Computer Netwroks -1 10CS55 Venugopala Rao A S Dept of CSE SMVITM Bantakal Computer Networks-1 Text Books: Behrouz A. Forouzan,: Data Communication and Networking, 4th Edition Tata McGraw-Hill, 2006. Reference Books: Alberto Leon-Garcia and Indra Widjaja: Communication Networks Fundamental Concepts and Key architectures, 2nd Edition Tata McGrawHill, 2004. William Stallings: Data and Computer Communication, 8th Edition, Pearson Education, 2007. Larry L. Peterson and Bruce S. Davie: Computer Networks – A Systems Approach, 4th Edition, Elsevier, 2007. Nader F. Mir: Computer and Communication Networks, Pearson Education, 2007. 2 Venugopala Rao A S, SMVITM, Bantakal 10-07-2024 Unit 1 Data Communications Networks The Internet Protocols & Standards Layered Tasks The OSI model, Layers in OSI model, TCP/IP Protocol suite Addressing. 7Hrs 3 Venugopala Rao A S, SMVITM, Bantakal 10-07-2024 Data communication Communication: Sharing of information between two parties. Can be local or remote. Local communication- usually occurs face to face Remote communication- takes place over distance. Eg. Telephony, telegraphy, television etc. Data: Information presented in some form agreed upon two communicating parties. Data communication: Exchange of data between two devices via some form of transmission medium such as wire or cable. Here communication system consists of hardware (physical 10-07-2024 4 equipment), software (some programs). Venugopala Rao A S, SMVITM, Bantakal Data communication Fundamental characteristics of communication: Four characteristics define the effectiveness of the communication – Delivery, Accuracy, Timeliness, and Jitter. data Delivery: The system must deliver data to the correct destination. Data must be received by the intended device or user and only by that device or user. Accuracy: The system must deliver the data accurately. Data that have been altered in transmission and left uncorrected are of no use. 5 Venugopala Rao A S, SMVITM, Bantakal 10-07-2024 Timeliness: Data communication The system must deliver data in a timely manner. Data delivered late are useless. In the case of video and audio, timely delivery means delivering data as they are produced, without significant delay. This kind of delivery is called real-time transmission. Jitter: Jitter refers to the variation in the packet arrival time. It is the uneven delay in the delivery of audio or video packets. Eg. Let us assume that video packets are sent every 30 ms. If some of the packets arrive with 30-ms delay and others with 40-ms delay, an uneven quality in the video is resulted. 6 Venugopala Rao A S, SMVITM, Bantakal 10-07-2024 Data communication Components of data communication system Data communication system has five components as shown 7 Venugopala Rao A S, SMVITM, Bantakal 10-07-2024 Data communication Message: The message is the information (data) to be communicated. E.g. text, numbers, pictures, audio, and video. Sender: The sender is the device that sends the data message. E.g. A computer, workstation, telephone handset, camera etc Receiver: The receiver is the device that receives the message. E.g. Computer, workstation, telephone handset, television etc. Transmission medium: This is the physical path by which a message travels from sender to receiver. E.g. : Twisted-pair wire, coaxial cable, fiber-optic cable, and radio waves. 8 Venugopala Rao A S, SMVITM, Bantakal 10-07-2024 Data communication Protocol: A protocol is a set of rules that govern data communications. It represents an agreement between the communicating devices. Without a protocol, two devices may be connected but not communicating, just as a person speaking Hindi cannot be understood by a person who speaks only Malayalam. Data representation: Today information is available in various forms namely Text Numbers Images Audio- Video 9 Venugopala Rao A S, SMVITM, Bantakal 10-07-2024 Data flow Communication between two devices can take up in any of three ways namely simplex, half duplex and fully duplex. Simplex mode: Communication is unidirectional. Out of two devices only one can transmit and other can receive. E.g. Keyboard – can only input data to computer Monitor – can only display the data Here entire channel capacity is used to send the data in one direction 10 Venugopala Rao A S, SMVITM, Bantakal 10-07-2024 Data flow Half duplex mode: Both devices can transmit the data but not at the same time When one device is transmitting, other will be in receiving mode and vice versa as shown below. Similar to one-lane traffic. E.g. : walkie-talkie This mode can be used in situations when there is no need of using the channel by both devices at the same time 11 Venugopala Rao A S, SMVITM, Bantakal 10-07-2024 Data communication Full duplex mode: Here both devices can transmit and receive data at the same time. Signals going in one direction share the capacity of communication link with the signals going in the other direction. Sharing can be achieved in two ways By having two separate transmission lines one for each side By dividing the capacity of the channel to half Eg. : Telephone network. 12 Venugopala Rao A S, SMVITM, Bantakal 10-07-2024 Networks What is a Network? Network is a set of devices (called as nodes) connected by communication link. A node can be a computer/Printer/ any other device capable of sending/ receiving data generated by other nodes. Most of the networks use distributed processing – here a task is divided among several computers so that a large process is shared among them. Network criteria: A network should meet certain criteria like performance, reliability and security. 