尊敬的 微信汇率:1円 ≈ 0.046215 元 支付宝汇率:1円 ≈ 0.046306元 [退出登录]
SlideShare a Scribd company logo
History of Computer Network
Dr. Poonam Kadam DJSCE
Packet Switching
Dr. Poonam Kadam DJSCE
ARPANET
Dr. Poonam Kadam DJSCE
TCP/IP
Dr. Poonam Kadam DJSCE
World wide web
Dr. Poonam Kadam DJSCE
 Early network architectures (Advanced Research Projects
Agency Network) were not compatible with each other.
Locking in customers with a single vendor.
Network reference models were developed to address this
challenge. A network reference model serves as a blueprint,
detailing how communication between network devices should
occur.
• The two most recognized network models are:
 The Open Systems Interconnection (OSI) model - developed by
International Standards Organization
 TCP/IP Protocol suit
•A computer network connects two or more devices together
to share information and services. Multiple networks connected
together form an internetwork.
Dr. Poonam Kadam DJSCE
The Layered Model
Dr. Poonam Kadam DJSCE
OSI Reference Model
The OSI model is now considered the primary
Architectural model for inter-computer communications.
The OSI model describes how information or data makes
its way from application programmes (such as
spreadsheets) through a network medium (such as wire)
to another application programme located on another
network.
The OSI reference model divides the problem of moving
information between computers over a network medium
into SEVEN smaller and more manageable problems .
This separation into smaller more manageable functions
is known as layering.
Dr. Poonam Kadam DJSCE
The OSI model
Dr. Poonam Kadam DJSCE
7 Layers
7. Application Layer
6. Presentation Layer
5. Session Layer
4. Transport Layer
3. Network Layer
2. Data Link Layer
1. Physical Layer
All
People
Seem
To
Need
Data
Processing
Dr. Poonam Kadam DJSCE
Layer architecture simplifies the network design.
Reduces complexity.
Facilitates modular engineering.
It is easy to debug network applications in a layered
architecture network.
The network management is easier due to the layered
architecture.
Simplifies teaching and learning.
Why use Layer Architecture
Dr. Poonam Kadam DJSCE
Host Layers
7 Application
6 Presentation
5 Session
4 Transport
3 Network
2 Data Link
1 Physical
Host layers: Provide accurate
data delivery between computers
}
Dr. Poonam Kadam DJSCE
Media Layers
7 Application
6 Presentation
5 Session
4 Transport
3 Network
2 Data Link
1 Physical
Host layers: Provide accurate
data delivery between computers
Media layers: Control
physical delivery of messages over
the network
}
}
Dr. Poonam Kadam DJSCE
Devices at different Layers
7 Application
6 Presentation
5 Session
4 Transport
3 Network
2 Data Link
1 Physical
NIC Card
Hub
Bridges and Switches
Routers
NIC = Network Interface Card
Dr. Poonam Kadam DJSCE
Tasks involved in sending letter
The protocol defines the
format of the data being
exchanged, and the control
and timing for the
handshake between layers.
Dr. Poonam Kadam DJSCE
OSI layers
Dr. Poonam Kadam DJSCE
Interfaces between Layers
 There is an interface
between each pair of
adjacent layers.
This interface defines
what information and
services a layer must
provide for the layer
above it.
Dr. Poonam Kadam DJSCE
• Within a single machine, each layer calls upon services of
the layer just below it.
• Layer 3, for example, uses the services provided by layer 2
and provides services for layer 4.
• Between machines, layer x on one machine communicates
with layer x on another machine, by using a protocol (this is
Peer-to-Peer Process).
• Communication between machines is therefore a peer-to-
peer process using protocols appropriate to a given layer.
Peer-to-Peer Process
Dr. Poonam Kadam DJSCE
Dr. Poonam Kadam DJSCE
Peer-to-Peer Communications
7 Application
6 Presentation
5 Session
4 Transport
3 Network
2 Data Link
1 Physical
Host A
Application
Presentation
Session
Transport
Network
Data Link
Physical
Bits
Frames
Packets
Segments
Host B
Each layer uses its own layer protocol to communicate with its
peer layer in the other system. Each layer’s protocol exchanges
information, called protocol data units (PDUs), between peer
Data Encapsulation
Application
Presentation
Session
Transport
Network
Physical
Data Link
Application
Presentation
Session
Transport
Network
Physical
Data Link
Host A Host B
Data
} {
Dr. Poonam Kadam DJSCE
Data Encapsulation
} {
Application
Presentation
Session
Transport
Network
Physical
Data Link
Application
Presentation
Session
Transport
Network
Physical
Data Link
Data
Data
Network
Header
Host A Host B
Data Encapsulation
} {
Application
Presentation
Session
Transport
Network
Physical
Data Link
Application
Presentation
Session
Transport
Network
Physical
Data Link
Data
Data
Network
Header
Frame
Header
Frame
Trailer
Data
Network
Header
Host A Host B
Data Encapsulation
} {
Application
Presentation
Session
Transport
Network
Physical
Data Link
Application
Presentation
Session
Transport
Network
Physical
Data Link
Data
Data
Network
Header
Frame
Header
Frame
Trailer
Data
Network
Header
0101101010110001
Host A Host B
Dr. Poonam Kadam DJSCE
An exchange using the OSI model
Dr. Poonam Kadam DJSCE
• Repeaters
• Hubs
• Bridges
• Switches
• Routers
Network Devices
Dr. Poonam Kadam DJSCE
Repeaters
Repeaters are network devices operating at physical layer of
the OSI model that regenerate an incoming signal before
retransmitting it.
Dr. Poonam Kadam DJSCE
Hub
• Device that serves as the center of a star
topology network
• sometimes referred to as a multiport
repeater
• no forwarding intelligence
Dr. Poonam Kadam DJSCE
Hub
• Physical layer device
• Regenerate signals
• Propagates signals through the network
• Does not filter data packets based on destination
123
124
125
126
127
128
Hub
Dr. Poonam Kadam DJSCE
A hub in a network
Dr. Poonam Kadam DJSCE
Bridge
• Device that connects and passes packets
between two network segments.
• More intelligent than hub—analyzes
incoming packets and forwards (or filters)
them based on addressing information.
Dr. Poonam Kadam DJSCE
Bridge
Segment 1 Segment 2
123
124
125
126
127
128
Corporate Intranet
Hub Hub
Bridge Example
• Layer 2 device
• More intelligent than a hub
• Maintains address tables
• Collects and passes packets between two network segments
Dr. Poonam Kadam DJSCE
Switches
•Layer 2 device
•Provide full dedicated data transmission rate
between two stations.
•Build and maintain MAC address
tables.
Dr. Poonam Kadam DJSCE
Workstation
31
Switch
Corporate Intranet
32
33
36
100 Mbps 100 Mbps
Switching—“Dedicated” Media
• Provides full dedicated transmission rate between stations
• Used in both LAN and WAN
35
34
Dr. Poonam Kadam DJSCE
A switch in a internetwork
Dr. Poonam Kadam DJSCE
Routers
• Interconnect LANs and WANs
• Provide path determination using metrics
• Forward packets from one network to
another
• Control broadcasts to the network
Dr. Poonam Kadam DJSCE
Cisco 2600 Series Router
Collision domain
Dr. Poonam Kadam DJSCE
Broadcast domain
Dr. Poonam Kadam DJSCE
Identifying broadcast domain and collision
domain
Dr. Poonam Kadam DJSCE
Dr. Poonam Kadam DJSCE
Layers in the OSI Model
The functions of each layer in the OSI model :
Physical Layer
Data Link Layer
Network Layer
Transport Layer
Session Layer
Presentation Layer
Application Layer
Dr. Poonam Kadam DJSCE
The physical layer is responsible
