Uploaded by vedantbohra

COMPUTER NETWORK unit 1

advertisement
COMPUTER NETWORK :
DEFINITION : A computer network is a system that connects numerous independent computers in
order to share information (data) and resources. The integration of computers and other different
devices allows users to communicate more easily.
A network connection can be established using either cable or wireless media. Hardware and software
are used to connect computers and tools in any network.
A computer network consists of various kinds of nodes. Servers, networking hardware, personal
computers, and other specialized or general-purpose hosts can all be nodes in a computer network.
Criteria of good network:
1. Performance: It can be measured in many ways, including transmit time and response time. Transit
time is the amount of time required for a message to travel from one device to another. Response
time is the elapsed time between an inquiry and a response. The performance of the network
depends on a number of factors, including the number of users, the type of medium & hardware
2. Reliability: In the addition to accuracy is measured by frequency of failure, the time it takes a link to
recover from failure, and the network’s robustness in catastrophe.
3. Security: Network security issues include protecting data from unauthorized access, protecting data
from damage and development, and implementing policies and procedures for recovery from
breaches and data loss.
Goal Of Networking:
 Programs do not have to execute on a single system because of resource and load sharing.
 Reduced costs – Multiple machines can share printers, tape drives, and other peripherals.
 Reliability – If one machine fails, another can take its place.
 Scalability (it’s simple to add more processors or computers)
 Communication and mail (people living apart can work together)
 Information Access (remote information access, access to the internet, e-mail, video conferencing,
and online shopping)
 Entertainment that is interactive (online games, videos, etc.)
 Social Networking
Types of Networks and its Classifications
A computer network is a cluster of computers over a shared communication path that works for the
purpose of sharing resources from one computer to another, provided by or located on the network
nodes.
Types of Computer Networks
1. Personal Area Network (PAN)
2. Local Area Network (LAN)
3. Wide Area Network (WAN)
4. Wireless Local Area Network (WLAN)
5. Metropolitan Area Network (MAN)
6. Virtual Private Network (VPN)
1. Personal Area Network (PAN) :
PAN is the most basic type of computer network. This network is restrained to a single person, that is,
communication between the computer devices is centred only to an individual’s work space. PAN offers
a network range of 10 meters from a person to the device providing communication.
Examples of PAN are USB, computer, phone, tablet, printer, PDA, etc.
2. Local Area Network (LAN) :
LAN is the most frequently used network. A LAN is a computer network that connects computers
together through a common communication path, contained within a limited area, that is, locally. A LAN
encompasses two or more computers connected over a server. The two important technologies
involved in this network are Ethernet and Wi-fi.
Examples of LAN are networking in a home, school, library, laboratory, college, office, etc.
3. Wide Area Network (WAN) :
WAN is a type of computer network that connects computers over a large geographical distance
through a shared communication path. It is not restrained to a single location but extends over many
locations. WAN can also be defined as a group of local area networks that communicate with each
other.
The most common example of WAN is the Internet.
4. Wireless Local Area Network (WLAN) :
WLAN is a type of computer network that acts as a local area network but makes use of wireless
network technology like Wi-Fi. This network doesn’t allow devices to communicate over physical cables
like in LAN but allows devices to communicate wirelessly.
The most common example of WLAN is Wi-Fi.
5. Metropolitan Area Network (MAN) :
A MAN is larger than a LAN but smaller than a WAN. This is the type of computer network that
connects computers over a geographical distance through a shared communication path over a city,
town or metropolitan area.
Examples of MAN are networking in towns, cities, a single large city, large area within multiple
buildings, etc.
. 6. Virtual Private Network (VPN) :
A VPN is a type of computer network that extends a private network across the internet and lets the
user send and receive data as if they were connected to a private network even though they are not.
Through a virtual point-to-point connection users can access a private network remotely. VPN protects
you from malicious sources by operating as a medium that gives you a protected network connection.
