Professional Documents
Culture Documents
Network and System UNIT 2 Notes
Network and System UNIT 2 Notes
Network and System UNIT 2 Notes
Network Models:
Explain Design Issues of the Layer, Protocol Hierarchy, ISO-OSI Reference Model: Functions of each
Layer, Various Terminology used in Computer Network (C2: Comprehension)
Analyze Connection-Oriented & Connectionless Services (C4: Analysis)
A number of design issues exist for the layer to layer approach of computer
networks. Some of the main design issues are as follows −
Reliability
Network channels and components may be unreliable, resulting in loss of bits
while data transfer. So, an important design issue is to make sure that the
information transferred is not distorted.
Scalability
Networks are continuously evolving. The sizes are continually increasing leading
to congestion. Also, when new technologies are applied to the added
components, it may lead to incompatibility issues. Hence, the design should be
done so that the networks are scalable and can accommodate such additions
and alterations.
Addressing
At a particular time, innumerable messages are being transferred between large
numbers of computers. So, a naming or addressing system should exist so that
each layer can identify the sender and receivers of each message.
Error Control
Unreliable channels introduce a number of errors in the data streams that are
communicated. So, the layers need to agree upon common error detection and
error correction methods so as to protect data packets while they are
transferred.
Flow Control
If the rate at which data is produced by the sender is higher than the rate at
which data is received by the receiver, there are chances of overflowing the
receiver. So, a proper flow control mechanism needs to be implemented.
Resource Allocation
Computer networks provide services in the form of network resources to the end
users. The main design issue is to allocate and deallocate resources to
processes. The allocation/deallocation should occur so that minimal interference
among the hosts occurs and there is optimal usage of the resources.
Statistical Multiplexing
It is not feasible to allocate a dedicated path for each message while it is being
transferred from the source to the destination. So, the data channel needs to be
multiplexed, so as to allocate a fraction of the bandwidth or time to each host.
Routing
There may be multiple paths from the source to the destination. Routing
involves choosing an optimal path among all possible paths, in terms of cost
and time. There are several routing algorithms that are used in network
systems.
Security
A major factor of data communication is to defend it against threats like
eavesdropping and surreptitious alteration of messages. So, there should be
adequate mechanisms to prevent unauthorized access to data through
authentication and cryptography.
Protocol Hierarchies :
Generally, Computer networks are comprised of or contain a large number of pieces of
hardware and software. To just simplify network design, various networks are
organized and arranged as a stack of layers of hardware and software, one on top of
another. The number, name, content, and function of each layer might vary and can be
different from one network to another. The main purpose of each of layers is just to
offer and provide services to higher layers that are present. Each and every layer has
some particular task or function. In programming, this concept is very common. The
networks are organized and arranged as different layers or levels simply to reduce and
minimize complexity of design of network software.
Example :
Below is diagram representing a five-layer network. The diagram shows
communication between Host 1 and Host 2. The data stream is passed through a number
of layers from one host to other. Virtual communication is represented using dotted
lines between peer layers. Physical communication is represented using solid arrows
between adjacent layers. Through physical medium, actual communication occurs. The
layers at same level are commonly known as peers. The peer basically has a set of
communication protocols. An interface is present between each of layers that are used
to explain services provided by lower layer to higher layer.
Advantages :
The layers generally reduce complexity of communication between networks
It increases network lifetime.
It also uses energy efficiently.
It does not require overall knowledge and understanding of network.
ISO-OSI Model
OSI stands for Open Systems Interconnection. It was developed by ISO – ‘International
Organization for Standardization’, in the year 1984. It is a 7-layer architecture with each layer
having specific functionality to perform. All these 7 layers work collaboratively to transmit the
data from one person to another across the globe.
Framing: Framing is a function of the data link layer. It provides a way for a
sender to transmit a set of bits that are meaningful to the receiver. This can be
accomplished by attaching special bit patterns to the beginning and end of the
frame.
