are called public key
cryptosystems.
 Asymmetric-key algorithms are more efficient for short
messages.
APPLICATION LAYER

 HTTP
 SMTP

 FTP

 DNS

 DHCP

26.2
6
LAYERED MODEL
 OSI MODEL VS TCP/IP MODEL
NETWORK SECURITY
Firewall

• Is a device installed between the internal network of an


organization and the rest of the Internet
Types of Firewalls
• Packet Filter Firewall
• Proxy based Firewall

30
COMPUTER VIRUS
 COMPUTER VIRUS
 DIFFERENT TYPES OF COMPUTER VIRUSES
 ANTIVIRUS

You might also like