You are on page 1of 104

1.2.

computer Networks
Network Definition
Network Applications
Network Types
Geographical Area
LAN MAN WAN
Network Architecture
Peer-to-Peer and Client/server
Network Components Hardware and Software Components
Network Topology
Physical
Logical
Network Models
OSI Reference Model
TCP/IP Protocol Suite

11/17/2021 Ambo University 1


 Connecting of computers with each other and other peripheral devices
known as Network.

 The concept of connected computers sharing resources is called


networking.

Computer network
– is a group of computers and associated peripheral devices
which connected by communication channel in order to
sharing resources.

11/17/2021 Ambo University 2


11/17/2021 Ambo University 3
 Basic importance of networking are increases efficiency

and reduce costs. i.e. save m0ney in three primary

ways:-

• Sharing Information/Data

• Sharing Hardware/Software

• Centralizing Administration And Support

11/17/2021 Ambo University 4


Network and its application
• Network applications

– utilize the Internet or other network hardware


infrastructure to perform useful functions.

– example file transfers within a network.

– used to transfer data from one point to another within


the network.

• There are 2 types of network applications:-

– Pure network applications

– Standalone network application

11/17/2021 Ambo University 5


Network and its application…
• Pure network application

– used to transfer data and communicate within a network.

– have a separate and distinct user interface that users must


learn

– for instance:-
1. Email Programs

2. File Transfer Protocol (FTP)

3. Terminal Emulation (TELNET)

4. Groupware

11/17/2021 Ambo University 6


• Email Programs

– They allow users to type messages at their local nodes and


then send to someone on the network. It is a fast and easy way
of transferring mail from one computer to another.

• File Transfer Protocol (FTP)

– This application facilities transfer of files from one computer


to another.

– e.g. from a client to a server.

There are 2 common processes involved in FTP


Downloading
Uploading

11/17/2021 Ambo University 7


Network and its application…
 Terminal Emulation (ex. TELNET)

– allows a workstation to access the server for an application


program.

– i.e. it enables to control the server and communicate with


other servers on the network.

– The workstation appears as a down terminal that is directly


attached to the server. The user feels like he/she is using the
server directly.

– TELNET enables PCs and workstations to function as dumb


terminals in sessions with hosts on inter-networks.

11/17/2021 Ambo University 8


• Groupware

– used to automate the administrative functions of a modern

office for instance video conferencing and chatting.

– i.e. facilitate the work of groups and improve on their

productivity; they can be used to communicate, co-operate,

coordinate, solve problems, compete, negotiate among

others

11/17/2021 Ambo University 9


Network and its application…
 Video Conferencing

– This is the process of conducting a conference between two or


more participants at different sites by using computer networks to
transmit audio and video data.

 Chatting

– is real-time communication between two users via computer.

– Once a chat has been initiated, either user can enter text by typing
on the keyboard and the entered text will appear on the other
user’s monitor.

– The two must be online for a chat to be initiated.

11/17/2021 Ambo University 10


Network and its application…
 Stand Alone Applications

– run on stand-alone computers (computers not connected


to any other).

– to extend their activity, they are rebuilt to run on network


environments e.g. word processors, spreadsheets, database
management systems, presentations graphics, project
management etc.

– They function even when the computer is offline.

11/17/2021 Ambo University 11


Network Types
 Network can be grouped in three major categories depending
on the geographical scope that they cover. such as:

1- Local Area Network (LAN)

– LAN refers to networks that have small geographical


coverage usually within a building or a campus.

– LAN are found in most organizations, businesses


enterprises, government offices, educational institutions,
and in home computing environment.

– LAN provides high security.

11/17/2021 Ambo University 12


2. Metropolitan Area Network (MAN):
•It is a network that transmits data and information over
citywide distance by interconnecting different LAN.
•It has a higher range than Local Area Network(LAN).

11/17/2021 Ambo University 13


3- Wide Area Network (WAN)

– WAN referees to the networks that cover very large geographical


area such as a country or the whole world.

Examples:- Internet

 - telephone networks operated by most long distance telephone


companies.

- Large companies having offices scattered around the world use


WAN to connect their computers.

– WAN usually combination of several types of communication media


such as cables, satellites, microwaves, and fiber-optics.

– Internet is one of the biggest WAN in the world.

11/17/2021 Ambo University 14


NETWORK TOPOLOGY
 What is Topology?

– defines the structure of the network of how all the components are

interconnected to each other.

– There are two types of topology:-

1. Physical, and

2. logical topology

• Logical topology
– is the method used to pass the information between the computers.

– It describes how the data is sent across the network.

