Professional Documents
Culture Documents
7 Layered Architecture PDF
7 Layered Architecture PDF
7 LAYERED ARCHITECTURE
The Open Systems Interconnection model (OSI model) is a conceptual model that characterizes and
standardizes the communication functions of a telecommunication or computing system without regard to their
underlying internal structure and technology.
At each level N, two entities at the communicating devices (layer N peers) exchange protocol data units (PDUs) by
means of a layer N protocol. Each PDU contains a payload, called the service data unit (SDU), along with
protocol-related headers and/or footers.
At each level N, two entities at the communicating devices (layer N peers) exchange protocol data units (PDUs) by
means of a layer N protocol. Each PDU contains a payload, called the service data unit (SDU), along with
protocol-related headers and/or footers.
service data unit (SDU) is a unit of data that has been passed down from an OSI layer to a lower layer and that
has not yet been encapsulated into a protocol data unit (PDU) by the lower layer. It is a set of data that is sent by a
user of the services of a given layer, and is transmitted semantically unchanged to a peer service user.
It differs from a PDU in that the PDU specifies the data that will be sent to the peer protocol layer at the receiving
end, as opposed to being sent to a lower layer.
The SDU at any given layer, layer 'n', is the PDU of the layer above, layer 'n+1'. In effect the SDU is the 'payload' of
a given PDU. That is, the process of changing a SDU to a PDU, consists of an encapsulation process,
performed by the lower layer. All the data contained in the SDU becomes encapsulated within the PDU. The
layer n-1 adds headers or footers, or both, to the SDU, transforming it into a PDU of layer n-1. The
added headers or footers are part of the process used to make it possible to get data from a source to a
destination.
Piece of data passed between layers collectively known as PDU (protocol data unit). Layers have different terms to
describe it like (segment in transport layer, packet in network layer, frame at data link layer, and signal at
physical layer.)
PDU include data file and a consistent body of information attached onto data at each successive layer. This
information is called header and footer. It includes instructions on how to restore the file to its original state
when it receives to the target system.
As a PDU passes through the layers, a header (and footer only on data link layer) is added to the packet with
information to the peer layer on the destination system for reconstructing the data on its way back up through the
layers of the destination network.
In data exchange process, participating computers work in reverse mode. Layers on receiving computer
perform the same task in reverse mode.
The receiving device takes delivery of, handles, and translates the data from the sending device at a particular
layer. For example on sending computer presentation layer compress the data, same presentation layer on
receiving computer decompress the data.
On sending computer
On receiving computer
Physical layer receive signals from media and convert them in frames. Frames are forwarded
to the data link layer.
Data link layer check the frame. All tampered frame are dropped here. If frame is correct, data link
layer strip down its header and footer from frame and hand over packet to network layer.
Network layer check the packet with its own implementations. If it's found everything fine with packet, it
strips down its header from packet and hand over segment to transport layer.
Transport layer again do the same job. It verifies the segments with its own protocol rules. Only the
verified segments are processed. Transport layer remove its header from verified segments and
reassemble the segments in data. Data is handed over the session layer.
Session layer keep track of open connection and forwarded the receiving data to presentation layer.
Presentation form the data in such a way that application layer use it.
Application layer on receiving computer find the appropriate application from the computer and open
data within particular application.
In nutshell
At the sending device, each layer breaks the data down into smaller packets and adds its own header.
At the receiving device, each layer strips off the header and builds the data packets into larger packets.
Each protocol layer is blind to the headers of any other protocol layer and cannot process them.
The physical layer defines the electrical and physical specifications of the data connection. It is responsible for
transmission and reception of unstructured raw data in a physical medium
The Physical Layer :
The data link layer provides node-to-node data transfer—a link between two directly connected nodes. It detects
and possibly corrects errors that may occur in the physical layer. It, among other things, defines the protocol to
establish and terminate a connection between two physically connected devices. It also defines the protocol
for flow control between them.
IEEE 802 divides the data link layer into two sublayer.
Media Access Control (MAC) layer - responsible for controlling how devices in a network gain access to
medium and permission to transmit it.
