You are on page 1of 20

CN UNIT - I : INTRODUCTION

During the 20thcentury, the key technology was information gathering, processing, and distribution. The
merging of computers and communications has had a profound influence on the way computer systems are
organized. The concept of the ''computer center'' has a room with a large computer to which all the users bring
their work or jobs for processing is now totally obsolete. The old model of this single computer serving all of the
organization's computational needs has been replaced by one in which a large number of separated but
interconnected computers to do the jobs. These systems collection is called as computer network.

A network is a set of devices (often referred to as nodes) connected by communication links. Where a
node can be a computer, printer, or any other device capable of sending and/or receiving the data generated by
other nodes on the network

CN Definition:
The term ''computer network'' to mean a collection of autonomous computers interconnected by a single
technology that can exchange the information. Two computers are said to be interconnected iff they are able to
exchange information. The connection need not be via a copper wire; fiber optics, microwaves, infrared, and
communication satellites can also be used. Networks come in many sizes, shapes and forms.
Computer network Example: LAN systems in our LAB
There is considerable confusion in the literature between a computer network and a distributed system.

Distributed system Definition:


In a distributed system, a collection of independent computers appears to its users as a single coherent
system. it Has a single model or paradigm that it presents to its users.
Expl: the World Wide Web , Exp2 : ATM operation
Conclusion: A distributed system is a software system built on the top of a network.

Basically Any Data communications system has 5 components.

1. Message. The message is the information (data) to be communicated. Popular


forms of information include text, numbers, pictures, audio, and video.
2. Sender. The sender is the device that sends the data message. It can be a
computer, workstation, telephone handset, video camera, and so on.
3. Receiver. The receiver is the device that receives the message. It can be a computer,
workstation, telephone handset, television, and so on.
4. Transmission medium. The transmission medium is the physical path by which a
message travels from sender to receiver. Some examples of transmission media include
twisted-pair wire, coaxial cable, fiber-optic cable, and radio waves
5. Protocol. A protocol is a set of rules that govern data communications. It
represents an agreement between the communicating devices. Without a protocol, two
devices may be connected but not communicating, just as a person speaking French
cannot be understood by a person who speaks only Japanese.
- - - - END OF TOPIC ----

1.1 Uses of Computer Networks

1.1.1 Networks for Companies (i.e for Business Applications )


 Resource Sharing
 High Reliability
 Saving Money
 Communication Medium
 Scalability

The issue here is resource sharing, and here the main goal is to make all resources (i.e
programs, equipment,project reports and especially data) available to everyone on the network without regard to
1
the physical location of the resources and the user. In the simplest of terms, one can imagine a ―company's
information system‖ as consisting of one or more databases and some number of employees who need to access
the resources remotely. In this model, the data are stored on powerful computers called servers. Often these are
centrally housed/stored and maintained by a system administrator. In contrast, the employees have simpler
machines, called clients, on their desks/tables, with this clients they can access remote data from servers, for
example, to include in spreadsheets which they are constructing. The client and server machines are connected by
a network, as illustrated in Fig. 1-1.

Client2

Figure 1-1. A network with two clients and one server

Figure 1-2. The client-server model involves requests and replies.

In client-server model Communication takes the form of the client process sending a message over the
network to the server process. The client process then waits for a reply message. When the server process gets the
request, it performs the requested work or looks up the requested data and sends back a reply. These messages are
shown in Fig. 1-2.

A second Goal is to provide high reliability by having alnerate sources of supply.(i.e maintaining alternative
sources of resources i.e all the files could be replicated or duplicated on two or more machines on the network ) if
one of the machine is failed the other machine can provide the data without interruption of your project work.
Another Goal is Saving Money i.e small computers have much better price/performance ratio than largest
computers(main frame computers) . Main frame large computers may be roughly factor of 10 times faster than
small(personal) computers, but the above main frame computers COST is 1000 times more than our existing small
personal computers. This imbalance has leads to many system administrators to build client server systems
consisting of local computers for each individual user and each user connected to a network.this arrangement is
called as client-server model.shown in above fig.
Another goal of setting up a computer network has to do with people rather than
information or even computers. A computer network can provide a powerful communication medium among
employees. Virtually every company that has two or more computers now has e-mail (electronic mail), which
employees generally use for a great deal of daily communication. But e-mail is not the only form of improved
communication made possible by computer networks. With a network, it is easy for two or more people who work
far apart to write a report together. When one worker makes a change to an online document, the others can see
the change immediately, instead of waiting several days for a letter. Such a speedup makes cooperation among
far-flung groups of people easy where it previously had been impossible. another form of computer-assisted
communication is videoconferencing. Using this technology, employees at distant locations can hold a meeting,
seeing and hearing each other and even writing on a shared virtual blackboard. Videoconferencing is a powerful
tool for eliminating the cost and time previously devoted to travel.
Another goal is scalability is nothing but ―ability to increase the system performance gradually as
the work load increases simply just by adding few more computers(processors) into the network.
One more goal is for increasingly many companies is doing business electronically with
othercompanies, especially suppliers and customers. For example, manufacturers of automobiles, aircraft, and
computers, among others, buy subsystems from a variety of suppliers and then assemble the parts. Using computer
networks, manufacturers can place orders electronically as needed. Being able to place orders in real time (i.e., as
needed) reduces the need for large inventories and enhances efficiency. last goal that is starting to become more
important is doing business with consumers over the Internet. Airlines, bookstores, and music vendors have
discovered that many customers like the convenience of shopping from home.