11/17/2021 Ambo University 15


NETWORK TOPOLOGY
 Physical topology

– is the geometric representation of all the nodes in a network.

– refers to the layout of cables, computers and other peripherals.

– It describes the layout of the network.

• The most common types of standard physical topologies are:-

 Bus,

 Star,

 Ring and Mesh.

11/17/2021 Ambo University 16


NETWORK TOPOLOGY…
1- Bus topology

– is designed in a way that all the stations are connected


through a single cable known as a backbone cable.

– each node is connected to the backbone cable by drop cable or


directly to the backbone that carries the data.

– When a node wants to send a message over the network, it


puts a message over the network. All the stations available in
the network will receive the message whether it has been
addressed or not

11/17/2021 Ambo University 17


NETWORK TOPOLOGY…
– Traffic generated by any computer will travel across the
backbone and received by all workstations.

– it works well in a small network of 2-5 computers.

– As the number of computers increases, performance will be


degraded.(Available bandwidth decreases)

– CSMA (Carrier Sense Multiple Access)-is most common


access method of the bus topologies.

– is mainly used in 802.3 (ethernet) and 802.4 standard


networks

11/17/2021 Ambo University 18


NETWORK TOPOLOGY…
 CSMA: It is a media access control used to control the data flow
so that data integrity is maintained, i.e., the packets do not get
lost.

 There are two alternative ways of handling the problems that


occur when two nodes send the messages simultaneously.

 CSMA CD(Collision detection)

– is an access method used to detect the collision. Once


the collision is detected, the sender will stop
transmitting the data. Therefore, it works on "recovery
after the collision“.
11/17/2021 Ambo University 19
NETWORK TOPOLOGY…
CSMA CA (Collision Avoidance)

– is an access method used to avoid the collision by


checking whether the transmission media is busy or
not.

– If busy, then the sender waits until the media


becomes idle.

– This technique effectively reduces the possibility of


the collision. It does not work on "recovery after the
collision".

11/17/2021 Ambo University 20


NETWORK TOPOLOGY…

• The following is a list of factors affect the performance of


a network:
- No of computers
- Types of cable used on the network
- Distances between computers on the network
11/17/2021 Ambo University 21
NETWORK TOPOLOGY…
 Signal Bounce:
– packet travels from one end of the cable to the other.

 Terminator:
– To stop the signal from bouncing, a component called a terminator is placed
at each end of the cable to absorb free signals.

Terminators absorb free signals


11/17/2021 Ambo University 22
NETWORK TOPOLOGY…
 Network Expansion
– Cable in the bus topology can be extended by one of the
following methods:
1. Barrel connector can connect two pieces of cable
together to make a longer piece of cable.
2. Repeater can be used to connect two cables.
 Advantages of Bus Topology

– Connecting a computer or peripheral to a linear bus is easy.

– Low-cost cable: i.e. nodes are directly connected to the cable


without passing through a hub. Therefore, the initial cost of
installation is low.
11/17/2021 Ambo University 23
NETWORK TOPOLOGY…
– It is easy to extend a bus since two cables can be joined
into longer cable with a connector.

– Limited failure: A failure in one node will not have any


effect on other nodes
 Disadvantages of Bus Topology
– Entire network shuts down if there is a failure on the
backbone.

– Heavy traffic can slow down a bus because computers on


such networks do not coordinate with each other to reserve
time to transmit.

11/17/2021 Ambo University 24


NETWORK TOPOLOGY…
– Difficult troubleshooting: It requires specialized test
equipment to determine the cable faults. If any fault occurs
in the cable, then it would disrupt the communication for all
the nodes.
– Signal interference: If two nodes send the messages
simultaneously, then the signals of both the nodes collide
with each other.
– Reconfiguration difficult: Adding new devices to the
network would slow down the network.
– Attenuation: Attenuation is a loss of signal strangth leads
to communication issues. Repeaters are used to regenerate
the signal
11/17/2021 Ambo University 25
NETWORK TOPOLOGY…
2-Ring Topology
– is like a bus topology, but with connected ends.

– he node that receives the message from the previous computer


will retransmit to the next node. i.e. Computers are connected
on a single circle of cable.

– The signals flows / travel around the loop in one direction and
pass through each computer.

– Each computer acts as a repeater.

– a token is used as a carrier.

– The data in a ring topology flow in a clockwise direction.

11/17/2021 Ambo University 26


NETWORK TOPOLOGY…
Fig. Ring Topology

11/17/2021 Ambo University 27


NETWORK TOPOLOGY…
– The most common access method of the ring topology is token
passing.

