Professional Documents
Culture Documents
The functionality of the TCP IP model is divided into four layers, and each
includes specific protocols.
TCP/IP is a layered server architecture system in which each layer is defined
according to a specific function to perform. All these four TCP IP layers work
collaboratively to transmit the data from one layer to another.
Application Layer
Transport Layer
Internet Layer
Network Interface
Four Layers of TCP/IP model
Application Layer
Application layer interacts with an application program, which is the highest
level of OSI model. The application layer is the OSI layer, which is closest to
the end-user. It means the OSI application layer allows users to interact with
other software application.
Application layer interacts with software applications to implement a
communicating component. The interpretation of data by the application
program is always outside the scope of the OSI model.
Example of the application layer is an application such as file transfer, email,
remote login, etc.
The function of the Application Layers are:
Application-layer helps you to identify communication partners,
determining resource availability, and synchronizing communication.
It allows users to log on to a remote host
This layer provides various e-mail services
This application offers distributed database sources and access for
global information about various objects and services.
Transport Layer
Transport layer builds on the network layer in order to provide data transport
from a process on a source system machine to a process on a destination
system. It is hosted using single or multiple networks, and also maintains the
quality of service functions.
It determines how much data should be sent where and at what rate. This
layer builds on the message which are received from the application layer. It
helps ensure that data units are delivered error-free and in sequence.
Transport layer helps you to control the reliability of a link through flow control,
error control, and segmentation or de-segmentation.
The transport layer also offers an acknowledgment of the successful data
transmission and sends the next data in case no errors occurred. TCP is the
best-known example of the transport layer.
Important functions of Transport Layers:
It divides the message received from the session layer into segments
and numbers them to make a sequence.
Transport layer makes sure that the message is delivered to the correct
process on the destination machine.
It also makes sure that the entire message arrives without any error else
it should be retransmitted.
Internet Layer
An internet layer is a second layer of TCP/IP layes of the TCP/IP model. It is
also known as a network layer. The main work of this layer is to send the
packets from any network, and any computer still they reach the destination
irrespective of the route they take.
The Internet layer offers the functional and procedural method for transferring
variable length data sequences from one node to another with the help of
various networks.
Message delivery at the network layer does not give any guaranteed to be
reliable network layer protocol.
Layer-management protocols that belong to the network layer are:
1. Routing protocols
2. Multicast group management
3. Network-layer address assignment.
The Network Interface Layer
Network Interface Layer is this layer of the four-layer TCP/IP model. This layer
is also called a network access layer. It helps you to defines details of how
data should be sent using the network.
It also includes how bits should optically be signaled by hardware devices
which directly interfaces with a network medium, like coaxial, optical, coaxial,
fiber, or twisted-pair cables.
A network layer is a combination of the data line and defined in the article of
OSI reference model. This layer defines how the data should be sent
physically through the network. This layer is responsible for the transmission
of the data between two devices on the same network.
Differences between OSI and TCP/IP models
OSI model, the transport layer is only A layer of the TCP/IP model is both
connection-oriented. connection-oriented and connectionless.
In the OSI model, the data link layer and In TCP, physical and data link are both
physical are separate layers. combined as a single host-to-network layer.
Session and presentation layers are not There is no session and presentation layer
a part of the TCP model. in TCP model.
It is defined after the advent of the It is defined before the advent of the
Internet. internet.
1. Unplug the PC
2. Remove the cover
3. Remove the cover plate adjacent to the slot for your NIC
4. Align the NIC over the slot with the jack facing toward the outside of
the PC
5. Set the NIC into the slot and press down firmly. Make sure the
mounting bracket is properly aligned with any slot that might be
present. It may be necessary to gently rock the card from end to end
to secure it in the slot. The gold contacts at the bottom of the NIC
should nearly or completely disappear into the slot. The card should
be level and straight.
6. Secure the NIC mounting bracket to the case with a screw (or replace
the securing mechanism your case uses.
7. Replace the cover
8. Plug in the PC
9. Plug in the ethernet wire to the RJ-45 jack and plug the other end into
the your DSL modem, hub, router or if using a crossover wire, directly
to another PC.
That completes the hardware installation, next you will need to start the
computer and complete the software installation. Your NIC should have
come with a disk which contains the appropriate drivers.
Follow the manufacturer's instructions for installing the software. Windows
will detect the NIC and start the hardware wizard; simply follow the
prompts. Some manufacturers require you to cancel the hardware wizard
and complete the installation using their own installation instructions.
To connect your PC to a local area network, you will have to configure your
operating system software. In Windows, use the Network Wizard or read
our article on the topic.
Configure Network Interface Card (NIC) on Development
Computer
To connect the Xilinx® Zynq® hardware board to the development computer,
you must configure an available network connection on the development
computer. Follow the steps outlined for your specific operating system.
Windows
1. Open the Control Panel.
2. Set View by to Category.
3. Click Network and Internet.
4. Click Network and Sharing Center.
5. On the left pane, click Change adapter settings.
6. Right-click the local area network connection that is connected to the radio
hardware and select Properties.
If an unused network connection is available, the local area connection
appears as Unidentified network.
If you plan to reuse your network connection, select the local area connection
that you plan to use for the radio hardware.
If you have only one network connection, check if you can connect
wirelessly to the existing local area network. If you can, you can use the
network connection for the radio hardware.
You can use a pluggable USB to Gigabit Ethernet LAN adapter instead of a
NIC. The instructions are the same.
