Computer Networks 2023 New Syllabus Notes Unit i
Computer Networks 2023 New Syllabus Notes Unit i
UNIT – I
HISTORY AND DEVELOPMENT OF COMPUTER NETWORK
Internet
ARPANET expanded to connect DOD with those universities of the
US that were carrying out defense-related research. It covered most
of the major universities across the country. The concept of
networking got a boost when University College of London (UK) and
Royal Radar Network (Norway) connected to the ARPANET and a
network of networks was formed.
The term Internet was coined by Vinton Cerf, Yogen Dalal and Carl
Sunshine of Stanford University to describe this network of
networks. Together they also developed protocols to facilitate
information exchange over the Internet. Transmission Control
Protocol (TCP) still forms the backbone of networking.
Telenet
Telenet was the first commercial adaptation of ARPANET introduced
in 1974. With this the concept of Internet Service Provider (ISP) was
also introduced. The main function of an ISP is to provide
uninterrupted Internet connection to its customers at affordable
rates.
Year Milestone
ARPANET decommissioned
1990 First web browser Nexus developed
HTML developed
Channel
Physical medium like cables over which information is exchanged is
called channel. Transmission channel may be analog or digital. As
the name suggests, analog channels transmit data using analog
signals while digital channels transmit data using digital signals.
In popular network terminology, path over which data is sent or
received is called data channel. This data channel may be a
tangible medium like copper wire cables or broadcast medium
like radio waves.
Bandwidth
Data transfer rates that can be supported by a network is called its
bandwidth. It is measured in bits per second (bps). Modern day
networks provide bandwidth in Kbps, Mbps and Gbps. Some of the
factors affecting a network’s bandwidth include −
Throughput
Throughput is the actual speed with which data gets transferred
over the network. Besides transmitting the actual data, network
bandwidth is used for transmitting error messages,
acknowledgement frames, etc.
The University College of London and the Royal Radar Establishment made the
first international link to the developing Internet in 1973. (Norway). DARPA
launched a research program the same year to examine strategies and
technologies for interconnecting various types of packet networks. The goal was
to create communication protocols based on 'packet-switching' that would allow
networked computers to interact across many geographically scattered sites in
real time. The 'packet-switching' method would divide the data to be conveyed
into small packets that might travel multiple paths to their destination -. A
network like this may resist a partial nuclear assault, as was anticipated during
the Cold War.
The CSNET server was an early example of a white pages directory service, and
its software is still in use at many sites. CSNET had over 200 participant sites
and international connections to about fifteen countries at its peak. Another
significant breakthrough that year was the establishment of BITNET (Because it
is a time network). BITNET began as a cooperative network at the City University
of New York, with the initial link to the University of Yale. BITNET used the IBM
RSCS protocol suite to connect participant sites through leased lines of the initial
BITNET connections linked IBM mainframes at university data centers.
BITNET has always been multidisciplinary, having users from many academic
disciplines. It has also supplied its consumers with various unique services (e.g.,
LISTSERV). BITNET and its sister networks in other regions of the world (for
example, EARN in Europe) already have thousands of participant sites. BITNET
has recently created a backbone that leverages the TCPIIP protocols with RSCS-
based applications operating atop TCP.
In the same year, the External Gateway Protocol (EGP) was established, which
provides methods for connecting non-TCP/IP networks to the Internet. In 1982,
the University of Wisconsin created a 'Name Server,' which enabled the
translation of names into strings of numbers. This advancement resulted in the
practice of giving domain names to websites, which is still in use today. Another
notable event in 1982 was the division of ARPANET into ARPANET and MILNET.
The MlLNET was eventually linked to the Defence Data Network, established in
1981.
The National Science Foundation (NSF) of the United States launched the
creation of the NSFNET in 1986, which currently serves as a primary backbone
communication service for the Internet. The National Aeronautics and Space
Administration (NASA) and the United States Department of Energy (DOE) each
donated additional backbone infrastructure in the shape of the NSFNET and
ESNET. The Network News Transfer Protocol (NNTP) was created to improve
news performance via TCP/IP.
The NSF signed a collaboration arrangement with Merit Networks, Inc. in 1987 to
administer the NSFNet backbone. Later, Merit, IBM, and MCI formed Advanced
Network and Services, Inc. (ANS). BITNET and CSNET combined the next year to
become the Corporation for Research and Educational Networking (CREN).