for the movement of individual bits from
one hop (node) to the next.
Note:
Physical Layer
Physical layer
Dr. Poonam Kadam DJSCE
Physical layer
The physical layer is concerned with the following:
• Physical characteristics of interfaces and media: The
physical layer defines the characteristics of the interface
between devices and the transmission media, including its
type.
• Representation of the bits: the physical layer data consist of
a stream of bits without any interpretation. To be
transmitted, bits must be encoded into signals –electrical
or optical-. The physical layer defines the type of encoding.
• Data rate: The physical layer defines the transmission rate,
the number of bits sent each second.
Dr. Poonam Kadam DJSCE
Physical Layer
• Line configuration: the physical layer is concerned with the
connection of devices to the medium.
• Physical topology : how devices are connected to make the
network.
• Transmission Mode :defines the direction of signal between
two devices.
Dr. Poonam Kadam DJSCE
Dr. Poonam Kadam DJSCE
Point-to-Point Line Configuration
•Link uses the entire capacity for transmission.
Dr. Poonam Kadam DJSCE
Multipoint Line Configuration
•More devices share the link (same bandwidth).
Dr. Poonam Kadam DJSCE
• no reply channel provided
Dr. Poonam Kadam DJSCE
Half-Duplex
Dr. Poonam Kadam DJSCE
Dr. Poonam Kadam DJSCE
Full-Duplex
Capacity of channel is divided between signals traveling
in opposite direction
Dr. Poonam Kadam DJSCE
Physical Topologies
Topology refers to the physical arrangement of network
components and media.
Four common types
• Mesh topology
• star topology
• Ring topology
• bus topology
Dr. Poonam Kadam DJSCE
Mesh Topology
MESH TOPOLOGY
• n(n-1)/2 -----duplex mode links
Advantages:
• Eliminates traffic problem-link carries traffic only between
the two devices it connects
• Robust
• Privacy/security-capacity reserved
• Easy fault identification
Disadvantages:
• no. of cables
• no. of ports required in each host
Dr. Poonam Kadam DJSCE
Star Topology (LAN)
• Center: hub, or
switch
• 5 to 100+ devices
• Does not allow
direct traffic
between
Devices.
Dr. Poonam Kadam DJSCE
• If N devices are connected to every other in star, then the amount of
cables required to attach them is N.
Advantages:
• Less expensive than mesh
• Easy to add new computer
• Easy to diagnose network fault
• It is very reliable – if one cable or device fails then all the others will
still work
• No disruptions to the network when connecting or removing devices.
• Each device requires just one port i.e. to attach to the hub.
Disadvantage:
• Central point of failure-Hub failure
Ring Topology
•Repeaters at each component
•Unidirectional transmission links
•Closed loop
Advantages:
• Add/deletion easy
• Equal access to the resources.
• It is cheap to install and expand.
• Minimum collision.
• Ring network is extremely orderly organized where every
device has access to the token and therefore the
opportunity to transmit.
Disadvantage:
• Break in the ring results in failure
• Due to the Uni-directional Ring, a data packet (token)
must have to pass through all the nodes.
Ring Topology (LAN)
Redundant ring to
avoid network failure
• Repeaters at each
component
• Unidirectional
transmission links
• Closed loop
• Typically used
in FDDI networks
Fiber Distributed Data Interface
Bus Topology
Tree topology
“branch” with
multiple nodes
Drop lines
tap
Dr. Poonam Kadam DJSCE
Advantages:
• It is the easiest network topology for connecting peripherals
or computers in a linear fashion.
• It works very efficient well when there is a small network.
• It is easy to connect or remove devices in this network
without affecting any other device.
• Very cost-effective as compared to other network topology
• It is easy to understand topology.
• Easy to expand by joining the two cables together.
Disadvantages:
• Bus topology is not great for large networks.
• Identification of problem becomes difficult if whole network
goes down.
• If a main cable is damaged, whole network fails.
• Packet loss is high.
• This network topology is very slow as compared to other
topologies.
Tree Topology
Dr. Poonam Kadam DJSCE
Hybrid Topology
Dr. Poonam Kadam DJSCE
The physical layer is responsible for movements
of individual bits from one hop (node) to another
Responsibilities of Physical layer
1> Physical characteristics of interfaces and
medium.
2> Representation of bits
3> Data rate
4> Synchronization of bits
5> Line configuration
6> Physical topology
7> Transmission modes.
Dr. Poonam Kadam DJSCE
The data link layer is responsible for
moving frames from one hop (node) to
the next.
Note:
Data Link Layer
Data link layer
Hop-to-hop delivery
Functions of the data link layer:
• Framing The data link layer divides the stream of bits
received from the network layer into data units called frames.
• Physical addressing If frames are to be distributed to different
systems on the network, the data link layer adds a header to
the frame to define the physical address of the sender (source
address) and/or receiver (destination address) of the frame.
Handles addressing problem locally.
• If the frame is intended for a system outside the sender’s
network, the receiver address is the address of the device that
connects one network to the next.
Data Link Layer Example
Data
A P
20 10 Data
A P
20 10
Physical
addresses
changed
Data
A P
33 99
Data
A P
33 99
Physical
addresses
changed
Data
A P
95 66 Data
A P
95 66
• Flow Control. If the rate at which the data are absorbed by the
receiver is less than the rate produced in the sender, the data link
layer imposes a flow control mechanism to prevent overwhelming
the receiver.
• Error control. The data link layer adds reliability to the physical
layer by adding mechanisms to detect and retransmit damaged or
lost frames. Error control is normally achieved through a trailer to
the end of the frame.
• Access Control. When two or more devices are connected to the
same link, data link layer protocols are necessary to determine
which device has control over the link at any time.
The data link layer is responsible for moving
frames from one hop (node) to another.
Responsibilities of Data link layer
1> Framing .
2> Physical addressing .
3> Flow control.
4> Error control.
5> Access control .
Dr. Poonam Kadam DJSCE
The network layer is responsible for the
delivery of individual packets from the
source host to the destination host.
Note:
Network Layer
The Network layer is responsible for delivery
of individual packets from source host to the
destination host.
Responsibilities of Network layer
1> Logical addressing .
2> Routing .
• Logical addressing. The physical addressing implemented by
the data link layer handles the addressing problem locally.
• The network layer adds a header to the packet coming from
the upper layer, among other things, includes the logical
address of the sender and receiver.
• Routing. When independent networks or links are connected
together to create an internetwork (a network of networks)
or a large network, the connecting devices (called routers or
gateways) route or switch the packets to their final
destination.
Network Layer
The unit of communication at the network
layer is a datagram.
Note
Source-to-destination delivery
The physical addresses will change from
hop to hop, but the logical addresses
remain the same.