1.1.2 Networks for People ( i.e for Home Applications )


Uses of the Internet for home users applications are :

2
1. Access to remote information. 2. Person-to-person communication.
3. Interactive entertainment. 4. Electronic commerce.

1.Access to remote information done in many ways i.e


• Surfing the WEB for remote information (arts, business, government,history, hobbies, recreation, science, sports,
travel,– or just for fun: comes in too many ways to mention, plus some ways that are better to left unmentioned
• Many newspapers (magazines and scientific journals) have gone on line and can be personalized ( tell a
newspaper that you want everything about corrupt politicians) • The on-line digital library: many professional
organizations (ACM, IEEE Society) have journals and conference proceedings on-line, the book sized notebook
computer is a reality!!!!!!!!!!!
• NOTE: All of these applications involve interactions between a person and a remote data base full of information

2.Person-to-person communication
Basically the21 century answer to the 19th centuries' telephone • E-mail is used by millions of people. It contains audio,
video, as well as text and pictures.
• Instant messaging: allows two people to type messages at each other in real time
• Chat room: a multiperson version
• Worldwide news groups: with discussions on conceivable topic
• Peer-to- peer communication
– in this form individuals who form a loose group can communicate with others in the group.
– Every person can communicate with one or more other people
– There is no fixed division into clients and servers.

Figure 1-3. In a peer-to-peer system there are no fixed clients and servers.
On-line auctions are more of a peer-to-peer system, sort of consumer-to-consumer.
Some of these forms of e-commerce have acquired cute little tags.

Figure 1-4. Some forms of e-commerce.

1.1.3 Networks for Interactive entertainment : vedio conferencing, skype call, teleconferencing are the examples
of it.
A huge and growing industry
• Important application:
– video on demand, live television
– Game playing; if the games are played with goggles and threedimensional real-time we have a kind of worldwide
shared virtual reality

1.1.4 for ECOMMERCE :


Home shopping is already popular and enables users to inspect the on-line
catalogs of thousand of companies. It provides a lot of abilities:
– Instant video of any product
– On-line technical support
• Access to financial institutions:
– Manny people already pay their bills, manage their bank accounts and
handle their investments electronically
• Electronic flea markets
– On line auctions of second-hand goods have become a massive
industry. They are more of a peer-to-peer system, sort of consumer-toconsumer.
– Some of these forms e-commerce have acquired cute little tags based
on the fact that ―to‖ and ―2‖ are pronounced the same.
1.1.4 Mobile Users

3
Mobile computers, such as notebook computers and personal digital assistants (PDAs), are one of the
fastest-growing segments of the computer industry. Many owners of these computers have desktop machines back
at the office and want to be connected to their home base even when away from home or en route. People on the
road often want to use their portable electronic equipment to send and receive telephone calls, faxes, and
electronic mail, surf the Web, access remote files, and log on to remote machines. And they want to do this from
anywhere on land, sea, or air. Wireless networks are also important to the military. wireless networking and
mobile computing are often related, they are not identical, as

Figure 1-5. Combinations of wireless networks and mobile computing.


1.1.5 Social Issues
The widespread introduction of networking has introduced new social, ethical, and political problems.
- - - - END OF TOPIC ----
NETWORK Topologies:
The term topology refers to the way in which a network is laid out(arranged) physically: two or more devices
connect to a link;two or more links form a topology. The topology of a network is the geometric representation
of the relationship of all the links and linking devices (usually called nodes) to one another.
There are four basic topologies possible: mesh, star, bus, and ring

Mesh topology : In a mesh topology, every device has a dedicated point-to-point link to every other device.
The term
dedicated means that the link carries data only between the two devices it
connects.
One practical example of a mesh topology is the connection of telephone regional offices in which each
regional office needs to be connected to every other regional office.
To find the number of physical links in a fully connected mesh network with n nodes, we first consider
that each node must be connected to every other node. Node 1 must be connected to n - 1 nodes, node 2 must be
connected to n – 1 nodes, and finally node n must be connected to n-1 nodes. However each physical link
allows communication in both directions (duplex mode).

Figure: A fully connected mesh topology (five devices)

Advantages of mesh topology:

 The use of dedicated links guarantees that each connection can carry its own data
load, thus eliminating the traffic problems that can occur when links must be shared by
multiple devices.
 A mesh topology is robust. If one link becomes unusable, it does not fail the entire
system
 There is the advantage of privacy or security. When every message travels
along a dedicated line, only the specific recipient sees it. Dedicated links prevent other
users from accessing the messages.
 Finally, point-to-point links make fault identification and fault correction easy. 4
Disadv antages of mesh topology:
 The amount of cabling and the number of I/O ports required are high.
 Every device must be connected to every other device, installation and reconnection are difficult.
 The bulk wiring can be greater than the available space (in walls, ceilings, or floors).
 The hardware required to connect each link (I/O ports and cable) can be prohibitively expensive.