Logical Link Control (LLC) layer - responsible for identifying Network layer protocols and then
encapsulating them and controls error checking and frame synchronization.
The Point-to-Point Protocol (PPP) is a data link layer that can operate over several different physical layers, such
as synchronous and asynchronous serial lines.
MAC Address
MAC address is a 48 bit long layer two address. It is also known as hardware address. This address is burnt with
device by manufacturing company.
The first six hexadecimal digits of a MAC address represent its manufacture company.
You can have the same MAC address in different broadcast domains.
Frame
Data link layer receive packet from network layer and wrap it with layer two Header that is
known as frame. There are two specifications of Ethernet frame.
1. Ethernet II
2. 802
1. Data link layer synchronizes the information which is to be transmitted over the physical layer.
2. The main function of this layer is to make sure data transfer is error free from one node
to another, over the physical layer.
3. Transmitting and receiving data frames sequentially is managed by this layer.
4. This layer sends and expects acknowledgements for frames received and sent respectively. Resending of
non-acknowledgement received frames is also handled by this layer.
5. This layer establishes a logical layer between two nodes and also manages the Frame traffic control over
the network. It signals the transmitting node to stop, when the frame buffers are full.
The network layer provides the functional and procedural means of transferring variable length data sequences
(called datagrams) from one node to another connected to the same network. It translates logical network
address into physical machine address.
A datagram is a basic transfer unit associated with a packet-switched network. The delivery, arrival time, and
order of arrival need not be guaranteed by the network.
A network is a medium to which many nodes can be connected, on which every node has an address and which
permits nodes connected to it to transfer messages to other nodes connected to it by merely providing the content
of a message and the address of the destination node and letting the network find the way to deliver the message
to the destination node, possibly routing it through intermediate nodes. If the message is too large to be
transmitted from one node to another on the data link layer between those nodes, the network may implement
message delivery by splitting the message into several fragments at one node, sending the fragments
independently, and reassembling the fragments at another node. It may, but need not, report delivery errors.
Message delivery at the network layer is not necessarily guaranteed to be reliable; a network
layer protocol may provide reliable message delivery, but it need not do so.
Network layer is responsible for providing logical address known as IP address. Router works on this layer. Main
functions of this layer are following:-
Define IP address
Find routes based on IP address to reach its destination
Connect different data link type together like as Token Ring, Serial, FDDI, Ethernet etc.
1. It routes the signal through different channels from one node to other.
2. It acts as a network controller. It manages the Subnet traffic.
3. It decides by which route data should take.
4. It divides the outgoing messages into packets and assembles the incoming packets into
messages for higher levels.
IP address
IP address a 32 bit long software address which made from two components:
Subnet mask is used to distinguish between network component and host component.
IP packet
Network layer receive segment from transport layer and wrap it with IP header that is known as datagram.
Datagram
Datagram is just another name of packet. Network layer use datagram to transfer information between nodes.
Two types of packets are used at the Network layer: data and route updates.
Data packets
Data packets are used to transport the user data across the network. Protocols used by data packets are
known as routed protocol. For example IP and IPv6
These packets are used to update the route information within internetwork. Routers use these packets.
Protocols that send route update packets are called routing protocols; for example RIP, RIPv2, EIGRP, and OSPF
Routing is the process of selecting best paths in a network. In packet switching networks, routing directs packet
forwarding (the transit of logically addressed network packets from their source toward their ultimate
destination) through intermediate nodes. Intermediate nodes are typically network hardware devices such
as routers, bridges, gateways, firewalls, or switches.
A router[a] is a networking device that forwards data packets between computer networks. Routers perform the
traffic directing functions on the Internet. A data packet is typically forwarded from one router to another
through the networks that constitute the internetwork until it reaches its destination node.[2]
A router is connected to two or more data lines from different networks.[b] When a data packet comes in on one of
the lines, the router reads the address information in the packet to determine the ultimate destination. Then,
using information in its routing table or routing policy, it directs the packet to the next network on its journey.
This creates an overlay internetwork.