13 Venugopala Rao A S, SMVITM, Bantakal 10-07-2024 Networks Performance: Measured in terms of transit time and response time Transit time- amount of time required for a message to travel from one device to another Response time – time between an inquiry and response to it. Various factors influence the performance No. of users Type of transmission medium Capacity of connected hardware Efficiency of software Performance is also measured in terms of throughput and delay. We desire more throughput and less delay for better performance 14 Venugopala Rao A S, SMVITM, Bantakal 10-07-2024 Networks Reliability This is measured in terms of frequency of failure and time taken by a link to recover from failure. Security This is one of the major criteria which includes Protecting data from unauthorized users Protecting data from damage and development Implementing policies and procedures to recover from distortion and data loss. 15 Venugopala Rao A S, SMVITM, Bantakal 10-07-2024 Networks Physical structure: We will learn how a network looks physically. Type of connection: Any network comprises of two or more devices connected using some link to transfer data. Two possible ways to connect links. Point-to-point Multipoint Point-to-point connection: Provides a dedicated link between two devices Entire link capacity is reserved for transmission between these two devices. 16 Venugopala Rao A S, SMVITM, Bantakal 10-07-2024 Networks In most cases actual cable or wire is used to connect two devices and in some cases, microwave signals and satellite links are also used. 17 Venugopala Rao A S, SMVITM, Bantakal 10-07-2024 Networks Multipoint connection: More than two devices share specific link Here channel capacity is shared either spatially or temporarily. If several devices use the link at the same time then it is spatial sharing If one is used at some time interval and other for some other time then it is called time shared. 18 Venugopala Rao A S, SMVITM, Bantakal 10-07-2024 Networks Physical topology: Refers to the way in which network is laid physically. Topology is geometric representation of relationship of all the links and linking devices. Four topologies possible: mesh, star, bus and ring. Mesh: Every device has dedicated point-to-point link to every other device. In a network of n nodes, there must be n(n-1)/2 duplex mode links 19 Venugopala Rao A S, SMVITM, Bantakal 10-07-2024 Networks Advantages: Guarantees that each connection carries its own data load and thus eliminates the traffic problem which may occur if connection is shared by several devices. Network is robust- if one link is failed it does not effect the entire network. Privacy and security- when a message travels along a dedicated link, only intended recipient can see it. Point-to-point connection makes it easy to isolate faulty links and correcting them is easy. Disadvantage: Main disadvantage is amount of cabling required is more. Secondly reconnection and installation is difficult Due to more no. of hardware, this is expensive. 20 Venugopala Rao A S, SMVITM, Bantakal 10-07-2024 Networks Star topology Each device has one dedicated point-to-point link only to a central controller called as hub. Here direct traffic between devices not allowed. If one device has some data to be sent to some other device then it has to send to the hub. The hub sends the data to desired recipient. 21 Venugopala Rao A S, SMVITM, Bantakal 10-07-2024 Networks Advantages: Less expensive Easy to install and maintain as only one cable is needed to be added or removed to add a device or to remove a device. Robustness- if one link fails only that link is affected and hence it is easy to isolate faulty link. Limitations: Entire system is depending on hub, if hub goes down the entire system will be down. Applications: Normally used in LAN connections. 22 Venugopala Rao A S, SMVITM, Bantakal 10-07-2024 Networks Bus topology: Example of multi-point topology One long cable acts as backbone which links all the devices and all the nodes are connected by drop lines and taps. As signal travels along the backbone cable it is transferred into heat. As it travels far and far, it gets weaker. So there is a limit on number of taps and distance between taps. 23 Venugopala Rao A S, SMVITM, Bantakal 10-07-2024 Networks Advantages: Easy to install. As compared to star topology, here redundancy is reduced as single backbone connects all the devices. Limitations: Difficulty in reconnection and fault isolation. Signal reflection at the tap degrades the signal quality and hence there is a limit on number of devices to be connected and also on spacing between devices. In case of fault or breakdown entire system collapses Applications: Used in design of early LANs 24 Venugopala Rao A S, SMVITM, Bantakal 10-07-2024 Networks Ring topology: Each device has a dedicated point-to-point connection with only the two devices on either side of it. A signal is passed along the ring in one direction, from device to device, until it reaches its destination. Each device in the ring incorporates a repeater. When a device receives a signal intended for another device, its repeater regenerates the bits and passes them further to the next device. 