DCC PIP On Chapter 5
DCC PIP On Chapter 5
5 U 4 Describe the major functions of network layer in TCP/IP protocol suite COI403.5
1. logical addressing
2. Routing.
Answer
3. Congestion control
5. Address transformation
OSI model has 7 layers as shown in the figure. Application Layer, Presentation Layer ,Session
Layer ,Transport Layer ,Network Layer ,Data link Layer and Physical Layer
Physical (Layer 1) OSI Model, Layer 1 conveys the bit stream - electrical impulse, light or radio
signal — through the network at the electrical and mechanical level. It provides the hardware
means of sending and receiving data on a carrier, including defining cables, cards and physical
aspects.
Data Link (Layer 2) At OSI Model, Layer 2, data packets are encoded and decoded into bits. It
furnishes transmission protocol knowledge and management and handles errors in the physical
layer, flow control and frame synchronization. The data link layer is divided into two sub layers:
The Media Access Control (MAC) layer and the Logical Link Control (LLC) layer. The MAC
sub layer controls how a computer on the network gains access to the data and permission to
transmit it. The LLC layer controls frame synchronization, flow control and error checking.
Application Layer
Presentation Layer
Session Layer
Transport Layer
Network Layer
Physical Layer
Network (Layer 3) Layer 3 provides switching and routing technologies, creating logical paths,
known as virtual circuits, for transmitting data from node to node. Routing and forwarding are
functions of this layer, as well as addressing, internetworking, error handling, congestion control
and packet sequencing.
Transport (Layer 4) Model, Layer 4, provides transparent transfer of data between end systems,
or hosts, and is responsible for end-to-end error recovery and flow control. It ensures complete
data transfer from source to destination.
Session (Layer 5) This layer establishes, manages and terminates connections between
applications. The session layer sets up, coordinates, and terminates conversations, exchanges, and
dialogues between the applications at each end. It deals with session and connection
coordination.
Presentation (Layer 6) This layer provides independence from differences in data representation
(e.g., encryption) by translating from application to network format, and vice versa. The
presentation layer works to transform data into the form that the application layer can accept.
This layer formats and encrypts data to be sent across a network, providing freedom from
compatibility problems. It is sometimes called the syntax & semantics.
Application (Layer 7) OSI Model, Layer 7, supports application and end-user processes.
Everything at this layer is application-specific. This layer provides application services for file.
Framing: Data-link layer takes packets from Network Layer and encapsulates them into
Frames. Then, it sends each frame bit-by-bit on the hardware. At receiver’ end, data link
layer picks up signals from hardware and assembles them into frames.
Addressing: Data-link layer provides layer-2 hardware addressing mechanism. Hardware
address is assumed to be unique on the link. It is encoded into hardware at the time of
manufacturing.
Synchronization: When data frames are sent on the link, both machines must be
synchronized in order to transfer to take place.
Error Control: Sometimes signals may have encountered problem in transition and the
bits are flipped. These errors are detected and attempted to recover actual data bits. It also
provides error reporting mechanism to the sender.
Flow Control: Stations on same link may have different speed or capacity. Data-link layer
ensures flow control that enables both machines to exchange data on same speed.
Multi-Access: When host on the shared link tries to transfer the data, it has a high
probability of collision. Data-link layer provides mechanism such as CSMA/CD to equip
capability of accessing a shared media among multiple Systems.
Functions of the Network layer are as follows:
It is responsible for routing packets from the source host to the destination host. The routes
can be based upon static tables that are rarely changed, or they can be automatically
updated depending upon network conditions.
The data link layer assigns the physical address locally. When the data packets are routed
to remote locations, a logical addressing scheme is required to differentiate between the
source system and the destination system. This is provided by the network layer.
This layer also provides mechanisms for congestion control.
The network layer tackles issues like transmission delays, transmission time, avoidance of
jitters, etc.
Functions of Transport Layer
Service Point Addressing: Transport Layer header includes service point address which is
port address. This layer gets the message to the correct process on the computer unlike
Network Layer, which gets each packet to the correct computer.
Segmentation and Reassembling: A message is divided into segments; each segment
contains sequence number, which enables this layer in reassembling the message.
Message is reassembled correctly upon arrival at the destination and replaces packets which
were lost in transmission.
Connection Control: It includes 2 types:
Connectionless Transport Layer: Each segment is considered as an independent packet
and delivered to the transport layer at the destination machine.
Connection Oriented Transport Layer: Before delivering packets, connection is made
with transport layer at the destination machine.
Flow Control: In this layer, flow control is performed end to end.