The transport layer provides the functional and procedural means of transferring variable-length data
sequences from a source to a destination host via one or more networks, while maintaining the
quality of service functions. The protocols of the layer provide host-to-host communication services for
applications.[1] It provides services such as connection-oriented data stream support, reliability, flow control,
and multiplexing.
An example of a transport-layer protocol in the standard Internet stack is Transmission Control Protocol (TCP),
usually built on top of the Internet Protocol (IP).
The transport layer controls the reliability of a given link through flow control, segmentation/desegmentation,
and error control. Some protocols are state- and connection-oriented. This means that the transport layer can
keep track of the segments and retransmit those that fail. The transport layer also provides the acknowledgement
of the successful data transmission and sends the next data if no errors occurred. The transport layer creates
packets out of the message received from the application layer. Packetizing is a process of dividing the long
message into smaller messages.
Although not developed under the OSI Reference Model and not strictly conforming to the OSI definition of the
transport layer, the Transmission Control Protocol (TCP) and the User Datagram Protocol(UDP) of the Internet
Protocol Suite are commonly categorized as layer-4 protocols within OSI.
Transport Layer :
Transport layer breaks the message (data) into small units so that they are handled more efficiently by the
network layer.
Transport layer provides following services: -
1. Segmentation
2. Connection management
3. Reliable and unreliable data delivery
4. Flow control
5. Connection multiplexing
Segmentation
Segmentation is the process of breaking large data file into smaller files that can be accommodated by network.
To understand this process thinks about a 700 MB movie that you want to download from internet. You have
2MBPS internet connection. How will you download a 700MB movie on 2MBPS internet connection?
In this case segmentation process is used. On server transport layer breaks 700MB movie in smaller size of
segments (less than your internet connection speed). Assume that 700Mb movie is divided in 700 segments. Each
segment has file size of 1Mb that your PC can easily download at current connection speed. Now your PC will
download 700 small files instead of one large file. So next time when you see download progress bar in browser,
think it about segment receiver progress bar. Once your browser receives all segments from server, it will pop up
a message indicating download is completed. Transport layer at your PC will merge all segments back in a single
700Mb movie file. End user will never know how a 700Mb movie makes its way through the 2Mbps connection
line.
Connection management
Transport layer setup, maintain and tear down connections for session layer. Actual mechanic of connection is
controlled by transport layer. Transport layer use two protocols for connection management UDP and TCP.
UDP
UDP is a connection less protocol. Connection-less transmission is said to be unreliable. Now, don't get worried
about the term "unreliable" this doesn't mean that the data isn't going to get its destination; its only means that it
isn't guaranteed to get its destination. Think of your options when you are sending a postcard, put it in the
mailbox, and chances are good that it will get where it's supposed to go but there is no guarantee. There is always
a chance of missing in the way. On the other hand, it's cheap.
TCP
TCP is a connection oriented protocol. Connection-oriented transmission is said to be reliable. Think TCP as
registry AD facility available in Indian post office. For this level of service, you have to buy extra ticket and put a
bunch of extra labels on it to track where it is going and where it has been. You get a receipt when it is delivered.
In this method you have a guaranteed delivery. All of this costs you more—but it is reliable!
Reliability
Reliability means guaranteed data delivery. To insure delivery of each single segment, connection oriented
method is used. In this approach before sending any segments three way handshake process is done.
Once connection is established data transmission will be initiated. To provide maximum reliability it includes
following functions:-
Flow control
In this method sender sends data according to its buffer size. Receiver receives data in its buffer. When receivers
buffer get filled, it send a not ready signal to sender, so sender can stop transmitting more segments. Receivers
send ready signal when it becomes ready to receive next segments. This method has two problems.
First, the receiver may respond to the sender with a not ready signal only when its buffer fills up. While
this message is on its way to the sender, the sender is still sending segments to the receiver, which the
receiver will have to drop because its buffer space is full.
The second problem with the uses of this method is that once the receiver is ready to receive more
segments, it must first send a ready signal to the sender, which must be received before sender can send
more segments.
Windowing
In windowing a window size is defined between sender and receiver. Sender host will wait for an
acknowledgement signal after sending the segments equal to the window size. If any packet lost in the way,
receiver will respond with acknowledgement for lost packet. Sender will send lost packet again. Window size is
automatically set during the three step handshake process. It can be adjust anytime throughout the lifetime of
connection.