25 Venugopala Rao A S, SMVITM, Bantakal 10-07-2024 Networks Advantages: Easy to install and reconfigure as each device is connected only to its neighbors Addition or removal of any device requires changing only two connections Only constraint here is about maximum ring length and number of devices in the ring. Fault isolation is simple Disadvantage: Unidirectional traffic In case of any failure in the cable can shut down entire system. This can be avoided by using dual ring. Applications: IBM used this in its LAN. 26 Venugopala Rao A S, SMVITM, Bantakal 10-07-2024 Networks Hybrid topology: Combination of various topologies as shown below 27 Venugopala Rao A S, SMVITM, Bantakal 10-07-2024 Networks Categories of Networks Networks are classified based on their coverage into three classifications: LAN, WAN, MAN Local Area Networks: Privately owned network which is used to link the devices in a single office, building, or campus. Depending on the need and technology used, LAN can be set up from very simple to complicated with more systems and peripheral devices like audio an video etc. LAN size is limited to a few kilometres. LANs are designed to share resources ( hardware, or software) between personal computers or workstations. 28 Venugopala Rao A S, SMVITM, Bantakal 10-07-2024 Networks 29 Venugopala Rao A S, SMVITM, Bantakal 10-07-2024 Networks Commonly found in business environments, academic environments etc Usually LAN will use only one type of transmission medium Commonly used topologies in LAN are bus, ring and star. Early days of LAN had a speed of about 4 to 16Mbps and today we have LANs with 100 to 1000Mbps. Wireless LAN is the latest evolution in LAN Technology. 30 Venugopala Rao A S, SMVITM, Bantakal 10-07-2024 Networks Wide area networks (WAN): Facilitates long distance transmission of data, audio, video etc across countries, continent or entire world. Two classifications: Switched WAN Point-to-point WAN Switched WAN usually connects end systems which consists of routers that connects to another LAN or WAN The point-to-point WAN is normally a line leased from a telephone or cable TV provider that connects a home computer or a small LAN to an Internet service provider (ISP). 31 Venugopala Rao A S, SMVITM, Bantakal 10-07-2024 Networks Examples: X.25, a network designed to connect end users, which is being replaced by high speed networks. 32 Venugopala Rao A S, SMVITM, Bantakal 10-07-2024 Networks Metropolitan Area Networks: Size lies between that of LAN and WAN Covers area inside a town. Usually designed for users who need high speed connectivity for internet and have end points spread all over the city. Examples: High speed DSL line from telephone company TV network which can provide cable TV and also high speed internet. 33 Venugopala Rao A S, SMVITM, Bantakal 10-07-2024 Networks Interconnection of Networks – Internetwork: When more than two networks are connected it is called as internetwork or simply internet. Here networks of different topologies, located at different locations can be connected using backbone. The Internet: Using Internet we can send mail, do business transaction, get news and many more. Internet is a collaboration of large number of interconnected networks. Concept of Internet came into existence since 1969 only !!!!! 34 Venugopala Rao A S, SSE Mukka 10-07-2024 Brief history of Internet: Assignment!!!!!! Internet Internet Today: Since 1960 till date Internet has come a long way. It consists of large number of WANs, LANs which are connected by joining devices and switches. As Internet is growing daily it is not possible to give accurate picture about it. Internet Service Providers(ISP) provide Internet to users. Different levels of ISP: International service provider, National service provider, Regional service provider and local service provider. Note that Internet is run by private companies. 35 Venugopala Rao A S, SSE Mukka 10-07-2024 Internet The following figure shows the conceptual view of Internet. 36 Venugopala Rao A S, SSE Mukka 10-07-2024 Internet International Internet Service Providers: They reside on the top in hierarchy and they connect nations together to form larger networks. National Internet Service providers: These are backbone networks created and maintained by specialized companies. The end users are connected to backbones using complex switching stations called as national access points. The data rate is about 600Mbps. Regional Internet service providers: Smaller ISPs which are connected to one or more National ISPs 37 Venugopala Rao A S, SSE Mukka 10-07-2024 Internet Local Internet Service Providers: Provide direct service to the end users These can be connected to regional ISP or national ISP. E.g. A company providing Internet service to its employees A college/university that maintains its own network which provides Internet for the users. Note that each of these local ISPs are connected either to regional or national ISP. 38 Venugopala Rao A S, SSE Mukka 10-07-2024 Protocols and Standards Protocol: Set of rules that govern data communication. Protocol defines what is communicated, how it is communicated and when it is communicated. There are few key elements of any protocol – Syntax, Semantics, Timing. Syntax: The format or structure of the data It tells how the data is to be represented. E.g. for some protocol, first 8-bits may represent the address of receiver and remaining part may the actual data. Semantics: Refers to the meaning of each section of bits i.e. how a bit pattern is to be interpreted and what action is to be taken after interpretation 39 Venugopala Rao A S, SSE Mukka 10-07-2024 Protocols and Standards Timing: It refers to time at which data is to be sent and also tells with what speed data is to be sent. This is needed because if the receiver is slower that the sender there may be possibility that the data may be lost. Standards: Needed to create and maintain an open and competitive market for equipment manufactures. It also guarantees the interoperability of data and telecommunication technology. Provides guidelines to manufactures, vendors, govt. agencies and also to service providers to ensure the kind of interconnectivities needed in the present marketplace and also in international communications. 