Star Topology: In a star topology, each device has a dedicated point-to-point link only to a central controller,
usually called a hub. The devices are not directly linked to one another. Unlike a mesh topology, a star topology
does not allow direct traffic between devices. The controller acts as an exchange: If one device wants to send data
to another, it sends the data to the controller, which then transfers the data to the other connected device.
The star topology is used in local-area networks (LANs),

Advantages of star topology


 A star topology is less expensive than a mesh topology
 In a star, each device needs only one link and one I/O port to connect it to any number of others. This
factor also makes it easy to install and reconfigure.
 less cabling needs to be housed
 Any additions, moves, and deletions involve only one connection: between that device and the hub.
 If one link fails, only that link is affected. All other links remain active. This factor also lends itself to
easy fault identification and fault correction.
Disadvantages of star topology
 Star topology is the dependency of the whole topology on one single point, the hub. If the hub goes
down, the whole system is dead.
 Although a star requires far less cable than a mesh, each node must be linked to a central hub. For
this reason, often more cabling is required in a star than in some other topologies (such as ring or bus).

Bus Topology: A bus topology is multipoint. One long cable acts as a backbone to link all the devices in a
network

Nodes are connected to the bus cable by drop lines and taps. A drop line is a connection running between the
device and the main cable. A tap is a connector that either splices into the main cable or punctures the
sheathing of a cable to create a contact with the metallic core. As a signal travels along the backbone,
some of its energy is transformed into heat. Therefore, it becomes weaker and weaker as it travels farther and
farther. For this reason there is a limit on the number of taps a bus can support and on the distance between those
taps.
Bus topology was the one of the first topologies used in the design of early local area networks.
Ethernet LANs can use a bus topology, but they are less popular now
Advantages of bus topology
 ease of installation
5
 In a bus, this redundancy is eliminated.
Disadvantages of bus topology
 difficult reconnection and fault isolation
 A bus is usually designed to be optimally efficient at installation. It can therefore be difficult to add new
devices.
 A fault or break in the bus cable stops all transmission. The damaged area reflects signals back in the
direction of origin, creating noise in both directions.

Ring Topology: In a ring topology, each device has a dedicated point-to-point connection with only the two
devices on either side of it. A signal is passed along the ring in one direction, from device to device, until it
reaches its destination. Each device in the ring incorporates a repeater. When a device receives a signal
intended for another device, its repeater regenerates the bits and passes them along.

Advantages of ring topology:


 easy to install and reconfigure
 Each device is linked to only its immediate neighbors (either physically or logically). To add or delete
a device requires changing only two connections

Hybrid Topology: A network can be hybrid. For example, we can have a main star
topology
with each branch connecting several stations in a bus topology as shown in
Figure

- - - - - END OF TOPIC - - - - - -

1.2 Network Hardware


• Local Area Networks
• Metropolitan Area Networks
• Wide Area Networks
• Wireless Networks
6
• Home Networks
• Internetworks
&
There are two types of transmission technology

1. Broadcast links. 2. Point-to-point links.

Types of transmission technology


• Broadcast links –single comm channel shared by all the machines
• Point-to-point links – many connections between individual pairs of machines- multiple routes

 Broadcast systems generally also allow the possibility of addressing a packet to all destinations by using a
special code in the address field. When a packet with this code is transmitted, it is received and processed
by every machine on the network. This mode of operation is called broadcasting. Some broadcast systems
also support transmission to a subset(group) of the machines,something known as multicasting

There are two possible types of connections: point-to-point and multipoint.

In contrast, point-to-point networks consist of many connections between individual pairs of machines.
To go from the source to the destination, a packet on this type of network may have to first visit one or more
intermediate machines. Often multiple routes, of different lengths, are possible, so finding good ones is important
in point-to-point networks. As a general rule, smaller, geographically localized networks tend to use broadcasting,
whereas larger networks usually are point-to-point. Point-to-point transmission with one sender and one receiver
is sometimes called unicasting. criterion for classifying networks is their scale. In Fig. 1-6 we classify multiple
processor systems by their physical size(SCALE). At the top are the personal area networks, networks that are
meant for one person. For example, a wireless network connecting a computer with its mouse, keyboard, and
printer is a personal area network. Also, a PDA that controls the user's hearing aid or pacemaker fits in this
category. Beyond the personal area networks come longer-range networks. These can be divided into local,
metropolitan, and wide area networks. Finally, the connection of two or more networks is called an internetwork.
The worldwide Internet is a well-known example of an internetwork. Distance is important as a classification
metric because different techniques are used at different scales.

Figure 1-6. Classification of interconnected processors by size(scale).

1.2.1 Local Area Networks ( LAN )

7
Local area networks, generally called LANs, are privately-owned
networks within a single building or campus of up to a few kilometers in size. They are widely used to connect
personal computers and workstations in company offices and factories to share resources (e.g., printers) and
exchange information. LANs are distinguished from other kinds of networks by three characteristics:
(1) their size, (2) their transmission technology, and (3) their topology.