Connection multiplexing feature allows multiple applications to connect at a time. For example a server performs
a number of functions like email, FTP, DNS, Web service, file service, data service etc. Suppose server has a single
IP address, how will it perform all these different functions for all the hosts that want to connect with it? To make
this possible transport layer assigns a unique set of numbers for each connection. These numbers are called port
or socket numbers. These port numbers allow multiple applications to send and receive data simultaneously.
Transport layer services are conveyed to an application via a programming interface to the transport layer
protocols. The services may include the following features:
The session layer controls the dialogues (connections) between computers. It establishes, manages and
terminates the connections between the local and remote application
1. Session layer manages and synchronize the conversation between two different applications.
2. Transfer of data from source to destination session layer streams of data are marked and are
resynchronized properly, so that the ends of the messages ar
Presentation layer prepares the data. It takes data from application layer and marks it with formatting code such
as .doc, .jpg, .txt, .avi etc. These file extensions make it easy to realize that particular file is formatted with
particular type of application. With formatting presentation layer also deals with compression and encapsulation.
It compresses (on sending computer) and decompresses (on receiving computer) the data file. This layer can also
encapsulate the data, but it’s uncommon as this can be done by lower layers more effectively.
Session layer deals with connections. It establishes, manages, and terminates sessions between two
communicating nodes. This layer provides its services to the presentation layer. Session layer also synchronizes
dialogue between the presentation layers of the two hosts and manages their data exchange.
1. Presentation layer takes care that the data is sent in such a way that the receiver will understand the
information (data) and will be able to use the data.
2. While receiving the data, presentation layer transforms the data to be ready for the application layer.
3. Languages(syntax) can be different of the two communicating systems. Under this condition
presentation layer plays a role of translator.
4. It perfroms Data compression, Data encryption, Data conversion etc.
The application layer is the OSI layer closest to the end user, which means both the OSI application layer and the
user interact directly with the software application. This layer interacts with software applications that implement
a communicating component. Such application programs fall outside the scope of the OSI model.
Application layer provides platform to send and receive data over the network. All applications and utilities that
communicate with network fall in this layer. For examples
Application Layer :
Application layer protocols that we should know for exam are following:
DNS (Domain Naming System) — Used to translate the name with IP address and vice versa.
1. OSI model distinguishes well between the services, interfaces and protocols.
2. Protocols of OSI model are very well hidden.
3. Protocols can be replaced by new protocols as technology changes.
4. Supports connection oriented services as well as connectionless service.
The design of protocols in the TCP/IP model of the Internet does not concern itself with strict hierarchical
encapsulation and layering.[16] RFC 3439 contains a section entitled "Layering considered harmful".[17] TCP/IP
does recognize four broad layers of functionality which are derived from the operating scope of their contained
protocols: the scope of the software application; the end-to-end transport connection; the internetworking range;
and the scope of the direct links to other nodes on the local network.[18]
Despite using a different concept for layering than the OSI model, these layers are often compared with the OSI
layering scheme in the following way:
The Internet application layer includes the OSI application layer, presentation layer, and most of the
session layer.
Its end-to-end transport layer includes the graceful close function of the OSI session layer as well as the
OSI transport layer.
The internetworking layer (Internet layer) is a subset of the OSI network layer.
The link layer includes the OSI data link layer and sometimes the physical layers, as well as some
protocols of the OSI's network layer.
TCP/IP Reference Model
TCP/IP protocol model is another popular layer model that describes network standards. For CCNA exam you
should be aware about this model as well. This model has same names of layers as OSI reference model has. Don't
be confuse with same name, layers at both model have different functionality in each model.
Let's see how TCP/IP model is different from OSI reference model
Application layer:
TCP/IP model combine the functionality of application layer, presentation layer and session layer from OSI
model in single application layer. In TCP/IP model application layer do all tasks those are performed by upper
layers in OSI model. Application layer deals with high level protocols, including data presentation, compression
and dialog control.