40 Venugopala Rao A S, SSE Mukka 10-07-2024 Protocols and Standards Data communication standards fall into two categories. de facto (meaning by fact or by convention) de jure ( meaning by law or by regulation) de facto standards: These are the standards which are not being approved by any organized body but have been adopted as standards through widespread use Normally defined by manufacturers who wish to define the functionality of a new product de jure standards: These have been legislated by some officially recognized body 41 Venugopala Rao A S, SSE Mukka 10-07-2024 Protocols and Standards Standards organizations: Standards are developed with the help of standards creation committees, forums and govt. regulatory agencies. Standards creation committees: There are many standard creation committees namely International Organization for Standardization (ISO). International Telecommunication Union -Telecommunication Standards Sector (ITU-T). American National Standards Institute (ANSI). Institute of Electrical and Electronics Engineers (IEEE). Electronic Industries Association (EIA). 42 Venugopala Rao A S, SSE Mukka 10-07-2024 Protocols and Standards Forums: The standards committees are procedural bodies and hence they are slow in nature. But to cater the need for working models, agreements and also to facilitate the standardization process, many special interest groups have developed their own forums. These consist of people from various interested organizations and these work with universities and users to test, evaluate and standardize new technologies. Forums help to speed up the acceptance and use of new technology. Some times they also give their conclusion about any new technology to the standard bodies. 43 Venugopala Rao A S, SSE Mukka 10-07-2024 Protocols and Standards Regulatory agencies Every communication technology is subjected to the regulation of govt. agencies. Purpose is to protect the public interest by regulating, radio, television or wire/cable communications. E.g. Federal Communication Commission (FCC) Telecom regulatory Authority of India (TRAI) Internet Standards: Thoroughly tested specification that is useful to and followed by those who use Internet. A specification undergoes a strict process to be called as Internet standard. Specification starts as Internet draft 44 Venugopala Rao A S, SSE Mukka 10-07-2024 Protocols and Standards Internet draft is a working document which has validity for 6 months. After recommendationsfrom Internet authorities, drafts are published as Request for Comment. Each RFC is edited and given a number and then made available for interested parties. 45 Venugopala Rao A S, SSE Mukka 10-07-2024 Layered tasks In our daily life concept of layers can be seen in most of the tasks we perform. Let us take up simple example of sending a letter to a friend 46 Venugopala Rao A S, SSE Mukka 10-07-2024 Hierarchy: Layered tasks In the example, it can be seen that there are various tasks to be performed at the sender side before letter is sent to the carrier. Similarly various tasks at the receiving side before letter reaches the destination. Here the order of tasks are need to be followed as they are given Services: Each layer in the sending side uses the service of layer immediately below it. i.e. sender uses services of higher layer, higher layer uses service of middle layer and so on. In data communication, the most dominated layered model was Open System Interconnect (OSI) model. But the introduction of TCP/IP protocol suit in 1990 took over the major role in data communication over OSI model. 47 Venugopala Rao A S, SSE Mukka 10-07-2024 OSI Model International standards Organization(ISO), a multinational body dedicated to worldwide agreement on International standards. An ISO standard that covers all aspects of data communication is OSI model. This was proposed in 1970. Open system is a set of protocols used for any two systems to communicate irrespective of their architecture. The purpose of OSI model was to show the possibility of communication between two different systems without changing the underlying hardware or software. Note that OSI model is not protocol, it is a model to understand, design a network which is flexible, robust and interoperable. 