Physical addressing: After creating frames, the Data link layer adds physical
addresses (MAC addresses) of the sender and/or receiver in the header of
each frame.
Error control: The data link layer provides the mechanism of error control in
which it detects and retransmits damaged or lost frames.
Flow Control: The data rate must be constant on both sides else the data may
get corrupted thus, flow control coordinates the amount of data that can be
sent before receiving an acknowledgment.
Access control: When a single communication channel is shared by multiple
devices, the MAC sub-layer of the data link layer helps to determine which
device has control over the channel at a given time.
Note:
1. Packet in the Data Link layer is referred to as Frame.
2. Data Link layer is handled by the NIC (Network Interface Card) and device
drivers of host machines.
3. Switch & Bridge are Data Link Layer devices.
Network Layer – Layer 3
The network layer works for the transmission of data from one host to the other located
in different networks. It also takes care of packet routing i.e. selection of the shortest
path to transmit the packet, from the number of routes available. The sender &
receiver’s IP addresses are placed in the header by the network layer.
Routing: The network layer protocols determine which route is suitable from
source to destination. This function of the network layer is known as routing.
Logical Addressing: To identify each device on Internetwork uniquely, the
network layer defines an addressing scheme. The sender & receiver’s IP
addresses are placed in the header by the network layer. Such an address
distinguishes each device uniquely and universally.
Note:
1. Segment in the Network layer is referred to as Packet.
2. Network layer is implemented by networking devices such as routers and
switches.
Transport Layer – Layer 4
The transport layer provides services to the application layer and takes services from
the network layer. The data in the transport layer is referred to as Segments. It is
responsible for the End to End Delivery of the complete message. The transport layer
also provides the acknowledgment of the successful data transmission and re-transmits
the data if an error is found.
At the sender’s side: The transport layer receives the formatted data from the upper
layers, performs Segmentation, and also implements Flow & Error control to ensure
proper data transmission. It also adds Source and Destination port numbers in its header
and forwards the segmented data to the Network Layer.
Note: The sender needs to know the port number associated with the receiver’s
application.
Generally, this destination port number is configured, either by default or manually.
For example, when a web application requests a web server, it typically uses port
number 80, because this is the default port assigned to web applications. Many
applications have default ports assigned.
At the receiver’s side: Transport Layer reads the port number from its header and
forwards the Data which it has received to the respective application. It also performs
sequencing and reassembling of the segmented data.
Segmentation and Reassembly: This layer accepts the message from the
(session) layer, and breaks the message into smaller units. Each of the
segments produced has a header associated with it. The transport layer at the
destination station reassembles the message.
Service Point Addressing: To deliver the message to the correct process, the
transport layer header includes a type of address called service point address
or port address. Thus by specifying this address, the transport layer makes
sure that the message is delivered to the correct process.
Services Provided by Transport Layer
1. Connection-Oriented Service
2. Connectionless Service
1. Connection-Oriented Service: It is a three-phase process that includes
Connection Establishment
Data Transfer
Termination/disconnection
In this type of transmission, the receiving device sends an acknowledgment, back to the
source after a packet or group of packets is received. This type of transmission is
reliable and secure.
2. Connectionless service: It is a one-phase process and includes Data Transfer. In this
type of transmission, the receiver does not acknowledge receipt of a packet. This
approach allows for much faster communication between devices. Connection-oriented
service is more reliable than connectionless Service.
Note:
1. Data in the Transport Layer is called Segments.
2. Transport layer is operated by the Operating System. It is a part of the OS
and communicates with the Application Layer by making system calls.
3. The transport layer is called as Heart of the OSI model.
4. Device or Protocol Use : TCP, UDP NetBIOS, PPTP
Session Layer – Layer 5
This layer is responsible for the establishment of connection, maintenance of sessions,
and authentication, and also ensures security.
Establishes Connection,
Maintenance, Ensures
Session Layer Message Gateway
Authentication, and
5 Ensures security.
Hub,
Establishing Physical
Physical Repeater,
Connections between Bits
Layer Modem,
Devices.