CSNET service was discontinued in the fall of 1991, having played an essential
early role in providing academic networking services. CREN's operational
expenditures are covered by dues paid by its member organizations, which is
crucial. In 1988, a computer virus impacted around 6,000 of the total 60,000
hosts on the Internet for the first time. The Internet's vulnerability and the need
for increased security were recognized for the first time. In response, DARPA
established the Computer Emergency Response Team (CERT). The Department
of Defense adopted Open Systems Interconnection in the same year (OSI).
In 1989, the total number of hosts on the Internet reached 100,000. In addition,
the year saw the first relays between a commercial electronic mail carrier and
the Internet. MCI Mail was linked via the Corporation for the National Research
Initiative (CNRI) and CompuServe via Ohio State University. The merging of
CSNET and BITNET resulted in the formation of the Corporation for Research and
Education Networking (CREN). In 1989, the lAB established the Internet
Engineering Task Force (IETF) and the Internet Research Task Force (IRTF).
Several additional nations joined the NSFNet in the same year, including
Australia, Germany, Israel, Italy, Japan, Mexico, the Netherlands, New Zealand,
Puerto Rico, and the United Kingdom. In Europe, important international
backbones such as NORDUNET and others connect over 100,000 computers
across many networks. The Internet system began to include support for
different protocol suites into its core networking architecture over its expansion,
notably after 1989. The system's current emphasis is on multi-protocol
internetworking, integrating the Open Systems Interconnection (OSI) protocols
into the architecture.
Recent Developments
OSI protocol implementations became available in the early 1990s. By the end
of 1991, the Internet had expanded to encompass over 5,000 networks in over a
dozen countries, serving over 700,000 host computers utilized by over
4,000,000 people. The ARPANET was decommissioned in 1990. Commercial
network operators in the United States and Europe began to offer Internet
backbone and access support to interested parties on a competitive basis.
'World' (world.std.com) provided commercial Internet connection for the first
time, becoming the first Internet Service Provider (ISP) providing Internet dial-up
access. Argentina, Austria, Belgium, Brazil, Chile, Greece, India, Ireland, South
Korea, Spain, and Switzerland were among the nations connected to the Internet
in 1990.
Brewster Kahle created Wide Area Information Servers (WAISs), which Thinking
Machines Corporation commercialized in 1991. These servers served as the
foundation for indexes of material available on the Internet. These engines'
indexing and search capabilities enable Internet users to discover information
using keywords across massive resources available on the internet. The creation
of the World Wide Web (WWW) by Tim Bemers-Lee at the CERN Laboratory in
1991 was the most significant advance in the history of the Internet. Mosaic, the
original web browser, was introduced in 1993 and quickly took the Internet by
storm. In 1993, several other nations were linked to the Internet. InterNIC was
established in 1993 to provide particular Internet services such as a directory of
database services, ii) registration services, and iii) information services.
Network Cables
Distributors
Routers
Internal Network Cards
External Network Cards
Network Cables
Network cables are used to connect computers. The most commonly
used cable is Category 5 cable RJ-45.
Distributors
A computer can be connected to another one via a serial port but if
we need to connect many computers to produce a network, this
serial connection will not work.
Router
A router is a type of device which acts as the central point among
computers and other devices that are a part of the network. It is
equipped with holes called ports. Computers and other devices are
connected to a router using network cables. Now-a-days router
comes in wireless modes using which computers can be connected
without any physical cable.
Network Card
Network card is a necessary component of a computer without
which a computer cannot be connected over a network. It is also
known as the network adapter or Network Interface Card (NIC). Most
branded computers have network card pre-installed. Network cards
are of two types: Internal and External Network Cards.
External network cards are of two types: Wireless and USB based.
Wireless network card needs to be inserted into the motherboard,
however no network cable is required to connect to the network.
Mesh Topology
In Star Topology, all the devices are connected to a single hub through a cable.
This hub is the central node and all other nodes are connected to the central
node. The hub can be passive in nature i.e., not an intelligent hub such as
broadcasting devices, at the same time the hub can be intelligent known as an
active hub. Active hubs have repeaters in them. Coaxial cables or RJ-45 cables
are used to connect the computers. In Star Topology, many popular Ethernet
LAN protocols are used as CD(Collision Detection), CSMA (Carrier Sense
Multiple Access), etc.