Transport layer:
In TCP/IP model transport layer provides quality of services. TCP protocol is used for reliable data delivery. Flow
control and error correction methods are used for guaranteed data delivery.
Internet layer:
In TCP/IP model Internet layer provide all the functionality that network layer provides in OSI model. Internet
layer is responsible for finding the correct path for datagram [packet].
Name of this layer may confuse you as OSI model has a layer of same name. In TCP/IP model network access
layer deals with LAN and WAN protocols and all the functionality provided by physical and data link layer in OSI
model.
Flow Control: Flow control coordinates that amount of data that can be sent before receiving
acknowledgement.
It is one of the most important duties of the data link layer.
Flow control tells the sender how much data to send.
It makes the sender wait for some sort of an acknowledgment (ACK) before continuing to send more
data.
Flow Control Techniques: Stop-and-wait, and Sliding Window
Error Control: Error control in the data link layer is based on ARQ (automatic repeat request), which is the retransmission
of data.
The term error control refers to methods of error detection and retransmission.
Anytime an error is detected in an exchange, specified frames are retransmitted. This process is called
ARQ.
To ensure reliable communication, there needs to exist flow control (managing the amount of data the sender sends), and
error control (that data arrives at the destination error free).
Flow and error control needs to be done at several layers.
For node-to-node links, flow and error control is carried out in the data-link layer.
For end-point to end-point, flow and error control is carried out in the transport layer.
For every frame that is sent, there needs to be an acknowledgment, which takes a similar amount of propagation
time
ime to get back to the sender.
Only one frame can be in transmission at a time. This leads to inefficiency if propagation delay is much longer
than the transmission delay
Advantages of Stop and Wait:Wait
o It’s simple and each frame is checked and acknowledged well. w
Disadvantages of Stop and Wait:Wait
o Only one frame can be in transmission at a time.
o It is inefficient, if the distance between devices is long. Reason is propagation delay is much longer than
the transmission delay.
o The time spent for waiting acknowledgements
acknowledge between each frame can add significant amount to the
total transmission time.
Reliable systems must have mechanism for detecting and correcting such errors.
Error detection and correction are implemented either at the data link layer or the transport layer of the
OSI model.
Error Detection
Error detection uses the concept of redundancy, which means adding extra bits for detecting errors at
the destination.
Checking function performs the action that the received bit stream passes the checking criteria, the data
portion of the data unit is accepted else rejected.
Some systems may use odd parity checking, where the number of 1’s should be odd. The principle is
the same, the calculation is different.
Checksum
There are two algorithms involved in this process, checksum generator at sender end and checksum
checker at receiver end.
The sender follows these steps
step
o The data unit is divided into k sections each of n bits.
o All sections are added together using 1’s complement to get the sum.
o The sum is complemented and becomes the checksum.
o The checksum is sent with the data.
The receiver follows these steps
o The received unit is divided into k sections each of n bits.
o All sections are added together using 1’s complement to get the sum.
o The sum is complemented.
complemented
o If the result is zero, the data are accepted, otherwise they are rejected.
Error Correction:
Error correction in data link layer is implemented simply anytime.
An error is detected in an exchange, a negative acknowledgement NAK is returned and the specified
frames are retransmitted. This process is called Automatic Repeat Request (ARQ)
(ARQ).
Retransmission of data happens in three Cases: Damaged frame, Lost frame and Lost
acknowledgement.
Damaged/Error Frame:
o In go-back-n ARQ, The receiver sends the NAK for this frame along with that frame number, that it
expects to be retransmitted.
o After sending NAK, the receiver discards all the frames that it receives, after a damaged frame.
o The receiver does not send any ACK (acknowledgement) for the discarded frames.
After the sender receives the NAK for the damaged frame, it retransmits all the frames onwards the
frame number referred by NAK.
Lost frame:
o In go-back-n ARQ, Receiver easily detects the loss of a frame as the newly received frame is received
out of sequence.
o The receiver sends the NAK for the lost frame and then the receiver discards all the frames received after
a lost frame.
o The receiver does not send any ACK for that discarded frames.
o After the sender receives the NAK for the lost frame, it retransmits the lost frame referred by NAK and
also retransmits all the frames which it has sent after the lost frame.