48 Venugopala Rao A S, SSE Mukka 10-07-2024 OSI Model The OSI model consists of seven separate but related layers, each of which defines a part of the process of moving information across a network 49 Venugopala Rao A S, SSE Mukka 10-07-2024 OSI Model Layered Architecture: In developing the model, the designers grouped the process of transmitting data to its most fundamental elements. i.e. they identified which networking functions had related uses and collected those functions into discrete groups known as layers. Here each layer defines a family of functions which is distinct from the functions of the other layers. By defining and localizing functionality in this fashion, an architecture is created that is both comprehensive and flexible. Most importantly, the OSI model allows complete interoperability between incompatible systems. This model is shown in a detailed manner in the figure. 50 Venugopala Rao A S, SSE Mukka 10-07-2024 OSI Model 51 Venugopala Rao A S, SSE Mukka 10-07-2024 OSI Model Within a single machine, each layer calls upon the services of the layer just below it. E.g.: Layer 3, uses the services provided by layer 2 and provides services for layer 4. Between machines, layer x on one machine communicates with layer x on another machine. This communication is governed by an agreed-upon series of rules and conventions called protocols. The processes on each machine that communicate at a given layer are called peer-to-peer processes. Communication between machines is therefore a peer-topeer process using the protocols appropriate to a given layer. 52 Venugopala Rao A S, SSE Mukka 10-07-2024 OSI Model Peer-to-peer process: From the fig. it is clear that, at the physical layer, communication is direct. i.e. device A sends bit stream to device B through intermediate nodes. But at the higher level communication comes down through higher layers on device A and moves upwards in layers of device B Each layer in sending side adds its own information to the data it receives from the layer above it and sends the same to layer below it Finally at layer 1, entire message is converted to a form suitable for transmission to receiving side. At receiving side, the message will be unwrapped layer by layer and passed to next higher layer. 53 Venugopala Rao A S, SSE Mukka 10-07-2024 OSI Model 54 Venugopala Rao A S, SSE Mukka 10-07-2024 OSI Model Interfaces Between Layers: The passing data and network information between layers is made possible by an interface between each pair of adjacent layers. Each interface defines the information and services a layer must provide for the layer above it. As long as a layer provides the expected services to the layer above it, the specific implementation of its functions can be modified or replaced without requiring changes to the surrounding layers. Organization of layers: Seven layers are grouped into three groups Physical, data link an network- network support layers. This is because they deal with physical aspects of data movement like physical connection, electrical specification, physical addressing etc. 55 Venugopala Rao A S, SSE Mukka 10-07-2024 OSI Model Session, presentation and application layers – user support layers. They allow interoperability among unrelated software systems. Layer 4, the transport layer links the above said two subgroups and also ensures that, data transmitted by lower layer is in a form which can be used by upper layers. Upper layers of OSI model are always implemented using software only. Lower layers except physical layer are combination of both hardware and software. Physical layer is commonly hardware. 56 Venugopala Rao A S, SSE Mukka 10-07-2024 OSI Model Data Exchange using OSI model 57 Venugopala Rao A S, SMVITM, Bantakal 10-07-2024 OSI Model In the figure, D7 means data unit at layer 7, D6 means data unit at layer 6 and so on. Communication process starts at layer 7, and moves downwards layer by layer. Each layer adds some information to the data it receives from higher layer. These are known as headers or trailers. Finally after reaching layer 1, data is converted to EM signal and transported via physical link. At receiving end, data is converted back to digital form and moves upwards through layers. At every layer, the headers and trailers attached to the data by the corresponding layer is removed and performs layer specific tasks and sends data upwards for next layer. 58 Venugopala Rao A S, SMVITM, Bantakal 10-07-2024 OSI Model Encapsulation: From the figure it can be seen that, data portion at any given layer N contains the whole packet (data + header/trailer) from the layer (N-1). This is called as encapsulation. For example, a packet from layer 6 which consists of header and data is together considered as single data unit and layer 5 adds its header to this data packet. Layer (N-1) will not be aware of which part of encapsulated packet is data an which part is header. It considers whole packet received from layer N as single data unit. 59 Venugopala Rao A S, SMVITM, Bantakal 10-07-2024 Layers in OSI Model Physical layer: The physical layer coordinates the functions required to carry a bit stream over a physical medium. It deals with the mechanical and electrical specifications of the interface and transmission medium. It also defines the procedures and functions of physical devices and interfaces for the transmission to take place. 