• Token passing:

– is a network access method in which token is passed from


one node to another node around a ring.

• Token:

– is a frame / series of bits that circulates around the network.

– it is passed from computer to computer until it reaches the


destination.

– A token moves around the network, and it is passed from


computer to computer until it reaches the destination.
11/17/2021 Ambo University 28
NETWORK TOPOLOGY…
– The sender modifies the token by putting the address
along with the data.
– The data is passed from one device to another device
until the destination address matches. Once the token
received by the destination device, then it sends the
acknowledgment to the sender.
 Advantage of Ring Topology
• Network Management: Faulty devices can be removed
from the network without bringing the network down.
• Product availability: Many hardware and software tools for
network operation and monitoring are available.
11/17/2021 Ambo University 29
NETWORK TOPOLOGY…
• Cost: Twisted pair cabling is inexpensive and easily available.
Therefore, the installation and reconfigure cost is very low.

• Reliable: It is a more reliable network because the


communication system is not dependent on the single host
computer.

• Every computer is given equal access to the ring. Hence, no single


computer can monopolize the network.
 Disadvantages of Ring Topology
– Difficult troubleshooting: It requires specialized test
equipment to determine the cable faults. If any fault occurs in the
cable, then it would disrupt the communication for all the nodes.
11/17/2021 Ambo University 30
NETWORK TOPOLOGY…
– Failure: The breakdown in one station /any cable or nodes
leads to break the loop and take down of the overall network.

– Reconfiguration difficult: Adding new devices to the


network would slow down the network.

– Delay: Communication delay is directly proportional to the


number of nodes. Adding new devices increases the
communication delay.

– Maximum ring length and number of nodes are limited.

11/17/2021 Ambo University 31


NETWORK TOPOLOGY…
3- Star Topology

– is an arrangement of the network in which every node is


connected to the central hub, switch or a central computer.

– the central computer in it is known as a server, and the


peripheral devices attached to the server are known as clients.

– Coaxial cable or RJ-45 cables are used to connect the


computers.

– Hubs or Switches are mainly used as connection devices in


a physical star topology. i.e. Cable segments from each
computer are connected to a centralized component called a
hub or switch.
11/17/2021 Ambo University 32
NETWORK TOPOLOGY…
– Signals are transmitted from the sending computer through

the hub to all computers on the network.

– is the most popular topology in network implementation.


Fig. Star topology

11/17/2021 Ambo University 33


NETWORK TOPOLOGY…
 Advantages of Star Topology

• Efficient troubleshooting: Troubleshooting is quite


efficient in a star topology as compared to bus topology.

 In a bus topology, the manager has to inspect the


kilometers of cable.

 In a star topology, all the stations are connected to the


centralized network. Therefore, the network administrator
has to go to the single station to troubleshoot the problem

11/17/2021 Ambo University 34


NETWORK TOPOLOGY…
• Network control: Complex network control features can
be easily implemented in the star topology. Any changes
made in the star topology are automatically accommodated

• Limited failure:

 As each station is connected to the central hub with its


own cable, therefore failure in one cable/ a node or one
station will not affect the entire network.

 i.e. removal of a node / one station from the network is


not disrupted the entire n/w.

11/17/2021 Ambo University 35


NETWORK TOPOLOGY…
• Easily expandable:

 It is easily expandable as new stations can be added to the


open ports on the hub.

• Cost effective:

 Star topology networks are cost-effective as it uses


inexpensive coaxial cable.

• High data speeds:

 It supports a bandwidth of approx 100Mbps. Ethernet


100BaseT is one of the most popular Star topology
networks.

 Fault detection and removal of faulty parts is easier in


11/17/2021 star topology. Ambo University 36
NETWORK TOPOLOGY…

 Disadvantages of Star Topology

• A Central point of failure:

 If the central hub or switch goes down, then all the


connected nodes will not be able to communicate with
each other.

• Cable:

 Sometimes cable routing becomes difficult when a


significant amount of routing is required.

 The cost of the hub makes the network expensive as


compared to bus and ring topology.
11/17/2021 Ambo University 37
NETWORK TOPOLOGY…
4-Mesh topology
– is an arrangement of the network in which each computer
is connected to every other computer by separate cabling
via various redundant connections.
– There are multiple paths from one computer to another
computer.
– It does not contain the switch, hub or any central
computer which acts as a central point of
communication.
– The Internet is an example of the mesh topology.

11/17/2021 Ambo University 38


NETWORK TOPOLOGY…
– The Internet is an example of the mesh topology.

– Mesh topology is mainly used for WAN implementations


where communication failures are a critical concern.