Lost Acknowledgement:
o In go-back-n ARQ, If the sender does not receive any ACK or if the ACK is lost or damaged in between
the transmission.
o The sender waits for the time to run out and as the time run outs, the sender retransmits all the frames for
which it has not received the ACK.
o The sender identifies the loss of ACK with the help of a timer.
o The ACK number, like NAK number, shows the number of the frame, that receiver expects to be the
next in sequence.
o The window size of the receiver is 1 as the data link layer only require the frame which it has to send
next to the network layer.
o The sender window size is equal to ‘w’. If the error rate is high, a lot of bandwidth is lost wasted.
Damaged frames:
o If a receiver receives a damaged frame, it sends the NAK for the frame in which error or damage is
detected.
o The NAK number, like in go-back-n also indicate the acknowledgement of the previously received
frames and error in the current frame.
o The receiver keeps receiving the new frames while waiting for the damaged frame to be replaced.
o The frames that are received after the damaged frame are not be acknowledged until the damaged frame
has been replaced.
Lost Frame:
o As in a selective repeat protocol, a frame can be received out of order and further they are sorted to
maintain a proper sequence of the frames.
o While sorting, if a frame number is skipped, the receiver recognise that a frame is lost and it sends NAK
for that frame to the sender.
o After receiving NAK for the lost frame the sender searches that frame in its window and retransmits that
frame.
o If the last transmitted frame is lost then receiver does not respond and this silence is a negative
acknowledgement for the sender.
Lost Acknowledgement:
o If the sender does not receive any ACK or the ACK is lost or damaged in between the transmission.
o The sender waits for the time to run out and as the time run outs, the sender retransmit all the frames for
which it has not received the ACK.
o The sender identifies the loss of ACK with the help of a timer.
Concept of Layering
Search this Search
The OSI model is a reference tool for understanding data communication between hosts with help of
seven layers approach in communication process.
Each layer performs specific functions to support the layers above it and uses services of the layers
below it.
Physical Layer:
The physical layer coordinates the functions required to transmit a bit stream over a physical medium.
It deals with the mechanical and electrical specifications of interface and transmission medium.
It also defines the procedures and functions that physical devices and interfaces have to perform for
transmission to occur.
Ethernet network interface card performs functions at both the physical layer and the data link lay
layer.
Physical layer defines characteristics of the interface between the devices and the transmission
medium.
It defines the type of transmission medium.
It defines the transmission rate (the number of bits sent each second).
It performs synchronisation of sender and receiver clocks.
It is concerned with the connection of devices to the medium.
1. Point-to-point configuration: Two devices are connected together through dedicated link.
2. Multipoint configuration: A link is shared between several devices
It is concerned with the physical topology.
It defines the direction of transmission called as transmission mode (simplex, half duplex or duplex).
It transmits bit stream over the communication channel.
Hardware Used: Repeater and Hub.
Data Unit: Bit stream
The data link layer transforms the physical layer, a raw transmission facility, to a reliable link.
It is responsible for Node-to-Node delivery.
It makes the physical layer appear error free to the Network layer.
Data Framing: Division of stream of bits received from network layer into manageable data units
called frames. Segmentation of upper layer datagrams (packets) into frames.
Flow Control: It is to manage communication between a high speed transmitter with the low speed
receiver.
Error Control: It provides mechanism to detect and re-transmit damaged or lost frames and to prevent
duplication of frames. To achieve error control, a trailer is added at the end of a frame.
Access Control: Gives mechanism to determine which device has control over the link at any given
time, if two or more devices are connected to the same link.
Physical Addressing: Adding a header to the frame to define the physical address of the sender
(source address) and/or receiver (destination address) of the frame.
Hardware Used: Bridges and switches.
Data Unit: Frames
Protocol Used: Simplex protocol, stop and wait protocol, sliding window, HDLC (High Level Data
Link Control), SDLC, NDP, ISDN, ARP, PSL, OSPF and NDP.
