Professional Documents
Culture Documents
UNIT-III
Network Layer(Continue): Congestion Control: Principles of congestion control; Congestion prevention policies, Leaky bucket & Token
Bucket Algorithms.
Transport Layer: Services provided to upper layers, Elements of Transport protocols. Addressing, Flow Control & buffering; Example
Transport protocols: TCP, SCTCP & UDP.
Application Layer and Network Security: Domain Name System, Simple Network Management Protocol, Electronic Mail, World Wide
Web, Basics of authentication, Public and Private Key Cryptography, Digital Signatures and Certificates, Firewalls.
Network Layer Design Isues
• Store-and-Forward Packet Switching
• Services Provided to the Transport Layer
• Implementation of Connectionless Service
• Implementation of Connection-Oriented Service
• Comparison of Virtual-Circuit and Datagram Subnets
Store-and-Forward Packet Switching
Implementation of Connectionless Service
Routing within a diagram subnet.
Implementation of Connection-Oriented Service
5-4
Internet Protocol
How does information get sent from one device to another across a
WAN?
The network layer
• The purpose of the physical layer is to provide a physical mechanism
for transmitting data as signals.
• The purpose of the data link layer is to ensure the integrity of the
data sent over a given physical link.
• The purpose of the network layer is to provide a mechanism for data
to be sent from one device to another over a route that might span
many different physical links.
• Routing is the process by which data is directed across multiple links
from one host to another.
Logical Addressing
• The data link layer uses physical addressing, such as MAC or NIC addresses,
where the address is tied to a specific physical device.
• Network layer protocols use logical addressing, where a given device can
have multiple possible addresses.
IP Addresses
• Each connection to the Internet is given an IP address of some for or
another.
• No two connections on the Internet can have the same IP address at
the same time.
• However, these are still logical addresses because a given
connection’s IP address can change, or it can be reassigned to a new
device if the first one is disconnected from the Internet.
• If a given device has multiple connections to the internet (such as a
router), each connection needs its own IP address.
• Old school addressing:
• All current IP addresses are 4 bytes.
• Once upon a time, IP address were arranged somewhat hierarchically:
• The first byte would indicate the class of the site, usually reflective of its size.
• The second byte would further uniquely identify the site.
• The third byte would be the subnet within the site.
• The fourth byte would specify the actual machine.
• This was wasteful. Small organizations like Carthage did not need 65,546 IP
addresses. Lots of potential addresses were being wasted.
• This was fine when the number of machines connected to the internet could
be measured in the hundred-thousands.
• Now that it’s creeping up on the billions, not so fine.
Modern addressing
• http
://highered.mheducation.com/sites/0072967757/student_view0/cha
pter12/powerpoint_slides.html
• https://www.tutorialspoint.com/data_communication_computer_net
work/data_link_control_and_protocols.htm
• Data Communications and Networking by Behrouz A. Forouzan
• www.mhhe.com/Forouzan
15