Network Topology
A Network Topology is the arrangement with which computer systems or network devices are connected to
each other. Topologies may define both physical and logical aspect of the network. Both logical and physical
topologies could be same or different in a same network.
1. Bus Topology: Every computer and network device is connected to a single cable in a bus
topology network. Linear Bus topology is defined as having exactly two terminals.
Advantages
 Installation is simple.
 Compared to mesh, star, and tree topologies, the bus utilizes less cabling.
Disadvantages
 Difficulty in reconfiguring and isolating faults.
 A bus cable malfunction or break interrupts all communication.
2. Ring Topology: The topology is named ring topology because one computer is connected to
another, with the final one being connected to the first. Exactly two neighbors for each device. A signal
is passed along the ring in one direction. Each ring incorporates a repeater.
Advantages
 Data transmission is relatively straightforward because packets only move in one direction.
 There is no requirement for a central controller to manage communication between nodes.
 Easy installation & Reconfiguration
 Simplified Faulty connections
Disadvantages
 In a Unidirectional Ring, a data packet must traverse through all nodes.
 All computers must be turned on in order for them to connect with one another.
3.Star Topology: Each device in a star topology has a dedicated point-to-point link to a central
controller, which is commonly referred to as the HUB. There is no direct connection between the
devices. Traffic between the devices is not allowed in this topology.
Advantages
 When attaching or disconnecting devices, there are no network interruptions.
 It’s simple to set up and configure.
 Identifying and isolating faults is simple.
 Less Expensive than mesh
 Easy to install & configure
Disadvantages
 Nodes attached to the hub, switch, or concentrator is failed if they fail.
 Because of the expense of the hubs, it is more expensive than linear bus topologies.
 More cable required compared to bus or ring
 Too much dependency on Hub
4.Mesh Topology: Every device in a mesh topology has dedicated point-to-point connectivity to every
other device. The term “dedicated” refers to the fact that the link exclusively transports data between
the two devices it links.
Advantages
 Data can be sent from multiple devices at the same time. This topology can handle a lot of traffic.
 Even if one of the connections fails, a backup is always available. As a result, data transit is
unaffected.
 Physical boundaries prevent other users from gaining access to messages
 Point to Point links make fault transmission & fault isolation easy
Disadvantages
 The amount of cabling and the number of I/O ports that are necessary.
 The sheer bulk of wiring can be greater than the available space can accommodate.
 It is difficult to install and reconfigure.
5.Tree Topology : The topology of a tree is similar to that of a star. Nodes in a tree, like those in a star,
are connected to a central hub that manages network traffic. It has a root node, which is connected to
all other nodes, producing a hierarchy. Hierarchical topology is another name for it.
Advantages
 Network expansion is both possible and simple.
 We partition the entire network into pieces (star networks) that are easier to manage and maintain.
 Other segments are unaffected if one segment is damaged.
Disadvantages
 Tree topology relies largely on the main bus cable because of its basic structure, and if it fails, the
entire network is handicapped.
 Maintenance becomes more challenging when more nodes and segments are added.
Serial
number
Network
Internet
1.
A network is a collection
of two or more computer
systems.
The internet, on the other
hand, is the interconnection
of a few networks.
2.
Low hardware devices
required as compared to
internet.
More hardware devices
required as compared to
network.
3.
Geographically
constrained (small –
area wise)
Geographically extensive
(large – area wise)
4.
As cover small area, low
error rate
As covers large area,
higher error rate
5.
Lower communication
cost
High communication cost
Computer Network Components
Computer network components are the major parts which are needed to install the software. Some
important network components are NIC, switch, cable, hub, router, and modem. Depending on the type
of network that we need to install, some network components can also be removed. For example, the
wireless network does not require a cable.
Following are the major components required to install a network:
NIC
o
NIC stands for network interface card.
o
NIC is a hardware component used to connect a computer with another computer onto a network
o
It can support a transfer rate of 10,100 to 1000 Mb/s.
o
The MAC address or physical address is encoded on the network card chip which is assigned by the
IEEE to identify a network card uniquely. The MAC address is stored in the PROM (Programmable readonly memory).