LANs are restricted in size, which means that the worst-case transmission time is bounded and known in
advance. Knowing this bound makes it possible to use certain kinds of designs that would not otherwise be
possible. It also simplifies network management. LANs may use a transmission technology consisting of a cable
to which all the machines are attached, like the telephone company party lines once used in rural areas. Traditional
LANs run at speeds of 10 Mbps to 100 Mbps, have low delay (microseconds or nanoseconds), and make very few
errors. Newer LANs operate at up to 10 Gbps. In this book, we will adhere to tradition and measure line speeds in
megabits/sec (1 Mbps is 1,000,000 bits/sec) and gigabits/sec (1Gbps is 1,000,000,000 bits/sec). Various
topologies are possible for broadcast LANs. Figure 1-7

In a bus (i.e., a linear cable) topology network, at any instant at most one machine is the master and is
allowed to transmit. All other machines are required to refrain from sending. An arbitration mechanism is needed
to resolve conflicts when two or more machines want to transmit simultaneously. The arbitration mechanism may
be centralized or distributed. IEEE 802.3, popularly called Ethernet, for example, is a bus-based broadcast
network with decentralized control, usually operating at 10 Mbps to 10 Gbps. Computers on an Ethernet can
transmit whenever they want to; if two or more packets collide, each computer just waits a random time and tries
again later.

Figure 1-7. Two broadcast networks. (a) Bus. (b) Ring.


A second type of broadcast system is the ring topology. In a ring, each bit propagates around on its
own, not waiting for the rest of the packet to which it belongs. Typically, each bit circumnavigates the entire ring
in the time it takes to transmit a few bits, often before the complete packet has even been transmitted. As with all
other broadcast systems, some rule is needed for arbitrating simultaneous accesses to the ring. Various methods,
such as having the machines take turns, are in use. IEEE 802.5 (the IBM token ring), is a ring-based LAN
operating at 4 and 16 Mbps. FDDI is another example of a ring network. Broadcast networks can be further
divided into static and dynamic, depending on how the channel is allocated. A typical static allocation would be
to divide time into discrete intervals and use a round-robin algorithm, allowing each machine to broadcast only
when its time slot comes up. Static allocation wastes channel capacity when a machine has nothing to say during
its allocated slot, so most systems attempt to allocate the channel dynamically (i.e., on demand).
Dynamic allocation methods for a common channel are either centralized or decentralized. In the centralized
channel allocation method, there is a single entity, for example, a bus arbitration unit, which determines who goes
next. It might do this by accepting requests and making a decision according to some internal algorithm. In the
decentralized channel allocation method, there is no central entity; each machine must decide for itself whether to
transmit. You might think that this always leads to chaos, but it does not.

1.2.2 Metropolitan Area Networks ( MAN )


 A metropolitan area network, or MAN, covers a city. The best-known example of a MAN is the cable
television network available in many cities. This system grew from earlier community antenna systems
used in areas with poor over-the-air television reception. MAN might look like the system shown in Fig.
1-8. In this figure we see both television signals and Internet being fed into the centralized head end for
subsequent distribution to people's homes. Cable television is not the only MAN. Recent developments in
high-speed wireless Internet access resulted in another MAN, which has been standardized as IEEE 802.16.

8
Figure 1-8. A metropolitan area network based on cable TV.

1.2.3 Wide Area Networks


 A wide area network, or WAN, spans a large geographical area, often a country or continent. It contains a
collection of machines intended for running user (i.e., application) programs. We will follow traditional
usage and call these machines hosts. The hosts are connected by a communication subnet, or just subnet
for short. The hosts are owned by the customers (e.g., people's personal computers), whereas the
communication subnet is typically owned and operated by a telephone company or Internet service
provider. The job of the subnet is to carry messages from host to host, just as the telephone system carries
words from speaker to listener. subnet consists of two distinct components: transmission lines and
switching elements. Transmission lines move bits between machines. They can be made of copper wire,
optical fiber, or even radio links. Switching elements are specialized computers that connect three or more
transmission lines. When data arrive on an incoming line, the switching element must choose an outgoing
line on which to forward them. In this model, shown in Fig. 1-9, each host is frequently connected to a
LAN on which a router is present, although in some cases a host can be connected directly to a router. The
collection of communication lines and routers (but not the hosts) form the subnet.

Figure 1-9. Relation between hosts on LANs and the subnet.

1.2.4 Wireless Area Networks (WAN )


wireless networks can be divided into three main categories:
1. System interconnection. 2. Wireless LANs. 3. Wireless WANs.
System interconnection is all about interconnecting the components of a computer using shortrange radio. Almost
every computer has a monitor, keyboard, mouse, and printer connected to the main unit by cables. system
interconnection networks use the master-slave paradigm of Fig. 1- 10(a). The system unit is normally the master,
talking to the mouse, keyboard, etc., as slaves. The master tells the slaves what addresses to use, when they can
broadcast, how long they can transmit, what frequencies they can use, and so on.

Figure 1-10. (a) Bluetooth configuration. (b) Wireless LAN.

9
The next step up in wireless networking is the wireless LANs. These are systems in which every computer has a
radio modem and antenna with which it can communicate with other systems. Often there is an antenna on the
ceiling that the machines talk to, as shown in Fig. 1-10(b). However, if the systems are close enough, they can
communicate directly with one another in a peer-to-peer configuration. Wireless LANs are becoming increasingly
common in small offices and homes, where installing Ethernet is considered too much trouble, as well as in older
office buildings, company cafeterias, conference rooms, and other places. There is a standard for wireless LANs,
called IEEE 802.11, which most systems implement and which is becoming very widespread. The third kind of
wireless network is used in wide area systems. The radio network used for cellular telephones is an example of a
low-bandwidth wireless system. This system has already gone through three generations. The first generation was
analog and for voice only. The second generation was digital and for voice only. The third generation is digital
and is for both voice and data.