– Mesh topology is mainly used for wireless networks.

– A fully connected mesh network has n(n-1)/2 physical


links to link n devices. NB. n – is number of the nodes in
the n/w.

11/17/2021 Ambo University 39


NETWORK TOPOLOGY…
• Mesh topology is divided into two categories:

– Fully connected mesh topology

– Partially connected mesh topology

11/17/2021 Ambo University 40


NETWORK TOPOLOGY…
– Full Mesh Topology:
• In a full mesh topology, each computer is connected to all
the computers available in the network.
– Partial Mesh Topology:
• In a partial mesh topology, not all but certain computers
are connected to those computers with which they
communicate frequently.
 Advantages of Mesh Topology
– Reliable:
• The use of large number of links eliminates network
congestion.
11/17/2021 Ambo University 41
NETWORK TOPOLOGY…
• If any link becomes breakdown, it does not affect
communication b/n connected computers in the entire system.
– Fast Communication:
• Communication is very fast between the nodes.
– Easier Reconfiguration:
• Adding new devices would not disrupt the communication
between other devices
 Disadvantages of Mesh Topology
– Cost:
• A mesh topology contains a large number of connected devices
such as a router and more transmission media than other
topologies. i.e. expensive to implement.

11/17/2021 Ambo University 42


NETWORK TOPOLOGY…
– Management:

• Mesh topology networks are very large and very difficult to


maintain and manage. i.e. As every node is connected to
the other, installation and reconfiguration is very difficult.
If the network is not monitored carefully, then the
communication link failure goes undetected.

– Efficiency:

• In this topology, redundant connections are high that


reduces the efficiency of the network.

11/17/2021 Ambo University 43


NETWORK TOPOLOGY…
5- Hybrid Topology
– The combination of various different topologies is known as Hybrid
topology.

– A Hybrid topology is a connection between different links and nodes to


transfer the data.

– When two or more different topologies are combined together is termed as


Hybrid topology

ex. Star - bus

11/17/2021
Star-bus network
Ambo University 44
NETWORK TOPOLOGY…
• Advantages of Hybrid Topology

– Reliable:

• If a fault occurs in any part of the network will not

affect the functioning of the rest of the network.

– Scalable:

• Size of the network can be easily expanded by adding

new devices without affecting the functionality of the

existing network.

11/17/2021 Ambo University 45


NETWORK TOPOLOGY…
– Flexible:

• This topology is very flexible as it can be designed

according to the requirements of the organization.

– Effective:

• Hybrid topology is very effective as it can be designed in

such a way that the strength of the network is

maximized and weakness of the network is minimized.

11/17/2021 Ambo University 46


NETWORK TOPOLOGY…
• Disadvantages of Hybrid topology

– Complex design:

• The major drawback of the Hybrid topology is the design of


the Hybrid network. It is very difficult to design the
architecture of the Hybrid network.

– Costly Hub:

• The Hubs used in the Hybrid topology are very expensive as


these hubs are different from usual Hubs used in other
topologies.

– Costly infrastructure:

• The infrastructure cost is very high as a hybrid network


11/17/2021 requires a lot of cabling,
Ambo network
University devices, etc. 47
NETWORK TOPOLOGY…
6-Tree topology
– combines the characteristics of bus topology and star
topology.
– is a type of structure in which all the computers are
connected with each other in hierarchical fashion.
– The top-most node in tree topology is known as a root
node, and all other nodes are the descendants of the root
node.
– There is only one path exists between two nodes for the
data transmission. Thus, it forms a parent-child hierarchy

11/17/2021 Ambo University 48


NETWORK TOPOLOGY…

• Hybrid-Tree Physical Topology

11/17/2021 Ambo University 49


NETWORK TOPOLOGY…
• Advantages of Tree topology

– Support for broadband transmission:

• Tree topology is mainly used to provide broadband


transmission, i.e., signals are sent over long distances
without being attenuated.

– Easily manageable:

• In tree topology, the whole network is divided into


segments known as star networks which can be easily
managed and maintained.

11/17/2021 Ambo University 50


NETWORK TOPOLOGY…
– Easily expandable:
• We can add the new device to the existing network.
Therefore, we can say that tree topology is easily expandable.