1 Cables
Network Terminologies:
LAN
LAN is a local area network that is used within less than a half kilometer of an
area, for example, small offices, homes, schools, Laboratories, etc. In short, A
network that is used in short distances or in a limited area is known as “LAN”
MAN
MAN is a Metropolitan area network, This network is larger than the LAN
network where it is used in a single large city and is known as “MAN”.
Examples: small & large cities, Industries, etc.
WAN
Ethernet
Node
A node is a physical connectivity over the network in which it send and
receives the data from one node to another node is known as “Node”
Network
Bandwidth
Ping
Ping is a Packet InterNet Groper, it is one of the most important tool for
checking the connectivity between two devices these two devices may be a
server, router switch or a computer. In short we can say it helps to check the
reachability or a connectivity of your devices with a network let say internet,
e.g when you use internet in your devices the connection between the
internet and your device is checked via ping tool. Well you can check your
ping here: https://www.speedtest.net/.
Packet
Internet
It is one of the largest network all over the world. It helps to connect the
millions of devices to the network together globally. It is known as “Internet”
MegaByte
MegaByte is a unit byte which is used for measuring the data of storage like
Hard Disk, Memory, SSD, etc. And 1 Megabyte = 1024 kb and if we convert it
to byte then it is = 1048576 byte.
MegaBit
Byte
It is the smallest unit that represents it a binary digit which are operated
upon as a unit. It is a measurement of data that contains 8 bits(1 Byte=8Bits)
Bit
Bit stands for binary digit and it is also a smallest unit of measurement on a
computer data. It contains two binary values 0 & 1.
Network Topology
It’s define the structure of arrangement of network and the connection made
with the combination of links and nodes. It is known as “Network
Topology”.
There are two types of network topology: 1) Physical Topology and 2) Logical
Topology. In Physical Topology there is a types i) Bus Topology, ii) Ring
Topology, iii) Star Topology, iv) Tree Topology, v) Mesh Topology and vi)
Hybrid Topology. In Logical Topology there is a types: i) Broadcast Topology,
ii) Token Pass Topology.
Network topology
Physical Topology
Bus Topology
Ring Topology
Star Topology
Tree Topology
Mesh Topology
Hybrid Topology
Logical Topology
Broadcast Topology
Token pass Topology
MAC Address
IP Address
NIC
Protocol
In simple word a TCP is the main controller of the data which are travelling
within the network is known as “TCP”.
Connection-Oriented Service
A connection-oriented service is a network service that was designed and developed
after the telephone system. A connection-oriented service is used to create an end to
end connection between the sender and the receiver before transmitting the data over
the same or different networks. In connection-oriented service, packets are transmitted
to the receiver in the same order the sender has sent them. It uses a handshake method
that creates a connection between the user and sender for transmitting the data over
the network. Hence it is also known as a reliable network service.
Suppose, a sender wants to send data to the receiver. Then, first, the sender sends a
request packet to a receiver in the form of an SYN packet. After that, the receiver
responds to the sender's request with an (SYN-ACK) signal/packets. That represents the
confirmation is received by the receiver to start the communication between the sender
and the receiver. Now a sender can send the message or data to the receiver.
Similarly, a receiver can respond or send the data to the sender in the form of packets.
After successfully exchanging or transmitting data, a sender can terminate the
connection by sending a signal to the receiver. In this way, we can say that it is a reliable
network service.
What is a TCP?
TCP (Transmission Control Protocol) is a connection-oriented protocol that allows
communication between two or more computer devices by establishing connections in
the same or different networks. It is the most important protocol that uses internet
protocol to transfer the data from one end to another. Hence, it is sometimes referred
to as TCP/IP. It ensures that the connection is established and maintained until the data
packet is transferring between the sender and receiver is complete.
