Unit-1 _weqeqeqweqweqweweqweqweqwweCCN.ppt

KalpeshMahajan23 42 views 140 slides Oct 18, 2024
Slide 1
Slide 1 of 140
Slide 1
1
Slide 2
2
Slide 3
3
Slide 4
4
Slide 5
5
Slide 6
6
Slide 7
7
Slide 8
8
Slide 9
9
Slide 10
10
Slide 11
11
Slide 12
12
Slide 13
13
Slide 14
14
Slide 15
15
Slide 16
16
Slide 17
17
Slide 18
18
Slide 19
19
Slide 20
20
Slide 21
21
Slide 22
22
Slide 23
23
Slide 24
24
Slide 25
25
Slide 26
26
Slide 27
27
Slide 28
28
Slide 29
29
Slide 30
30
Slide 31
31
Slide 32
32
Slide 33
33
Slide 34
34
Slide 35
35
Slide 36
36
Slide 37
37
Slide 38
38
Slide 39
39
Slide 40
40
Slide 41
41
Slide 42
42
Slide 43
43
Slide 44
44
Slide 45
45
Slide 46
46
Slide 47
47
Slide 48
48
Slide 49
49
Slide 50
50
Slide 51
51
Slide 52
52
Slide 53
53
Slide 54
54
Slide 55
55
Slide 56
56
Slide 57
57
Slide 58
58
Slide 59
59
Slide 60
60
Slide 61
61
Slide 62
62
Slide 63
63
Slide 64
64
Slide 65
65
Slide 66
66
Slide 67
67
Slide 68
68
Slide 69
69
Slide 70
70
Slide 71
71
Slide 72
72
Slide 73
73
Slide 74
74
Slide 75
75
Slide 76
76
Slide 77
77
Slide 78
78
Slide 79
79
Slide 80
80
Slide 81
81
Slide 82
82
Slide 83
83
Slide 84
84
Slide 85
85
Slide 86
86
Slide 87
87
Slide 88
88
Slide 89
89
Slide 90
90
Slide 91
91
Slide 92
92
Slide 93
93
Slide 94
94
Slide 95
95
Slide 96
96
Slide 97
97
Slide 98
98
Slide 99
99
Slide 100
100
Slide 101
101
Slide 102
102
Slide 103
103
Slide 104
104
Slide 105
105
Slide 106
106
Slide 107
107
Slide 108
108
Slide 109
109
Slide 110
110
Slide 111
111
Slide 112
112
Slide 113
113
Slide 114
114
Slide 115
115
Slide 116
116
Slide 117
117
Slide 118
118
Slide 119
119
Slide 120
120
Slide 121
121
Slide 122
122
Slide 123
123
Slide 124
124
Slide 125
125
Slide 126
126
Slide 127
127
Slide 128
128
Slide 129
129
Slide 130
130
Slide 131
131
Slide 132
132
Slide 133
133
Slide 134
134
Slide 135
135
Slide 136
136
Slide 137
137
Slide 138
138
Slide 139
139
Slide 140
140

About This Presentation

2eqe


Slide Content

1.1
Chapter 1
Introduction
Copyright © The McGraw-Hill Companies, Inc. Permission required for reproduction or display.

1.2


Examination Scheme (Theory)

Term Test : 15 Marks

Teacher Assessment : 20 Marks

End Sem Exam : 65 Marks

Total Marks : 100 Marks

Examination Scheme (Practical)

Teacher Assessment : 25 Marks

End Sem Exam : 25 Marks

Total Marks: 50 Marks
1.3


Course Objectives:

This course aims to provide students with a comprehensive
understanding of computer networks, from the fundamental
concepts of networking to advanced topics such as Internet
of Things (IoT) architecture and wireless networks.

Students will explore the key components of networking,
including the network layer, transport and application layer
protocols, and the interconnection of smart objects using IP.