There are two types of NIC:
Wired NIC and Wireless NIC
Wired NIC: The Wired NIC is present inside the motherboard. Cables and connectors are used with wired NIC
to transfer data.
Wireless NIC: The wireless NIC contains the antenna to obtain the connection over the wireless network. For
example, laptop computer contains the wireless NIC.
Hub
A Hub is a hardware device that divides the network connection among multiple devices. When
computer requests for some information from a network, it first sends the request to the Hub through
cable. Hub will broadcast this request to the entire network. All the devices will check whether the
request belongs to them or not. If not, the request will be dropped.
The process used by the Hub consumes more bandwidth and limits the amount of communication.
Nowadays, the use of hub is obsolete, and it is replaced by more advanced computer network
components such as Switches, Routers.
Switch
A switch is a hardware device that connects multiple devices on a computer network. A Switch contains more
advanced features than Hub. The Switch contains the updated table that decides where the data is transmitted
or not. Switch delivers the message to the correct destination based on the physical address present in the
incoming message. A Switch does not broadcast the message to the entire network like the Hub. It determines
the device to whom the message is to be transmitted. Therefore, we can say that switch provides a direct
connection between the source and destination. It increases the speed of the network.
Router
o
A router is a hardware device which is used to connect a LAN with an internet connection. It is used to
receive, analyze and forward the incoming packets to another network.
o
A router works in a Layer 3 (Network layer) of the OSI Reference model.
o
A router forwards the packet based on the information available in the routing table.
o
It determines the best path from the available paths for the transmission of the packet.
Advantages Of Router:
o
Security: The information which is transmitted to the network will traverse the entire cable, but the
only specified device which has been addressed can read the data.
o
Reliability: If the server has stopped functioning, the network goes down, but no other networks are
affected that are served by the router.
o
Performance: Router enhances the overall performance of the network. Suppose there are 24
workstations in a network generates a same amount of traffic. This increases the traffic load on the
network. Router splits the single network into two networks of 12 workstations each, reduces the traffic
load by half.
o
Network range
Modem
o
A modem is a hardware device that allows the computer to connect to the internet over the existing
telephone line.
o
A modem is not integrated with the motherboard rather than it is installed on the PCI slot found on
the motherboard.
o
It stands for Modulator/Demodulator. It converts the digital data into an analog signal over the
telephone lines.
Based on the differences in speed and transmission rate, a modem can be classified in the following categories:
o
Standard PC modem or Dial-up modem
o
Cellular Modem
o
Cable modem
Cables and Connectors
Cable is a transmission media used for transmitting a signal.
There are three types of cables used in transmission:
o
Twisted pair cable
o
Coaxial cable
o
Fibre-optic cable
Coaxial cables
Coaxial cables are metallic cables most often used to carry television signals and connect video equipment. They provide
protection from electromagnetic interference, allowing signals with low power to be transmitted over longer distances.
Sometimes called “coax,” they often carry infrared (IR or remote) control signals, eliminating the need for a separate IR
network. While no longer installed for the purpose, coax was among the first Ethernet network cable types
FIBER OPTIC CABLES
Fiber optic cables use glass or plastic threads to transmit data quickly and efficiently using pulses of light rather than
electrical signals. Apart from connecting components in home theaters, they are not as readily available for residential use
as are coax and CAT5e. They transmit data at higher rates than coaxial or twisted-pair cables.
TWISTED PAIR CABLES
The pair of twisted is the simplest transmission medium. it consists of one or more pairs of electrical son
arranged spiral. This type of support is suitable for transmission both analog and digital.
The twisted pairs may be shielded, metal sheath surrounding completely metallic pairs or unshielded.
They can also be “unscreened”. In this case, a metal tape around the son.
A twisted pair consists of two copper wires about 1 mm thick. Purpose of twisting the wire is to reduce the
electrical interference from the similar pairs in surroundings. The performance of the wire improves with the
increase in the number of twist per foot.
