CH 4 Network Protocols and Architectures

Download as pdf or txt
Download as pdf or txt
You are on page 1of 20

NETWORK TOPOLOGIES

Bus topology:-

It is often referred to as a "linear bus" because the computers are connected in a straight line.

is the simplest network topology, it consists of a single cable called a trunk (also called a
backbone or segment) that connects all of the computers in the network in a single line, by using
a connector called BNT(Bayonet Neill Councilman)
Terminal use to stop signal from bouncing it placed on end
CONT…
Advantages
Media is cheap and easy to work

System is simple and easy to extend

If one computer fails, it does not affect the rest of the network.
Disadvantages
The more computers connected, the slower the network. (woks well 2-5
computers)

Break in the segment will affect the entire network.

Difficult to troubleshoot
CONT…
Star Topology:-

All computers are connected to a single hub/switch

Advantages of Star Topology

If one computer - or the cable that connects it to the hub - fails on a star network,
only the failed computer will not be able to send or receive network data.

Easy to setup and modify

Easy to troubleshoot
CONT…
Disadvantage of Star Topology
If hub (Switch) fails then entire network will fail

Require more cables

May require a device to rebroadcast signals across the network


CONT…
 Ring Topology: -

The ring topology connects computers on a single circle of cable they transfer in one side

Advantages
Equal access for all computers
Disadvantages
Failure of one computer can affect others

Problems are hard to isolate


CONT…
Mesh topology: -

In this topology each computer is connected to every other computer by separate cabling. If one cable
fails, another will take over the traffic

Advantages

Reliable connection

Failure tolerant (easy to troubleshoot)


Disadvantages
Complex & expensive maintain, to troubleshoot & to do with it.
NETWORK PROTOCOLS AND ARCHITECTURES
Protocols are rules and procedures for communication.

OSI (open system interconnection) architecture is global internationally standard language for computer and it is open, it
have 7 layers.

Layer 7:- Application


Layer 6:- Presentation
Layer 5:- Session All People Seem To Need Data Processing

Layer 4:-Transport
Layer 3:-Network
Layer 2:-Data Link
Layer 1:-physical
APPLICATION LAYER
This layer enables users and software to get an access to the network

Some services provided by this layer are


 E-mail , transferring files, distributing the result to user, etc.

This layer contain Varity of protocols that are commonly used by users, the one commonly used
application protocol is HTTP (Hyper Text Transfer Protocol); when a browser wants a web-page it sand
the name of the page to the server, the page name wants to the server through this protocol, then the
server send the page back.

The other protocol which are the members of this layer are FTP (File Transfer Protocol), TFTP (Trivial
File Transfer Protocol), SMTP (Simple Mail Transfer Protocol), DNS (Domain Name System), etc.
FUNCTION OF APPLICATION LAYER
Mail service:- it provide the basis for E-mail, for word and storage

Network Virtual Terminal:- it allows a user to logon a remote host


Packets
Directory services :- this layer provide access for global information about a various services

File Transfer Access and Management (FTAM):- it is a standard mechanism to access file and
manage it.

Data from Application Data to/from


user Layer Presentation
Layer
PRESENTATION LAYER (NETWORK TRANSLATOR)
It is responsible for code and decode data sent to the work station

Presentation layer take cares that the data is sent in such away that the receiver (Application
Layer) will understand the information (data) and will be able to use the data, syntax
(language) can be different between two communicating systems, under this condition
presentation layer plays a role of translator

In order to able to computers to communicates with different language, the data structure to be
exchanged. The exchanging process can be defend in abstract way, the presentation layer
manage these abstract data structures and allow higher level data structures to be defined
and exchange
FUNCTION OF PRESENTATION LAYER
Translation:- before data Bing transmit, information in the form of characters and numbers they
have to changed into Bit stream and because deferent computers use different encoding
mechanism presentation layer translates data between the format that the network requires
and the format that the computers requires.

Compression:- it carry out data compression to reduce the band width of the data to be
transmitted. The primary purpose of data compression is to reduce the number of bits to be
transmitted, it is important in transition of multimedia files such as Audio, Video, Text, etc.
SESSION LAYER (CHEEK POINT)
• The main aim of this layer is to establish, maintain and synchronize the interaction between
communicating systems (two different applications)
function of session layer
Dialog control :- it allows two systems (Applications) to start communication with each other in
half duplex and full duplex

Token management :- it prevents two parties from attempting the same critical operation at
the same time
Synchronization :- it allows a process to add cheek points which are considered as
synchronization point into stream of data.
TRANSPORT LAYER
It is responsible to the packets are delivered error free, in sequence, and with out loss or duplication. It
putts the packets in segment

The basic function of this layer is to accept data from the above layer (session) split it into smaller unit
(packets) pass these data units to the lower layer (Network), and ensure that all the pieces arrive
correctly at the other end.