By the end of the course, students will be equipped with
the knowledge and skills necessary to design, manage, and
troubleshoot computer networks, with a focus on emerging
technologies and applications in the field.
1.4

1.5

Unit-1 Contents

Introduction to Computer Networks: Basics
of Computer Networks

Network Topologies and Protocols

OSI and TCP/IP Models

Network Devices and Components.
1.6

1.7
1-1 DATA COMMUNICATIONS1-1 DATA COMMUNICATIONS
The term The term telecommunicationtelecommunication means communication at a means communication at a
distance. The word distance. The word datadata refers to information presented refers to information presented
in whatever form is agreed upon by the parties creating in whatever form is agreed upon by the parties creating
and using the data. and using the data. Data communicationsData communications are the are the
exchange of data between two devices via some form of exchange of data between two devices via some form of
transmission medium such as a wire cable. transmission medium such as a wire cable.
 Components of a data communications system
 Data Flow
Topics discussed in this section:Topics discussed in this section:

1.8
A data communication system is made up of five
components
1.Message: the information (data) to be communicated
–Consist of text, numbers, pictures, audio, or video
2.Sender: the device that sends the data message
–Computer, workstation, telephone handset, video camera,

3.Receiver: the device that receives the message
–Computer, workstation, telephone handset, television
4.Medium: The physical path by which a message travels from
sender to receiver
–twisted pair, coaxial cable, fiber-optic, radio waves
5.Protocol: a set of rules that govern data communications
– An agreement between the communicating devices
– Devices may be connected but not communicating (no
protocol)
–Arabic speaker with Japanese speaker

1.9
Figure 1.1 Components of a data communication system

1.10
Data Flow
Communication between two devices can be:
•Simplex
•Half-Duplex
•Full-Duplex

1.11
Figure 1.2 Data flow (simplex, half-duplex, and full-duplex)


Simplex (one way street)

The communication is unidirectional

Only one device on a link can transmit; the other can
only receive

Use the entire capacity of the channel to send data

Example: Keyboards, Monitors
1.12


Half-Duplex (one-lane with two-directional traffic)

Each station can both transmit and receive, but not at
the same time

When one device is sending, the other can only
receive, and vice versa

The entire capacity of a channel is taken over by the
transmitting device

Example: Walkie-talkies
1.13


Full-Duplex (Duplex) (two-way street)

Both stations can transmit and receive at same time

Signals going in either direction sharing the capacity of
the link

Sharing can occur in two ways:

Link has two physically separate transmission paths

One for sending and the other for receiving

The capacity of the channel is divided between signals
travelling in both directions

Example: Telephone network
1.14

1.15
1-2 NETWORKS1-2 NETWORKS
A A networknetwork is a set of devices (often referred to as is a set of devices (often referred to as nodesnodes) )
connected by communication connected by communication linkslinks. A node can be a . A node can be a
computer, printer, or any other device capable of sending computer, printer, or any other device capable of sending
and/or receiving data generated by other nodes on the and/or receiving data generated by other nodes on the
network. A link can be a cable, air, optical fiber, or any network. A link can be a cable, air, optical fiber, or any
medium which can transport a signal carrying medium which can transport a signal carrying
information.information.
 Network Criteria
 Physical Structures
 Categories of Networks
Topics discussed in this section:Topics discussed in this section:

1.16
Network Criteria

Performance

Depends on Network Elements

Measured in terms of Delay(low) and Throughput( (high): a
measure of how fast we can actually send data through a network)

Reliability

Failure rate of network components

Recovery time of a network after a failure

Network’s robustness in a catastrophe: protect by good back up
network system

Measured in terms of availability/robustness

Security

Data protection against corruption/loss of data due to:

Errors

Malicious users


Physical Structures:

Type of connection

Network: Two or more devices connected through
links

Link: Communication pathway that transfers data
from one device two another

Two devices must be connected in some way to the
same link at the same time. Two possible types:

Point-to-Point

Multipoint
1.17

1.18
Physical Structures

Type of Connection

Point to Point - single transmitter and receiver

Dedicated link between two devices

Entire capacity of the link is reserved for transmission between
those two devices