CABLE CONNECTORS :Fiber Optic cable connector , USB connector , Coaxial Cable Connectors ,
ETHERNET Cable Connectors.
Computer Network Architecture
Computer Network Architecture is defined as the physical and logical design of the software, hardware,
protocols, and media of the transmission of data. Simply we can say that how computers are organized and
how tasks are allocated to the computer.
The two types of network architectures are used:
o
Peer-To-Peer network
o
Client/Server network
Peer-To-Peer network
o
Peer-To-Peer network is a network in which all the computers are linked together with equal privilege
and responsibilities for processing the data.
o
Peer-To-Peer network is useful for small environments, usually up to 10 computers.
o
Peer-To-Peer network has no dedicated server.
o
Special permissions are assigned to each computer for sharing the resources, but this can lead to a
problem if the computer with the resource is down.
Advantages Of Peer-To-Peer Network:
o
It is less costly as it does not contain any dedicated server.
o
If one computer stops working but, other computers will not stop working.
o
It is easy to set up and maintain as each computer manages itself.
Disadvantages Of Peer-To-Peer Network:
o
In the case of Peer-To-Peer network, it does not contain the centralized system . Therefore, it cannot
back up the data as the data is different in different locations.
o
It has a security issue as the device is managed itself.
Client/Server Network
o
Client/Server network is a network model designed for the end users called clients, to access the
resources such as songs, video, etc. from a central computer known as Server.
o
The central controller is known as a server while all other computers in the network are called clients.
o
A server performs all the major operations such as security and network management.
o
A server is responsible for managing all the resources such as files, directories, printer, etc.
o
All the clients communicate with each other through a server. For example, if client1 wants to send
some data to client 2, then it first sends the request to the server for the permission. The server sends
the response to the client 1 to initiate its communication with the client 2.
Advantages Of Client/Server network:
o
A Client/Server network contains the centralized system. Therefore we can back up the data easily.
o
A Client/Server network has a dedicated server that improves the overall performance of the whole
system.
o
Security is better in Client/Server network as a single server administers the shared resources.
o
It also increases the speed of the sharing resources.
Disadvantages Of Client/Server network:
o
Client/Server network is expensive as it requires the server with large memory.
o
A server has a Network Operating System(NOS) to provide the resources to the clients, but the cost of NOS
is very high.
o
It requires a dedicated network administrator to manage all the resources.
Layered Architecture
o
The main aim of the layered architecture is to divide the design into small pieces.
o
Each lower layer adds its services to the higher layer to provide a full set of services to manage
communications and run the applications.
o
It provides modularity and clear interfaces, i.e., provides interaction between subsystems.
o
It ensures the independence between layers by providing the services from lower to higher layer
without defining how the services are implemented. Therefore, any modification in a layer will not
affect the other layers.
o
The number of layers, functions, contents of each layer will vary from network to network. However, the
purpose of each layer is to provide the service from lower to a higher layer and hiding the details from
the layers of how the services are implemented.
o
The basic elements of layered architecture are services, protocols, and interfaces.
o
Service: It is a set of actions that a layer provides to the higher layer.
o
Protocol: It defines a set of rules that a layer uses to exchange the information with peer
entity. These rules mainly concern about both the contents and order of the messages used.
o
Interface: It is a way through which the message is transferred from one layer to another
layer.
o
In a layer n architecture, layer n on one machine will have a communication with the layer n on another
machine and the rules used in a conversation are known as a layer-n protocol.
Let's take an example of the five-layered architecture.
Why do we require Layered architecture?
o
Divide-and-conquer approach: Divide-and-conquer approach makes a design process in such a way
that the unmanageable tasks are divided into small and manageable tasks. In short, we can say that
this approach reduces the complexity of the design.
o
Modularity: Layered architecture is more modular. Modularity provides the independence of layers,
which is easier to understand and implement.
o
Easy to modify: It ensures the independence of layers so that implementation in one layer can be
changed without affecting other layers.
o
Easy to test: Each layer of the layered architecture can be analyzed and tested individually.