Star Topology
If the concentrator (hub) on which the whole topology relies fails, the whole
system will crash down.
The cost of installation is high.
Performance is based on the single concentrator i.e. hub.
A common example of star topology is a local area network (LAN) in an office
where all computers are connected to a central hub. This topology is also used
in wireless networks where all devices are connected to a wireless access
point.
For more, refer to the Advantages and Disadvantages of Star Topology.
Bus Topology
Bus Topology is a network type in which every computer and network device is
connected to a single cable. It is bi-directional. It is a multi-point connection and
a non-robust topology because if the backbone fails the topology crashes. In
Bus Topology, various MAC (Media Access Control) protocols are followed by
LAN ethernet connections like TDMA, Pure Aloha, CDMA, Slotted Aloha, etc.
Bus Topology
Figure 3: A bus topology with shared backbone cable. The nodes are
connected to the channel via drop lines.
Advantages of Bus Topology
If N devices are connected to each other in a bus topology, then the number
of cables required to connect them is 1, known as backbone cable, and N
drop lines are required.
Coaxial or twisted pair cables are mainly used in bus-based networks that
support up to 10 Mbps.
The cost of the cable is less compared to other topologies, but it is used to
build small networks.
Bus topology is familiar technology as installation and troubleshooting
techniques are well known.
CSMA is the most common method for this type of topology.
Drawbacks of Bus Topology
A bus topology is quite simpler, but still, it requires a lot of cabling.
If the common cable fails, then the whole system will crash down.
If the network traffic is heavy, it increases collisions in the network. To avoid
this, various protocols are used in the MAC layer known as Pure Aloha,
Slotted Aloha, CSMA/CD, etc.
Adding new devices to the network would slow down networks.
Security is very low.
A common example of bus topology is the Ethernet LAN, where all devices are
connected to a single coaxial cable or twisted pair cable. This topology is also
used in cable television networks. For more, refer to the Advantages and
Disadvantages of Bus Topology .
Ring Topology
Ring Topology
Figure 4: A ring topology comprises 4 stations connected with each forming a
ring.
The most common access method of ring topology is token passing.
Token passing: It is a network access method in which a token is passed
from one node to another node.
Token: It is a frame that circulates around the network.
Operations of Ring Topology
1. One station is known as a monitor station which takes all the responsibility
for performing the operations.
2. To transmit the data, the station has to hold the token. After the transmission
is done, the token is to be released for other stations to use.
3. When no station is transmitting the data, then the token will circulate in the
ring.
4. There are two types of token release techniques: Early token
release releases the token just after transmitting the data and Delayed
token release releases the token after the acknowledgment is received from
the receiver.
Advantages of Ring Topology
The data transmission is high-speed.
The possibility of collision is minimum in this type of topology.
Cheap to install and expand.
It is less costly than a star topology.
Drawbacks of Ring Topology
The failure of a single node in the network can cause the entire network to
fail.
Troubleshooting is difficult in this topology.
The addition of stations in between or the removal of stations can disturb the
whole topology.
Less secure.
For more, refer to the Advantages and Disadvantages of Ring Topology .
Tree Topology
This topology is the variation of the Star topology. This topology has a
hierarchical flow of data. In Tree Topology, protocols like DHCP and SAC
(Standard Automatic Configuration ) are used.
Tree Topology
Figure 5: In this, the various secondary hubs are connected to the central hub
which contains the repeater. This data flow from top to bottom i.e. from the
central hub to the secondary and then to the devices or from bottom to top i.e.
devices to the secondary hub and then to the central hub. It is a multi-point
connection and a non-robust topology because if the backbone fails the
topology crashes.
Advantages of Tree Topology
It allows more devices to be attached to a single central hub thus it
decreases the distance that is traveled by the signal to come to the devices.
It allows the network to get isolated and also prioritize from different
computers.
We can add new devices to the existing network.
Error detection and error correction are very easy in a tree topology.
Drawbacks of Tree Topology
If the central hub gets fails the entire system fails.
The cost is high because of the cabling.
If new devices are added, it becomes difficult to reconfigure.
A common example of a tree topology is the hierarchy in a large organization.
At the top of the tree is the CEO, who is connected to the different departments
or divisions (child nodes) of the company. Each department has its own
hierarchy, with managers overseeing different teams (grandchild nodes). The
team members (leaf nodes) are at the bottom of the hierarchy, connected to
their respective managers and departments.