Use an actual length of wire or cable

Other options, such as microwave or satellite is possible

Example: Television remote control


Multipoint (Multidrop)- multiple recipients of single transmission

More than two devices share a single link

Capacity is shared

Channel is shared either spatially or temporally

Spatially shared: if devices use link at same time

Timeshare: if users must take turns
1.19

1.20
Figure 1.3 Types of connections: point-to-point and multipoint

1.21
Categories of Networks

Local Area Networks (LANs)

Short distances

Designed to provide local interconnectivity

Wide Area Networks (WANs)

Long distances

Provide connectivity over large areas

Metropolitan Area Networks (MANs)

Provide connectivity over areas such as a city, a campus

1.22
Categories of Networks
Network Category depends on its size
Three primary categories
LANLAN: Covers area < 2miles
WANWAN: Can be worldwide
MANMAN: Between LAN & WAN, span 10s of
miles

Local Area Network (LAN)

Privately owned

Links devices in the same office, building, or
campus

Simple LAN: 2 PCs & 1 printer in home or office

Size is limited to a few kilometers

Allow resources to be shared (hardware, software,
or data)
1.23

Local Area Network (LAN)
1.24
An isolated LAN connecting 12 computers to a hub in a closet

Local Area Network (LAN)

LAN is distinguished by:

Size (# users of OS, or licensing restrictions)

Transmission medium (only one type)

Topology (bus, ring, star)

Data Rates (speed):

Early: 4 to 16 Mbps

Today: 100 to 1000 Mbps
1.25

Wide Area Networks (WAN)

Provides long-distance transmission of data
over large geographic areas (country,
continent, world)
1.26

Wide Area Networks (WAN)

Switched WAN

Backbone of the Internet

Dialup line point-to-point WAN

Leased line from a telephone company
1.27

Wide Area Networks (WAN)
1.28

Metropolitan Area Networks (MAN)

Size between LAN and WAN

Inside a town or a city

Example: the part of the telephone company
network that can provide a high-speed DSL
to the customer
1.29

Metropolitan Area Networks (MAN)

Two or more networks connected together
1.30

1.31
Figure 1.12 A heterogeneous network made of four WANs and two LANs

The Internet

Internet has revolutionized many aspects of our daily lives.

It has affected the way we do business as well as the way
we spend our leisure time.

Internet is a communication system that has brought a
wealth of information to our fingertips and organized it for
our use

An internet is 2 or more networks that can communicate
with each other

The Internet is a collaboration of more than hundreds of
thousands of interconnected networks
1.32

1.33
Figure 1.13 Hierarchical organization of the Internet

Protocols and Standards

Protocol synonymous with rule

Standards: agreed-upon rules

Protocols

A protocol is a set of rules that govern data
communications

Defines What, How, and When it is communicated
1.34

Protocols and Standards
Elements of a protocol:

Syntax: structure or format of data

Example: 8-bits address of sender, 8-bits address of receiver,
remaining bits: message stream

Semantics: meaning of each section of bits. It refers
when data sent and how fast it is sent

Example: Does the address is a route to be taken or the
final destination of the message

Timing: when data should be sent and how fast they can
be sent

Example: sender produces data at 100 Mbps but the
receiver can process data at only 1 Mbps  overload
and data loose
1.35

1.36
Physical Topology
Connection of devices
The way a network is laid out physically
Two or more links form a topology
The topology of a network is the geometric
representation of the relationship of all the links and
linking devices (nodes) to one another.
Four topologies : Mesh, Star, Bus, and Ring
•Type of transmission - unicast, mulitcast, broadcast

1.37
Figure 1.4 Categories of topology

1.38
Topology
Mesh Star Ring Bus Tree Hybrid

1.39
Figure 1.5 A fully connected mesh topology (five devices)


In a
 
mesh topology, every computer is connected to each
other computer via dedicated channels.

The total number of ports that are required by each device
is N-1. (if 5 devices are connected then 4 port are required)
The total number of dedicated links required to connect
them is N(N-1)/2. i.e, if there are 5 computers connected to
it then required dedicated link will be 5*4/2 = 10.

It can be divided into two kinds:
1. Fully connected mesh topology: all the nodes connected
to every other node. 2. Partially connected mesh topology:
It does not have all the nodes connected to each other.
1.40


Advantages of Mesh Topology

The arrangement of the network nodes is such that
it is possible to transmit data from one node to
many other nodes at the same time.