Connectionless Service
A connection is similar to a postal system, in which each letter takes along different
route paths from the source to the destination address. Connectionless service is used in
the network system to transfer data from one end to another end without creating any
connection. So it does not require establishing a connection before sending the data
from the sender to the receiver. It is not a reliable network service because it does not
guarantee the transfer of data packets to the receiver, and data packets can be received
in any order to the receiver. Therefore we can say that the data packet does not follow
a defined path. In connectionless service, the transmitted data packet is not received by
the receiver due to network congestion, and the data may be lost.
For example, a sender can directly send any data to the receiver without establishing
any connection because it is a connectionless service. Data sent by the sender will be in
the packet or data streams containing the receiver's address. In connectionless service,
the data can be travelled and received in any order. However, it does not guarantee to
transfer of the packets to the right destination.
What is UDP?
The UDP (User Datagram Protocol) is a connectionless protocol that allows
communication between two or more devices without establishing any connection. In
this protocol, a sender sends the data packets to the receiver that holds the destination
address. A UDP does not ensure to deliver the data packets to the correct destination,
and it does not generate any acknowledgment about the sender's data. Similarly, it does
not acknowledge the receiver about the data. Hence, it is an unreliable protocol.
Connection-Oriented vs Connectionless
Service
1. Related System It is designed and developed based It is service based on the postal
on the telephone system. system.
3. Virtual path It creates a virtual path between the It does not create any virtual
sender and the receiver. connection or path between
the sender and the receiver.
5. Data Packets All data packets are received in the Not all data packets are
Path same order as those sent by the received in the same order as
sender. those sent by the sender.
6. Bandwidth It requires a higher bandwidth to It requires low bandwidth to
Requirement transfer the data packets. transfer the data packets.
1. Host-to- Network Layer −It is the lowest layer that is concerned with the physical
transmission of data. TCP/IP does not specifically define any protocol here but supports all
the standard protocols.
2. Internet Layer −It defines the protocols for logical transmission of data over the network.
The main protocol in this layer is Internet Protocol (IP) and it is supported by the
protocols ICMP, IGMP, RARP, and ARP.
3. Transport Layer − It is responsible for error-free end-to-end delivery of data. The protocols
defined here are Transmission Control Protocol (TCP) and User Datagram Protocol (UDP).
4. Application Layer − This is the topmost layer and defines the interface of host programs
with the transport layer services. This layer includes all high-level protocols
like Telnet, DNS, HTTP, FTP, SMTP, etc.
The following diagram shows the layers and the protocols in each of the layers −
OSI TCP/IP
OSI represents Open System TCP/IP model represents the
Interconnection. Transmission Control
Protocol / Internet Protocol.
OSI is a generic, protocol TCP/IP model depends on
independent standard. It is standard protocols about
acting as an interaction which the computer network
gateway between the network has created. It is a
and the final-user. connection protocol that
assigns the network of hosts
over the internet.
The OSI model was developed The protocols were created
first, and then protocols were first and then built the
created to fit the network TCP/IP model.
architecture’s needs.
It provides quality services. It does not provide quality
services.
The OSI model represents It does not mention the
defines administration, services, interfaces, and
interfaces and conventions. It protocols.
describes clearly which layer
provides services.
The protocols of the OSI model The TCP/IP model protocols
are better unseen and can be are not hidden, and we
returned with another cannot fit a new protocol
appropriate protocol quickly. stack in it.
It is difficult as distinguished to It is simpler than OSI.
TCP/IP.
It provides both connection It provides connectionless
and connectionless oriented transmission in the network
transmission in the network layer and supports
layer; however, only connecting and
connection-oriented connectionless-oriented
transmission in the transport transmission in the transport
layer. layer.
It uses a vertical approach. It uses a horizontal
approach.
The smallest size of the OSI The smallest size of the
header is 5 bytes. TCP/IP header is 20 bytes.
Protocols are unknown in the In TCP/IP, returning protocol
OSI model and are returned is not difficult.
while the technology modifies.