Internetworks
• Def: A collection of interconnected networks is called an internetwork or simply internet
– Expl: a collection of LANs connected by a WAN

• Subnet – networks – internetworks : differences

– >Subnet make sense in the context of wide area network =collection of routers and communication lines

– >Subnet + hosts = network

– >Internetwork = Connecting a LAN and a WAN


Or Connecting 2 LANs

1.4 Reference Models


1.4.1 The OSI Reference Model

The model is called the ISO OSI (Open Systems Interconnection) Reference Model because it deals with
connecting open systems—that is, systems that are open for communication with other systems.

10
Figure 1-17. The OSI reference model.
The OSI model has seven layers.
1. A layer should be created where a different abstraction is needed.
2. Each layer should perform a well-defined function.
3. The function of each layer should be chosen with an eye toward defining internationally standardized protocols.
4. The layer boundaries should be chosen to minimize the information flow across the interfaces.
5. The number of layers should be large enough that distinct functions need not be thrown
together in the same layer out of necessity and small enough that the architecture does not become unwieldy.

The Physical Layer


The physical layer is concerned with transmitting raw bits over a communication channel. The
design issues have to do with making sure that when one side sends a 1 bit, it is received by the other side
as a 1 bit, not as a 0 bit. The design issues here largely deal with mechanical, electrical, and timing
interfaces, and the physical transmission medium, which lies below the physical layer.

The Data Link Layer


The main task of the data link layer is to transform a raw transmission facility into a line that
appears free of undetected transmission errors to the network layer. It accomplishes this task by having the
sender break up the input data into data frames (typically a few hundred or a few thousand bytes) and
transmit the frames sequentially. If the service is reliable, the receiver confirms correct receipt of each
frame by sending back an acknowledgement frame. Another issue that arises in the data link layer (and
most of the higher layers as well) is how to keep a fast transmitter from drowning a slow receiver in data.
Some traffic regulation mechanism is often needed to let the transmitter know how much buffer space the
receiver has at the moment. Frequently, this flow regulation and the error handling are integrated.

The Network Layer


The network layer controls the operation of the subnet. A key design issue is determining how
packets are routed from source to destination.
If too many packets are present in the subnet at the same time, they will get in one another's way,
forming bottlenecks. The control of such congestion also belongs to the network layer. More
generally, the quality of service provided (delay, transit time, jitter, etc.) is also a network layer
issue.
When a packet has to travel from one network to another to get to its destination, many problems
can arise. The addressing used by the second network may be different from the first one. The
second one may not accept the packet at all because it is too large. The protocols may differ, and so
on. It is up to the network layer to overcome all these problems to allow heterogeneous networks to
be interconnected. In broadcast networks, the routing problem is simple, so the network layer is
often thin or even nonexistent.

The Transport Layer


11
The basic function of the transport layer is to accept data from above, split it up into smaller units if
need be, pass these to the network layer, and ensure that the pieces all arrive correctly at the other
end. Furthermore, all this must be done efficiently and in a way that isolates the upper layers from
the inevitable changes in the hardware technology. The transport layer also determines what type of
service to provide to the session layer, and, ultimately, to the users of the network. The most
popular type of transport connection is an error-free point-to-point channel that delivers messages
or bytes in the order in which they were sent. The transport layer is a true end-to-end layer, all the
way from the source to the destination. In other words, a program on the source machine carries on
a conversation with a similar program on the destination machine, using the message headers and
control messages. In the lower layers, the protocols are between each machine and its immediate
neighbors, and not between the ultimate source and destination machines, which may be separated
by many routers. The difference between layers 1 through 3, which are chained, and layers 4
through 7, which are end-to-end.

The Session Layer


The session layer allows users on different machines to establish sessions between them. Sessions
offer various services, including dialog control (keeping track of whose turn it is to transmit), token
management (preventing two parties from attempting the same critical operation at the same time),
and synchronization (checkpointing long transmissions to allow them to continue from where they
were after a crash).

The Presentation Layer


Lower layers, which are mostly concerned with moving bits around, the presentation layer is
concerned with the syntax and semantics of the information transmitted. In order to make it
possible for computers with different data representations to communicate, the data structures to be
exchanged can be defined in an abstract way, along with a standard encoding to be used ''on the
wire.'' The presentation layer manages these abstract data structures and allows higher-level data
structures (e.g., banking records), to be defined and exchanged.

The Application Layer


The application layer contains a variety of protocols that are commonly needed by users. One
widely-used application protocol is HTTP (HyperText Transfer Protocol), which is the basis for the
World Wide Web. When a browser wants a Web page, it sends the name of the page it wants to the
server using HTTP. The server then sends the page back. Other application protocols are used for
file transfer, electronic mail, and network news.

LAYERS IN THE OSI MODEL : .

Physical Layer :

The physical layer is used for transmitting the raw bits over a communication channel. Here if the
system at one side sends 1bit, it is received by the other side also as a 1bit, not as a 0 bit. The functions
required to carry a bit stream over a physical medium. It deals with the mechanical and electrical specifications
of the interface and transmission medium. Following figure shows the position of the physical layer with respect
to the transmission medium and the data link layer.