Design Issues for the Layers of Computer Networks
o
A number of design issues exist for the layer to layer approach of computer networks. Some of the
main design issues are as follows −
o
o
Reliability
o
o
Scalability
o
o
Addressing
o
o
Error Control
o
o
Flow Control
o
o
Resource Allocation
o
o
Statistical Multiplexing
Network channels and components may be unreliable, resulting in loss of bits while data transfer. So,
an important design issue is to make sure that the information transferred is not distorted.
Networks are continuously evolving. The sizes are continually increasing leading to congestion. Also,
when new technologies are applied to the added components, it may lead to incompatibility issues.
Hence, the design should be done so that the networks are scalable and can accommodate such
additions and alterations.
At a particular time, innumerable messages are being transferred between large numbers of
computers. So, a naming or addressing system should exist so that each layer can identify the sender
and receivers of each message.
Unreliable channels introduce a number of errors in the data streams that are communicated. So, the
layers need to agree upon common error detection and error correction methods so as to protect data
packets while they are transferred.
If the rate at which data is produced by the sender is higher than the rate at which data is received by
the receiver, there are chances of overflowing the receiver. So, a proper flow control mechanism
needs to be implemented.
Computer networks provide services in the form of network resources to the end users. The main
design issue is to allocate and deallocate resources to processes. The allocation/deallocation should
occur so that minimal interference among the hosts occurs and there is optimal usage of the
resources.
It is not feasible to allocate a dedicated path for each message while it is being transferred from the
source to the destination. So, the data channel needs to be multiplexed, so as to allocate a fraction of
the bandwidth or time to each host.
o
o
Routing
o
o
Security
There may be multiple paths from the source to the destination. Routing involves choosing an optimal
path among all possible paths, in terms of cost and time. There are several routing algorithms that are
used in network systems.
A major factor of data communication is to defend it against threats like eavesdropping and
surreptitious alteration of messages. So, there should be adequate mechanisms to prevent
unauthorized access to data through authentication and cryptography.
Interfaces and Services
Generally a network service is an application which runs at application layer and above and is used in
computer networking.
Network service provides data Storage, manipulation, presentation, communication. This is implemented using
client-server architecture or peer-to-peer architecture.
Service Interface is used to implement a Service-Oriented Architecture (SOA). This is implemented to
achieve interoperability among the applications among various technologies.
The basis of functions of each and every layered structure is to provide a service to the layer above it.
Types of interface’s services
The types of interface’s services are as follows −
Entities and peer entities
An entity is an active element in each and every layer, It can be either a software entity or hardware entity.
Example of software entity − Process.
Example of hardware entity − I/O chip's.
Services provider and services user
The entities and layer n implement services for the (n+1) which is above the nth layer to layer n which provides
services is called services provider and layer (n+1) which takes these services is called as services user.
Services Access Points
They are available at the interfaces of n and n+1 layer. Services are available at SAP’s that means the layer n
SAPs are those placed at the interfaces where layer n+1 access the service being offered.
Interface Data Unit (IDU)
For the successful exchange of information between two layers, a set of rules about the interfaces should be
presented, the layer (n+1) entity passes an IDU to the layer and entity through the SAP. IDU contains mainly
two parts: ICI and SDU.


SDU − Services Data Unit is a part of IDU, The SDU is the information which is passed across two
networks from peer network to peer entity and then goes to the help layer (n+1).
ICI − ICI contains the control information which is necessary to help the lower layer n to do the
necessary job.
Protocol data unit
In order to transfer the SDU the layer n entity has to divide into many smaller pieces. Each pieces in given
header is buying the entities to their peer protocol as shown in below figure
Layer n entities exchanging PDU their layer n protocol
The relationship between layer and interfaces is shown in the diagram below −
Both Connection-oriented service and Connection-less service are used for the connection
establishment between two or more two devices. These types of services are offered by the
network layer.