– Error detection:
• Error detection and error correction are very easy in a
tree topology.
– Limited failure:
• The breakdown in one station does not affect the entire
network.
– Point-to-point wiring:
• It has point-to-point wiring for individual segments.
11/17/2021 Ambo University 51
NETWORK TOPOLOGY…
• Disadvantages of Tree topology
– Difficult troubleshooting:
• If any fault occurs in the node, then it becomes difficult to
troubleshoot the problem.
– High cost:
• Devices required for broadband transmission are very costly.
– Failure:
• A tree topology mainly relies on main bus cable and failure in
main bus cable will damage the overall network.
– Reconfiguration difficult:
• If new devices are added, then it becomes difficult to
reconfigure.
11/17/2021 Ambo University 52
7- Other Types of Practically Used Hybrid
Topologies
• Clustered Star Topology

•Hierarchical Star Topology

11/17/2021 Ambo University 53


Quiz - 1

Time allowed 5 minutes (5 Points)


1. when sharing knowledge and experience to others is
know as __________
A. Network B. Networking C. Computer Network
2. Which one of the following is more secure network type.
(1 Pt)
a. LAN b. WAN c. MAN
3. List the three factors that affects the performance of Bus
topology. (1Pt)
4. Why we use computer networking?(1pt)
11/17/2021 Ambo University 54
5. List the common FTP provides(1pt)
Network components
When you need installation of computer network the basic components
are
Network Hardware components
Clients/ server computer
NIC
Connectivity devices (Hub,switch, Birdge, Gateway, Router
and Modem)
Connector
Cables
Network Software Components
NOS
NIC driver
11/17/2021 Ambo University 55
Protocols
Network components
Network Interface Card (NIC):

– NIC is a device that used to connect a computer to another

computer or device on a network.

 It can support a transfer rate of 10,100 to 1000 Mb/s


 There are two types of NIC, such as wireless NIC and wired NIC.

– Wireless NIC:
• contain the antenna to obtain the connection over the wireless network.

• All the modern laptops use the wireless NIC.

– Wired NIC:
• Cables and connectors are used with wired NIC to transfer the data.
11/17/2021 • is present inside the motherboard.
Ambo University 56
Network components…..
 The role of the NIC is :-

– It realize connection b/n devices via cable or wireless.

– Generates the electrical signals that travel over the cable.

– Controls access to the cable by following specific rules.

 The translation of the computer's digital signals into


electrical signals that can travel on the network's cables
is accomplished by transceiver
(transmitter/receiver).

11/17/2021 Ambo University 57


Network components…
 Hub
– is a central device that splits the network connection into
multiple devices.
• When computer request some information from the network, hub:
– Distributes / broadcast the requests for the entire network.
– All the devices will check whether the request belongs to them or
not.
– Disadvantage of hub – consumes more bandwidth.
 Switches
– Connects multiple device s on a computer networks.
– is a networking device that groups all the devices over the
network to transfer the data to another device.

11/17/2021 Ambo University 58


Network components…
– contains the updated table that decides where the
data is transmitted or not. Switch delivers the
message to the correct destination based on the
physical address present in the incoming message.

– i.e. it is better than Hub as it does not broadcast the


message over the network, i.e., it sends the message to
the device for which it belongs to. Therefore, the
switch sends the message directly from source to the
destination.
– It increases the speed of the network
11/17/2021 Ambo University 59
Network components…
 Router

 is a device which is used to connect a LAN with an internet


connection.

 is mainly used to connect the distinct networks or connect the


internet to multiple computers.

 It is used to receive, analyze and forward the incoming packets to


another network.

 works in a Layer 3 (Network layer) of the OSI Reference model.

 forwards the packet based on the information available in the routing


table.

 It determines the best path from the available paths for the
transmission of the packet.

11/17/2021 Ambo University 60


Network components…
• Advantages Of Router:

– Security:

• The information which is transmitted to the network

will traverse via entire cable, but the only specified

device which has been addressed can read the data.

– Reliability:

• If the server has stopped functioning, the network

goes down, but no other networks are affected that

are served by the router.

11/17/2021 Ambo University 61


Network components…
– Performance:

• Router enhances the overall performance of the


network.

• Suppose there are 24 workstations in a network


generates a same amount of traffic.

• This increases the traffic load on the network.

• Router splits the single network into two networks of 12


workstations each, reduces the traffic load by half.

11/17/2021 Ambo University 62


Network components…
 Cables and Connectors

 Cable

– is a transmission media used for transmitting a


signal.

– There are three types of cables used in transmission:

• Twisted pair cable

• Coaxial cable

• Fibre-optic cable

 Connectors(SC, ST, MT-RJ 45, RJ 11, RJ 45, BNC)


11/17/2021 Ambo University 63
Network components…
• A modem

– is a device that makes possible the communication for computers over a telephone

line. i.e. allows the computer to connect to the internet over the existing telephone

line.

– Is not integrated with the motherboard rather than it is installed on the PCI slot

found on the motherboard.