Figure: Physical
layer
The physical layer is also concerned with the
following:
 Representation of bits: The physical layer data consists of a stream of bits (sequence of 0s or 1s)
with no interpretation. To be transmitted, bits must be encoded into signals--electrical or optical.
 Data rate: It represents that how many number of bits can be transferred in each second is also
12
defined by the physical layer.
 Synchronization of bits:The sender and receiver both must have to use the same bit rate but also
must be synchronized at the bit level

Line configuration: The physical layer is concerned with the connection of devices to the media. In a point-
to- point configuration, two devices are connected through a dedicated link. In a multipoint configuration,
a link is shared among several devices.
 Physical topology: The physical topology defines how devices are connected to make a network.
Ex: mesh topology, a star topology, a ring topology, a bus topology, a hybrid topology.
 Transmission mode: The physical layer also defines the direction of transmission between the two
devices as Simplex, Half-duplex, and Full-duplex.

Data Link Layer (node to node delivery of a mesg)


The data link layer transforms the physical layer, a raw transmission facility, to a reliable link. It makes the
physical layer appear as an error-free to the upper layer (network layer).
Following Figure shows the relationship of the data link layer to the network and
physical layers.

 Framing: The data link layer divides the stream of bits received from the network layer into data
units called frames.
 Physical addressing. If frames are to be distributed to different systems on the network, the data link
layer adds a header to the frame to define the sender and/or receiver of the frame. If the frame is
intended for a system outside the sender's network, the receiver address is the address of the device that
connects the network to the next one.
 Flow control: If the rate at which the data is absorbed by the receiver is less than the rate at which
data is transferred by thesender, the data link layer uses a flow control protocols to maintain same
data transfer rate between sender and the receiver
 Error control: The data link layer adds reliability to the physical layer by adding mechanisms to
detect and correct the damaged or lost frames. It also uses a mechanism to recognize duplicate frames.
Error control is normally achieved through a trailer added to the end of the frame.
 Access control: When two or more devices are connected to the same link, data link layer
protocols are necessary to determine which device has to send the data at any given time. Otherwise
there is a chance of collision. For this purpose a special sub layer in the data link layer known as
medium access sub layer will deal this one.

Network Layer: (source to destination delivery of a mesg)


The network layer is responsible for the delivery of a packet from source to destination, possibly
across multiple networks. The network layer ensures that each packet gets from its point of origin to its final
destination. If two systems are connected to the same link, there is no need for a network layer. However, if the
two systems are attached to different networks with connecting devices between the networks, there is often a
need for the network layer to maintain source-to- destination delivery.
13
Following Figure shows the relationship of the network layer to the data link and transport layers.

Figure: Network
layer
Other responsibilities of the network layer include the following:
 Logical addressing: The physical addressing implemented by the data link layer handles the addressing
problem locally. The network layer adds a header to the packet coming from the upper layer that, among
other things, includes the logical addresses of the sender and receiver.
 Routing: When independent networks or links are connected to create internetworks(network of
networks) or a large network, the connecting devices (called routers or switches) route or switch the
packets to their final destination.
 Congestion Control: If there is traffic in one way of network for transferring the data. It is known as
Congestion, Here we have to find another path for transferring the data by the use of congestion control
protocols
Transport Layer: (process to process delivery of a mesg)
 The transport layer is responsible for process-to-process delivery of the entire message.
 A process is an application program running on a
host.
 Whereas the network layer maintainsource-to-destination delivery of individual packets, it does not
recognize any relationship between those packets. It treats each one independently, as though each piece
belonged to a separate message, whether or not it does.
 The transport layer, on the other hand, ensures that the whole message arrives intact and in order,
overseeing both error control and flow control at the source-to-destination level. Following Figure shows
the relationship of the transport layer to the network and session layers.

Transport layer
Other responsibilities of the transport layer include the following:
 Service-point addressing: Computers often run several programs at the same time. For this reason,
source-to- destination delivery means delivery not only from one computer to the next but also from a
specific process (running program) on one computer to a specific process (running program) on the other.
 Segmentation and reassembly: A message is divided into transmittable segments, with each segment
containing a sequence number. These numbers enable the transport layer to reassemble the message
correctly upon arriving at the destination and to identify and replace packets that were lost in
transmission.
 Connection control: The transport layer can be either connectionless or connection oriented. A
connectionless transport layer treats each segment as an independent packet and delivers it to the
14
transport layer at the destination machine. A connection oriented transport layer makes a connection
with the transport layer at the destination machine first before delivering the packets. After all the data
are transferred, the connection is terminated.
 Flow control: Like the data link layer, the transport layer is responsible for flow control. However,
flow control at this layer is performed end to end rather than across a single link.
 Error control: Like the data link layer, the transport layer is responsible for error control. However, error
control at this layer is performed process-to process rather than across a single link. The sending
transport layer makes sure that the entire message arrives at the receiving transport layer without error
(damage, loss, or duplication). Error correction is usually achieved through retransmission.
Session Layer:
Session layer allows users on different machines to establish the Sessions , maintain the sessions and
synchronize the sessions.
The session layer is responsible for dialog control.