Note
The transport layer is responsible for
the delivery of a message from one
process to another.
Note:
Transport layer
The transport layer is responsible for the delivery
of a message from one process to another.
Responsibilities of Transport layer
1> Service –point addressing.
2> Segmentation and reassembly.
3> Connection control.
4> Flow control-performed end to end not across a
link.
5> Error control
Dr. Poonam Kadam DJSCE
Classification of Port Numbers
IANA (Internet Assigned Numbers Authority)
ephemeral ports
Internet Assigned Numbers Authority (IANA) is responsible for
managing the uses of these ports.
Well-known ports : The range of well-known port is 0 to 1023. well
known ports are assigned to common protocols and services such
as HTTP, SMTP etc.
Registered ports : Range 1024 to 49151. Registered ports assigned
by IANA to a specific service upon application by a requesting
entity.
Dynamic ports : dynamic (private, high) ports range from 49,152 to
65,535. Can be used by any service on an ad hoc basis. Ports are
assigned when a session is established, and released when the
session ends.
Source Port: The source port defines an application to which the TCP
segment belongs to, and this port number is dynamically assigned by the
client.
Destination port: The destination port identifies the location of the service
The client sends an http request, then, in this case, the destination
port would be 80, whereas the http server is serving the request so its
source port number would be 80.
A Sender Receiver P
Internet
Port numbers
a Data
j
A P
H2
a Data
j
A P
a Data
j
Data
a Data
j
A P
H2
a Data
j
A P
a Data
j
Data
13
Data
Destination port number
selects the process
Reliable process-to-process
delivery of a message
Connection control by Transport layer :
•Connectionless Transport Layer: Each segment is
considered as an independent packet and delivered to
the transport layer at the destination machine.
•Connection-Oriented Transport Layer: Before delivering
packets, the connection is made with the transport layer
at the destination machine.
Dr. Poonam Kadam DJSCE
Session layer
The session layer is responsible for dialog
control and synchronization
Responsibilities of Session layer
1> Dialog control.
2> Synchronization.
• The session layer is responsible for establishing, managing,
synchronizing and terminating sessions between end-user
application processes.
• It works as a dialog controller. It allows the systems to
communicate in either half-duplex or full-duplex mode of
communication.
• It is responsible for token management. Through this, it
prevents the two users to simultaneously attempt the same
critical operation.
• It synchronizes communication. It adds synchronization points
or checkpoints in data streams for long communications. This
ensures that data streams up to the checkpoints are
successfully received and acknowledged. In case of any
failures, only the streams after the checkpoints have to be re-
transmitted.
Presentation layer
The Presentation layer is responsible for
translation, compression, and encryption.
Responsibilities of Presentation layer
1> Translation- Different computers use different encoding
systems, the presentation layer is responsible for the
interoperability between these encoding methods.
It defines the format in which the data is to be exchanged
between the two communicating entities.
2> Encryption- To carry sensitive information a system must
be able to ensure privacy.
3> Compression- Data compression reduces the number of
bits contained in the information.
Application layer
The unit of communication at the
application layer is a message.
Note
The Application layer enables user to access
network.
Responsibilities of Application layer
1> User interface- Application layer interacts with
application programs
2> Support for services such as email, remote file
access and transfer, shared database management - It
contains management functions to support distributed
applications.
Dr. Poonam Kadam DJSCE
OSI in Action
A message begins at the top
application layer and moves down
the OSI layers to the bottom
physical layer.
As the message descends, each
successive OSI model layer adds a
header to it.
A header is layer-specific
information that basically explains
what functions the layer carried
out.
Conversely, at the receiving end,
headers are striped from the
message as it travels up the
corresponding layers.
Layer Functions
Provides network services to
application processes
Enable the user to access n/w
7 Application
Layer Functions
Network services to applications
• Ensures data is readable by
receiving system
• Format of data
7 Application
6 Presentation Data representation
Layer Functions
Provides specification for
managing comm. Session.
• Establishes, manages, and
terminates sessions between
applications
7 Application
6 Presentation
5 Session
Network services to applications
Data representation
Layer Functions
7 Application
6 Presentation
5 Session
Transport
4
Inter-host communication
Network services to applications
Data representation
End-to-end connection reliability
source to destination delivery of
the entire message.
• Concerned with data transport
issues between hosts
• Data transport reliability
• Establishes, maintains, and
terminates virtual circuits
• Fault detection and recovery
• Information flow control
Layer Functions
7 Application
6 Presentation
5 Session
Transport
4
Network
3
Inter-host communication
Network services to applications
Data representation
End-to-end connection reliability
Addresses and best path source to
destination delivery of packets
• Provides connectivity and path
selection between two end systems
• routing
• Logical addressing-if packet passes
the network boundary.
Layer Functions
7 Application
6 Presentation
5 Session
Transport
4
Network
3
Data Link
2
Inter-host communication
Network services to applications
Data representation
End-to-end connection reliability
Addresses and best path
Access to media-which device
has control over the link.
• Framing
• Physical addressing, network
topology, error notification, flow
control
• Flow control
• Provides reliable transfer of data
across media
Layer Functions
7 Application
6 Presentation
5 Session
Transport
4
Network
3
Data Link
2
Physical
1
Inter-host communication
Network services to applications
Data representation
End-to-end connection reliability
Addresses and best path
Access to media
• Deals with electrical and mechanical
specifications of the interface and medium,
Wires, connectors
• Representation of bits, Data rate
• Concerned with Line configuration
• Physical topology
• Transmission mode
TCP/IP Protocol Suite
The TCP/IP protocol suite is made of five layers: physical, data link,
network, transport, and application. The first four layers provide physical
standards, network interface, internetworking, and transport functions that
correspond to the first four layers of the OSI model. The three topmost
layers in the OSI model, however, are represented in TCP/IP by a single
layer called the application layer.
Physical Host to Network Layer/Network interface
Data Link Layers
Network Layer- Internet Layer
Transport Layer- host to host Layer
Application Layer
OSI & TCP/IP Models
TCP/IP Model
Dr. Poonam Kadam DJSCE
4 layers.
4.
5.
6.
Protocols in TCP/IP and OSI model