Error Control: Error Control is performed end to end in this layer to ensure that the
complete message arrives at the receiving transport layer without any error. Error
Correction is done through retransmission.
IPV4 IPv6
Answer TCP/IP that is Transmission Control Protocol and Internet Protocol has following features
● Support for a flexible architecture. Adding more machines to a network was easy.
● The network is robust, and connections remained intact until the source and destination
machines were functioning. The main idea was to allow one application on one computer to talk to
(send data packets) another application running on different computer.
2. Protocol is used to connect to the host, so that the packets can be sent over it.
4. Order in which packets are received is different from the way they are sent.
o Delivering IP packets
o Performing routing
o Avoiding congestion
2. Functions such as multiplexing, segmenting or splitting on the data is done by transport layer.
5. Transport layer breaks the message (data) into small units so that they are handled more
efficiently by the network layer.
6.Transport layer also arrange the packets to be sent, in sequence
The TCP/IP specifications described a lot of applications that were at the top of the protocol stack.
Some of them were TELNET, FTP, SMTP, DNS etc.
1. Telnets a two-way communication protocol which allows connecting to a remote machine and
run applications on it.
2. FTP (File Transfer Protocol) is protocol that allows File transfer amongst computer users
connected over a network. It is reliable, simple and efficient.
3. SMTP (Simple Mail Transport Protocol) is a protocol, which is used to transport electronic
mail between a source and destination, directed via a route.
4. DNS (Domain Name Server) resolves an IP address into a textual address for Hosts connected
over a network.
It allows peer entities to carry conversation.6.It defines two end-to-end protocols: TCP and UDP.
Class B: Class B range for first byte is 128-191. This type has first two bytes specifying network
ID with starting two bits as 10 and last two bytes referring to host ID. The default subnet masks
for class B is 255.255.0.0. Network addresses for these ranges from 128.0.0.0 to 191.0.0.0.
Class C: Class C range for first byte is 192-223. This class has first three bytes referring to
network with starting bits as 110 and last byte signifies Host ID. Here, number of networks is
more when compared to number of hosts in each network. The default subnet masks for class C is
255.255.255.0 The network IP addresses for these range from 192.0.0.0 to 223.0.0.0.
Class D: Class D range for first byte is 224-239 Class D is used for multicasting and its starting
bits are 1110
Class E: Class E range for first byte is 240-255 .Class E is reserved for future use and its starting
bits are 1111
Answer DHCP (Dynamic Host Configuration Protocol) is a client-server protocol that uses DHCP servers
and DHCP clients. A DHCP server is a machine that runs a service that can lease out IP addresses
and other TCP/IP information to any client that requests them. The DHCP server typically has a
pool of IP addresses that it is allowed to distribute to clients, and these clients lease an IP address
from the pool for a specific period of time, usually several days. Once the lease is ready to expire,
the client contacts the server to arrange for renewal. DHCP clients are client machines that run
special DHCP client software enabling them to communicate with DHCP server.
DHCP clients obtain a DHCP lease for an IP address, a subnet mask, and various DHCP options from DHCP
servers in a four-step process:
DHCPREQUEST: The client broadcasts a request to lease an address from one of the offering DHCP
servers.
DHCPACK: The DHCP server that the client responds to acknowledges the client, assigns it
any configured DHCP options, and updates its DHCP database. The client then initializes and
binds its TCP/IP protocol stack and can begin network communication.
Marking Scheme
Step by step procedure -6M
Answer
Before beginning configuration procedure, the following are the prerequisites.
Network hardware is installed and cabled. .
TCP/IP software is installed.
To configure your TCP/IP network, the following steps are followed:
Read TCP/IP protocols for the basic organization of TCP/IP.
Minimally configure each host machine on the network.
This means adding a network adapter, assigning an IP address, and assigning a host name to
each host, as well as defining a default route to your network. For background information on
these tasks, refer to TCP/IP network interfaces, TCP/IP addressing, and Naming hosts on
your network.
Configure and start the intend daemon on each host machine on the network. Read
TCP/IP daemons and then follow the instructions in Configuring the intend daemon.
Configure each host machine to perform either local name resolution or to use a name
server. If a hierarchical Domain Name networks being set up, configure at least one host to
function as a name server.
If the network needs to communicate with any remote networks, configure at least one
host to function as a gateway. The gateway can use static routes or a routing daemon to perform
inters network routing.
Decide which services each host machine on the network will use.
By default, all services are available. Follow the instructions in Client network services if you
wish to make a particular service unavailable.
Decide which hosts on the network will be servers, and which services a particular server
will provide.Follow the instructions in Server network services to start the server daemons you
wish to run.