– It stands for Modulator/Demodulator. It converts the digital data into an analog

signal over the telephone lines.

11/17/2021 Ambo University 64


Network components…

Modem Converting Digital Signal into Analog and Analog back to


Digital.
11/17/2021 Ambo University 65
Network components…

 Network Operating System


 Operating System
• is a manager of all devices or resources on a computer
network.
– The OS controls different resources of the hardware (such as
Memory, CPU time, Disk space, Peripheral devices), so that users
can utilize them to the maximum
– Resources can be utilized in a fair and efficient manner

11/17/2021 Ambo University 66


Network components…

 Network Operating Systems

– Designed to include networking protocol at the lower


level, optimize resource sharing, Multitasking,
concurrency.

– enables a server to share resources with clients. It also


facilitate: communications, security, user management.

– is software allow users to run, access, control and


manage network resources.

11/17/2021 Ambo University 67


Network components…
 Some basic function of network operating system

– File sharing :have the ability to share resources with

other network users the most common resources is

sharing server’s file system. So the network

administrator must know which part of the file system to

be shared.

– Multitasking: the ability to support multiple users at a

time. i.e users can execute multiple tasks at a time.(to do

this the computer must support multiprocessor)


11/17/2021 Ambo University 68
Network components…

– Directory Service: are catalogs that provides information

about every resources located on the network like users,

computers, shared file and folders.

– Security Service: enable the server to protect

unauthorized users from accessing the network.

11/17/2021 Ambo University 69


Network components…
 Server operating system

– run on servers, which are very large personal computers,

workstations, or even mainframes.

– serve multiple users at once over a network and allow the

users to share HW and SW resources.

– Eg. Server can provide print service, file service, or web

service.

– Typical server operating systems are UNIX, Window

2003, Linux
11/17/2021 Ambo University 70
Network Models
• Network model is responsible for establishing a connection among the

sender and receiver, and transmitting the data in a smooth manner

respectively.

• There are two most important network models i.e.

– OSI Model and TCP/IP Model on which the whole data

communication process relies.

Network Models

OSI Reference Model TCP/IP Model

11/17/2021 Ambo University 71


Network Models….
 OSI(Open Systems Interconnection) Reference Model

– is general purpose networking or communication model which is


responsible for establishing connection in an open manner
between all the communicable devices present across the globe.

– It stands for “Open System Interconnection” and the name given


by “International Organization for Standardization”.

– It organizes the network functions into seven layers (physical, data


link, network, transport, session, presentation, and application). i.e.
having a layered architecture, w/c allows easy data communication as
each layer has predefined structured and functionalities.
11/17/2021 Ambo University 72
Network Models…..

– The functionalities are different for each layer but when

combined together forms the OSI Model.

– specifies the communication interfaces between the OSI model

layers and network endpoints utilizing various protocols.

– provide standardized functions that take place at each layer.

– The seven layers is designed as a layer serves the layer above it


and is served by the layer below it.

11/17/2021 Ambo University 73


Network Models…..
– The seven layers of the OSI reference model divided into two broad parts
such as Host layers and Media layers.

Fig. The seven layer of the OSI reference model


11/17/2021 Ambo University 74
 The seven layers of OSI model

– are further categorized into Upper Layers, Network Independent Layer and Lower
Layers.

– Physical Layer, Data link Layer and Network Layer are categorized as Lower
Layers.

– Transport Layer as Network Independent Layer, and

– Session Layer, Presentation Layer, Application Layer as Upper Layers.

11/17/2021 Ambo University 75


Network Models…
 Layer 1: Physical layer

– is responsible for the actual physical connection between the devices.

– is the most bottom layer w/c responsible for the transmission and reception of
unstructured raw data between a device and a physical transmission medium.

– converts the digital bits into electrical, radio, or optical signals.

– Provide the interface for the data transmission to Data Link Layer .

Fig. Physical Layer : Architecture

• Physical Layer : Devices

– Transmission cables, Repeater & HUBs, Multiplexers, Transmitters, & Receivers


etc.
11/17/2021 Ambo University 76
Network Models……
 Layer 2: Data Link Layer(DLL)

– Is a link between two directly connected nodes that provides node-

to-node data transfer within the same network.

– It detects and possibly corrects errors that may occur in the

physical layer. i.e. it ensure data transfer from one node to another

is error free, over the physical layer.

– translates the data received in the form of bits from physical layer

into respective format and forwards it to network layer.

– It also assembles the data message into data frames. These data

frames are special structures containing the source address field,

destination address fields and the data message.


11/17/2021 Ambo University 77
Network Models…….