Connection-oriented service is related to the telephone system. It includes connection establishment
and connection termination. In a connection-oriented service, the Handshake method is used to
establish the connection between sender and receiver.
Connection-less service is related to the postal system. It does not include any connection
establishment and connection termination. Connection-less Service does not give a guarantee of
reliability. In this, Packets do not follow the same path to reach their destination.
Difference between Connection-oriented and Connection-less Services:
S.NO Connection-oriented Service
Connection-less Service
1.
Connection-oriented service is related to
the telephone system.
Connection-less service is related to
the postal system.
2.
Connection-oriented service is preferred by
long and steady communication.
Connection-less Service is preferred
by bursty communication.
3.
Connection-oriented Service is necessary.
Connection-less Service is not
compulsory.
4.
Connection-oriented Service is feasible.
Connection-less Service is not
feasible.
5.
In connection-oriented Service, Congestion
is not possible.
In connection-less Service,
Congestion is possible.
6.
Connection-oriented Service gives the
guarantee of reliability.
Connection-less Service does not give
a guarantee of reliability.
7.
In connection-oriented Service, Packets
follow the same route.
In connection-less Service, Packets do
not follow the same route.
8.
Connection-oriented services require a
bandwidth of a high range.
Connection-less Service requires a
bandwidth of low range.
9.
Ex: TCP (Transmission Control Protocol)
Ex: UDP (User Datagram Protocol)
10.
Connection-oriented requires
authentication.
Connection-less Service does not
require authentication.
SERVICE PRIMITIVES
Service generally includes set of various primitives. A primitive simply means Operations.
A Service is specified by set of primitives that are available and given to user or other various
entities to access the service. All these primitives simply tell the service to perform some
action or to report on action that is taken by peer entity. Each of the protocol that
communicates in layered architecture also communicates in peer-to-peer manner with some
of its remote protocol entity.
Classification of Service Primitives :
Primitive
Request
Meaning
It represent entity that wants or request service to perform some
action or do some work (requesting for connection to remote
computer).
It represent entity that is to be informed about event (receiver
Indication just have received request of connection).
Response
It represents entity that is responding to event (receiver is simply
sending the permission or allowing to connect).
Confirm
It represent entity that acknowledges the response to earlier
request that has come back (sender just acknowledge the
permission to get connected to the remote host).
Primitives of Connection-Oriented Service :
Primitive
Meaning
Listen
When server is ready to accept request of incoming connection,
it simply put this primitive into action. Listen primitive simply
waiting for incoming connection request.
Connect
This primitive is used to connect the server simply by creating
or establishing connection with waiting peer.
Accept
This primitive simply accepts incoming connection form peer.
Receive
These primitive afterwards block the server. Receive primitive
simply waits for incoming message.
Send
This primitive is put into action by the client to transmit its
request that is followed by putting receive primitive into action
to get the reply. Send primitive simply sends or transfer the
message to the peer.
This primitive is simply used to terminate or end the connection
Disconnect after which no one will be able to send any of the message.
Primitives of Connectionless Service :
Primitive
Meaning
Unitdata
Unitdata primitive is simply required to send packet of data or
information.
Facility,
Report
This primitive is required for getting details about the
performance and working of the network such as delivery
statistics or report.
OSI Model
o
OSI stands for Open System Interconnection is a reference model that describes how information
from a software application in one computer moves through a physical medium to the software
application in another computer.
o
OSI consists of seven layers, and each layer performs a particular network function.
o
OSI model was developed by the International Organization for Standardization (ISO) in 1984, and it is
now considered as an architectural model for the inter-computer communications.
o
OSI model divides the whole task into seven smaller and manageable tasks. Each layer is assigned a
particular task.
o
Each layer is self-contained, so that task assigned to each layer can be performed independently.
