CH 4 Network Protocols and Architectures
CH 4 Network Protocols and Architectures
CH 4 Network Protocols and Architectures
Bus topology:-
It is often referred to as a "linear bus" because the computers are connected in a straight line.
is the simplest network topology, it consists of a single cable called a trunk (also called a
backbone or segment) that connects all of the computers in the network in a single line, by using
a connector called BNT(Bayonet Neill Councilman)
Terminal use to stop signal from bouncing it placed on end
CONT…
Advantages
Media is cheap and easy to work
If one computer fails, it does not affect the rest of the network.
Disadvantages
The more computers connected, the slower the network. (woks well 2-5
computers)
Difficult to troubleshoot
CONT…
Star Topology:-
If one computer - or the cable that connects it to the hub - fails on a star network,
only the failed computer will not be able to send or receive network data.
Easy to troubleshoot
CONT…
Disadvantage of Star Topology
If hub (Switch) fails then entire network will fail
The ring topology connects computers on a single circle of cable they transfer in one side
Advantages
Equal access for all computers
Disadvantages
Failure of one computer can affect others
In this topology each computer is connected to every other computer by separate cabling. If one cable
fails, another will take over the traffic
Advantages
Reliable connection
OSI (open system interconnection) architecture is global internationally standard language for computer and it is open, it
have 7 layers.
Layer 4:-Transport
Layer 3:-Network
Layer 2:-Data Link
Layer 1:-physical
APPLICATION LAYER
This layer enables users and software to get an access to the network
This layer contain Varity of protocols that are commonly used by users, the one commonly used
application protocol is HTTP (Hyper Text Transfer Protocol); when a browser wants a web-page it sand
the name of the page to the server, the page name wants to the server through this protocol, then the
server send the page back.
The other protocol which are the members of this layer are FTP (File Transfer Protocol), TFTP (Trivial
File Transfer Protocol), SMTP (Simple Mail Transfer Protocol), DNS (Domain Name System), etc.
FUNCTION OF APPLICATION LAYER
Mail service:- it provide the basis for E-mail, for word and storage
File Transfer Access and Management (FTAM):- it is a standard mechanism to access file and
manage it.
Presentation layer take cares that the data is sent in such away that the receiver (Application
Layer) will understand the information (data) and will be able to use the data, syntax
(language) can be different between two communicating systems, under this condition
presentation layer plays a role of translator
In order to able to computers to communicates with different language, the data structure to be
exchanged. The exchanging process can be defend in abstract way, the presentation layer
manage these abstract data structures and allow higher level data structures to be defined
and exchange
FUNCTION OF PRESENTATION LAYER
Translation:- before data Bing transmit, information in the form of characters and numbers they
have to changed into Bit stream and because deferent computers use different encoding
mechanism presentation layer translates data between the format that the network requires
and the format that the computers requires.
Compression:- it carry out data compression to reduce the band width of the data to be
transmitted. The primary purpose of data compression is to reduce the number of bits to be
transmitted, it is important in transition of multimedia files such as Audio, Video, Text, etc.
SESSION LAYER (CHEEK POINT)
• The main aim of this layer is to establish, maintain and synchronize the interaction between
communicating systems (two different applications)
function of session layer
Dialog control :- it allows two systems (Applications) to start communication with each other in
half duplex and full duplex
Token management :- it prevents two parties from attempting the same critical operation at
the same time
Synchronization :- it allows a process to add cheek points which are considered as
synchronization point into stream of data.
TRANSPORT LAYER
It is responsible to the packets are delivered error free, in sequence, and with out loss or duplication. It
putts the packets in segment
The basic function of this layer is to accept data from the above layer (session) split it into smaller unit
(packets) pass these data units to the lower layer (Network), and ensure that all the pieces arrive
correctly at the other end.
An example of transport layer protocols are TCP (Transmission Control Protocol) It is a reliable
connection-oriented protocol that transmits data from the source to the destination machine without any
error., UD P (User Datagram Protocol) it is a simple protocol and it provides non sequenced transport
functionality and it is connectionless protocol, UDP is an end-to-end transport level protocol that adds
transport-level addresses, checksum error control, and length information to the data from the upper
layer, The packet produced by the UDP protocol is known as a user datagram.
Segment
Segment
• NETWORK LAYER :-
THIS LAYER DETERMINE IN WHICH PATH THE DATA SHOULD TAKE BASED ON THE NETWORK CONDITION,
PRIORITY OF SERVICE, AND OTHER FACTORS SUCH AS MAKE PACKETS USE IP AND ROUTER
THE MAIN AIM OF THIS LAYER IS TO DELIVER PACKETS FROM SOURS TO DESTINATION ACROSS MULTIPLE
LINKS (NETWORKS) IF TWO COMPUTERS (SYSTEMS) ARE CONNECTED ON THE SAME LINK, THEN THEIR IS NO
NEED OF A NETWORK LAYER IT ROUTES THE SIGNAL THROUGH DIFFERENT CHANNEL TO THE OTHER END
AND ACT AS A NETWORK CONTROLLER.
IT ALSO DIVIDE THE OUTGOING MESSAGE IN TO PACKETS AND TO ASSEMBLE IN COMING PACKETS IN TO
MESSAGE FOR HIGHER LEVELS
FUNCTION OF NETWORK LAYER
It translate logical network in to physical address connected with circuit, message or packet
switching
Packet
Segment
DATA LINK LAYER
This layer send data frames from network layer to the physical layer; it control the data flow
from sender to receiver, in most situation after a data frame is sent, the data link layer then waits
for a positive response. It use a MAK address and swathes
This layer preform a most reliable node to node delivery of data, it forms frames for the
packets that are received from the network layer and gives it to the physical layer, in this layer
error controlling is easily done.
Error correction bits are used by the data link layer, it is also correct the error.
Example of data link layer protocols are PPP (Point to Point Protocol), HDLC, ADCCP (Advanced
Data Communication Control Procedures or protocol)
Packet Frames
PHYSICAL LAYER
IT CARRIES THE SIGNALS THAT TRANSMIT DATA GATHERED BY EACH OF THE HIGHER LAYERS. IT IS RESPONSIBLE FOR
TRANSMITTING (ZEROS & ONES) FROM ONE COMPUTER TO ANOTHER.
Other Protocols
IP (INTERNET PROTOCOL) UNIQUELY IDENTIFIES A COMPUTER FROM THE INTERNET IPV4 HAVE 32 BIT
IP ADDRESS HAVE ITS OWN ADDRESS
Class A 1-126 255.0.0.0
Class B 128-191 255.255.0.0
Class C 192-223
255.255.255.0 /Subnet mask
NOTE: - 127 IS LOOPBACK IP ADDRESS:- IT ALLOWS FOR A RELIABLE METHOD OF TESTING THE FUNCTIONALITY OF
AN ETHERNET CARD AND ITS DRIVERS AND SOFTWARE WITHOUT A PHYSICAL NETWORK
CONT…
•TCP(Transmission Control Protocol)
• DHCP(Dynamic Host Configuration Protocol):- Is the protocol used for requesting and
assigning dynamic IP addresses
Example www.acad.bg 194.141.0.9