More Related Content

Similar to Introduction to Computer Networks & OSI MODEL.ppt

Ccna day 1
Ccna day 1Ccna day 1
Ccna day 1
Sachin Morya
 
Ccna day1
Ccna day1Ccna day1
Ccna day1
Ccna day1Ccna day1
Ccna day1
danishrafiq
 
Ccna PPT
Ccna PPTCcna PPT
Ccna PPT
AIRTEL
 
networking1.ppt
networking1.pptnetworking1.ppt
networking1.ppt
ChinmayWaingankar3
 
Ccna presentation{complete]
Ccna presentation{complete]Ccna presentation{complete]
Ccna presentation{complete]
Avijit Nath
 
Dcn concepts
Dcn conceptsDcn concepts
Dcn concepts
Prof. Dr. K. Adisesha
 
Ccnapresentation 13020219098042-phpapp02 (1)
Ccnapresentation 13020219098042-phpapp02 (1)Ccnapresentation 13020219098042-phpapp02 (1)
Ccnapresentation 13020219098042-phpapp02 (1)
ateeq85905
 
ccna presentation
ccna presentationccna presentation
ccna presentation
Yasser Mahfouz
 
CCNA PPT score increases as you pick a category, fill out a long description ...
CCNA PPT score increases as you pick a category, fill out a long description ...CCNA PPT score increases as you pick a category, fill out a long description ...
CCNA PPT score increases as you pick a category, fill out a long description ...
edieali1
 
network fundamentals _Chapter 2 - Week 2and 3.pptx
network fundamentals _Chapter 2 - Week 2and 3.pptxnetwork fundamentals _Chapter 2 - Week 2and 3.pptx
network fundamentals _Chapter 2 - Week 2and 3.pptx
mashfiqislam
 
CCNA Training
CCNA Training CCNA Training
CCNA Training
Rakesh Rangadal
 
Ccna presentation
Ccna presentationCcna presentation
Ccna presentation
sondus Zeyad
 
VOICE
VOICEVOICE
VOICE
CiscoV1
 
OSI and TCPIP Model
OSI and TCPIP ModelOSI and TCPIP Model
OSI and TCPIP Model
Tapan Khilar
 
Computer Networks- Introduction and Data Link Layer
Computer Networks- Introduction and Data Link LayerComputer Networks- Introduction and Data Link Layer
Computer Networks- Introduction and Data Link Layer
Deepak John
 
OSI Layering
OSI Layering OSI Layering
Introduction to Networks_v0.2
Introduction to Networks_v0.2Introduction to Networks_v0.2
Introduction to Networks_v0.2
Sohail Gohir
 
BCE L-1 networking fundamentals 111.pptx
BCE L-1  networking fundamentals 111.pptxBCE L-1  networking fundamentals 111.pptx
BCE L-1 networking fundamentals 111.pptx
Kirti Verma
 
Lecture12 ie321 dr_atifshahzad - networks
Lecture12 ie321 dr_atifshahzad - networksLecture12 ie321 dr_atifshahzad - networks
Lecture12 ie321 dr_atifshahzad - networks
Atif Shahzad
 

Similar to Introduction to Computer Networks & OSI MODEL.ppt (20)

Ccna day 1
Ccna day 1Ccna day 1
Ccna day 1
 
Ccna day1
Ccna day1Ccna day1
Ccna day1
 
Ccna day1
Ccna day1Ccna day1
Ccna day1
 
Ccna PPT
Ccna PPTCcna PPT
Ccna PPT
 
networking1.ppt
networking1.pptnetworking1.ppt
networking1.ppt
 
Ccna presentation{complete]
Ccna presentation{complete]Ccna presentation{complete]
Ccna presentation{complete]
 
Dcn concepts
Dcn conceptsDcn concepts
Dcn concepts
 
Ccnapresentation 13020219098042-phpapp02 (1)
Ccnapresentation 13020219098042-phpapp02 (1)Ccnapresentation 13020219098042-phpapp02 (1)
Ccnapresentation 13020219098042-phpapp02 (1)
 
ccna presentation
ccna presentationccna presentation
ccna presentation
 
CCNA PPT score increases as you pick a category, fill out a long description ...
CCNA PPT score increases as you pick a category, fill out a long description ...CCNA PPT score increases as you pick a category, fill out a long description ...
CCNA PPT score increases as you pick a category, fill out a long description ...
 
network fundamentals _Chapter 2 - Week 2and 3.pptx
network fundamentals _Chapter 2 - Week 2and 3.pptxnetwork fundamentals _Chapter 2 - Week 2and 3.pptx
network fundamentals _Chapter 2 - Week 2and 3.pptx
 
CCNA Training
CCNA Training CCNA Training
CCNA Training
 
Ccna presentation
Ccna presentationCcna presentation
Ccna presentation
 
VOICE
VOICEVOICE
VOICE
 
OSI and TCPIP Model
OSI and TCPIP ModelOSI and TCPIP Model
OSI and TCPIP Model
 
Computer Networks- Introduction and Data Link Layer
Computer Networks- Introduction and Data Link LayerComputer Networks- Introduction and Data Link Layer
Computer Networks- Introduction and Data Link Layer
 
OSI Layering
OSI Layering OSI Layering
OSI Layering
 
Introduction to Networks_v0.2
Introduction to Networks_v0.2Introduction to Networks_v0.2
Introduction to Networks_v0.2
 
BCE L-1 networking fundamentals 111.pptx
BCE L-1  networking fundamentals 111.pptxBCE L-1  networking fundamentals 111.pptx
BCE L-1 networking fundamentals 111.pptx
 
Lecture12 ie321 dr_atifshahzad - networks
Lecture12 ie321 dr_atifshahzad - networksLecture12 ie321 dr_atifshahzad - networks
Lecture12 ie321 dr_atifshahzad - networks
 

Recently uploaded

Hot Call Girls In Bangalore ✔ 9079923931 ✔ Hi I Am Divya Vip Call Girl Servic...
Hot Call Girls In Bangalore ✔ 9079923931 ✔ Hi I Am Divya Vip Call Girl Servic...Hot Call Girls In Bangalore ✔ 9079923931 ✔ Hi I Am Divya Vip Call Girl Servic...
Hot Call Girls In Bangalore ✔ 9079923931 ✔ Hi I Am Divya Vip Call Girl Servic...
Banerescorts
 
comptia-security-sy0-701-exam-objectives-(5-0).pdf
comptia-security-sy0-701-exam-objectives-(5-0).pdfcomptia-security-sy0-701-exam-objectives-(5-0).pdf
comptia-security-sy0-701-exam-objectives-(5-0).pdf
foxlyon
 
Asymmetrical Repulsion Magnet Motor Ratio 6-7.pdf
Asymmetrical Repulsion Magnet Motor Ratio 6-7.pdfAsymmetrical Repulsion Magnet Motor Ratio 6-7.pdf
Asymmetrical Repulsion Magnet Motor Ratio 6-7.pdf
felixwold
 
Intuit CRAFT demonstration presentation for sde
Intuit CRAFT demonstration presentation for sdeIntuit CRAFT demonstration presentation for sde
Intuit CRAFT demonstration presentation for sde
ShivangMishra54
 
Technological Innovation Management And Entrepreneurship-1.pdf
Technological Innovation Management And Entrepreneurship-1.pdfTechnological Innovation Management And Entrepreneurship-1.pdf
Technological Innovation Management And Entrepreneurship-1.pdf
tanujaharish2
 
Call Girls In Tiruppur 👯‍♀️ 7339748667 🔥 Free Home Delivery Within 30 Minutes
Call Girls In Tiruppur 👯‍♀️ 7339748667 🔥 Free Home Delivery Within 30 MinutesCall Girls In Tiruppur 👯‍♀️ 7339748667 🔥 Free Home Delivery Within 30 Minutes
Call Girls In Tiruppur 👯‍♀️ 7339748667 🔥 Free Home Delivery Within 30 Minutes
kamka4105
 
🔥 Hyderabad Call Girls  👉 9352988975 👫 High Profile Call Girls Whatsapp Numbe...
🔥 Hyderabad Call Girls  👉 9352988975 👫 High Profile Call Girls Whatsapp Numbe...🔥 Hyderabad Call Girls  👉 9352988975 👫 High Profile Call Girls Whatsapp Numbe...
🔥 Hyderabad Call Girls  👉 9352988975 👫 High Profile Call Girls Whatsapp Numbe...
aarusi sexy model
 
paper relate Chozhavendhan et al. 2020.pdf
paper relate Chozhavendhan et al. 2020.pdfpaper relate Chozhavendhan et al. 2020.pdf
paper relate Chozhavendhan et al. 2020.pdf
ShurooqTaib
 