60 Venugopala Rao A S, SMVITM, Bantakal 10-07-2024 Layers in OSI Model Other responsibilities of physical layer are Physical characteristics of interfaces and medium: The physical layer defines the characteristics of the interface between the devices and the transmission medium. It also defines the type of transmission medium. Representation of bits: The physical layer data consists of a stream of bits (sequence of 0’s or l’s) with no interpretation. To be transmitted, bits must be encoded into signals---electrical or optical. The physical layer defines the type of encoding (how 0’s and 1’s are changed to signals). Data rate: (The transmission rate) - the number of bits sent each second—is defined by the physical layer. In other words, the physical layer defines the duration of a bit. 61 Venugopala Rao A S, SMVITM, Bantakal 10-07-2024 Layers in OSI Model Synchronization of bits: The sender and receiver not only must use the same bit rate but also must be synchronized at the bit level. In other words, the sender and the receiver clocks must be synchronized. Line configuration: The physical layer is concerned with the connection of devices to the media. In a point-to-point configuration, two devices are connected through a dedicated link. In a multipoint configuration, a link is shared among several devices. Physical topology: The physical topology defines how devices are connected to make a network. Devices can be connected by using a mesh topology, a star topology, a ring topology, a bus topology, or a hybrid topology. Transmission mode: The physical layer also defines the direction of transmission between two devices: simplex, half-duplex, or fullduplex. 62 Venugopala Rao A S, SMVITM, Bantakal 10-07-2024 Layers in OSI Model Data link layer: Data link layer makes physical layer to be error free for the upper layer (Network layer). Other functions of data link layer include Framing: The data link layer divides the stream of bits received from the network layer into manageable data units called frames. Physical addressing: The data link layer adds a header to the frame to define the sender and/or receiver of the frame. If the frame is intended for a system outside the sender's network, the receiver address is the address of the device that connects the network to the next one. 63 Venugopala Rao A S, SMVITM, Bantakal 10-07-2024 Layers in OSI Model Flow control: If the rate at which the data are absorbed by the receiver is less than the rate at which data are produced in the sender, the data link layer imposes a flow control mechanism to avoid data loss at the receiver. Error control: The data link layer adds reliability to the physical layer by adding mechanisms to detect and retransmit damaged or lost frames. It also uses a mechanism to recognize duplicate frames. Error control is normally achieved through a trailer added to the end of the frame. Access control: When two or more devices are connected to the same link, data link layer protocols are necessary to determine which device has control over the link at any given time. 64 Venugopala Rao A S, SMVITM, Bantakal 10-07-2024 Network layer: Layers in OSI Model Responsible for the source-to-destination delivery of a packet, possibly across multiple networks (links). The network layer ensures that each packet gets from its point of origin to its final destination. If two systems are connected to the same link, there is usually no need for a network layer. But if the two systems are attached to different networks (links) with connecting devices between the networks (links), there is often a need for the network layer to accomplish source-to-destination delivery. 65 Venugopala Rao A S, SMVITM, Bantakal 10-07-2024 Layers in OSI Model Other functions of network layer: Logical addressing: The physical addressing implemented by the data link layer handles the addressing problem locally. If a packet passes the network boundary, we need another addressing system to help distinguish the source and destination systems. The network layer adds a header to the packet coming from the upper layer that, among other things, includes the logical addresses of the sender and receiver. Routing: When independent networks or links are connected to create internetworks (network of networks) or a large network, the connecting devices (called routers or switches) route or switch the packets to their final destination. The network layer provides this mechanism. 66 Venugopala Rao A S, SMVITM, Bantakal 10-07-2024 Layers in OSI Model Transport layer: Responsible for process to process delivery of the entire message. i.e. this layer ensures that the whole message arrives from source to destination intact and also in the same order as it is sent. It also performs error control and flow control operations 67 Venugopala Rao A S, SMVITM, Bantakal 10-07-2024 Layers in OSI Model Other responsibilities: Service point addressing: W.k.t. computers run several programs at the same time. In this context, source to destination delivery implies that delivery of messages from a specific process in source to a specific process in the destination. The transport layer header must include a type of address called a service-point address (or port address). Based on this address, the network layer gets each packet to the correct computer, the transport layer gets the entire message to the correct process on that computer. 68 Venugopala Rao A S, SMVITM, Bantakal 10-07-2024 Layers in OSI Model Segmentation and reassembly: Messages are divided in small pieces so that transportation becomes easy. Each piece will have a sequence number which is used for reassembling them at destination. In case any number in the sequence is missing, this indicates that, corresponding packet is lost. This can be obtained by the retransmission from the source. Flow control: Similar to data-link layer, this layer also performs flow control. But difference here is, the flow control here is done from end to end. 69 Venugopala Rao A S, SMVITM Bantakal 10-07-2024 Layers in OSI Model Error control: Error control is done process to process. Transport layer of sending side, makes sure that the message is received at the destination without any error caused due to damage, loss or duplication. Usually error correction is done via retransmission. 