Network Layer:
Network layer is responsible for source to destination delivery of a packet possibly across multiple
networks (links).
If the two systems are connected to the same link, there is usually no need for a network layer.
If the two systems are attached to different networks (links) with connecting devices between networks,
there is often a need of the network layer to accomplish source to destination delivery.
Functions of the Network Layer:
Logical Addressing: If packet passes the network boundary, we need logical addressing system to
distinguish the source and destination systems.
Routing: Independent networks or links are connected together with the help of routers or gateways.
Routers route the packets to their final destination. Network layer is responsible for providing routing
mechanism.
Hardware Used: Routers
Data Units: Packets
Protocols Used: IP (Internet, Protocol), NAT (Network Address Translation), ARP (Address
Resolution Protocol), ICMP (Internet control Message Protocol), BGP (Border Gateway Protocol),
RARP (Reverse Address Resolution Protocol), DHCP (Dynamic Host Configuration Protocol),
BOOTP and OSPF.
Transport Layer:
The transport layer is responsible for- source to destination (end-to-end) delivery of the entire message.
Network layer does not recognise any relationship between the packets delivered.
Network layer treats each packet independently, as though each packet belonged to a separate message, whether or
not it does. The transport layer ensures that the whole message arrives intact and in order.
Service Point Addressing: The transport layer header must include a type of address called service
point address (or part address).
Segmentation and Reassembly: A message is divided into transmittable segments, each segment
containing a sequence number.
Flow Control Flow: control at this layer is performed end to end rather than across a single link.
Error Control: This layer performs an end to end error control by ensuring that the entire message at
the receiving transport layer without error (damage, loss or duplication). Error correction is usually
achieved through retransmission.
Connection Control: Transport layer can deliver the segments using either connection oriented or
connection less approach.
Hardware Used: Transport Gateway
Data Unit: Segments
Protocol Used: TCP (Transmission Control Protocol) for connection oriented approach and UDP
(User Datagram Protocol) for connection less approach.
Session Layer:
Presentation Layer:
It is responsible for how an application formats data to be sent out onto the network.
It basically allows an application to read and understan the message.
Application Layer:
This layer enables the user, whether human or software, to access the network.
It provides user interfaces and support for services such as electronic mail, remote file access and transfer shared
database management and other types of distributed information services.
Examples: Telnet. FTP etc
Types of Networks: Mainly three types of network based on their coverage areas: LAN, MAN and WAN.
LAN: It is a local area network typically interconnects hosts that are up to a few or maybe a few tens of
kilo meters apart.
MAN: It is a metropolitan area network typically interconnects devices that are up to a few hundred
kilo meters apart
WAN: It is a wide area network interconnect hosts that can be located anywhere on Earth
Characteristics of Networking:
Topology: The geometrical arrangement of the computers or nodes.
Protocols: How they communicate.
mmunicate.
Medium: Through which medium.
Network Topology
Network topology is the arrangement of the various elements of a computer or biological network.
Essentially it is the topological structure of a network, and may be depicted physically or logically.
Physical topology refers to the placement of the network’s various components, inducing device
location and cable installation, while logical topology shows how data flows within a network,
regardless of its physical design.
design
Network topology can be classified as Bus topology, Star topology, Ring topology, Mesh topology and
Tree topology.
Bus Topology: In bus topology, each node is directly connected to a common cable.
In bus topology at the first, the message will go through the bus then one user can communicate with
other.
The drawback of this topology is that if the network cable breaks, the entire network will be down.
Star Topology: In this topology, each node has a dedicated set of wires connecting it to a central network hub.
Since, all traffic passes through’ the hub, it becomes a central point for isolating network problems and
gathering network statistics.
Ring Topology: A ring ‘topology features a logically closed loop. Data packets travel in a single direction
around the ring from one network device to the next. Each network device acts as a repeater to keep the signal
strong enough as it travels.
Mesh Topology: In mesh topology, each system is connected to all other systems in the network.
In bus topology at the first, the message will go through the bus then one user can communicate with
other.
In star topology, first the message will go to the hub then that message will go to other user.
In ring topology, user can communicate as randomly.
In mesh topology, any user can directly communicate with other users.