Particle Swarm Optimization–Long Short-Term Memory based Channel Estimation w...
Particle Swarm Optimization–Long Short-Term Memory based Channel Estimation w...Particle Swarm Optimization–Long Short-Term Memory based Channel Estimation w...
Particle Swarm Optimization–Long Short-Term Memory based Channel Estimation w...
IJCNCJournal
 
INTRODUCTION TO ARTIFICIAL INTELLIGENCE BASIC
INTRODUCTION TO ARTIFICIAL INTELLIGENCE BASICINTRODUCTION TO ARTIFICIAL INTELLIGENCE BASIC
INTRODUCTION TO ARTIFICIAL INTELLIGENCE BASIC
GOKULKANNANMMECLECTC
 
Literature review for prompt engineering of ChatGPT.pptx
Literature review for prompt engineering of ChatGPT.pptxLiterature review for prompt engineering of ChatGPT.pptx
Literature review for prompt engineering of ChatGPT.pptx
LokerXu2
 
Update 40 models( Solar Cell ) in SPICE PARK(JUL2024)
Update 40 models( Solar Cell ) in SPICE PARK(JUL2024)Update 40 models( Solar Cell ) in SPICE PARK(JUL2024)
Update 40 models( Solar Cell ) in SPICE PARK(JUL2024)
Tsuyoshi Horigome
 
SMT process how to making and defects finding
SMT process how to making and defects findingSMT process how to making and defects finding
SMT process how to making and defects finding
rameshqapcba
 
A high-Speed Communication System is based on the Design of a Bi-NoC Router, ...
A high-Speed Communication System is based on the Design of a Bi-NoC Router, ...A high-Speed Communication System is based on the Design of a Bi-NoC Router, ...
A high-Speed Communication System is based on the Design of a Bi-NoC Router, ...
DharmaBanothu
 
3rd International Conference on Artificial Intelligence Advances (AIAD 2024)
3rd International Conference on Artificial Intelligence Advances (AIAD 2024)3rd International Conference on Artificial Intelligence Advances (AIAD 2024)
3rd International Conference on Artificial Intelligence Advances (AIAD 2024)
GiselleginaGloria
 
College Call Girls Kolkata 🔥 7014168258 🔥 Real Fun With Sexual Girl Available...
College Call Girls Kolkata 🔥 7014168258 🔥 Real Fun With Sexual Girl Available...College Call Girls Kolkata 🔥 7014168258 🔥 Real Fun With Sexual Girl Available...
College Call Girls Kolkata 🔥 7014168258 🔥 Real Fun With Sexual Girl Available...
Ak47
 
Butterfly Valves Manufacturer (LBF Series).pdf
Butterfly Valves Manufacturer (LBF Series).pdfButterfly Valves Manufacturer (LBF Series).pdf
Butterfly Valves Manufacturer (LBF Series).pdf
Lubi Valves
 
SELENIUM CONF -PALLAVI SHARMA - 2024.pdf
SELENIUM CONF -PALLAVI SHARMA - 2024.pdfSELENIUM CONF -PALLAVI SHARMA - 2024.pdf
SELENIUM CONF -PALLAVI SHARMA - 2024.pdf
Pallavi Sharma
 
一比一原版(psu学位证书)美国匹兹堡州立大学毕业证如何办理
一比一原版(psu学位证书)美国匹兹堡州立大学毕业证如何办理一比一原版(psu学位证书)美国匹兹堡州立大学毕业证如何办理
一比一原版(psu学位证书)美国匹兹堡州立大学毕业证如何办理
nonods
 
Sachpazis_Consolidation Settlement Calculation Program-The Python Code and th...
Sachpazis_Consolidation Settlement Calculation Program-The Python Code and th...Sachpazis_Consolidation Settlement Calculation Program-The Python Code and th...
Sachpazis_Consolidation Settlement Calculation Program-The Python Code and th...
Dr.Costas Sachpazis
 

Recently uploaded (20)

Hot Call Girls In Bangalore ✔ 9079923931 ✔ Hi I Am Divya Vip Call Girl Servic...
Hot Call Girls In Bangalore ✔ 9079923931 ✔ Hi I Am Divya Vip Call Girl Servic...Hot Call Girls In Bangalore ✔ 9079923931 ✔ Hi I Am Divya Vip Call Girl Servic...
Hot Call Girls In Bangalore ✔ 9079923931 ✔ Hi I Am Divya Vip Call Girl Servic...
 
comptia-security-sy0-701-exam-objectives-(5-0).pdf
comptia-security-sy0-701-exam-objectives-(5-0).pdfcomptia-security-sy0-701-exam-objectives-(5-0).pdf
comptia-security-sy0-701-exam-objectives-(5-0).pdf
 
Asymmetrical Repulsion Magnet Motor Ratio 6-7.pdf
Asymmetrical Repulsion Magnet Motor Ratio 6-7.pdfAsymmetrical Repulsion Magnet Motor Ratio 6-7.pdf
Asymmetrical Repulsion Magnet Motor Ratio 6-7.pdf
 
Intuit CRAFT demonstration presentation for sde
Intuit CRAFT demonstration presentation for sdeIntuit CRAFT demonstration presentation for sde
Intuit CRAFT demonstration presentation for sde
 
Technological Innovation Management And Entrepreneurship-1.pdf
Technological Innovation Management And Entrepreneurship-1.pdfTechnological Innovation Management And Entrepreneurship-1.pdf
Technological Innovation Management And Entrepreneurship-1.pdf
 
Call Girls In Tiruppur 👯‍♀️ 7339748667 🔥 Free Home Delivery Within 30 Minutes
Call Girls In Tiruppur 👯‍♀️ 7339748667 🔥 Free Home Delivery Within 30 MinutesCall Girls In Tiruppur 👯‍♀️ 7339748667 🔥 Free Home Delivery Within 30 Minutes
Call Girls In Tiruppur 👯‍♀️ 7339748667 🔥 Free Home Delivery Within 30 Minutes
 
🔥 Hyderabad Call Girls  👉 9352988975 👫 High Profile Call Girls Whatsapp Numbe...
🔥 Hyderabad Call Girls  👉 9352988975 👫 High Profile Call Girls Whatsapp Numbe...🔥 Hyderabad Call Girls  👉 9352988975 👫 High Profile Call Girls Whatsapp Numbe...
🔥 Hyderabad Call Girls  👉 9352988975 👫 High Profile Call Girls Whatsapp Numbe...
 
paper relate Chozhavendhan et al. 2020.pdf
paper relate Chozhavendhan et al. 2020.pdfpaper relate Chozhavendhan et al. 2020.pdf
paper relate Chozhavendhan et al. 2020.pdf
 
Particle Swarm Optimization–Long Short-Term Memory based Channel Estimation w...
Particle Swarm Optimization–Long Short-Term Memory based Channel Estimation w...Particle Swarm Optimization–Long Short-Term Memory based Channel Estimation w...
Particle Swarm Optimization–Long Short-Term Memory based Channel Estimation w...
 