Characteristics of OSI Model:
o
The OSI model is divided into two layers: upper layers and lower layers.
o
The upper layer of the OSI model mainly deals with the application related issues, and they are
implemented only in the software. The application layer is closest to the end user. Both the end user
and the application layer interact with the software applications. An upper layer refers to the layer just
above another layer.
o
The lower layer of the OSI model deals with the data transport issues. The data link layer and the
physical layer are implemented in hardware and software. The physical layer is the lowest layer of the
OSI model and is closest to the physical medium. The physical layer is mainly responsible for placing
the information on the physical medium.
7 Layers of OSI Model
There are the seven OSI layers. Each layer has different functions. A list of seven layers are given below:
1.
Physical Layer
2.
Data-Link Layer
3.
Network Layer
4.
Transport Layer
5.
Session Layer
6.
Presentation Layer
7.
Application Layer
TCP/IP MODEL
The OSI Model we just looked at is just a reference/logical model. It was designed to describe the
functions of the communication system by dividing the communication procedure into smaller and
simpler components. But when we talk about the TCP/IP model, it was designed and developed based on
standard protocols. It stands for Transmission Control Protocol/Internet Protocol. The TCP/IP model is a
concise version of the OSI model. It contains four layers, unlike seven layers in the OSI model. The
layers are:
1. Process/Application Layer
2. Host-to-Host/Transport Layer
3. Internet Layer
4. Network Access/Link Layer
The diagrammatic comparison of the TCP/IP and OSI model is as follows :
Difference between TCP/IP and OSI Model:
TCP/IP
OSI
TCP refers to Transmission
Control Protocol.
OSI refers to Open Systems
Interconnection.
TCP/IP has 4 layers.
OSI has 7 layers.
TCP/IP is more reliable
OSI is less reliable
TCP/IP does not have very
strict boundaries.
OSI has strict boundaries
TCP/IP follow a horizontal
approach.
OSI follows a vertical approach.
TCP/IP uses both session
and presentation layer in the
application layer itself.
OSI uses different session and
presentation layers.
TCP/IP developed protocols
then model.
OSI developed model then protocol.
Transport layer in TCP/IP
does not provide assurance
delivery of packets.
In OSI model, transport layer
provides assurance delivery of
packets.
TCP/IP model network layer
only provides connection
less services.
Connection less and connection
oriented both services are provided
by network layer in OSI model.
Protocols cannot be replaced
easily in TCP/IP model.
While in OSI model, Protocols are
better covered and is easy to replace
with the change in technology.
The first layer is the Process layer on the behalf of the sender and Network Access layer on the behalf of
the receiver. During this article, we will be talking on the behalf of the receiver.
1. Network Access Layer –
This layer corresponds to the combination of Data Link Layer and Physical Layer of the OSI model. It
looks out for hardware addressing and the protocols present in this layer allows for the physical
transmission of data.
2. Internet Layer –
This layer parallels the functions of OSI’s Network layer. It defines the protocols which are responsible
for logical transmission of data over the entire network. The main protocols residing at this layer are :
1. IP – stands for Internet Protocol and it is responsible for delivering packets from the source host to the
destination host by looking at the IP addresses in the packet headers. IP has 2 versions:
IPv4 and IPv6. IPv4 is the one that most of the websites are using currently. But IPv6 is growing as
the number of IPv4 addresses are limited in number when compared to the number of users.
2. ARP – stands for Address Resolution Protocol. Its job is to find the hardware address of a host from a
known IP address. ARP has several types: Reverse ARP, Proxy ARP, Gratuitous ARP and Inverse
ARP.
3. Host-to-Host Layer –
This layer is analogous to the transport layer of the OSI model. It is responsible for end-to-end
communication and error-free delivery of data. It shields the upper-layer applications from the
complexities of data. The two main protocols present in this layer are :
1. Transmission Control Protocol (TCP) – It is known to provide reliable and error-free
communication between end systems. It performs sequencing and segmentation of data. It also has
acknowledgment feature and controls the flow of the data through flow control mechanism. It is a very
effective protocol but has a lot of overhead due to such features. Increased overhead leads to increased
cost.