Tree Topology: In this type of network topology, in which a central root is connected to two or more nodes that
are one level lower in hierarchy.
Hardware/Networking Devices: Networking hardware may also be known as network equipment computer
networking devices.
Network Interface Card (NIC):
(NIC)
o NIC provides a physical connection between the networking cable and the computer’s internal
bus.
o Each computer on a network must have a network card.
o NICs come in three basic varieties 8 bit, 16 bit and 32 bit.
o The larger number of bits that can be transferred to NIC, the faster the NIC can transfer data to
network cable.
Repeater:
o Repeaters are used to connect together two Ethernet segments of any media type.
o In larger designs, signal quality begins to deteriorate as segments exceed their maximum
length.
o Signal transmission is always attached with energy loss. So, a periodic refreshing of the
signals is required.
required
Hubs:
o A hub is a device used to connect a PC to the network
o Hubs are actually multiport repeaters.
o A hub takes any incoming signal and repeats it out all ports.
Bridges:
o When the size of the LAN is difficult to manage, it is necessary to breakup the network.
o The function of the bridge is to connect separate networks together.
o Bridges do not forward bad or misaligned packets.
Switch:
o Switches are an expansion of the concept of bridging.
o Switches are used to connect multiple devices on the same network within a building or
campus.
o Cut through switches examine the packet destination address, only before forwarding it onto
its destination segment, while a store and forward switch accepts and analyzes the entire
packet before forwarding it to its destination.
o It takes more time to examine the entire packet, but it allows catching certain packet errors
and keeping them from propagating through the network.
Routers:
o Routers are used to tie multiple networks together.
o Router forwards packets from one LAN (or WAN) network to another.
o It is also used at the edges of the networks to connect to the Internet.
o Routers analyze the data being sent over a network, change how it is packaged, and send it to
another network, or over a different type of network.
Gateway:
o Gateway acts like an entrance between two different networks.
o Gateway in organisations is the computer that routes the traffic from a work station to the
outside network that is serving web pages.
o ISP (Internet Service Provider) is the gateway for Internet service at homes.
Data Transfer Modes: There are mainly three modes of data transfer.
Simplex: Data transfer only in one direction e.g., radio broadcasting.
Half Duplex: Data transfer in both direction, but not simultaneously e.g., talk back radio.
Full Duplex or Duplex: Data transfer in both directions, simultaneously e.g., telephone
Data representation: Information comes in different forms such as text, numbers, images, audio and video.
Text: Text is represented as a bit pattern. The number of bits in a pattern depends on the number of
symbols in the language.
ASCII: The American National Standards Institute developed a code called the American Standard
code for Information Interchange .This code uses 7 bits for each symbol.
Extended ASCII: To make the size of each pattern 1 byte (8 bits), the ASCII bit patterns are
augmented with an extra 0 at the left.
Unicode: To represent symbols belonging to languages other than English, a code with much greater
capacity is needed. Unicode uses 16 bits and can represent up to 65,536 symbols.
ISO: The international organization for standardization known as ISO has designed a code using a 32-
bit pattern. This code can represent up to 4,294,967,296 symbols.
Numbers: Numbers are also represented by using bit patterns. ASCII is not used to represent numbers.
The number is directly converted to a binary number.
Images: Images are also represented by bit patterns. An image is divided into a matrix of pixels, where
each pixel is a small dot. Each pixel is assigned a bit pattern. The size and value of the pattern depends
on the image. The size of the pixel depends on what is called the resolution.
Audio: Audio is a representation of sound. Audio is by nature different from text, numbers or images.
It is continuous not discrete
Video: Video can be produced either a continuous entity or it can be a combination of images.
Protocols:
It define the rules that govern the communications between two computers connected to the network.
Roles include addressing and routing of messages, error detection and recovery, sequence and flow
controls etc.
A protocol specification consists of the syntax, which defines the kinds and formats of the messages
exchanged, and the semantic, which specifies the action taken by each entity when specific events
occur.
Protocols are designed based on a layered architecture such as the OSI reference model.
Example: HTTP protocol for communication between web browsers and servers.