INTRODUCTION TO ARTIFICIAL INTELLIGENCE BASIC
INTRODUCTION TO ARTIFICIAL INTELLIGENCE BASICINTRODUCTION TO ARTIFICIAL INTELLIGENCE BASIC
INTRODUCTION TO ARTIFICIAL INTELLIGENCE BASIC
 
Literature review for prompt engineering of ChatGPT.pptx
Literature review for prompt engineering of ChatGPT.pptxLiterature review for prompt engineering of ChatGPT.pptx
Literature review for prompt engineering of ChatGPT.pptx
 
Update 40 models( Solar Cell ) in SPICE PARK(JUL2024)
Update 40 models( Solar Cell ) in SPICE PARK(JUL2024)Update 40 models( Solar Cell ) in SPICE PARK(JUL2024)
Update 40 models( Solar Cell ) in SPICE PARK(JUL2024)
 
SMT process how to making and defects finding
SMT process how to making and defects findingSMT process how to making and defects finding
SMT process how to making and defects finding
 
A high-Speed Communication System is based on the Design of a Bi-NoC Router, ...
A high-Speed Communication System is based on the Design of a Bi-NoC Router, ...A high-Speed Communication System is based on the Design of a Bi-NoC Router, ...
A high-Speed Communication System is based on the Design of a Bi-NoC Router, ...
 
3rd International Conference on Artificial Intelligence Advances (AIAD 2024)
3rd International Conference on Artificial Intelligence Advances (AIAD 2024)3rd International Conference on Artificial Intelligence Advances (AIAD 2024)
3rd International Conference on Artificial Intelligence Advances (AIAD 2024)
 
College Call Girls Kolkata 🔥 7014168258 🔥 Real Fun With Sexual Girl Available...
College Call Girls Kolkata 🔥 7014168258 🔥 Real Fun With Sexual Girl Available...College Call Girls Kolkata 🔥 7014168258 🔥 Real Fun With Sexual Girl Available...
College Call Girls Kolkata 🔥 7014168258 🔥 Real Fun With Sexual Girl Available...
 
Butterfly Valves Manufacturer (LBF Series).pdf
Butterfly Valves Manufacturer (LBF Series).pdfButterfly Valves Manufacturer (LBF Series).pdf
Butterfly Valves Manufacturer (LBF Series).pdf
 
SELENIUM CONF -PALLAVI SHARMA - 2024.pdf
SELENIUM CONF -PALLAVI SHARMA - 2024.pdfSELENIUM CONF -PALLAVI SHARMA - 2024.pdf
SELENIUM CONF -PALLAVI SHARMA - 2024.pdf
 
一比一原版(psu学位证书)美国匹兹堡州立大学毕业证如何办理
一比一原版(psu学位证书)美国匹兹堡州立大学毕业证如何办理一比一原版(psu学位证书)美国匹兹堡州立大学毕业证如何办理
一比一原版(psu学位证书)美国匹兹堡州立大学毕业证如何办理
 
Sachpazis_Consolidation Settlement Calculation Program-The Python Code and th...
Sachpazis_Consolidation Settlement Calculation Program-The Python Code and th...Sachpazis_Consolidation Settlement Calculation Program-The Python Code and th...
Sachpazis_Consolidation Settlement Calculation Program-The Python Code and th...
 