The failure of a single node does not cause the
entire network to fail as there are alternate paths for
data transmission.

It can handle heavy traffic, as there are dedicated
paths between any two network nodes.

Point-to-point contact between every pair of nodes
makes it easy to identify faults.
1.41


Disadvantages of Mesh Topology

The cost of implementation and maintenance is
higher.

Configuration and installation are difficult.

Suitable for less number of devices, as cable cost is
high.
1.42

1.43
Figure 1.6 A star topology connecting four stations


In
 
star topology, all the computers are connected
to a single central node called a hub through a
cable. All the transmission of data is through the
hub.

Every computer is connected to the hub through a
dedicated connection/cable.

Hub also acts as a repeater.

The performance of the network depends on the
capacity of central Hub . If the hub has high data
transfer rate , the overall network performance is
likely to be good
1.44


Advantages of Star Topology

Due to its centralized nature, the topology offers simplicity
of operation.

It also achieves isolation of each device in the network.

Adding or removing network nodes is easy, and can be
done without affecting the entire network.

Due to its centralized nature, it is easy to detect faults in the
network devices.

As the analysis of traffic is easy, the topology poses a lesser
security risk.

Data packets do not have to pass through many nodes, like
in the case of a ring network. Thus, with the use of a high-
capacity central hub, traffic load can be handled at fairly
decent speeds.
1.45


Disadvantages of Star Topology

Network operation depends on the functioning of
the central hub. Hence,
 central hub failure leads to
the failure of the entire network.

Also, the number of nodes that can be added,
depends on the capacity of the central hub.

 The setup cost is quite high.
1.46

1.47
Figure 1.7 A bus topology connecting three stations

1.48
Figure 1.8 A ring topology connecting six stations

1.49
In a
 
Ring topology, the device forms the ring shape, in
which each device is connected exactly to its neighbour
on both sides through point to point connection and the
first and last nodes are connected to each other.
The functionality of Ring topology:
1.In this topology, one device known as monitor station
will take responsibility for the operation.
2.Station has to hold the token to transmit the data.
3.When no station is holding the token then the token
will be circulated in the ring

1.50
1.To prevent the loss of the transmission data from the first node
to the last node say i.e,1000th node, number of repeaters are
deployed in the network.
2.Dual Ring Topology: Bidirectional connections between each
network node.
3.Data is transmitted in a sequential manner it can’t skip device
in between.
Disadvantages of Ring topology
•Difficult to troubleshoot.
•Failure in a single computer can lead to disturbing the whole
network.
•Adding or removing a computer will disturb the transmission of
the data in the network.


Advantages of Ring Topology

The data being transmitted between two nodes passes
through all the intermediate nodes. A central server is not
required for the management of this topology.

The traffic is unidirectional and the data transmission is
high-speed.

In comparison to a bus, a ring is better at handling load.

The adding or removing of network nodes is easy, as the
process requires changing only two connections.

The configuration makes it easy to identify faults in
network nodes.

In this topology, each node has the opportunity to transmit
data. Thus, it is a very organized network topology.

It is less costly than a star topology.
1.51

Tree Topology
1.52

Tree Topology
PROS CONS
Blends bus and star topologies The network is dependent on the
health of the root node
Easy to manage Requires networking expertise
Easy to expand Involves a lot of cable
Suitable for middle-sized
businesses
Larger implementations require
monitoring software
Can get expensive
1.53

Tree Topology

Imagine a hierarchy of network nodes, with the root node
serving client nodes, that in turn serve other lower-level
nodes.

The
 
top-level node 
is mostly a mainframe computer while
other nodes in the hierarchy are mini or microcomputers.

In this arrangement, the node at each level could be forming
a star network with the nodes it serves. In this case, the
structure combines star and bus topologies and inherits their
advantages and disadvantages.

Tree topology is used to organised the computers in
corporate network.
1.54


Advantages of Tree Topology

The tree topology is useful in cases where a star or bus
cannot be implemented individually. It is most suited in
networking multiple departments of a university or
corporation, where each unit (star segment) functions
separately and is also connected with the main node (root
node).