70 Venugopala Rao A S, SMVITM Bantakal 10-07-2024 Layers in OSI Model Session layer: In some processes, services provided by physical, data link and network layers may not be sufficient. In such cases session layer is useful for providing required additional services. Session layer establishes, maintains and synchronizes the interaction among communicating systems. Responsibilities of Session layer: Dialog control- this layer enables two systems to enter into communication(dialog) Communication may be half duplex or full duplex. Synchronization:- this layer adds check points/synchronization points to the stream of data. E.g. sending a file of say 5000 pages with check points after every 500 pages 71 Venugopala Rao A S, SMVITM Bantakal 10-07-2024 Layers in OSI Model Presentation layer: Concerned with syntax and semantics of the information being exchanged between two systems. Main functions of this layer include translation, encryption and compression. Translation: It is known that different machines work with different types of data encoding formats. So, presentation layer in sender side converts the message from sender dependent format to a common format. On the other hand, presentation layer converts this back to receiver dependent format. 72 Venugopala Rao A S, SMVITM Bantakal 10-07-2024 Layers in OSI Model Encryption: In order to protect the privacy of the data, at the sending side original data will be transformed to another form and this modified data is sent across network. in the receiving end, decryption is done which is a reverse operation of encryption. Data compression: Used to reduce the number of bits in the information Becomes useful in transmitting messages such as images audio n video etc. 73 Venugopala Rao A S, SMVITM Bantakal 10-07-2024 Layers in OSI Model Application layer: Enables the user (human/software) to access the network. Provides user interfaces and supports for services like e-mail, file transfer, remote file access, shared database management an other distributed information services. 74 Venugopala Rao A S, SMVITM Bantakal 10-07-2024 Layers in OSI Model Specific services provided: Network virtual terminal: Software version of a physical terminal Allows user to log on to a remote system File transfer, access and management Allows to access files from a remote host, retrieve files from a remote host to local system, and also to manage files located in remote host locally. Mail services: Provides platform for e-mail forwarding and storage. Directory Services: This provides distributed database sources and access for global information about various objects and services. 75 Venugopala Rao A S, SMVITM Bantakal 10-07-2024 Layers in OSI Model Summary of layers: 76 Venugopala Rao A S, SMVITM Bantakal 10-07-2024 TCP/IP Protocol suit TCP/IP Protocol suit: Has 4 layers namely host-to-network, internet, transport and application layers. 77 Venugopala Rao A S, SMVITM Bantakal 10-07-2024 TCP/IP Protocol suit TCP/IP is a hierarchical protocol made up of interactive modules, each of which provides a specific functionality. The modules are not necessarily interdependent. The layers of the TCP/IP protocol suite contain relatively independent protocols that can be mixed and matched depending on the needs of the system. The term hierarchical means that each upper-level protocol is supported by one or more lower-level protocols. At the transport layer, TCP/IP defines three protocols: Transmission Control Protocol (TCP), User Datagram Protocol (UDP), and Stream Control Transmission Protocol (SCTP). 78 Venugopala Rao A S, SMVITM Bantakal 10-07-2024 TCP/IP Protocol suit At the network layer, the main protocol defined by TCP/IP is the Internetworking Protocol (IP); there are also some other protocols that support data movement in this layer. Physical and Data Link Layers At the physical and data link layers, TCP/IP does not define any specific protocol. But it supports all the standard and proprietary protocols. A network in a TCP/IP internetwork can be a local-area network or a wide-area network. Internetworking layer: In this layer, TCP/IP supports the Internetworking Protocol IP, in turn, uses four supporting protocols: ARP, RARP, ICMP, and IGMP. 79 Venugopala Rao A S, SMVITM Bantakal 10-07-2024 TCP/IP Protocol suit Internetworking Protocol (IP) : This is the transmission mechanism used by the TCP/IP protocols. It is an unreliable and connectionless protocol--a best-effort delivery service. Best effort means that IP provides no error checking or tracking. IP assumes the unreliability of the underlying layers and does its best to get a transmission through to its destination, but with no guarantees. IP transports data in packets called datagrams, each of which is transported separately. Datagrams travel along different routes and can arrive out of sequence or be duplicated. IP does not keep track of the routes and has no facility for reordering datagrams once they arrive at their destination. 