DCC All Chapter PDF
DCC All Chapter PDF
➢ Data Communication is defined as, “the exchange of information (in the form of 0’s and 1’s) between two
digital devices via some form of transmission medium.
OR
➢ The transfer of exchange of information from one computer to another is known as Data Communication.
PROCESS OF DATA COMMUNICATION
1. A data communication process is made up of five components namely message, sender, receiver,
transmission medium and protocol.
2. The functions of each components in data communication are as follows:
1. The Message is information in the form of data to be communicated. It can consists of text, numbers,
pictures, sound, video or any combination of these.
2. The Sender is the device that sends the data message. It can be computers, workstation, telephone
handset, video camera and so on.
3. The Receiver is the device that receives the message. It can be computer, workstation, telephone
handset, video camera and so on.
4. The Transmission Medium is the physical path by which a message travels from sender to receiver. It
can consists of twisted pair wire, coaxial cable, fiber-optic cable, laser or radio waves.
5. A Protocol is refers to a set of rules (agreed upon by sender and the receiver) that co-ordinates the
exchange of information. Without the protocol, the sender and receiver cannot communicate.
Process of Data Communication
Protocols
1. A Protocol is a set of rule and conventions. In other words, a protocol is a set of rules that governs data
communication.
COMMON PROTOCOLS
2) FTP (File Transfer Protocol): It provides the uploading and downloading of files from a remote host running
FTP server software.
3) SMTP (Simple Mail Transfer Protocol): It defines how mail messages are sent between hosts.
4) HTTP (Hypertext Transfer Protocol): It enables text, graphics, multimedia, and other material to be
downloaded from an HTTP server.
Modes of communication
1. The direction of data flow between two linked devices is called as mode of communication.
2. There are 3 types of direction of data flow namely simplex mode, half-duplex mode and full-duplex mode.
Simplex communication mode
• In Simplex communication mode, the communication can take place in only one direction i.e. data can be
sent only in one direction.
• The examples of Simplex Communication mode are Radio and T.V transmissions.
Advantages of simplex communication mode
• In half duplex communication mode, the communication can take place in both directions, but only in one
direction at a time.
• In full duplex communication mode, the communication can take place in both directions simultaneously, i.e.
at the same time on the same channel.
1. Basic 1. An analog signal is a continuous wave 1. A digital signal is a discrete wave that
that changes over a time period. carries information in binary form.
2. Range 2. Analog signal has no fixed range. 2. Digital signal has a finite range i.e.
between 0 and 1.
3. Example 3. Human voice in air, analog electronic
devices. 3. Computers, CDs, DVDs, and other digital
electronic device.
4. Flexibility 4. Analog hardware is not flexible.
4. Digital hardware is flexible.
5. Can be used in analog devices only. Best
5. Uses
suited for audio and video transmission. 5. Best suited for computing and digital
electronics.
6. Applications 6. Thermometer
6. PCs, PDAs
7. Requires large power.
7. Power 7. Requires negligible power.
8. Low cost and portable.
8. Cost 8. Cost is high and not easily portable.
9. low
9. High order of 100 megaohm
9. Impedance
Definition of computer network
• Two or more computers connected together through a communication media (coaxial cable, fiber optics or
satellite) is called as computer network.
1. Cost: Includes the cost of the network components, their installation, and their ongoing maintenance.
2. Security: Includes the protection of the network components and the data they contain and/or the data
transmitted between them.
3. Speed: Includes how fast data is transmitted between network end points, (the data rate).
4. Topology: Describes the physical cabling layout and the logical way data moves between components.
5. Sharing: Computer networks enable sharing of files, software, hardware resources and computing capabilities.
Advantages of computer network
1. File Sharing: The major advantages of a computer network is that allows file sharing and
remote file access. A person sitting at one workstation that is connected to a network can
easily see files present on another workstation, provided he/she is authorized to do so.
3. Inexpensive Set-up: Shared resources mean reduction in hardware costs. Shared files mean
reduction in memory requirement, which indirectly means reduction in file storage expenses.
4. Increased Storage Capacity: Since, there is more than one computer on a network which can
easily shares files, the issue of storage capacity gets resolved to a great extent.
5. Speed: Sharing and transferring files within networks is very rapid (fast), depending on the
type of network. This will save time while maintaining the integrity of files.
Disadvantages of computer network
1. Security Concerns: One of the major drawbacks of computer networks is the security issues that are involved.
2. Expensive To Build: Building a network is a complex and time consuming for large scale organizations.
3. Virus and Malware: Viruses can spread on a network easily, because of the inter-connectivity of workstations.
APPLICATIONS OF COMPUTER NETWORK
1. Financial Services
2. Directory Services
4. Electronic Mail
5. E-Commerce
FILE SHARING
1. Network file sharing is the process of copying files from one computer to another using a live network
connection.
2. Any file can be centrally stored and can be used by more than one user by sharing it. File sharing requires a
shared directory or disk drive to which many users can access over a network.
3. Fig shows a simple computer network for file sharing. In a network two computer make a connection with each
and communicate across a wire or cable. Simple network like this have existed for decades. A common use for
these network is file sharing
ADVANTAGES OF FILE SHARING
1. Less secure.
2. Conflicting problem arises.
SHARING RESOURCES
1. One of the benefits of a network is that it allows group of computer users to share data, share software and
even share hardware(such as, printer or a modem).
1. Sharing hardware resources, and resources sharing the goal is to make all programs, equipment and
especially data available to anyone on the network without regard to the physical location of resource and
the user.
1. Network facilitate the sharing of hardware devices. Peripherals such as printers, modems and backup storage
devices can be connected and utilized by everyone in the office.
2. For example: Instead of giving each of four employees in a department an expensive laser printer. One printer
can be placed on the network for everyone to share, in Fig
all the users of network can use printer to take printouts from their own work-stations without talking data in
floppy and physically moving to the printer.
SHARING SOFTWARE RESOURCES
1. With standard computers, software used on the computers must be present on each computer’s hard disk i.e.
each computer on network needs a separate copy of software separately installed on them.
2. In such cases you need to buy those many copies of software for each computers, which increases the cost.
3. It is also difficult and time consuming to install software on each computer. To overcome this problem software
resources can be shared among all computers on network.
PRINTER SHARING
1. Printer sharing is best example of network resource sharing. It allows you to share costly higher quality printer
among network users. The most common way of sharing printer is to use printer queue on a server.
2. The printer server function can be done in many ways. Some of them are:
1. By a computer connected to the network, with the printer connected to that computer. The computer runs
special print server software to perform this job.
2. Through the use of a built-in print server in a printer’s network interface card.
ADVANTAGES OF PRINTER SHARING
1. Network are classified depending on their geography and their component role as shown below
PAN (Personal Area Network)
CAN(Campus Area Network)
LAN (Local Area Network)
DIFFERENECE BETWEEN LAN, MAN & WAN
Area covered Covers small geographical Covers large Covers larger than LAN
area geographical area but smaller than Wan
Peer-to-Peer are best suited to home or very Client-server works best for large set-ups, such
small office set-ups. as full-scale or school
Are generally simpler and less expensive. Are generally more complex but give user more
control and more expensive.
Each user needs to take his/her own backup. Centralized backup can be taken.
Poor performance for large number of users. Better performance for large number of users.
SUBJECT: DCC CHAPTER:2ND
1. Transmission media means a communication signal is carried from one computer system to another.
1. Attenuation: Attenuation refers to loss of energy as signal propagates outwards. The amount of energy lost
depends on frequency.
2. No. of Users (Density): It is the concurrent number of users supported/connected by the communication
media.
Transmission
Media
Guided Unguided
Media media
Shielded Unshielded
twisted pair twisted pair
cable cable
GUIDED TRANSMISSION MEDIA
1. Guided transmission media uses a cabling system that guides that data signals along a specific path.
2. Guided media also knows as bounded media which include twisted pair cable, coaxial cable, & fiber-optic
cable.
3. Twisted pair & coaxial cable use metallic (copper) conductor that accept and transport signal in the form of
electric current.
4. Optical fiber is cable that accept and transport signal in the form of light.
UNSHIELDED TWISTED PAIR CABLE
SHIELDED TWISTED PAIR CABLE
DIFFERENCE BETWEEN UNSHIELDED AND SHIELDED TWISTED PAIR CABLES
Low performance at higher data rates. Better performances at higher data rates.
It uses electrical signal for It uses electrical signal for It uses optical signal for
transmission. transmission. transmission.
Affected by EMI and noise. Less affected by EMI and noise Not affected by EMI and noise.
Bandwidth is low which is 3 to 4 Bandwidth is high which is 300 to Bandwidth is very high which is 2
MHz 400 MHz to 3 GHz
Used for analog and digital Used for analog and digital Used for analog and digital
transmission transmission transmission
Supports low data rates up to 4 Supports high data rates up to Supports very high data rates up
Mbps. 400 to 500 Mbps. to3 Gbps.
Cost is very less. Cost is moderate. More costly.
Signal to noise ratio is less. Signal to noise ratio is moderate. Signal to noise ratio is high.
1. Electromagnetic waves having frequencies between 1 and 300 GHz are called microwaves. Microwaves are
unidirectional.
2. Microwave communication is widely used for long distance telephone communication cellular, telephones,
television distribution and other uses that a serve shortage of spectrum has developed.
3. Fig shows typical example of microwave link using dish antenna and satellite.
4. Microwave transmission is line of sight transmission. The transmitter station must be in visible contact with the
receiver station.
5. This sets a limit on the distance between stations depending on the local geography.
ADVANTAGES OF MICROWAVE
1. They can carry high quantities of information due to their high operating frequencies.
2. Low cost land purchase: each tower occupies small area.
3. High frequency/short wavelength signals require small antenna.
DISADVANTAGES OF MICROWAVE
1. A satellite is a body that revolves around the earth just in same way earth revolves around the sun. a satellite
cab be artificial/manmade.
2. Satellite process microwaves with bi-directional antennas. Therefore the signal from a satellite is normally
aimed at a specific area called the footprint.
3. The signal power at the center of footprint is maximum. The power decreases as we move out from the
footprint center.
4. A communication satellite acts as a big microwave repeater in the sky.
5. Fig shows typical satellite communication system.
1. In case of satellite communication two different frequencies are used as carrier frequencies to
avoid interference between incoming and outgoing signals.
2. The signal which is being transmitted upwards to satellite is called as the uplink. Thus, uplink
frequency is the frequency used to transmit signal from earth station to satellite.
3. The signal which is being transmitted back to receiving earth station is called as downlink. Thus,
downlink frequencies is the frequencies used to transmit the signal from satellite to earth
station.
ADVANTAGES OF SATELLITE TRANSMISSION
1. Availability: The biggest advantage of satellite internet access is its availability compared to other internet
connection types.
3. Latency: Satellite internet connections are high latency, meaning that a great deal of time is required for
packets of information to travel to the satellite and back.
Guided media also called as bounded media. Unguided media also called as unbounded media.
Twisted pair cables, coaxial cables, optical fiber cables Radio and infrared light are the example of wireless
are example of wired media. media.
Additional transmission capacity can be obtained by It is not possible to obtain additional capacity.
adding more wires.
Wired media lead to discrete network topologies. Wireless media leads to continuous network topologies
Installation is costly, time consuming and complicated. Installation needs less time and money.
SUBJECT: DCC CHAPTER:3rd
1. IEEE (Institute of Electrical and Electronic Engineers) was chosen to develop standard to enable all devices and
systems to communicate together.
➢ IEEE Standards:
1. IEEE 802.1
2. IEEE 802.2
3. IEEE 802.3
4. IEEE 802.4
5. IEEE 802.5
➢ WIRELESS LANs
1. IEEE 8802.11 Standard.
SUMMARY OF 802.11 STANDARDS
1. Bluetooth is a short range wireless technology that lets you connect computers, mobile phones & hand held
devices to each other and to the internet.
2. Bluetooth technology eliminates the need for the cables that connect devices together.
Piconet Scatternet
It is one network of eight stations. Many piconets can be combined forms Scatternet.
A station is a member of only one network. A station can be member of more than one piconet.
Piconet can have up to 8 stations, one station is the A secondary station in one piconet can be a primary in
primary station. another piconet.
In this Bluetooth network, device can function either as In this Bluetooth network, device can function as master
master or slave. or slave or (master+slave)
Technology 1G 2G 3G 4G 5G
Frequency 30 KHz 1.8 GHz 1.6-2.0 GHz 2-8 GHz 3-300 GHz
Multiplexing FDMA TDMA/CDMA CDMA CDMA CDMA
Key differentiator Mobility Secure, Mass Better internet Faster Better coverage
adoption experience broadband and no dropped
internet calls, better
performance
Weakness Poor Limited data Real Battery use is ?
spectral rates, difficult performance fail more, requird
security to support to watch type, complicated and
issue failure of WAP expensive
SUBJECT: DCC CHAPTER:4th
1. Network topology describe the ways in which the elements of a network are mapped. They describe the
physical and logical arrangement of the network nodes.
Classification Of
Topologies
Physical Logical
Topology Topology
Token Shared
Bus Star Mesh Tree Ring Hybrid
based media
Topology Topology Topology Topology Topology Topology
Topology Topology
DIFFERENCE BETWEEN PHYSICAL & LOGICAL TOPOLOGY
Physical Topologies refer to the physical layout of Logical Topologies refer to the logical paths in which
devices and network media. data accesses the media and transmits packets across it
Types include: Bus Topology, Ring Topology, Star Types include: Shared Media topology & Token Bases
Topology, Tree Topology, Mesh Topology. topology
A physical topology describes the way in which the The logical topology describes how the devices
devices are connected together. communicate or the shape of the communication shape.
TOPOLOGY
BUS TOPOLOGY
1. In networking, a topology that allows all network nodes to receive the same message through the network
cable at the same time is called as bus topology.
2. All the data that travel over the network is transmitted through a common transmission medium knows as the
bus or the backbone of the network.
WORKING OF BUS TOPOLOGY
1. The central cable is the backbone of the network and is knows as Bus. Every workstation or node
communicates with the other device through this bus.
2. A signal from source is broadcasted and it travels to all workstations connected to bus cable. Although the
message is broadcasted but only the intended recipient, whose MAC address or IP address matches, accepts it.
3. If the MAC/IP address of machine does not match with intended address, machine discards the signal.
4. A terminator is added at ends of the central cable, to prevent bouncing of signals. A barrel connector can be
used to extend it.
ADVANTAGES OF BUS TOPOLOGY
2. It is called ring topology because it forms a ring as each computers is connected to another computer, with
the last one connected to the first. Exactly two neighbours for each device.
WORKING OF RING TOPOLOGY
1. In ring topology network arrangement, a signal is transferred sequentially using a ‘token’ from one node to
the next. If a node wants to transmit, it “grabs” the token, attaches data and a destination address to it, and
then sends it around the ring.
2. The token travels along the ring until it reaches its destination. Once, token reaches destination, receiving
computer acknowledge receipt with a return message to the sender. The sender then releases the token for
the token for use by another computer.
3. A signal from the source is broadcasted and it travels to all workstations connected to bus cable.
4. Although the message is broadcasted but only the intended recipient, whose MAC address or IP address
matches, accepts it.
5. If the MAC/IP address of machine does not match with the intended address, machine discards the signal.
6. A terminator is added at ends of the central cable, to prevent bouncing of signals. A barrel connector can be
used to extends it.
ADVANTAGES OF RING TOPOLOGY
1. Traffic is unidirectional.
2. Slow in speed.
3. Difficult for troubleshooting the ring.
STAR TOPOLOGY
1. Star topology is one topology in which a central unit is called a hub or concentrator host a set of network
cables that radiate out to each node on the network.
2. Unlike Bus topology, where nodes were connected to central cable, here all workstations are connected to
central devices i.e. hub or concentrator with a point-to-point connection.
ADVANTAGES OF STAR TOPOLOGY
1. Easy to install.
2. Centralized management. It helps in monitoring the network.
3. Robustness i.e. if one link fails, only that link is affected.
4. Fast as compare to ring topology.
1. If central node (hub or switch) goes down, then entire network goes down.
2. More cabling is required than bus topology.
TREE TOPOLOGY
1. As it name implies in this topology devices make a tree structure. Tree topology integrates the characteristics
of star and bus topology.
2. In tree topology, the number of star networks are connected using bus. This main cable seems like a main
stem of tree, and other star network as the branches.
1. More expensive than bus topologies because of the cost of the concentrators(hub or switch).
2. Failure in the central hub brings the entire network to a halt.
HYBRID TOPOLOGY
1. Hybrid, as the name suggest, is mixture of two different things. A hybrid topology is combination of two ore
more network topologies.
2. Two common examples for hybrid network are star ring network and star bus network.
3. Hybrid topology is used to connect a network that is divided into smaller sections also known as segments.
1. A Star-ring Network: It consists of two or more star topologies connected using a Multistation Access
Unit(MAU) as a centralized hub.
2. A Star-bus Network: It consists of two or more star topologies connected using a bus trunk (the bus trunk
serves as the network’s backbone).
HYBRID TOPOLOGY
ADVANTAGES OF HYBRID TOPOLOGY
1. Unlike other networks, fault detection and troubleshooting is easy in this type of topology.
2. It is easy to increase the size of network by adding new components, without disturbing existing architecture.
1. One of the biggest drawback of hybrid topology is its design. It’s not easy to design this type of architecture
and it’s a tough job for designers.
2. The hubs used to connect two distinct networks, are very expensive.
NETWORK CONTROL/CONNECTING DEVICES
1. Network control devices are component used to connect computers or other electronic devices together so
that they can share files or resources like printers or fax machines etc.
2. The network devices are playing an important role in network communication, each device has different role.
3. Network hardware includes all computers, peripherals, interface cards and other equipment needed to
perform data-processing and communications within the network.
NEED OF NETWORK CONNECTING/CONTROL DEVICE
1. Hub: Hub is important because it broadcasts data from one port to all other ports in the network.
2. Repeater: The repeaters are used in places where amplification of input signal is necessary.
3. Router: When there are more than one computer at home or in an organization, and you have a single
internet connection, you need a Router. Router is a device which is used when multiple device need to
connect to the internet using the same IP.
4. Gateway: Needed when two different network technologies are being used. They acts as translator switch-
intelligent device which sends data to particular port.
5. Bridge: Same function as switch but much more primitive and has lesser ports.
6. Network Interface Cards(NIC): It is very important component installed in a computer which is responsible for
connecting a particular computer to a network.
HUB
TYPES OF HUB
1. Active Hub: As it name suggests, active hub is a hub which can amplify or regenerate the information signal.
This type of hub has an advantage as it also amplifies the incoming signal as well as forward it to multiple
devices. This hub is also known as Multiport Repeater.
2. Passive Hub: Passive hub works like a simple bridge. It is used for just creating a connection between various
devices. It does not have the ability to amplify or regenerate any incoming signal. It receives signal and then
forward it to multiple devices.
3. Intelligent Hub: It can perform tasks of both active and passive hub. Also, it can perform some other tasks
like bridging and routing. It increases the speed and effectiveness of total network thus make the performance
of whole network fast and efficient. An intelligent hub help in troubleshooting by pinpointing the actual
location of the problem and help identify the root cause and resolution.
SWITCH
DIFFERENCE BETWEEN HUB AND SWITCH
HUB SWITCH
To connect a network of personal computers Allow to connect multiple device and port can be
together, they can be joined though a central hub. manage, VLAN can create security also can apply.
It send the received packet to all ports. It only send packet to only destination port.
1. A network router is a network control device with interfaces in multiple networks whose task is to copy
packets from one network to another.
2. Router gives path to data packet to destination. Routers provide connectivity inside enterprises, between
enterprises and the internet, and within an internet service provider.
TYPES OF ROUTER
1. Static Routers: This router is hard coded in the routing table. The administrator has no configure and set up
all routes manually. Static routing is the process of predefining route paths across data networks and can be
used to conserve LAN and WAN bandwidth and optimize processing time.
2. Dynamic Routers: Only the first route has to be manually configured. After that additional routes are
automatically discovered.
ADVANTAGES OF ROUTERS
DISADVANTAGES OF ROUTERS
1. A repeater (or generator) is an electronic device that operates on physical layer of OSI model.
2. A repeater is a network device that retransmits a received signal with more power and to an extended
geographical or technological network boundary than what would be capable with the original signal.
3. A repeater is regenerator, not an amplifier. An amplifier cannot discriminate between the intended signal and
noise; it amplifies everything fed to it.
REPEATER CONNECTED WITH DIFFERENT LAN
TYPES OF REPEATER
1. Amplifier: Which simply amplifies entire incoming signals along with noise.
2. Signal Regenerating: It amplifies only data signals, (does not amplify noise signals.)
ADVANTAGES OF REPEATER
DISADVANTAGES OF REPEATER
1. They do not examine any destination address and they do not filter or translate any data.
1. Gateway work all 7 layers of the OSI model. Gateway is a network device which interconnects two
heterogeneous networks.
2. Gateway is a connectivity link between two networks that use dissimilar protocols and architecture.
3. A gateway is a network element that acts as an entrance point to another network, for example, an access
gateway is a gateway between telephony network and other network such as Internet.
WORKING OF GATEWAY
1. The fig shows the working of a gateway. Consider two networks, say in PUNE, and a network is MUMBAI. If data
has to be sent from one place to another, we need to ensure that the network technologies that are being used
by both the networks are the same. If not, we need to use a gateway.
2. A gateway is a node in a computer network, a key stopping point for data on its way to or from other networks.
ADVANTAGES OF GATEWAY
1. Used to expand the network and used to connect two different types of network.
2. Gateway is a server so it provides some security.
3. Effectively handles the traffic problems.
DISADVANTAGES OF GATEWAY
REFERENCE MODELS
Mr. Samiran Maity,
Senior Lecturer,
Pravin Patil Polytechnic, Bhayander
E-mail: [email protected]
Contact No:7977649037
LEARNING OUTCOMES
1. Encapsulation is the process of taking data from one protocol and translating it into another protocol, so the
data can continue across a network.
2. The process by which data is handled layer-to-layer through the OSI model is referred as data encapsulation.
3. As shown in fig the data layer 7 i.e. the Application layer along with the header added at layer 7 is given to
layer 6, the Presentation layer. This layer adds its header and passed the whole package to the layer below.
4. A packet (header and data) at level 7 is encapsulated in a packet at level 6. The whole packet at level 6 is
encapsulated in a packet at level 5, and so on.
5. In other words, the data portion of a packet at level N-1 carries the whole packet from level N. the concept is
called encapsulation.
6. Level N-1 is not aware of which part of the encapsulated packet is data and which part is the header or trailer. For
Level N-1, the whole packet coming from Level N is treated as one integral unit.
HORIZONTAL COMMUNICATION
1. Fig shows concept of horizontal communication. The horizontal communication is the logical connection
between the layers, there is no direct communication between them.
2. Information included in each protocol header by the transmitting system is a message that will be carried to
the same protocol in the destination system.
3. For two computers to communicate over a network, the protocol used at each layer of OSI model in the
transmitting system must be duplicated at the receiving system.
VERTICAL COMMUNICATION
2. In addition to communicating horizontally with the same protocol in the other system, the header information
also enables each layer to communicate with the layer above and below it.
3. For example, the network layer will communicate with the data link layer
and transport layer. This interlayer communication is called communication
vertical.
OSI MODEL
1. Open Systems Interconnection (OSI) model is a reference model developed by ISO (International Organization
for Standardization) in 1984.
2. OSI model logically groups the functions and set rules, called protocols, necessary to establish and conduct
communication between two or more parties.
3. The model consists of seven functions, often referred to as layers.
Application
Presentation
Session
Transport
Network
Data link
Physical
OSI Model
FUNCTIONS OF EACH LAYER IN OSI MODEL
1. Physical Layer: The lowest layer of the OSI model (Layer 1) is referred as physical layer. Physical layer deals
with the mechanical and electrical specifications of the interface and transmission medium.
2. Data Link Layer: The second layer is referred as the data link layer. This layer defines how frames of
information are constructed. Generally this mean defining how bytes are combined into units called frames.
Data Link Layer consists of following two sub-layers:
1. Logical Link Layer(LLC): LLC sublayer determines whether the communication is going to be
connectionless or connection oriented at the data link layer.
2. Medium Access Control(MAC): MAC sub layer is responsible for connection to physical media.
3. Network Layer: The third layer is in the OSI model the network layer. This layer defines how packets of data are
constructed. Network layer is responsible for addressing messages and translating logical addresses and names into
physical addresses. It determines the route from the source to the destination computer.
4. Transport Layer: Layer 4 of the OSI model is the transport layer. Transport layer is responsible for packet creation.
Transport layer ensures that packets are delivered error free, in sequence with no losses or duplications. Transport
layer provides flow control, error handling, and solves transmission problems.
5. Session Layer: The Session layer is 5th layer of OSI model. Session layer establishes, maintains the interactions
between communicating system. Session layer allows two applications running on different computers to establish
use and end a connection called a session. Session layer performs name recognition and security.
6. Presentation Layer: The 6th layer of OSI model is the presentation layer. It serves as a translator layer of the
OSI model and it is responsible for data conversion and encryption. The presentation layer may translate data from
a format used by application layer into a common format at sending station, and then translate the common
format to a format at known to the application layer at the receiving station.
7. Application Layer: Application layer is top most layer (Layer 7) of OSI model. Application layer provides the
interface and services that supports user applications and provides general access to the network, Application
layer serves as a window for application to access network services.
1. TCP/IP stands for Transmission Control Protocol/Internet Protocol. TCP/IP model was developed by the U.S.
Department of Defense (DoD) to connect multiple networks and preserve data integrity.
2. TCP/IP protocol suite also called as Internet protocol suite. TCP/IP provides end-to-end connectivity specifying
how data should be formatted, addressed, transmitted, routed and received at the destination.
3. TCP/IP protocol model came after the OSI model and the number of layers in TCP/IP differ from that of the OSI
model. TCP/IP model comprises of 4 layers namely, network access (also called host-to-network layer), internet,
transport and application layer.
4. The network access layer of TCP/IP model corresponds to the combination of physical and data link layer of OSI
model. The internet layer corresponds to network layer of OSI model and the application layer perform tasks of
session, presentation and application layer of OSI model with the transport layer of TCP/IP performing a part of
responsibilities of session layer of OSI model
LAYERED STRUCTURE OF TCP/IP
APPLICATION LAYER
INTERNET LAYER
APPLICATION
PRESENTATION APPLICATION
SESSION
NETWORK INTERNET
DATA LINK
NETWORK
PHYSICAL
ADDRESS RESOLUTION PROTOCOL(ARP)
1. Address Resolution Protocol (ARP) is a protocol for mapping an internet protocol address(IP Address) to a
physical machine address.
2. ARP converts an Internet Protocol (IP) address to its corresponding physical network address. ARP is a low-
level network protocol, operating at Layer 2 of the OSI model.
3. ARP provides the interface between the IP addressing system used by IP and the hardware addresses used by
the data link layer protocols.
4. When IP constructs a datagram, it known the IP address of system that is packet’s ultimate destination.
5. That address may identify a computer connected to the local network or a system on another network.
IP Address Input
ARP
Physical/Hardware
address
Output
DYNAMIC HOST CONFIGURATION PROTOCOL(DHCP)
1. DHCP (Dynamic Host Configuration Protocol) is a protocol used to provide quick, automatic and central
management for the distribution of IP addresses within a network.
2. A DHCP server is used to issue unique IP addresses and automatically configure other network information. In
most homes and small business, the router acts as the DHCP server. In large networks, a single computer might
act as the DHCP server.
3. DHCP is a protocol that automatically assigns a unique IP address to each device that connects to a network.
4. DHCP runs in a client/server mode, where server sets up a pool of available IP addresses for a network.
5. When you connect to a network, your device is considered a client and the router is the server. In order to
successfully connect to a network via DHCP, the following steps must take place:
STEPS
1. When a client detects it has connected to a DHCP server, it sends a DHCPDISCOVER request.
2. The router either receives the request or redirects it to the appropriate DHCP server.
3. If the server accepts the new device, it will send a DHCPOFFER message back to the client, which contains the
client device MAC’s address and IP address being offered.
4. The client returns a DHCPREQUEST message to the server, confirming it will use the IP address.
5. Finally, the server responds with a DHCPACK acknowledgement message that confirms the client has been given
access for a certain amount of time.
DIFFERENCE BETWEEN CONNECTION-ORIENTED & CONNECTIONLESS SERVICES
Suitability Suitable for long & steady Suitable for bursty transmission
communication
1. Internet, in order to provide universal communication services, must follow a uniform addressing mechanism
which identifies machines in a network.
2. The addressing mechanism should be universally accepted and uniquely identify and source and destination
host computers existing in a network.
3. Each host on the internet is assigned unique 32-bit internet address, which is placed in the IP header and used
to route packets to their destinations.
4. In general, internet addressing is a systematic way to identify people, computers and internet resources.
IP ADDRESS
145.25.10.100
Network ID Host ID
IP Address can be displayed in 3 typical formats:
1. Binary Notation (Base 2): Binary notation is the format that systems on the network use to process the
address. In binary notation, the IPV4 address is displayed as 32 bits. An example of binary notation is
01110101.10010101.00011101.11101010.
2. Hexadecimal Notation (Base 16): We sometimes see an IP Address in hexadecimal notation. Each
hexadecimal digit is equivalent to 4 bits. This means that a 32-bit address has 8 hexadecimal digits. An
example of hexadecimal notation of an IPV4 address is CO.A8.01.64.
3. Dotted-Decimal Notation (Base 256): To make the IPV4 address more compact and easier to read, internet
addresses are usually written in decimal point separating the bytes. An example of dotted-decimal notation is
192.168.1.100.
IP ADDRESS CLASSES
Class A 0-127 0
Class B 128-191 10
Class C 192-223 110
Class D 224-239 1110
Class E 240-255 1111
CLASS ADDRESSINGS
7 bits 24 bits
CLASS A
14 bits 16 bits
CLASS B
21 bits 8 bits
CLASS C
CLASS D
CLASS E
CLASSLESS IP ADDRESSING
9. Protocol:- Indicates the higher level protocol to which IP should deliver the data in this datagram.
10. Header Checksum:- Is a checksum for the information contained in the header. If it doesn’t match the contents,
the datagram is discarded.
12. IP Options:- Is a variable length field used for control or debugging & measurement.
IPV6
1. It is of 128 bits or 16 bytes. Length is 4 times the length of IPV4.
2. It means 2128.
DIFFERENCE BETWEEN IPV4 AND IPV6
DIFFERENCE BETWEEN OSI REFERENCE & TCP/IP MODEL
OSI refers to open system Interconnection. TCP refers to Transmission Control Protocol/Internet
Protocol.
OSI model had seven layers. TCP/IP model has four layers.
OSI is a conceptual model. TCP/IP is a client-server model, i.e. when the client
requests for service it is provided by the server.
OSI model follows a bottom-up approach. TCP/IP follows top to bottom approach.