Introduction to Computer Networks & OSI MODEL.ppt

  • 1. History of Computer Network Dr. Poonam Kadam DJSCE
  • 5. World wide web Dr. Poonam Kadam DJSCE
  • 6.  Early network architectures (Advanced Research Projects Agency Network) were not compatible with each other. Locking in customers with a single vendor. Network reference models were developed to address this challenge. A network reference model serves as a blueprint, detailing how communication between network devices should occur. • The two most recognized network models are:  The Open Systems Interconnection (OSI) model - developed by International Standards Organization  TCP/IP Protocol suit •A computer network connects two or more devices together to share information and services. Multiple networks connected together form an internetwork. Dr. Poonam Kadam DJSCE
  • 7. The Layered Model Dr. Poonam Kadam DJSCE
  • 8. OSI Reference Model The OSI model is now considered the primary Architectural model for inter-computer communications. The OSI model describes how information or data makes its way from application programmes (such as spreadsheets) through a network medium (such as wire) to another application programme located on another network. The OSI reference model divides the problem of moving information between computers over a network medium into SEVEN smaller and more manageable problems . This separation into smaller more manageable functions is known as layering. Dr. Poonam Kadam DJSCE
  • 9. The OSI model Dr. Poonam Kadam DJSCE
  • 10. 7 Layers 7. Application Layer 6. Presentation Layer 5. Session Layer 4. Transport Layer 3. Network Layer 2. Data Link Layer 1. Physical Layer All People Seem To Need Data Processing Dr. Poonam Kadam DJSCE
  • 11. Layer architecture simplifies the network design. Reduces complexity. Facilitates modular engineering. It is easy to debug network applications in a layered architecture network. The network management is easier due to the layered architecture. Simplifies teaching and learning. Why use Layer Architecture Dr. Poonam Kadam DJSCE
  • 12. Host Layers 7 Application 6 Presentation 5 Session 4 Transport 3 Network 2 Data Link 1 Physical Host layers: Provide accurate data delivery between computers } Dr. Poonam Kadam DJSCE
  • 13. Media Layers 7 Application 6 Presentation 5 Session 4 Transport 3 Network 2 Data Link 1 Physical Host layers: Provide accurate data delivery between computers Media layers: Control physical delivery of messages over the network } } Dr. Poonam Kadam DJSCE
  • 14. Devices at different Layers 7 Application 6 Presentation 5 Session 4 Transport 3 Network 2 Data Link 1 Physical NIC Card Hub Bridges and Switches Routers NIC = Network Interface Card Dr. Poonam Kadam DJSCE
  • 15. Tasks involved in sending letter The protocol defines the format of the data being exchanged, and the control and timing for the handshake between layers. Dr. Poonam Kadam DJSCE
  • 16. OSI layers Dr. Poonam Kadam DJSCE
  • 17. Interfaces between Layers  There is an interface between each pair of adjacent layers. This interface defines what information and services a layer must provide for the layer above it. Dr. Poonam Kadam DJSCE
  • 18. • Within a single machine, each layer calls upon services of the layer just below it. • Layer 3, for example, uses the services provided by layer 2 and provides services for layer 4. • Between machines, layer x on one machine communicates with layer x on another machine, by using a protocol (this is Peer-to-Peer Process). • Communication between machines is therefore a peer-to- peer process using protocols appropriate to a given layer. Peer-to-Peer Process Dr. Poonam Kadam DJSCE
  • 20. Peer-to-Peer Communications 7 Application 6 Presentation 5 Session 4 Transport 3 Network 2 Data Link 1 Physical Host A Application Presentation Session Transport Network Data Link Physical Bits Frames Packets Segments Host B Each layer uses its own layer protocol to communicate with its peer layer in the other system. Each layer’s protocol exchanges information, called protocol data units (PDUs), between peer
  • 22. Data Encapsulation } { Application Presentation Session Transport Network Physical Data Link Application Presentation Session Transport Network Physical Data Link Data Data Network Header Host A Host B
  • 23. Data Encapsulation } { Application Presentation Session Transport Network Physical Data Link Application Presentation Session Transport Network Physical Data Link Data Data Network Header Frame Header Frame Trailer Data Network Header Host A Host B
  • 24. Data Encapsulation } { Application Presentation Session Transport Network Physical Data Link Application Presentation Session Transport Network Physical Data Link Data Data Network Header Frame Header Frame Trailer Data Network Header 0101101010110001 Host A Host B
  • 26. An exchange using the OSI model Dr. Poonam Kadam DJSCE
  • 27. • Repeaters • Hubs • Bridges • Switches • Routers Network Devices Dr. Poonam Kadam DJSCE
  • 28. Repeaters Repeaters are network devices operating at physical layer of the OSI model that regenerate an incoming signal before retransmitting it. Dr. Poonam Kadam DJSCE
  • 29. Hub • Device that serves as the center of a star topology network • sometimes referred to as a multiport repeater • no forwarding intelligence Dr. Poonam Kadam DJSCE
  • 30. Hub • Physical layer device • Regenerate signals • Propagates signals through the network • Does not filter data packets based on destination 123 124 125 126 127 128 Hub Dr. Poonam Kadam DJSCE
  • 31. A hub in a network Dr. Poonam Kadam DJSCE
  • 32. Bridge • Device that connects and passes packets between two network segments. • More intelligent than hub—analyzes incoming packets and forwards (or filters) them based on addressing information. Dr. Poonam Kadam DJSCE
  • 33. Bridge Segment 1 Segment 2 123 124 125 126 127 128 Corporate Intranet Hub Hub Bridge Example • Layer 2 device • More intelligent than a hub • Maintains address tables • Collects and passes packets between two network segments Dr. Poonam Kadam DJSCE
  • 34. Switches •Layer 2 device •Provide full dedicated data transmission rate between two stations. •Build and maintain MAC address tables. Dr. Poonam Kadam DJSCE
  • 35. Workstation 31 Switch Corporate Intranet 32 33 36 100 Mbps 100 Mbps Switching—“Dedicated” Media • Provides full dedicated transmission rate between stations • Used in both LAN and WAN 35 34 Dr. Poonam Kadam DJSCE
  • 36. A switch in a internetwork Dr. Poonam Kadam DJSCE
  • 37. Routers • Interconnect LANs and WANs • Provide path determination using metrics • Forward packets from one network to another • Control broadcasts to the network Dr. Poonam Kadam DJSCE
  • 41. Identifying broadcast domain and collision domain Dr. Poonam Kadam DJSCE
  • 43. Layers in the OSI Model The functions of each layer in the OSI model : Physical Layer Data Link Layer Network Layer Transport Layer Session Layer Presentation Layer Application Layer Dr. Poonam Kadam DJSCE
  • 44. The physical layer is responsible for the movement of individual bits from one hop (node) to the next. Note: Physical Layer
  • 46. Physical layer The physical layer is concerned with the following: • Physical characteristics of interfaces and media: The physical layer defines the characteristics of the interface between devices and the transmission media, including its type. • Representation of the bits: the physical layer data consist of a stream of bits without any interpretation. To be transmitted, bits must be encoded into signals –electrical or optical-. The physical layer defines the type of encoding. • Data rate: The physical layer defines the transmission rate, the number of bits sent each second. Dr. Poonam Kadam DJSCE
  • 47. Physical Layer • Line configuration: the physical layer is concerned with the connection of devices to the medium. • Physical topology : how devices are connected to make the network. • Transmission Mode :defines the direction of signal between two devices. Dr. Poonam Kadam DJSCE
  • 49. Point-to-Point Line Configuration •Link uses the entire capacity for transmission. Dr. Poonam Kadam DJSCE
  • 50. Multipoint Line Configuration •More devices share the link (same bandwidth).
  • 52. • no reply channel provided Dr. Poonam Kadam DJSCE
  • 55. Full-Duplex Capacity of channel is divided between signals traveling in opposite direction Dr. Poonam Kadam DJSCE
  • 56. Physical Topologies Topology refers to the physical arrangement of network components and media. Four common types • Mesh topology • star topology • Ring topology • bus topology Dr. Poonam Kadam DJSCE
  • 58. MESH TOPOLOGY • n(n-1)/2 -----duplex mode links Advantages: • Eliminates traffic problem-link carries traffic only between the two devices it connects • Robust • Privacy/security-capacity reserved • Easy fault identification Disadvantages: • no. of cables • no. of ports required in each host Dr. Poonam Kadam DJSCE
  • 59. Star Topology (LAN) • Center: hub, or switch • 5 to 100+ devices • Does not allow direct traffic between Devices. Dr. Poonam Kadam DJSCE
  • 60. • If N devices are connected to every other in star, then the amount of cables required to attach them is N. Advantages: • Less expensive than mesh • Easy to add new computer • Easy to diagnose network fault • It is very reliable – if one cable or device fails then all the others will still work • No disruptions to the network when connecting or removing devices. • Each device requires just one port i.e. to attach to the hub. Disadvantage: • Central point of failure-Hub failure
  • 61. Ring Topology •Repeaters at each component •Unidirectional transmission links •Closed loop
  • 62. Advantages: • Add/deletion easy • Equal access to the resources. • It is cheap to install and expand. • Minimum collision. • Ring network is extremely orderly organized where every device has access to the token and therefore the opportunity to transmit. Disadvantage: • Break in the ring results in failure • Due to the Uni-directional Ring, a data packet (token) must have to pass through all the nodes.
  • 63. Ring Topology (LAN) Redundant ring to avoid network failure • Repeaters at each component • Unidirectional transmission links • Closed loop • Typically used in FDDI networks Fiber Distributed Data Interface
  • 64. Bus Topology Tree topology “branch” with multiple nodes Drop lines tap Dr. Poonam Kadam DJSCE
  • 65. Advantages: • It is the easiest network topology for connecting peripherals or computers in a linear fashion. • It works very efficient well when there is a small network. • It is easy to connect or remove devices in this network without affecting any other device. • Very cost-effective as compared to other network topology • It is easy to understand topology. • Easy to expand by joining the two cables together. Disadvantages: • Bus topology is not great for large networks. • Identification of problem becomes difficult if whole network goes down. • If a main cable is damaged, whole network fails. • Packet loss is high. • This network topology is very slow as compared to other topologies.