7. On the Networking tab of the Properties dialog box, clear all options
except Internet Protocol Version 4 (TCP/IPv4). Other services, particularly
antiviral software, can cause intermittent connection problems with the radio
hardware.
8. Double-click Internet Protocol Version 4 (TCP/IPv4).
9. On the General tab, select Use the following IP Address.
10.The default IP address of the Xilinx Zynq hardware board is 192.168.1.101.
The development computer network connection must be on the same subnet as
the hardware board. To meet this requirement, a compatible IP address must be
assigned to the development computer network connection. Set the network IP
address to 192.168.1.x, where x is any number in the range 1 through 255,
apart from 101.
11.Leave the subnet mask set to the default value of 255.255.255.0 and
click OK.
Understanding Subnetting:
An IP address is the combination of two addresses; network address and host address.
Network address is always written first in sequence. While reading an IP address how
much portion should be treated as network address and how much portion should be
treated as host address is decided by an another address known as Subnet mask.
An IP address is always used with Subnet mask. Without subnet mask an IP address is an
ambiguous address and vice versa.
Both IP address and Subnet mask consists 32 bits. These bits are divided in four octets.
Octets are separated by periods and written in a sequence.
A Subnet mask can be written in two ways; in full form and in abbreviated form. In full
form a decimal value of each octet is written along with IP address. In abbreviated form
only the number of network bits are written along with IP address. Following table lists
some examples of both types.
IP address with full subnet mask IP address with abbreviated subnet mask
10.0.0.0 10.0.0.0/8
255.0.0.0
172.168.1.0 172.168.1.0/16
255.255.0.0
192.168.1.0 192.198.1.0/24
255.255.255.0
To know how many Subnetting bits are required to create how many networks, we use
power of 2.
For example if we want to know many networks can be created from 3 Subnetting bits,
we will use power 2 three times.
23 = 8
We can create 8 networks from 3 Subnetting host bits.
Power of 2
2X Value 2X Value 2X Value 2X Value
In each network first address and last address are always reserved for network address
and broadcast address respectively. Besides these two addresses, all remaining
addresses are considered as valid host addresses.
Subnetting Questions
A Subnetting question can be asked in three ways.
1. Find the number of networks and number of host addresses in each network
2. Find the type of given address, network ID and broadcast ID
3. Build the Subnet mask
Let’s understand the each type of Subnetting question in detail with examples.
Finding the number of networks and host addresses in each network
In this type of questions, we are asked to find the number of networks and host
addresses in each network from a given address space. Let’s take some examples.
Following table lists 15 imaginary networks. Find the number of networks, total hosts
and valid hosts in each network.
Security
Routers have to be secluded from being filled with massive data and heavy traffic. It is
important to ensure that congestion between the routing paths can be minimized
acceptably, so several routing tables should be designed to map the network's data
travel process. Whereas the gateway is important, since it is the endpoint for the
network, it should be highly protected to avoid a virus attack. The data passes via the
gateway could be easily accessed. If a single router is flooded or granted, the particular
router can be disabled by the customer. In order to get the data over the network,
another router determines the shortest possible way. However, if the user eliminates the
gateway, it leads to the whole down of the network.
Components Configuration
The routers are designed with a list of IP addresses from the routing tables that can
transfer the router data. While the gateway is configured by specifying the
recommended internal and external IP addresses, it has two ports to iterate between
routers and gateways for internal and external IPs.
Definition A Router is a networking layer system A gateway is simply a device or hardware that acts
used to manage and forward data as a "gate" between the networks. It could also be
packets to computer networks. defined as a node that acts as an entry for other
network nodes.
Working Usually, routers run on the 3rd layer of Gateway interprets the network system as
Principle the protocol and transmit the packets endpoints from one packet to another.
from one system to another. A router
chooses the network's path to
transport the data packets.
Deployment It is deployed on the router hardware The gateway is deployed as the virtual or physical
in a specific appliance. server or the specific appliance.
OSI Layer It can operate only on 3 and 4 layers. It can operate only on the 5 layers.
Dynamic Router supports dynamic routing. Gateway doesn't support dynamic routing.
Routing
Associated The router is also called a wireless The gateway is also called a gateway router, proxy
terms router and an Internet router. server, and voice gateway.
Component's The router operates by installing The gateway works by distinguishing between the
Operating different routing data for different network structure and the components available
Process networks, and the destination address outside the network.
is based on traffic.
If you do not have yum repository use RPM command to install these packages. Go in
the folder which contain RPM (In installation disk of RHEL, Package folder contains all
RPM ) and run following command.
#rpm -ivhnfs* --nodeps --force
#rpm -ivhrpcbind* --nodeps --force
Our second task is to verify that the NFS services are installed. This can be done form
following command.
rpm –qanfs-utils
Verify that rpcbind package is installed.
rpm –qarpcbind
For this article I assume that you have both packages installed.
Following services are associated with NFS daemons. Each service have its script file
stored in init.d directory.
/etc/init.d/nfs Main control script for NFS Daemons which control NFS services.
/etc/init.d/nfslock Script for lock files and the statd daemon, which locks and provides status of files those are c
/etc/init.d/portreserve Replacement script for the portmap which used to set up ports for RPC services.
/etc/init.d/rpcidmapd Configuration script used for mapping of NFS user ID to LDAP and Kerberos systems.
/etc/init.d/rpcsvcgssd Control script for the server side of RPC-related general security services.