Specific responsibilities of the session layer include the following:


 Dialog control: one of the services of the session layer is to manage dialogue control. Sessions allow
traffic in one direction or both the directions at the same time. In a network we are having many numbers
of systems. If more than one system want to perform the operation, on that case which system will
have the priority is the service provided by session layer, it is known as token management
Synchronization: The session layer allows a concept of checkpoints, that if we are transferring a file
which may take 2hours between two machines. After the completion of 1 hour if the system crashes,
automatically already transferred data will be lost. For that purpose such a huge data will be divided into
checkpoints.
Following Figure illustrates the relationship of the session layer to the transport and presentation layers.

Presentation Layer:

 The presentation layer is concerned with the syntax and semantics of the information exchanged
between two systems.
 Following Figure shows the relationship between the presentation layer and the application and session
layers.

Figure: Presentation
layer
Specific responsibilities of the presentation layer include the
15
following:
 The presentation layer is responsible for translation, compression, and encryption.
 Translation: The processes (running programs) in two systems are usually exchanging information in the
form of character strings, numbers, and so on. The information must be changed to bit streams before
being transmitted. Because different computers use different encoding systems, the presentation layer is
responsible for interoperability between these different encoding methods. The presentation layer at the
sender changes the information from its sender-dependent format into a common format. The
presentation layer at the receiving machine changes the common format into its receiver-dependent
format.
 Encryption: To carry sensitive information, a system must be able to ensure privacy. Encryption means
that the sender transforms the original information to another form and sends the resulting message out
over the network. Decryption reverses the original process to transform the message back to its original
form.
 Compression: Data compression reduces the number of bits contained in the information. Data
compression becomes particularly important in the transmission of multimedia such as text, audio, and
video.
Application Layer:
 The application layer enables the user, whether human or software, to access the network.
 It provides user interfaces and support for services such as electronic mail, remote file access and
transfer, shared database management, and other types of distributed information services.
 The application layer is responsible for providing services to the user.
Following Figure shows the relationship of the application layer to the user and the presentation layer..

Figure: Application
layer
Specific services provided by the application layer include the
following:
 Network virtual terminal. A network virtual terminal is a software version of a physical terminal, and it
allows a user to log on to a remote host. To do so, the application creates a software emulation of a
terminal at the remote host. The user's computer talks to the software terminal which, in turn, talks to
the host, and vice versa. The remote host believes it is communicating with one of its own terminals
and allows the user to log on.
 File transfer, access, and management. This application allows a user to access files in a remote host to
retrieve files from a remote computer for use in the local computer, and to manage or control files in a
remote computer locally.
 Mail services. This application provides the basis for e-mail forwarding and storage.
 Directory services. This application provides distributed database sources and access for global
information about various objects and services.

Summary of Layers:
16
- - - - END OF TOPIC - - - -

1.4.2 The TCP/IP Reference Model


TCP/IP stands for Transmission Control Protocol / Internet Protocol. The TCP/IP reference model is a set
of protocols that allow communication across multiple diverse networks.

Figure 1-18. The TCP/IP reference model.

The Internet Layer


Its job is to permit hosts to inject packets into any network and have them travel independently to
the destination (potentially on a different network). They may even arrive in a different order than they
were sent, in which case it is the job of higher layers to rearrange them, if in-order delivery is desired. Note
that ''internet'' is used here in a generic sense, even though this layer is present in the Internet. The internet
layer defines an official packet format and protocol called IP (Internet Protocol). The job of the internet
layer is to deliver IP packets where they are supposed to go. Packet routing is clearly the major issue here,
as is avoiding congestion. For these reasons, it is reasonable to say that the TCP/IP internet layer is similar
in functionality to the OSI network layer. Figure 1-18 shows this correspondence.

The Transport Layer


The layer above the internet layer in the TCP/IP model is now usually called the transport layer. It is
designed to allow peer entities on the source and destination hosts to carry on a conversation, just as in the
OSI transport layer. Two end-to-end transport protocols have been defined here. The first one, TCP
(Transmission Control Protocol), is a reliable connection oriented protocol that allows a byte stream
originating on one machine to be delivered without error on any other machine in the internet. It fragments
the incoming byte stream into discrete messages and passes each one on to the internet layer. At the
destination, the receiving TCP process reassembles the received messages into the output stream. TCP also
handles flow control to make sure a fast sender cannot swamp a slow receiver with more messages than it
can handle. The second protocol in this layer, UDP (User Datagram Protocol), is an unreliable,
connectionless protocol for applications that do not want TCP's sequencing or flow control and wish to
provide their own. It is also widely used for one-shot, client-server-type request-reply queries and
applications in which prompt delivery is more important than accurate delivery, such as transmitting
speech or video.

17
Figure 1-19. Protocols and networks in the TCP/IP model initially.

The Application Layer


The TCP/IP model does not have session or presentation layers. No need for them was perceived,
so they were not included. Experience with the OSI model has proven this view correct: they are of little
use to most applications. On top of the transport layer is the application layer. It contains all the higher-
level protocols. The early ones included virtual terminal (TELNET), file transfer (FTP), and electronic
mail (SMTP), as shown in Fig. 1-19. The virtual terminal protocol allows a user on one machine to log
onto a distant machine and work there. The file transfer protocol provides a way to move data efficiently
from one machine to another. Electronic mail was originally just a kind of file transfer, but later a
specialized protocol (SMTP) was developed for it. Many other protocols have been added to these over the
years: the Domain Name System (DNS) for mapping host names onto their network addresses, NNTP, the
protocol for moving USENET news articles around, and HTTP, the protocol for fetching pages on the
World Wide Web, and many others.