An example of transport layer protocols are TCP (Transmission Control Protocol) It is a reliable
connection-oriented protocol that transmits data from the source to the destination machine without any
error., UD P (User Datagram Protocol) it is a simple protocol and it provides non sequenced transport
functionality and it is connectionless protocol, UDP is an end-to-end transport level protocol that adds
transport-level addresses, checksum error control, and length information to the data from the upper
layer, The packet produced by the UDP protocol is known as a user datagram.
Segment

Segment

• NETWORK LAYER :-

 THIS LAYER DETERMINE IN WHICH PATH THE DATA SHOULD TAKE BASED ON THE NETWORK CONDITION,
PRIORITY OF SERVICE, AND OTHER FACTORS SUCH AS MAKE PACKETS USE IP AND ROUTER

 THE MAIN AIM OF THIS LAYER IS TO DELIVER PACKETS FROM SOURS TO DESTINATION ACROSS MULTIPLE
LINKS (NETWORKS) IF TWO COMPUTERS (SYSTEMS) ARE CONNECTED ON THE SAME LINK, THEN THEIR IS NO
NEED OF A NETWORK LAYER IT ROUTES THE SIGNAL THROUGH DIFFERENT CHANNEL TO THE OTHER END
AND ACT AS A NETWORK CONTROLLER.

 IT ALSO DIVIDE THE OUTGOING MESSAGE IN TO PACKETS AND TO ASSEMBLE IN COMING PACKETS IN TO
MESSAGE FOR HIGHER LEVELS
FUNCTION OF NETWORK LAYER

It translate logical network in to physical address connected with circuit, message or packet
switching

Route and getaways operate In the network layer

Break larger packets in to smaller packets


Packet
Segment

Packet
Segment
DATA LINK LAYER
This layer send data frames from network layer to the physical layer; it control the data flow
from sender to receiver, in most situation after a data frame is sent, the data link layer then waits
for a positive response. It use a MAK address and swathes

This layer preform a most reliable node to node delivery of data, it forms frames for the
packets that are received from the network layer and gives it to the physical layer, in this layer
error controlling is easily done.

Error correction bits are used by the data link layer, it is also correct the error.

Example of data link layer protocols are PPP (Point to Point Protocol), HDLC, ADCCP (Advanced
Data Communication Control Procedures or protocol)
Packet Frames

PHYSICAL LAYER

 IT CARRIES THE SIGNALS THAT TRANSMIT DATA GATHERED BY EACH OF THE HIGHER LAYERS. IT IS RESPONSIBLE FOR
TRANSMITTING (ZEROS & ONES) FROM ONE COMPUTER TO ANOTHER.
Other Protocols
 IP (INTERNET PROTOCOL) UNIQUELY IDENTIFIES A COMPUTER FROM THE INTERNET IPV4 HAVE 32 BIT
 IP ADDRESS HAVE ITS OWN ADDRESS
 Class A 1-126 255.0.0.0
 Class B 128-191 255.255.0.0
 Class C 192-223
 255.255.255.0 /Subnet mask

 NOTE: - 127 IS LOOPBACK IP ADDRESS:- IT ALLOWS FOR A RELIABLE METHOD OF TESTING THE FUNCTIONALITY OF
AN ETHERNET CARD AND ITS DRIVERS AND SOFTWARE WITHOUT A PHYSICAL NETWORK
CONT…
•TCP(Transmission Control Protocol)

• UDP(User Datagram Protocol)


TCP UDP

 provides connection-oriented  provides connectionless


transmission transmission

 Acknowledgement is sent by the receiver  Acknowledgement is not sent by the


receiver

 It is reliable but slow  It is not reliable but fast

• DHCP(Dynamic Host Configuration Protocol):- Is the protocol used for requesting and
assigning dynamic IP addresses
 Example www.acad.bg 194.141.0.9

• DNS(Domain Name Service):- Resolve IP to Name


CONT…
FTP(File Transfer Protocol ):-it is the standard mechanism provided by TCP/IP for copying of
any kind of files from one host to another.
The TELNET protocol is used for providing remote terminal access over a network

You might also like