The advantages of centralization that are achieved in a star
topology are inherited by the individual star segments in a
tree network.

Each star segment gets a dedicated link from the central
bus. Thus, the failure of one segment does not affect the
rest of the network.

Fault identification is easy.

The network can be expanded by the addition of secondary
nodes. Thus, scalability is achieved.
1.55


Disadvantages of Tree Topology

As multiple segments are connected to a central bus, the
network depends heavily on the bus. Its failure affects the
entire network.

Owing to its size and complexity, maintenance is not easy
and costs are high. Also, configuration is difficult in
comparison to that in other topologies.

Though it is scalable, the number of nodes that can be
added depends on the capacity of the central bus and on the
cable type.
1.56

1.57
Hybrid Topology

1.58
Figure 1.9 A hybrid topology: a star backbone with three bus networks


A
 
hybrid topology 
is a combination of two or more types
of network topology.
This types of network topology are usually implemented by
the organisation

Examples of Hybrid Topology

Internet is the best example of the largest Hybrid topology
If there is a
 
bus topology 
in the IT department while 
ring
topology 
in the HR department then connecting these two
will result in the
 
hybrid topology.

Features of Hybrid Topology

1. Collection of two or more topology.
1.59


Advantages of Hybrid Topology

Scalable: easy to increase the size of the network by adding
new components

Effective: design in such a way that the strength of
constituent topologies is maximized.

Flexible: It can be designed according to the requirement of
the organisation.

Reliable: as troubleshooting is easy and Error detecting.
fault detection and troubleshooting

Disadvantages of Hybrid Topology

Costly to implement: Cost of Infrastructure, hub and
expertise increases.

Difficult to manage 
as it is complex in design.
1.60

1.61
1-4 PROTOCOLS1-4 PROTOCOLS
A protocol is synonymous with rule. It consists of a set of A protocol is synonymous with rule. It consists of a set of
rules that govern data communications. It determines rules that govern data communications. It determines
what is communicated, how it is communicated and when what is communicated, how it is communicated and when
it is communicated. The key elements of a protocol are it is communicated. The key elements of a protocol are
syntax, semantics and timingsyntax, semantics and timing
 Syntax
 Semantics
 Timing
Topics discussed in this section:Topics discussed in this section:

1.62
Elements of a Protocol

Syntax

Structure or format of the data

Indicates how to read the bits - field delineation

Semantics

Interprets the meaning of the bits

Knows which fields define what action

Timing

When data should be sent and what

Speed at which data should be sent or speed at which it is
being received.


Many times it is necessary to connect a local area
network to another local area network or to a wide
area network.

Local area network to local area network
connections are usually performed with a bridge.

Local area network to wide area network
connections are usually performed with a router.

A third device, the switch, can be used to
interconnect segments of a local area network
1.63

1.64

Network Devices & Components
1.65

1.66

Network Devices & Components

Network Devices:

Are products used to expand or connect
networks

Can control the amount of traffic on a
network

Can speed up the flow of data over a
network
1.67

Network Interface card(NIC)

NIC provides the physical interface between
computer and cabling

It prepares data, sends data, and controls the
flow of data.It can also receive and translate
data into bytes for the CPU to understand
1.68

1.69

Repeater

A repeater is a regenerator, not an amplifier A repeater
installed on a link receives the signal before it becomes too
weak or corrupted , regenerates the original bit pattern, and
put the refreshed copy back onto the link.
1.70


Repeaters are very small devices . They allow a cabling
system to extend beyond its maximum allowed length by
amplifying the network voltage so they travel farther

Repeaters are nothing more than amplifiers and as such are
very inexpensive . Repeaters can only be used to regenerate
signals between similar network segments

The main disadvantage to repeater is that they just amplify
signals. These signals not only include network signals, but
any noise on the wire as well.
1.71

Hub

A device that connects all the computers in a network to
each other.