2. User Datagram Protocol (UDP) – On the other hand does not provide any such features. It is the goto protocol if your application does not require reliable transport as it is very cost-effective. Unlike
TCP, which is connection-oriented protocol, UDP is connectionless.
4. Application Layer –
This layer performs the functions of top three layers of the OSI model: Application, Presentation and
Session Layer. It is responsible for node-to-node communication and controls user-interface
specifications. Some of the protocols present in this layer are: HTTP, HTTPS, FTP, TFTP, Telnet, SSH,
SMTP, SNMP, NTP, DNS, DHCP, NFS.
Physical layer
Physical layer in the OSI model is the lowest layer of the OSI reference model. It is
responsible for sending raw bits from one computer to another computer over a network. It does
not deal with the data of these bits and is majorly concerned with the setup of physical
connection to the network. It plays the role of interacting with actual hardware and signaling
mechanisms.
Functions of OSI Model Physical Layer
Following are some important and basic functions that are performed by the
physical layer in the OSI model :
1.
2.
3.
4.
5.
6.
7.
8.
9.
10.
11.
12.
Physical Layer maintains the data rate (how many bits a sender can send per second).
It performs Synchronization of bits.
It helps in Transmission Medium decision (direction of data transfer).
It helps in Physical Topology (Mesh, Star, Bus, Ring) decision (Topology through which we can
connect the devices with each other).
It helps in providing Physical Medium and Interface decisions.
It provides two types of configuration Point to Point configuration and Multi-Point configuration.
It provides an interface between devices (like PC’s or computers) and transmission medium.
It has a protocol data unit in bits.
Hubs, Ethernet, etc. device is used in this layer.
This layer comes under the category of Hardware Layers (since the hardware layer is responsible
for all the physical connection establishment and processing too).
It provides an important aspect called Modulation, which is the process of converting the data into
radio waves by adding the information to an electrical or optical nerve signal.
It also provides Switching mechanism wherein data packets can be forward from one port (sender
port) to the leading destination port.
MODULATION
Modulation is defined as the process of superimposing a low-frequency signal on a high-frequency carrier signal.
To involve data information or speech information, another wave has to be imposed known as an input signal above
the carrier wave. This process of imposing an input signal on a carrier wave is known as modulation.
Types of Modulation
There are three types of modulation, namely:


Frequency Modulation
Amplitude Modulation

Phase Modulation
Amplitude Modulation
It is a kind of modulation where the amplitude of the carrier signal is changed in proportion to the
message signal while the phase and frequency are kept constant.
Phase Modulation
In this type of modulation, the phase of the carrier signal is altered according to the low frequency of the
message signal and hence it is called phase modulation.
Frequency Modulation
In this modulation the frequency of the carrier signal is altered in proportion to the message signal while
the phase and amplitude are kept constant is called frequency modulation.
Modulation mechanisms can also be digital or analogue. An analogue modulation scheme has an input
wave that continuously changes like a sine wave, but it is a bit more complicated when it comes to digital.
The voice sample is considered at some rate and then compressed into a bit (the stream of zeros and
ones). This, in turn, is made into a specific type of wave that is superimposed on the carrier.
What is Demodulation?
Demodulation is defined as extracting the original information-carrying signal from a modulated carrier
wave. A demodulator is an electronic circuit that is mainly used to recover the information content from
the modulated carrier wave. There are different types of modulation, and so are demodulators. The output
signal via a demodulator may describe the sound, images, or binary data.
Difference Between Modulation and Demodulation

Modulation is the process of influencing data information on the carrier, while demodulation is the
recovery of original information at the distant end of the carrier.

A modem is an equipment that performs both modulation and demodulation.

Both processes aim to achieve transfer information with the minimum distortion, minimum loss,
and efficient utilisation of the spectrum.
Download
Study collections