– It defines the protocol to establish and terminate a

connection between two physically connected devices.

– It also defines the protocol for flow control between them.

– It is responsible to transmit a packet arrives in a n/w to host

using its MAC address. I.e. ensuring delivery of data message

to its respective destination in the network by using the

physical address of the device known as MAC (Media Access

Control) Address.

11/17/2021 Ambo University 78


Network Models…..
– divides into two sub layers.

– Medium access control (MAC) layer – responsible for

controlling how devices in a network gain access to a medium

and permission to transmit data.

– Logical link control (LLC) layer – responsible for identifying

and encapsulating network layer protocols, and controls error

checking and frame synchronization.

– The MAC and LLC layers of IEEE 802 networks such

as 802.3 Ethernet, 802.11 Wi-Fi,

and 802.15.4 ZigBee operate


11/17/2021
at the data link layer.
Ambo University 79
Network Models…..
– Is further divided packet received from Network layer into frames
depending on the frame size of NIC(Network Interface Card).

– Even before sending the data packets to receiver, adding sender’s &
receiver’s address to the frame for reliable data delivery

– also encapsulates Sender and Receiver’s MAC address in the


header.

– The Receiver’s MAC address is obtained by placing an ARP(Address


Resolution Protocol) request onto the wire asking “Who has that IP
address?” and the destination host will reply with its MAC address.

11/17/2021 Ambo University 80


Network Models…..
– Data link layer: Architecture

• Data Link Layer : Devices


– Bridges and Switches.
11/17/2021 Ambo University 81
Network Models….
• Layer 3: Network Layer
– is responsible for establishing data communication channel
between multiple networks or devices or hosts or nodes.

– It provides the functional and procedural means of transferring


variable length data sequences (called packets) from one node
(source host) to another node (destination host) connected in
"different networks". i.e. is required when a connection needs to
establish between two or more different networks.

– If connect or link locally the two or more nodes or devices,


network layer is no use.

11/17/2021 Ambo University 82


Network Models….
– Data is forwarded in the form of data packets while using
routing protocols to send these data packets to their
respective destinations.

– If the message is too large to transmit from one node to


another on the data link layer between those nodes, the
network may implement message delivery by splitting the
message into several fragments / packets at one node,
sending the fragments / packets independently, and
reassembling the fragments/ / packets at another node.

11/17/2021 Ambo University 83


Network Models…..
– performs network routing functions by providing the content
of a message and the address of the destination node , and
might also perform fragmentation and reassembly, and
report delivery errors.

– defines the most optimized and shortest path for delivery of


data packets from source address to destination address.

11/17/2021 Ambo University 84


Network Models….
– Multiple networks connected through routers and data
transmission in the form of data packets is done, an
optimized shortest path is chosen to transmit that from
source to destination called route and this process is called
routing
• Network Layer : Devices
– Layer-3 switches

– Routers

– Gateways

11/17/2021 Ambo University 85


Network Models….
• Layer 4: Transport Layer
– Is the middle most layer in OSI model and it acts as Network
Independent Layer.

– acts as the transition point between the functions performed by Upper


layers(Application Layer, Presentation Layer, Session Layer) & Lower
layers(Network Layer, Data Link Layer, Physical Layer).

– Data received from Upper layers application are combined into data
streams and are transmitted to the receivers end in exact format as it
was in original.

– provides the functional and procedural means of transferring variable-


length data sequences from a source to a destination host, while
maintaining the quality of service functions.

11/17/2021 Ambo University 86


Network Models…..
– controls the reliability of a given link through flow
control, segmentation/de-segmentation, and error control.
Some protocols are state- and connection-oriented. This
means that the transport layer can keep track of the
segments and re-transmit those that fail delivery.
– provides the acknowledgement of the successful data
transmission and sends the next data if no errors occurred.

– creates segments out of the message received from the


application layer. i.e. Segmentation is the process of dividing
a long message / data into smaller messages / data .

11/17/2021 Ambo University 87


Network Models….
– two protocols which are used for transferring the data: TCP
and UDP. TCP refers for transmission control protocol and
UDP refers for user data gram protocol.

– the Transmission Control Protocol (TCP) and the User


Datagram Protocol (UDP) of the Internet Protocol Suite
are commonly categorized as layer-4 protocols within OSI

– Performs Multiplexing & De-multiplexing functions too.

– Also perform connection oriented service using


TCP(Transmission Control Protocol) Protocol
& Connection less service using UDP(User Data-
gram Protocol) Protocol
11/17/2021 Ambo University 88
Network Models……
• Transport Layer : Architecture

• Transport Layer : Devices


– Network Devices.
– Network Gateways.
11/17/2021 Ambo University 89
Network Models…..
• Layer 5: Session Layer

– controls the dialogues (connections) between computers.