  • 68. The physical layer is responsible for movements of individual bits from one hop (node) to another Responsibilities of Physical layer 1> Physical characteristics of interfaces and medium. 2> Representation of bits 3> Data rate 4> Synchronization of bits 5> Line configuration 6> Physical topology 7> Transmission modes. Dr. Poonam Kadam DJSCE
  • 69. The data link layer is responsible for moving frames from one hop (node) to the next. Note: Data Link Layer
  • 72. Functions of the data link layer: • Framing The data link layer divides the stream of bits received from the network layer into data units called frames. • Physical addressing If frames are to be distributed to different systems on the network, the data link layer adds a header to the frame to define the physical address of the sender (source address) and/or receiver (destination address) of the frame. Handles addressing problem locally. • If the frame is intended for a system outside the sender’s network, the receiver address is the address of the device that connects one network to the next.
  • 73. Data Link Layer Example
  • 74. Data A P 20 10 Data A P 20 10 Physical addresses changed Data A P 33 99 Data A P 33 99 Physical addresses changed Data A P 95 66 Data A P 95 66
  • 75. • Flow Control. If the rate at which the data are absorbed by the receiver is less than the rate produced in the sender, the data link layer imposes a flow control mechanism to prevent overwhelming the receiver. • Error control. The data link layer adds reliability to the physical layer by adding mechanisms to detect and retransmit damaged or lost frames. Error control is normally achieved through a trailer to the end of the frame. • Access Control. When two or more devices are connected to the same link, data link layer protocols are necessary to determine which device has control over the link at any time.
  • 76. The data link layer is responsible for moving frames from one hop (node) to another. Responsibilities of Data link layer 1> Framing . 2> Physical addressing . 3> Flow control. 4> Error control. 5> Access control . Dr. Poonam Kadam DJSCE
  • 77. The network layer is responsible for the delivery of individual packets from the source host to the destination host. Note:
  • 79. The Network layer is responsible for delivery of individual packets from source host to the destination host. Responsibilities of Network layer 1> Logical addressing . 2> Routing .
  • 80. • Logical addressing. The physical addressing implemented by the data link layer handles the addressing problem locally. • The network layer adds a header to the packet coming from the upper layer, among other things, includes the logical address of the sender and receiver. • Routing. When independent networks or links are connected together to create an internetwork (a network of networks) or a large network, the connecting devices (called routers or gateways) route or switch the packets to their final destination. Network Layer
  • 81. The unit of communication at the network layer is a datagram. Note
  • 83. The physical addresses will change from hop to hop, but the logical addresses remain the same. Note
  • 84. The transport layer is responsible for the delivery of a message from one process to another. Note:
  • 86. The transport layer is responsible for the delivery of a message from one process to another. Responsibilities of Transport layer 1> Service –point addressing. 2> Segmentation and reassembly. 3> Connection control. 4> Flow control-performed end to end not across a link. 5> Error control Dr. Poonam Kadam DJSCE
  • 87. Classification of Port Numbers IANA (Internet Assigned Numbers Authority) ephemeral ports
  • 88. Internet Assigned Numbers Authority (IANA) is responsible for managing the uses of these ports. Well-known ports : The range of well-known port is 0 to 1023. well known ports are assigned to common protocols and services such as HTTP, SMTP etc. Registered ports : Range 1024 to 49151. Registered ports assigned by IANA to a specific service upon application by a requesting entity. Dynamic ports : dynamic (private, high) ports range from 49,152 to 65,535. Can be used by any service on an ad hoc basis. Ports are assigned when a session is established, and released when the session ends.
  • 89.
  • 90. Source Port: The source port defines an application to which the TCP segment belongs to, and this port number is dynamically assigned by the client. Destination port: The destination port identifies the location of the service
  • 91. The client sends an http request, then, in this case, the destination port would be 80, whereas the http server is serving the request so its source port number would be 80.
  • 92. A Sender Receiver P Internet Port numbers a Data j A P H2 a Data j A P a Data j Data a Data j A P H2 a Data j A P a Data j Data
  • 95. Connection control by Transport layer : •Connectionless Transport Layer: Each segment is considered as an independent packet and delivered to the transport layer at the destination machine. •Connection-Oriented Transport Layer: Before delivering packets, the connection is made with the transport layer at the destination machine. Dr. Poonam Kadam DJSCE
  • 97. The session layer is responsible for dialog control and synchronization Responsibilities of Session layer 1> Dialog control. 2> Synchronization.
  • 98. • The session layer is responsible for establishing, managing, synchronizing and terminating sessions between end-user application processes. • It works as a dialog controller. It allows the systems to communicate in either half-duplex or full-duplex mode of communication. • It is responsible for token management. Through this, it prevents the two users to simultaneously attempt the same critical operation. • It synchronizes communication. It adds synchronization points or checkpoints in data streams for long communications. This ensures that data streams up to the checkpoints are successfully received and acknowledged. In case of any failures, only the streams after the checkpoints have to be re- transmitted.
  • 100. The Presentation layer is responsible for translation, compression, and encryption. Responsibilities of Presentation layer 1> Translation- Different computers use different encoding systems, the presentation layer is responsible for the interoperability between these encoding methods. It defines the format in which the data is to be exchanged between the two communicating entities. 2> Encryption- To carry sensitive information a system must be able to ensure privacy. 3> Compression- Data compression reduces the number of bits contained in the information.
  • 102. The unit of communication at the application layer is a message. Note
  • 103. The Application layer enables user to access network. Responsibilities of Application layer 1> User interface- Application layer interacts with application programs 2> Support for services such as email, remote file access and transfer, shared database management - It contains management functions to support distributed applications. Dr. Poonam Kadam DJSCE
  • 104. OSI in Action A message begins at the top application layer and moves down the OSI layers to the bottom physical layer. As the message descends, each successive OSI model layer adds a header to it. A header is layer-specific information that basically explains what functions the layer carried out. Conversely, at the receiving end, headers are striped from the message as it travels up the corresponding layers.
  • 105. Layer Functions Provides network services to application processes Enable the user to access n/w 7 Application
  • 106. Layer Functions Network services to applications • Ensures data is readable by receiving system • Format of data 7 Application 6 Presentation Data representation
  • 107. Layer Functions Provides specification for managing comm. Session. • Establishes, manages, and terminates sessions between applications 7 Application 6 Presentation 5 Session Network services to applications Data representation
  • 108. Layer Functions 7 Application 6 Presentation 5 Session Transport 4 Inter-host communication Network services to applications Data representation End-to-end connection reliability source to destination delivery of the entire message. • Concerned with data transport issues between hosts • Data transport reliability • Establishes, maintains, and terminates virtual circuits • Fault detection and recovery • Information flow control
  • 109. Layer Functions 7 Application 6 Presentation 5 Session Transport 4 Network 3 Inter-host communication Network services to applications Data representation End-to-end connection reliability Addresses and best path source to destination delivery of packets • Provides connectivity and path selection between two end systems • routing • Logical addressing-if packet passes the network boundary.
  • 110. Layer Functions 7 Application 6 Presentation 5 Session Transport 4 Network 3 Data Link 2 Inter-host communication Network services to applications Data representation End-to-end connection reliability Addresses and best path Access to media-which device has control over the link. • Framing • Physical addressing, network topology, error notification, flow control • Flow control • Provides reliable transfer of data across media
  • 111. Layer Functions 7 Application 6 Presentation 5 Session Transport 4 Network 3 Data Link 2 Physical 1 Inter-host communication Network services to applications Data representation End-to-end connection reliability Addresses and best path Access to media • Deals with electrical and mechanical specifications of the interface and medium, Wires, connectors • Representation of bits, Data rate • Concerned with Line configuration • Physical topology • Transmission mode
  • 112. TCP/IP Protocol Suite The TCP/IP protocol suite is made of five layers: physical, data link, network, transport, and application. The first four layers provide physical standards, network interface, internetworking, and transport functions that correspond to the first four layers of the OSI model. The three topmost layers in the OSI model, however, are represented in TCP/IP by a single layer called the application layer. Physical Host to Network Layer/Network interface Data Link Layers Network Layer- Internet Layer Transport Layer- host to host Layer Application Layer
  • 113. OSI & TCP/IP Models TCP/IP Model Dr. Poonam Kadam DJSCE
  • 115. Protocols in TCP/IP and OSI model
  翻译: