Unit-1 of Computer Network
Unit-1 of Computer Network
The purpose of having computer network is to send and receive data stored in other devices
over the network. These devices are often referred as nodes.
Message: It is the data or information which needs to be transferred from one device to
another device over a computer network.
Sender: Sender is the device that has the data and needs to send the data to other device
connected to the network.
Receiver: A receiver is the device which is expecting the data from other device on the
network.
Transmission media: In order to transfer data from one device to another device we need
a transmission media such as wires, cables, radio waves etc.
Protocol: A protocol is a set of rules that are agreed by both sender and receiver, without
a protocol two devices can be connected to each other but they cannot communicate. In
order to establish a reliable communication or data sharing between two different devices
we need set of rules that are called protocol. For example, http and https are the two
protocols used by web browsers to get and post the data to internet, similarly smtp protocol
is used by email services connected to the internet.
Types of Computer Network: LAN, MAN and WAN
A computer network is a group of computers connected with each other through a
transmission medium such as cable, wire etc. In this guide, we will discuss the types of
computer networks in detail.
There are mainly three types of computer networks based on their size:
1. Local Area Network (LAN)
2. Metropolitan Area Network (MAN)
3. Wide area network (WAN)
1. Local area network is a group of computers connected with each other in a small
places such as school, hospital, apartment etc.
2. LAN is secure because there is no outside connection with the local area network thus
the data which is shared is safe on the local area network and can’t be accessed outside.
3. LAN due to their small size are considerably faster, their speed can range anywhere
from 100 to 100Mbps.
4. LANs are not limited to wire connection, there is a new evolution to the LANs that
allows local area network to work on a wireless connection.
MAN network covers larger area by connections LANs to a larger network of computers.
In Metropolitan area network various Local area networks are connected with each other
through telephone lines. The size of the Metropolitan area network is larger than LANs
and smaller than WANs(wide area networks), a MANs covers the larger area of a city or
town.
Wide area network provides long distance transmission of data. The size of the WAN is
larger than LAN and MAN. A WAN can cover country, continent or even a whole world.
Internet connection is an example of WAN. Other examples of WAN are mobile
broadband connections such as 3G, 4G etc.
Advantages of WAN:
Centralized infrastructure: One of the main advantage of WAN is the that we do not need
to maintain the backup and store data on local system as everything is stored online on a
data centre, from where we can access the data through WAN.
Privacy: We can setup the WAN in such a way that it encrypts the data that we share online
that way the data is secure and minimises the risk of unauthorized access.
Increased Bandwidth: With the WAN we get to choose the bandwidth based on the need,
a large organization can have larger bandwidth that can carry large amount of data faster
and efficiently.
Area: A WAN can cover a large area or even a whole world though internet connection
thus we can connect with the person in another country through WAN which is not possible
is other type of computer networks.
Disadvantages of WAN:
Antivirus: Since our systems are connected with the large amount of systems, there is
possibility that we may unknowingly download the virus that can affect our system and
become threat to our privacy and may lead to data loss.
Expensive: Cost of installation is very high.
Issue resolution: Issue resolution takes time as the WAN covers large area, it is really
difficult to pin point the exact location where the issues raised and causing the problem.
Interconnection of Networks:
We have read LAN, MAN and WAN above, we also talked about internet. You can say
that an internet is a combination of LAN, MAN and WAN.
Data transmission refers to the process of transferring data between two or more digital devices.
Data is transmitted from one device to another in analog or digital format. Basically, data
transmission enables devices or components within devices to speak to each other.
Data transmission between digital devices
Data is transferred in the form of bits between two or more digital devices. There are two
methods used to transmit data between digital devices: serial transmission and parallel
transmission. Serial data transmission sends data bits one after another over a single channel.
Parallel data transmission sends multiple data bits at the same time over multiple channels.
Serial transmission
When data is sent or received using serial data transmission, the data bits are organized in a
specific order, since they can only be sent one after another. The order of the data bits is
important as it dictates how the transmission is organized when it is received. It is viewed as a
reliable data transmission method because a data bit is only sent if the previous data bit has
already been received.
Data bits can be sent at any point in time. Stop bits and start bits are used between data bytes to
synchronize the transmitter and receiver and to ensure that the data is transmitted correctly. The
time between sending and receiving data bits is not constant, so gaps are used to provide time
between transmissions.
The advantage of using the asynchronous method is that no synchronization is required between
the transmitter and receiver devices. It is also a more cost effective method. A disadvantage is
that data transmission can be slower, but this is not always the case.
Data bits are transmitted as a continuous stream in time with a master clock. The data transmitter
and receiver both operate using a synchronized clock frequency; therefore, start bits, stop bits,
and gaps are not used. This means that data moves faster and timing errors are less frequent
because the transmitter and receiver time is synced. However, data accuracy is highly dependent
on timing being synced correctly between devices. In comparison with asynchronous serial
transmission, this method is usually more expensive.
When is serial transmission used to send data?
Serial transmission is normally used for long-distance data transfer. It is also used in cases where
the amount of data being sent is relatively small. It ensures that data integrity is maintained as it
transmits the data bits in a specific order, one after another. In this way, data bits are received in-
sync with one another.
Parallel transmission
When data is sent using parallel data transmission, multiple data bits are transmitted over
multiple channels at the same time. This means that data can be sent much faster than using
serial transmission methods.
Given that multiple bits are sent over multiple channels at the same time, the order in which a bit string is
received can depend on various conditions, such as proximity to the data source, user location, and
bandwidth availability. Two examples of parallel interfaces can be seen below. In the first parallel
interface, the data is sent and received in the correct order. In the second parallel interface, the data is sent
in the correct order, but some bits were received faster than others.
it is easier to program;
Data is sent faster.
Although parallel transmission can transfer data faster, it requires more transmission channels
than serial transmission. This means that data bits can be out of sync, depending on transfer
distance and how fast each bit loads. A simple of example of where this can be seen is with a
voice over IP (VOIP) call when distortion or interference is noticeable. It can also be seen when
there is skipping or interference on a video stream.
A scenario where parallel transmission is used to send data is video streaming. When a video is
streamed to a viewer, bits need to be received quickly to prevent a video pausing or buffering.
Video streaming also requires the transmission of large volumes of data. The data being sent is
also time-sensitive as slow data streams result in poor viewer experience.
1. Simplex
2. Half-Duplex
3. Full-Duplex
Simplex Mode
In Simplex Transmission Mode, communication can be done in a single direction only i.e. unidirectional.
It consist of a single sender and single/multiple users. For example: Radio, Pager.
Simplex Transmission
1. In simplex mode the data transmits in one direction only, from one system to another
system.
2. The sender device that sends data can only send data and cannot receive it. On the
other hand the receiver device can only receive the data and cannot send it.
3. Television is an example of simplex mode transmission as the broadcast sends signals
to our TV but never receives signals back from our TV. This is a unidirectional
transmission.
Half-Duplex Mode
In Half Duplex Transmission Mode, communication can be done bi-direction-ally but one at a time. For
example: Walkies-talkie, Railway Track.
1. In half duplex mode transmission can be done both ways which means if two systems
are connected with half-duplex mode of transmission, they both can send and receive data
but not at the same time.
2. If one device is sending data then other device cannot send data until it receives the data
which is already in transmission. You can say that the communication is not simultaneous.
3. The radio communication device that our soldiers use at the battle fields are the examples
of half duplex mode transmission as they send message and then say over and then the
person on other hand send his message and this way they communicate but not
simultaneously like we used to do on mobile.
1. In full duplex mode both the connected devices can send and receive data
simultaneously. The mobile phone we use is an example of full duplex mode where we
can communicate simultaneously.
2. Both the devices can send and receive the data at the same time.
The voice-band and broad-band channels are usually used in the synchronous transmission modes
as it provides a faster speed up to 1200 bps and serves the purpose of high data transfer speed.
It uses character-based synchronization so that the receiving terminal could synchronize itself with
the receipt of data on a character. It is simple, fast, economical and does not require a 2-way
communication. Letters, emails, forums, televisions and radios are some of the examples of
Asynchronous Transmission.
1. Transmission Rate
2. Cost and Ease of Installation
4. Distances
1. Guided Media:
It is also referred to as Wired or Bounded transmission media. Guided media, which are those that
provide a conduit from one device to another, include Twisted-Pair Cable, Coaxial Cable,
and Fibre-Optic Cable.
A signal travelling along any of these media is directed and contained by the physical limits of the
medium. Twisted-pair and coaxial cable use metallic (copper) conductors that accept and transport
signals in the form of electric current. Optical fibre is a cable that accepts and transports signals
in the form of light. Signals being transmitted are directed and confined in a narrow pathway by
using physical links.
Features:
High Speed
Secure
Used for comparatively shorter distances
There are 3 major types of Guided Media:
(i) Twisted Pair Cable –
This cable is the most commonly used and is cheaper than others. It is lightweight, cheap, can be
installed easily, and they support many different types of network. Some important points:
A twisted pair consists of two conductors (normally copper), each with its own plastic insulation,
twisted together. One of these wires is used to carry signals to the receiver, and the other is used
only as ground reference. The receiver uses the difference between the two. In addition to the
signal sent by the sender on one of the wires, interference (noise) and crosstalk may affect both
wires and create unwanted signals. If the two wires are parallel, the effect of these unwanted signals
is not the same in both wires because they are at different locations relative to the noise or crosstalk
sources. This results in a difference at the receiver.
Twisted Pair is of two types:
Installation is easy
Flexible
Cheap
It consists of two insulating copper wires (1mm thick). The wires are twisted together in a helical
form to reduce electrical interference from similar pair.
Disadvantages of Unshielded Twisted Pair Cable
This type of cable consists of a special jacket to block external interference. It is used in fast-
data-rate Ethernet and in voice and data channels of telephone lines.
This cable has a metal foil or braided-mesh covering which encases each pair of insulated
conductors. Electromagnetic noise penetration is prevented by metal casing. Shielding also
eliminates crosstalk (explained in KEY TERMS Chapter).
It has same attenuation as unshielded twisted pair. It is faster the unshielded and coaxial cable. It
is more expensive than coaxial and unshielded twisted pair.
Easy to install
Performance is adequate
Eliminates crosstalk
Heavy
More expensive
Bulky
In telephone lines to provide voice and data channels. The DSL lines that are used by the
Local Area Network, such as 10Base-T and 100Base-T, also use twisted-pair cables.
Coaxial is called by this name because it contains two conductors that are parallel to each other.
Copper is used in this as centre conductor which can be a solid wire or a standard one. It is
surrounded by PVC installation, a sheath which is encased in an outer conductor of metal foil,
barid or both.
Outer metallic wrapping is used as a shield against noise and as the second conductor which
completes the circuit. The outer conductor is also encased in an insulating sheath. The outermost
part is the plastic cover which protects the whole cable.
Here the most common coaxial standards.
50-Ohm RG-7 or RG-11 : used with thick Ethernet.
2. BroadBand
This uses analog transmission on standard cable television cabling. It transmits several
simultaneous signal using different frequencies. It covers large area when compared with
Baseband Coaxial Cable.
Advantages of Coaxial Cable
Bandwidth is high
The can span to longer distance at higher speeds as they have better shielding when compared to
Inexpensive
Coaxial cable was widely used in analog telephone networks, where a single coaxial network
Cable TV networks also use coaxial cables. In the traditional cable TV network, the entire
In traditional Ethernet LANs. Because of it high bandwidth, and consequence high data rate,
coaxial cable was chosen for digital transmission in early Ethernet LANs. The 10Base-2, or Thin
Ethernet, uses RG-58 coaxial cable with BNC connectors to transmit data at 10Mbps with a range
of 185 m.
A fibre-optic cable is made of glass or plastic and transmits signals in the form of light. For better
understanding we first need to explore several aspects of the nature of light. Light travels in a
straight line as long as it is mobbing through a single uniform substance. If ray of light travelling
through one substance suddenly enters another substance (of a different density), the ray changes
direction. The below figure shows how a ray of light changes direction when going from a more
dense to a less dense substance.
Note: The critical angle is a property of the substance, and its value differs from one substance to
another.
Optical fibres use reflection to guide light through a channel. A glass or plastic core is
surrounded by a cladding of less dense glass or plastic. The difference in density of the two
materials must be such that a beam of light moving through the core is reflected off the cladding
instead of being refracted into it.
In multimode step-index fibre, the density of the core remains constant from the centre to the
edges. A beam of light moves through this constant density in a straight line until it reaches the
The term step-index refers to the suddenness of this change, which contributes to the distortion of
In multimode graded-index fibre, this distortion gets decreases through the cable. The word
index here refers to the index of refraction. This index of refraction is related to the density. A
graded-index fibre, therefore, is one with varying densities. Density is highest at the centre of the
Single Mode
Single mode uses step-index fibre and a highly focused source of light that limits beams to a
small range of angles, all close to the horizontal. The single-mode fibre itself is manufactured
with a much smaller diameter than that of multimode fibre, and with substantially lower density.
The decrease in density results in a critical angle that is close enough to 90 degree to make the
propagation of beams almost horizontal.
Fibre Sizes for Fiber Optic Cable
Optical fibres are defined by the ratio of the diameter or their core to the diameter of their
cladding, both expressed in micrometers. The common sizes are shown in the figure below:
The Subscriber Channel (SC) connector is used for cable TV. It uses push/pull locking system.
The Straight-Tip (ST) connector is used for connecting cable to the networking devices. MT-RJ
is a connector that is the same size as RJ45.
Advantages of Fibre Optic Cable
Fibre optic has several advantages over metallic cable:
Higher bandwidth
Light weight
(iii) Infrared
Infrared waves are used for very short distance communication. They cannot penetrate through
obstacles. This prevents interference between systems. Frequency Range:300GHz – 400THz. It
is used in TV remotes, wireless mouse, keyboard, printer, etc.
Networking Devices:
Networking devices hold the key to generate a network through which communication
can occur. These devices are responsible smooth data transmission among different nodes
of same network and/or nodes of different network.
There are five basic devices which are used for data transmission. These are:
Networking Devices
1. Networking Devices: Bridge
Bridge is a device which is used for connecting similar or dissimilar Local Area
Networks(LANs).
It’s concept is based upon store and forward technology.
By connecting different LANs, it can expand the geographical are of a network.
A bridge consists of two ports and different LANs can be connected through these ports.
Brides amplifies the signals and filter the data packets as required.
A router is a device which is used for connecting similar and dissimilar networks.
In any network whenever data transmission occurs, it is done through a series of nodes that are
connected from source to destination. The shortest path to transmit the data from source to
destination is called as route and this process is called as routing and this is achieved using
routers.
Routers are combination of software and hardware. A simple network connected through router is
depicted below.
If node N3 wants to transmit data to node N11, it will be transmitted through routers with the
shortest path possible.
Networking Devices: Router
Gateway is another network device which is used for connecting networks with different types of
architectures. For Example: Communication between a mobile device having 4G connection and
landline device having 2G connection can be done using gateway.
A HUB is a multi-port repeater in which, signals received at a port and floods out that signal to all
other ports connected to the devices except the one that originated the signal.
In all communication channels, signals get week after they travel some particular amount of
distance. So it is necessary to boost up these week signals, which is done with the help of
repeaters.
1. Bandwidth
One characteristic that measures network performance is bandwidth. However, the term can be
used in two different contexts with two different measuring values: bandwidth in hertz and
bandwidth in bits per second.
a. Bandwidth in Hertz
Bandwidth in hertz is the range of frequencies contained in a composite signal or the range of
frequencies a channel can pass. For example, we can say the bandwidth of a subscriber telephone
line is 4 kHz.
b. Bandwidth in Bits per Seconds
The term bandwidth can also refer to the number of bits per second that a channel, a link, or even
a network can transmit. For example, one can say the bandwidth of a Fast Ethernet network (or
the links in this network) is a maximum of 100 Mbps. This means that this network can send 100
Mbps.
c. Relationship
There is an explicit relationship between the bandwidth in hertz and bandwidth in bits per seconds.
Basically, an increase in bandwidth in hertz means an increase in bandwidth in bits per second.
The relationship depends on whether we have baseband transmission or transmission with
modulation.
2. Throughput
The throughput is a measure of how fast we can actually send data through a network. Although,
at first glance, bandwidth in bits per second and throughput seem the same, they are different. A
link may have a bandwidth of B bps, but we can only send T bps through this link with T always
less than B. In other words, the bandwidth is a potential measurement of a link; the throughput is
an actual measurement of how fast we can send data. For example, we may have a link with a
bandwidth of 1 Mbps, but the devices connected to the end of the link may handle only 200 kbps.
This means that we cannot send more than 200 kbps through this link.
3. Latency (Delay)
The latency or delay defines how long it takes for an entire message to completely arrive at the
destination from the time the first bit is sent out from the source. We can say that latency is made
of four components: propagation time, transmission time, queuing time and processing delay.
Latency =propagation time +transmission time +queuing time + processing delay
4. Propagation Time
Propagation time measures the time required for a bit to travel from the source to the destination.
The propagation time is calculated by dividing the distance by the propagation speed.
The propagation speed of electromagnetic signals depends on the medium and on the frequency of
the signal. For example, in a vacuum, light is propagated with a speed of 3x108mfs. It is lower in
air; it is much lower in cable.
5. Transmission time
In data communications we don't send just 1 bit, we send a message. The first bit may take a time
equal to the propagation time to reach its destination; the last bit also may take the same amount
of time. However, there is a time between the first bit leaving the sender and the last bit arriving
at the receiver. The first bit leaves earlier and arrives earlier; the last bit leaves later and arrives
later. The time required for transmission of a message depends on the size of the message and the
bandwidth of the channel.
Transmission time =Message size / Bandwidth
6. Queuing Time
The third component in latency is the queuing time, the time needed for each intermediate or end
device to hold the message before it can be processed. The queuing time is not a fixed factor; it
changes with the load imposed on the network. When there is heavy traffic on the network, the
queuing time increases. An intermediate device, such as a router, queues the arrived messages and
processes them one by one. If there are many messages, each message will have to wait.
7. Jitter
Another performance issue that is related to delay is jitter. Jitter is a problem if different packets
of data encounter different delays and the application using the data at the receiver site is time-
sensitive (audio and video data, for example). If the delay for the first packet is 20 ms, for the
second is 45 ms, and for the third is 40 ms, then the real-time application that uses the packets
endures jitter.
5. Session Layer: Allows two applications to establish, use and disconnect a connection between
them called a session. Provides for name recognition and additional functions like security, which
are needed to allow applications to communicate over the network.
4. Transport Layer: Ensures that data is delivered error free, in sequence and with no loss,
duplications or corruption. This layer also repackages data by assembling long messages into lots
of smaller messages for sending, and repackaging the smaller messages into the original larger
message at the receiving end.
2. Data-Link Layer: This layer takes the data frames or messages from the Network Layer and
provides for their actual transmission. At the receiving computer, this layer receives the incoming
data and sends it to the network layer for handling. The Data-Link Layer also provides error-free
delivery of data between the two computers by using the physical layer. It does this by packaging
the data from the Network Layer into a frame, which includes error detection information. At the
receiving computer, the Data-Link Layer reads the incoming frame, and generates its own error
detection information based on the received frames data. After receiving the entire frame, it then
compares its error detection value with that of the incoming frames, and if they match, the frame
has been received correctly.
Examples PPP, FDDI, ATM, IEEE 802.5/ 802.2, IEEE 802.3/802.2, HDLC, Frame Relay.
1. Physical Layer: Controls the transmission of the actual data onto the network cable. It defines
the electrical signals, line states and encoding of the data and the connector types used. An example
is 10BaseT.
The upper layers of the OSI model deal with application issues and generally are implemented only in
software. The highest layer, the application layer, is closest to the end user. Both users and application
layer processes interact with software applications that contain a communications component. The
term upper layer is sometimes used to refer to any layer above another layer in the OSI model.
The lower layers of the OSI model handle data transport issues. The physical layer and the data link
layer are implemented in hardware and software. The lowest layer, the physical layer, is closest to the
physical network medium (the network cabling, for example) and is responsible for actually placing
information on the medium.
Two sets of layers make up the OSI layers
PROTOCOL
Protocol is a formal set of rules and conventions that governs how computers exchange
information over a network medium. A protocol implements the functions of one or more of the
OSI layers
There exist a variety of physical layer protocols such as RS-232C, Rs-449 standards developed by
Electronics Industries Association (EIA).
d). Framing
The DLL translates the physical layer's raw bit stream into discrete units (messages) called frames.
How can the receiver detect frame boundaries? Various techniques are used for this: Length Count, Bit
Stuffing, and Character stuffing.
e). Error Control
Error control is concerned with insuring that all frames are eventually delivered (possibly in order) to
a destination. To achieve this, three items are required: Acknowledgements, Timers, and Sequence
Numbers.
f). Flow Control
Flow control deals with throttling the speed of the sender to match that of the receiver. Usually, this is
a dynamic process, as the receiving speed depends on such changing factors as the load, and availability
of buffer space.
Error Detection and Correction
In data communication, error may occur because of various reasons including attenuation, noise.
Moreover, error usually occurs as bursts rather than independent, single bit errors. For example, a burst
of lightning will affect a set of bits for a short time after the lightning strike. Detecting and correcting
errors requires redundancy (i.e., sending additional information along with the data).
There are two types of attacks against errors:
Error Detecting Codes: Include enough redundancy bits to detect errors and use ACKs and
retransmissions to recover from the errors. Example: parity encoding.
Error Correcting Codes: Include enough redundancy to detect and correct errors. Examples: CRC
checksum, MD5.
Network Layer
The basic purpose of the network layer is to provide an end-to-end communication capability in
contrast to machine-to-machine communication provided by the data link layer. This end-to-end is
performed using two basic approaches known as connection-oriented or connectionless network-layer
services.
Four issues:
1. Interface between the host and the network (the network layer is typically the boundary between the
host and subnet)
2. Routing
3. Congestion and deadlock
4. Internetworking (A path may traverse different network technologies (e.g., Ethernet, point-to-point
links, etc.)
The network layer is responsible for routing packets from the source to destination. The routing
algorithm is the piece of software that decides where a packet goes next (e.g., which output line, or
which node on a broadcast channel).
For connectionless networks, the routing decision is made for each datagram. For connection-
oriented networks, the decision is made once, at circuit setup time.
Routing Issues:
The routing algorithm must deal with the following issues:
Correctness and simplicity: networks are never taken down; individual parts (e.g., links, routers) may
fail, but the whole network should not.
Stability: if a link or router fails, how much time elapses before the remaining routers recognize the
topology change? (Some never do.)
Fairness and optimality: an inherently intractable problem. Definition of optimality usually doesn't
consider fairness. Do we want to maximize channel usage? Minimize average delay?
When we look at routing in detail, we'll consider both adaptive--those that take current traffic and
topology into consideration--and non-adaptive algorithms.
Congestion The network layer also must deal with congestion:
When more packets enter an area than can be processed, delays increase and performance decreases.
If the situation continues, the subnet may have no alternative but to discard packets.
If the delay increases, the sender may (incorrectly) retransmit, making a bad situation even worse.
Overall, performance degrades because the network is using (wasting) resources processing packets
that eventually get discarded.
Internetworking Finally, when we consider internetworking -- connecting different network
technologies together -- one finds the same problems, only worse:
Packets may travel through many different networks
Each network may have a different frame format
Some networks may be connectionless, other connection oriented.
Transport Layer
The transport level provides end-to-end communication between processes executing on different
machines. Although the services provided by a transport protocol are similar to those provided by a
data link layer protocol, there are several important differences between the transport and lower
layers:
1. User Oriented. Application programmers interact directly with the transport layer, and from
the programmers perspective, the transport layer is the ``network''. Thus, the transport layer should
be oriented more towards user services than simply reflect what the underlying layers happen to
provide. (Similar to the beautification principle in operating systems.)
2. Negotiation of Quality and Type of Services. The user and transport protocol may need to
negotiate as to the quality or type of service to be provided. Examples? A user may want to
negotiate such options as: throughput, delay, protection, priority, reliability, etc.
3. Guarantee Service. The transport layer may have to overcome service deficiencies of the
lower layers (e.g. providing reliable service over an unreliable network layer).
4. Addressing becomes a significant issue. That is, now the user must deal with it; before it was
buried in lower levels.
Two solutions:
Use well-known addresses that rarely if ever change, allowing programs to ``wire in''
addresses. For what types of service does this work? While this works for services that
are well established (e.g., mail, or telnet), it doesn't allow a user to easily experiment with
new services.
Use a name server. Servers register services with the name server, which clients contact
to find the transport address of a given service.
5. Storage capacity of the subnet. Assumptions valid at the data link layer do not necessarily
hold at the transport Layer. Specifically, the subnet may buffer messages for a potentially long
time, and an ``old'' packet may arrive at a destination at unexpected times.
6. We need a dynamic flow control mechanism. The data link layer solution of reallocating
buffers is inappropriate because a machine may have hundreds of connections sharing a single
physical link. In addition, appropriate settings for the flow control parameters depend on the
communicating end points (e.g., Cray supercomputers vs. PCs), not on the protocol used.
7. Deal with congestion control. In connectionless Internets, transport protocols must exercise
congestion control. When the network becomes congested, they must reduce rate at which they
insert packets into the subnet, because the subnet has no way to prevent itself from becoming
overloaded.
8. Connection establishment. Transport level protocols go through three phases: establishing,
using, and terminating a connection. For data gram-oriented protocols, opening a connection
simply allocates and initializes data structures in the operating system kernel
Session Layer
This layer allows users on different machines to establish session between them. A session allows
ordinary data transport but it also provides enhanced services useful in some applications. A session
may be used to allow a user to log into a remote time- sharing machine or to transfer a file between
two machines. Some of the session related services are:
1. This layer manages Dialogue Control. Session can allow traffic to go in both direction at the same
time, or in only one direction at one time.
2. Token management. For some protocols, it is required that both sides don't attempt same operation
at the same time. To manage these activities, the session layer provides tokens that can be exchanged.
Only one side that is holding token can perform the critical operation. This concept can be seen as
entering into a critical section in operating system using semaphores.
3. Synchronization. Consider the problem that might occur when trying to transfer a 4-hour file transfer
with a 2-hour mean time between crashes. After each transfer was aborted, the whole transfer has to
start again and again would probably fail. To eliminate this problem, Session layer provides a way to
insert checkpoints into data streams, so that after a crash, only the data transferred after the last
checkpoint have to be repeated.
Presentation Layer
This layer is concerned with Syntax and Semantics of the information transmitted, unlike other layers,
which are interested in moving data reliably from one machine to other. Few of the services that
Presentation layer provides are:
2. It manages the abstract data structures and converts from representation used inside computer to
network standard representation and back.
Application Layer
The application layer consists of what most users think of as programs. The application does the actual
work at hand. Although each application is different, some applications are so useful that they have
become standardized. The Internet has defined standards for:
File transfer (FTP): Connect to a remote machine and send or fetch an arbitrary file. FTP deals with
authentication, listing a directory contents, ASCII or binary files, etc.
Remote login (telnet): A remote terminal protocol that allows a user at one site to establish a TCP
connection to another site, and then pass keystrokes from the local host to the remote host.
Mail (SMTP): Allow a mail delivery agent on a local machine to connect to a mail delivery agent on
a remote machine and deliver mail.
News (NNTP): Allows communication between a news server and a news client.
Web (HTTP): Base protocol for communication on the World Wide Web.
The network was robust, and connections remained intact untill the source and destination
The overall idea was to allow one application on one computer to talk to(send data packets)
another application running on different computer.
4. Order in which packets are received is different from the way they are sent.
o Delivering IP packets
o Performing routing
o Avoiding congestion
Layer 3: Transport Layer
5. Transport layer breaks the message (data) into small units so that they are handled more
2. FTP (File Transfer Protocol) is a protocol,that allows File transfer amongst computer users
3. SMTP (Simple Mail Transport Protocol) is a protocol, which is used to transport electronic mail
4. DNS (Domain Name Server) resolves an IP address into a textual address for Hosts connected
over a network.
which handles byte-stream from source to destination without error and flow control.
want TCPs, sequencing and flow control. Eg: One-shot request-reply kind of service.
1. It operated independently.
2. It is scalable.
3. Client/server architecture.
Demerits of TCP/IP
Diagrammatic Comparison between OSI Reference Model and TCP/IP Reference Model