– It establishes, manages and terminates the connections between


the local and remote application.

– It provides for full-duplex, half-duplex, or simplex operation,


and establishes procedures for check pointing, suspending,
restarting, and terminating a session.

– In the OSI model, this layer is responsible for gracefully closing


a session, which is handled in the Transmission Control
Protocol at the transport layer in the Internet Protocol Suite.

11/17/2021 Ambo University 90


Network Models……
– provides appropriate sessions between users and entities /
software, where the user interacts.

– It also responsible for session check pointing and recovery, which is


not usually used in the Internet Protocol Suite.

– is commonly implemented explicitly in application environments


that use remote procedure calls.

• some of the major feature performed by Session Layer:

– Connection establishment.

– Connection termination.

– Synchronization.

11/17/2021 Ambo University 91


Network Models…..
• Session Layer: Architecture

11/17/2021 Ambo University 92


Network Models…..
• Layer 6: Presentation Layer
– establishes context between application-layer entities, in which the

application-layer entities may use different syntax and semantics if

the presentation service provides a mapping between them.

– If a mapping is available, presentation protocol data units are

encapsulated into session protocol data units and passed down

the protocol stack.

– It provides independence from data representation by translating

between application and network formats.

11/17/2021 Ambo University 93


Network Models…..
– transforms data into the form that the application accepts.

This layer formats data to be sent across a network. i.e.

ensures that data presented in same format at both sender’s

and receiver’s end.

– Provides appropriate representation of data through data

presentation techniques.

– Other features of this layer is data encryption and data

decryption.

– ensures that translation of data among different devices.


11/17/2021 Ambo University 94
Network Models……
Presentation Layer :Architecture

11/17/2021 Ambo University 95


Network Models…….
• Layer 7: Application Layer

– Is also called Desktop layers.

– is the OSI layer closest to the end user w/c providing interface

among users and the software application, which means both the

OSI application layer and the user interact directly with the

software application.

 interacts with software applications that implement a

communicating component. Such application programs fall outside

the scope of the OSI model.

 Provide interface b/n various users and application

11/17/2021 Ambo University 96


Network Models……
– Its functions identifying communication partners, determining
resource availability, and synchronizing communication.

– When identifying communication partners, the application layer


determines the identity and availability of communication partners
for an application with data to transmit.

– does not directly acts as an application but, it is an intermediate


between actual software application and the users.

– File transfer, emails, remote access etc. are some of the examples of
applications where users interacts.

11/17/2021 Ambo University 97


Network Models…..
– OSI Reference model : Architecture

11/17/2021 Ambo University 98


Network Models…..
 TCP/IP Model
– created their own architectural model to describe its
components and functions.
– is similar to the OSI model except it is a four layer standard
compared to the seven layer of the OSI model.
– the four layers account for all 7 layers of functions in the OSI
model, each layers function is not as strictly defined in this
model.
– TCP/IP stands for Transmission Control Protocol / Internet
Protocol
– makes use of protocols.

11/17/2021 Ambo University 99


Network Models

11/17/2021 Ambo University 100


Network Models
• The Network Access Layer of TCP/IP reference
model
– is also known as the Host-to-Host or Host-to-Network
layer as it is responsible for performing roles of the
Physical Layer along with the functions of Data Link Layer.

– Data in the form of bits received in the Network Access


Layer are connected in the form of data packets to Internet
Layer.

– Network Access Layer = Data Link Layer + Physical Layer.

11/17/2021 Ambo University 101


Network Models
• The Internet Layer

– is also called Network Layer which is responsible for


establishment of connection to send or receive data
packets between multiple users or nodes or devices or
networks.

– en-routes the data packets from source to destination


through the process of routing using various routing
techniques and routing protocols.

11/17/2021 Ambo University 102


Network Models
• The Transport Layer
– performs the same functions and have similar features as that in OSI
Model.
– it provides end to end data transfer by using the technique of
connection oriented services between sender and receiver using various
protocols.
• The Application layer
– resides on the top of the TCP/IP reference model as line in OSI Model.
– provide interface between users and the applications.
– it can perform the functions of Session Layer(to provide sessions) and
Presentation Layer(data representation).
– Application Layer = Session Layer + Presentation Layer + Application
Layer.
11/17/2021 Ambo University 103
Quiz
1. List basic elements we need when network
build for one organization.
2. Mention the categories of network Model
and discuss it

11/17/2021 Ambo University 104

You might also like