Hub is a common connection point for devices in a network

A hub contains multiple ports. When a packet arrives at one
port , it is copied to the other ports so that all segments of
the LAN can see all the packets
1.72

Hub
1.73

Switch
1.74

Switch

A network switch is a computer networking device that
connects network segments

Low end network switches appear nearly identical to
network hubs , but a switch contains more
“intelligence”(and slightly higher price) than a network hub

Switch is data link layer device.
 

Switch can perform error checking before forwarding data,
that makes it very efficient as it does not forward packets
that have errors and
 forward good packets selectively to
correct port only

Network switches are capable of inspecting data packets as
they are received, determining the source and destination
device of that packet , and forwarding it appropriately
1.75


A vital difference between hub and switch is that all the
nodes connected to a hub share the bandwidth among
themselves, while a device connected to a switch port has
the full bandwidth all to itself

For ex. If 10 nodes are communicating using a hub on 10-
Mbps network, then each node may only get a portion of
the 10 Mbps if other nodes on the hub want to communicate
as well. But with a switch , each node could possibly
communicate at the full 10 Mbps
1.76

Switch
1.77

Router

A router is a device like a switch that routes data
packets based on their IP addresses.

Router is mainly a Network Layer device.

Routers normally connect LANs and WANs
together and have a dynamically updating routing
table based on which they make decisions on
routing the data packets.

Like bridges, they can segment large networks and
can filter out noise.

Highly intelligent device and more expensive that
connect multiple network types and determine the
best path for sending data
1.78

Routers
1.79

Bridge
Bridge
S1 S2
S4
S3
S5 S6
LAN1
LAN2
1.80

Bridges

As a physical layer device , it regenerates the signal it receives

As a data link layer device the Bridge can check the
Physical/MAC address (source & destination) contained in the
frame

Bridges use backward learning in recording source address on
transmissions.

Unlike repeaters, bridges will not forward a frame onto another
LAN segment if it knows about the location of the destination
node.

Bridge management gets more complicated when loops are
possible in the frame route.

It can connect on different architectures like Ethernet and Token-
ring

It provide packet filtering , meaning it only passes the packet that
are allow on destination network
1.81

1.82

How it works?

Bridge examine each packet as it enters through
one of the port, it first checks MAC address of the
sender and create a mapping between the port and
the sender MAC address .

Then it looks MAC address of destination and
compare the list of all learned MAC addresses.

If the address is in the list then bridge look up the
port number & forward the packet to the port
where the destination is connected .

If the destination’s MAC address is not in the list
the bridge blocks the data from passing
1.83

1.84

Gateway

A gateway is a protocol convertor.

It accepts a packet format for one protocol(e.g.,
Apple Talk) and converts it into a packet format for
another protocol(e.g.,TCP/IP).

It is a computer that operates in all 5 layer or 7 layers
of OSI model

A Gateway takes an application message, reads it &
interprets it

In homes, the Gateway is the ISP(internet service
provider) that connects the user to the Internet.
1.85

Gateway
1.86

MAC Address

A Media Access Control (MAC) address is a 48-bit address
that is used for communication between 2 hosts in an
Ethernet environment

It is a hardware address which means that it is stored in the
firmware of the network card

A MAC address is supposed to be globally unique. Each
network card vendor gets its share of addresses (represented
by the first 24 bits)

The address is written in the form of 12 hexadecimal digits.

Ex. D8-D3-85-EB-12-E3

Every hexadecimal character represents 4 bits so the first 6
hexadecimal characters represent the vendor(in this case
Hewlett Packard)

It is a physical address
1.87

1.88

IP Address

An IP address is a 32 bit number that identifies a host on a
network. It is usually written in the form of 4 decimal
numbers separated by periods (ex.10.0.50.1)

An IP address is a logical address

Any device that wants to communicate with other device
using TCP/IP needs to have an IP address . It can be
configured manually or it can be obtained from a DHCP
server

The term “IP address” is used for IPV4 which is the fourth
version of the IP protocol.