The Host-to-Network Layer


Below the internet layer is a great void. The TCP/IP reference model does not really say much
about what happens here, except to point out that the host has to connect to the network using some
protocol so it can send IP packets to it. This protocol is not defined and varies from host to host and
network to network.

The TCP/IP Reference Model :In detail

Let us now turn from the OSI reference model to the reference model used in the grandparent of all
wide area computer networks,
The ARPANET, and its successor, the world wide Internet. It is useful to mention a few key aspects of it
now. The ARPANET was a research network sponsored by the DoD (U.S. Department of Defense). It
eventually connected hundreds of universities and government installations, using leased telephone lines.
When satellite and radio networks were added later, the existing protocols had trouble interworking with them,
so a new reference architecture was needed. This architecture later became known as the TCP/IP Reference
Model, after its two primary protocols.
Fig)The TCP/IP reference model

The Internet Layer:


All these requirements led to the choice of a packet-switching network based on a connectionless internetwork
layer. This layer, called the internet layer, Its job is to permit hosts to inject packets into any network and have
them travel independently to the destination They may even arrive in a different order than they were sent, in
which case it is the job of higher layers to rearrange them, if in-order delivery is desired. Note that ''internet'' is

18
used here in a generic sense, even though this layer is present in the Internet.
The internet layer defines an official packet format and protocol called IP (Internet Protocol). The job of the
internet layer is to deliver IP packets where they are supposed to go. Packet routing is clearly the major issue
here, as is avoiding congestion. For these reasons, it is reasonable to say that the TCP/IP internet layer is similar
in functionality to the OSI network layer.

The Transport Layer:


The layer above the internet layer in the TCP/IP model is now usually called the transport layer. It is designed to
allow peer entities on the source and destination hosts to carry on a conversation, just as in the OSI transport
layer. Two end-to- end transport protocols have been defined here. The first one, TCP (Transmission Control
Protocol), is a reliable connection-oriented protocol that allows a byte stream originating on one machine to be
delivered without error on any other machine in the internet. It fragments the incoming byte stream into discrete
messages and passes each one on to the internet layer. At the destination, the receiving TCP process
reassembles the received messages into the output stream. TCP also handles flow control to make sure a fast
sender cannot transfer data accurately to a slow receiver with more messages than it can handle.
The second protocol in this layer, UDP (User Datagram Protocol), is an unreliable, connectionless protocol for
applications that do not want TCP's sequencing or flow control and wish to provide their own. It is also widely
used for client-server-type request-reply queries and applications in which prompt delivery is more
important than accurate delivery, such as transmitting speech or video.
Stream Control Transmission Protocol (SCTP): The Stream Control Transmission Protocol (SCTP) provides
support for newer applications such as voice over the Internet. It is a transport layer protocol that combines
the best features of UDP and TCP.

 TCP/IP PROTOCOL SUITE:

 The TCP/IP protocol suite was developed prior to the OSI model.
 The layers in the TCP/IP protocol suite do not exactly match those in the OSI model.
 The original TCP/IP protocol suite was defined as having four layers: host-to-network, internet, transport,
and application
 However, when TCP/IP is compared to OSI, we can say that the host-to-network layer is
equivalent to the combination of the physical and data link layers.
19
 The internet layer is equivalent to the network layer
 The application layer is roughly doing the job of the session, presentation, and application layers
with the transport layer in TCP/IP taking care of part of the duties of the session layer.
 we assume that the TCP/IP protocol suite is made of five layers: physical, data link, network,
transport, and application. The first four layers provide physical standards, network interfaces,
internetworking, and transportfunctions that correspond to the first four layers of the OSI model. The
three topmost layers in the OSI model, however, are represented in TCP/IP by a single layer called the
application layer
 TCP/IP is a hierarchical protocol made up of interactive modules, each of which provides a specific
functionality.
At the transport layer, TCP/IP defines three protocols: Transmission Control Protocol (TCP),
User Datagram Protocol (UDP), and Stream Control Transmission Protocol (SCTP). At the network
layer, the main protocol defined by TCP/IP is the Internetworking Protocol (IP); there are also some
other protocols that support data movement in this layer.
The Application Layer:
The TCP/IP model does not have session and presentation layers. No need for them was perceived, so they were
not included. Experience with the OSI model has proven that they are of little use to most applications.
On top of the transport layer is the application layer. It contains all the higher-level protocols. The early ones
included virtual terminal (TELNET), file transfer (FTP), and electronic mail (SMTP). The virtual terminal
protocol allows a user on one machine to log onto a distant machine and work there. The file transfer protocol
provides a way to move data efficiently from one machine to another. Electronic mail was originally just a kind
of file transfer, but later a specialized protocol (SMTP) was developed for it. Many other protocols have
been added to these over the years. HTTP, The protocol for fetching pages on the World Wide Web.

The Host-to-Network Layer:


Below the internet layer is a great void. The TCP/IP reference model does not really say much about what
happens here, except to point out that the host has to connect to the network using some protocol so it can send
IP packets to it. This protocol is not defined and varies from host to host and network to network.
- - - - ---- END OF Topic -- - -

20

You might also like