80 Venugopala Rao A S, SMVITM Bantakal 10-07-2024 TCP/IP Protocol suit Address Resolution Protocol(ARP): ARP is used to associate a logical address with a physical address. On a typical physical network, such as a LAN, each device on a link is identified by a physical address, usually imprinted on the network interface card (NIC). ARP is used to find the physical address of the node when its Internet address is known. Reverse Address Resolution Protocol (RARP): The RARP allows a host to discover its Internet address when it knows only its physical address. It is used when a computer is connected to a network for the first time or when a diskless computer is booted. 81 Venugopala Rao A S, SMVITM, Bantakal 10-07-2024 TCP/IP Protocol suit Internet Control Message Protocol (ICMP): The ICMP is a mechanism used by hosts and gateways to send notification of datagram problems back to the sender. ICMP sends query and error reporting messages. Internet Group Message Protocol (IGMP): The IGMP is used to facilitate the simultaneous transmission of a message to a group of recipients. Transport Layer Transport layer was represented in TCP/IP by two protocols: TCP and UDP. UDP and TCP are transport level protocols responsible for delivery of a message from a process to another process. 82 Venugopala Rao A S, SMVITM, Bantakal 10-07-2024 TCP/IP Protocol suit User Datagram Protocol (UDP): The UDP is the simpler of the two standard TCP/IP transport protocols. It is a process-to-process protocol that adds only port addresses, checksum error control, and length information to the data from the upper layer. Transmission Control Protocol (TCP) The TCP provides full transport-layer services to applications. TCP is a reliable stream transport protocol. The term stream, means connection-oriented- A connection must be established between both ends of a transmission before either can transmit data. At the sending end of each transmission, TCP divides a stream of data into smaller units called segments. 83 Venugopala Rao A S, SMVITM, Bantakal 10-07-2024 TCP/IP Protocol suit Each segment includes a sequence number for reordering after receipt, along with an acknowledgment number for the segments received. Segments are carried across the internet inside of IP datagrams. At the receiving end, TCP collects each datagram as it comes in and reorders the transmission based on sequence numbers. Stream Control Transmission Protocol (SCTP): New protocol introduced in transport layer. This provides support for newer applications such as voice over the Internet. This combines the best features of UDP and TCP. 84 Venugopala Rao A S, SMVITM, Bantakal 10-07-2024 TCP/IP Protocol suit Application layer: The application layer in TCP/IP is equivalent to the combined session, presentation, and application layers in the OSI model. Many protocols like HTTP, FTP etc are defined at this layer. Addressing: Four levels of addresses are used in an internet employing the TCP/IP protocols: Physical (link) addresses, Logical (IP) addresses, Port addresses, and Specific addresses 85 Venugopala Rao A S, SMVITM, Bantakal 10-07-2024 Addressing Each address is related to a specific layer in the TCP/IP architecture, as shown below 86 Venugopala Rao A S, SMVITM, Bantakal 10-07-2024 Addressing Physical Addresses The physical address, (link address) is the address of a node as defined by its LAN or WAN. Lowest-level address. The size and format of these addresses vary depending on the network. E.g. Ethernet uses a 6-byte (48-bit) physical address that is imprinted on the network interface card (NIC). 87 07:01:02:01:2C:4B A 6-byte (12 hexadecimal digits) physical address Venugopala Rao A S, SMVITM, Bantakal 10-07-2024 Addressing Logical Addresses Physical addresses are not adequate in an internetwork environment where different networks can have different address formats. A universal addressing system is needed in which each host can be identified uniquely, regardless of the underlying physical network. The logical addresses are designed for this purpose. A logical address in the Internet is currently a 32-bit address that can uniquely define a host connected to the Internet. No two publicly addressed and visible hosts on the Internet can have the same IP address. 88 Venugopala Rao A S, SMVITM, Bantakal 10-07-2024 Port Addresses Addressing The logical address and the physical address are necessary for data to travel from a source to the destination host. We know that, Computers can run multiple processes at the same time. The main objective of Internet communication is a process communicating with another process. E.g.: Computer A can communicate with computer C by using TELNET. At the same time, computer A communicates with computer B by using the File Transfer Protocol (FTP). For these processes to receive data simultaneously, there should be a method to label the different processes. In the TCP/IP architecture, the label assigned to a process is called a port address. A port address in TCP/IP is 16 bits in length. 89 Venugopala Rao A S, SMVITM, Bantakal 10-07-2024 Addressing Specific Addresses: Some applications have user-friendly addresses that are designed for that specific address. The e-mail address – defines the recipient of an e-mail abc@wxyz.com Universal Resource Locator (URL) address- used to find a document on the World Wide Web. E.g. www. sode-edu.in These addresses get changed to the corresponding port and logical addresses by the sending computer. 90 Venugopala Rao A S, SMVITM, Bantakal 10-07-2024