A newer version exists IPV6 that uses 128 bit addressing
1.89

Protocol Architecture

It is layered structure of H/W and S/W that
supports exchange of data between systems

It supports distributed applications(E-mail , file
transfer)

Each layer of protocol architecture provides some
set of rules

There are 2 widely used protocol architecture

OSI Model

TCP/IP architecture
1.90

OSI Model

An ISO(International standard organization) that covers all
aspects of network communications is the open system
Interconnection (OSI) model

An open system is a model that allows any 2 different
systems to communicate regardless of their underlying
architecture(H/w and S/w)

The OSI model is not a protocol ; it is a model for
understanding and designing a network architecture that is
flexible, robust and interoperable

The OSI model is a layered framework for the design of
network systems that allows for communication across all
types of computer systems
1.91


The purpose of the OSI model is to facilitate
communication between different systems(2
different OS) without requiring changes to the
logic of the underlying hardware & software
1.92


The OSI model is built of 7 ordered layers
1.(layer 1) physical layer
2.(layer 2) Data Link layer
3.(layer 3) Network layer
4.(layer 4) Transport layer
5.(layer 5)Session layer
6.(layer 6) Pesentation layer
7.(layer 7) Application layer
1.93

1.94

Peer to Peer Process

Within a single machine each layer calls upon the
services of the layer just below it

Layer 3, for example , uses the services provided
by layer 2 and provides services for layer 4

Between machines, layer x on one machine
communicates with layer x on another machine , by
using a protocol (this is peer-to –peer process)

Communication between machines is therefore
peer to peer process using protocols appropriate to
a given layer
1.95

1.96

1.97

1.98

1.99

1.100

1.101

1.102

1.103

1.104

1.105

1.106

1.107

1.108

1.109

1.110

1.111

1.112

1.113

1.114

1.115

1.116


Helps in setting up & managing connections , enabling
sending & receiving of data followed by termination of
connections or sessions

Seesion layer has it own helpers called APIs which allows
applications on different computers to communicate with each
other

Just before a connection or session established with the server ,
server perform a function called Authentication (process of
verifying “who you are?”) for this server uses username &
password. Once entered username & password are matched a
seesion or connection is established between your computer &
server.

Authrization is checked afterwards. If you have permission to
access a file?

Session layer keeps the track of files that are being
downloaded

Helps in session management. (which data packet belong to
which file(eg. text or image file) & tracks where the received
data packet go
1.117

1.118

1.119

1.120

1.121

1.122

1.123

1.124

TCP/IP

A network model designed to support network communication even if the
computers are from different manufacturers

It is specifically designed as a model to offer highly reliable and end-to-end
byte stream over an unreliable internetwork.

As per the name TCP/IP seems to be a set of 2 protocols only, however it
consists of numerous protocols bundled at different layers.

Application layer generates the message which pass through the lower layer
at the sending node where each layer encapsulates the message from the
above layer . So the message sent becomes larger & larger as it passes down
the chain

TCP/IP helps you to determine how a specific computer should be
connected to the internet and how you can transmit data between them. It
helps you to create a virtual network when multiple computer networks are
connected together.
1.125

1.126

1.127

1.128

1.129

1.130

1.131

1.132
Physical Layer

1.133

1.134

Media Access Control(MAC
sublayer)
1.135

1.136

1.137
The remaining layers are
implemented in the form of software
programs in computer’s operating
system

1.138


Advantages of the OSI Model
Here are the major benefits/pros of using the OSI model:

It helps you to standardize router, switch, motherboard, and
other hardware

Reduces complexity and standardizes interfaces

Facilitates modular engineering

Helps you to ensure interoperable technology

Helps you to accelerate the evolution

Protocols can be replaced by new protocols when technology
changes.

Provide support for connection-oriented services as well as
connectionless service.

It is a standard model in computer networking.

Supports connectionless and connection-oriented services.

It offers flexibility to adapt to various types of protocols.
1.139


Advantages of TCP/IP
Here, are pros/benefits of using the TCP/IP model:

It helps you to establish/set up a connection between
different types of computers.

It operates independently of the operating system.

It supports many routing-protocols.

It enables the internetworking between the organizations.

TCP/IP model has a highly scalable client-server architecture.

It can be operated independently.

Supports several routing protocols.

It can be used to establish a connection between two
computers.
1.140