For more, refer to the Advantages and Disadvantages of Tree Topology .
Hybrid Topology
Hybrid Topology
Figure 6: The above figure shows the structure of the Hybrid topology. As seen
it contains a combination of all different types of networks.
Advantages of Hybrid Topology
This topology is very flexible.
The size of the network can be easily expanded by adding new devices.
Drawbacks of Hybrid Topology
It is challenging to design the architecture of the Hybrid Network.
Hubs used in this topology are very expensive.
The infrastructure cost is very high as a hybrid network requires a lot of
cabling and network devices.
A common example of a hybrid topology is a university campus network. The
network may have a backbone of a star topology, with each building connected
to the backbone through a switch or router. Within each building, there may be
a bus or ring topology connecting the different rooms and offices. The wireless
access points also create a mesh topology for wireless devices. This hybrid
topology allows for efficient communication between different buildings while
providing flexibility and redundancy within each building.
Layering in Computer Network
Layering means decomposing the problem into more manageable components
(layers).
Advantages:
Iit provide more modular design
Easy to troubleshoot
OSI MODEL
OSI or Open System Interconnection model was developed by
International Standards Organization (ISO). It gives a layered networking
framework that conceptualizes how communications should be done
between heterogeneous systems. It has seven interconnected layers. The
seven layers of the OSI Model are a physical layer, data link
layer, network layer, transport layer, session layer, presentation
layer, and application layer, as shown in the following diagram –
The physical layer, data link layer and the network layer are the network
support layers. The layers manage a physical transfer of data from one device to
another. Session layer, presentation layer, and application layer are the user
support layers. These layers allow communication among unrelated software in
dissimilar environments. Transport layer links the two groups.
Physical Layer − Its function is to transmit individual bits from one node
to another over a physical medium.
Data Link Layer − It is responsible for the reliable transfer of data
frames from one node to another connected by the physical layer.
Network Layer − It manages the delivery of individual data packets from
source to destination through appropriate addressing and routing.
Transport Layer −It is responsible for delivery of the entire message
from the source host to destination host.
Session Layer − It establishes sessions between users and offers
services like dialog control and synchronization.
Presentation Layer − It monitors syntax and semantics of transmitted
information through translation, compression, and encryption.
Application Layer − It provides high-level APIs (application program
interface) to the users.
Physical Layer in OSI Model
The physical Layer is the bottom-most layer in the Open System
Interconnection (OSI) Model which is a physical and electrical representation
of the system. It consists of various network components such as power plugs,
connectors, receivers, cable types, etc. The physical layer sends data bits from
one device(s) (like a computer) to another device(s). The physical Layer defines
the types of encoding (that is how the 0’s and 1’s are encoded in a signal). The
physical Layer is responsible for the communication of the unstructured raw
data streams over a physical medium.
Presentation Layer
Introduction : Presentation Layer is the 6th layer in the Open System
Interconnection (OSI) model. This layer is also known as Translation layer, as
this layer serves as a data translator for the network. The data which this layer
receives from the Application Layer is extracted and manipulated here as per
the required format to transmit over the network. The main responsibility of this
layer is to provide or define the data format and encryption. The presentation
layer is also called as Syntax layer since it is responsible for maintaining the
proper syntax of the data which it either receives or transmits to other layer(s).
Application Layer
Present Layer=> Presentation Layer
Session Layer
Transport Layer
Network Layer
Data Layer
Physical Layer
Functions of Presentation Layer :
Data from Application Layer <=> Presentation layer <=> Data
from Session Layer
The presentation layer, being the 6th layer in the OSI model, performs several
types of functions, which are described below-
Presentation layer format and encrypts data to be sent across the network.
This layer takes care that the data is sent in such a way that the receiver will
understand the information (data) and will be able to use the data efficiently
and effectively.
This layer manages the abstract data structures and allows high-level data
structures (example- banking records), which are to be defined or
exchanged.
This layer carries out the encryption at the transmitter and decryption at the
receiver.
This layer carries out data compression to reduce the bandwidth of the data
to be transmitted (the primary goal of data compression is to reduce the
number of bits which is to be transmitted).
This layer is responsible for interoperability (ability of computers to exchange
and make use of information) between encoding methods as different
computers use different encoding methods.
This layer basically deals with the presentation part of the data.
Presentation layer, carries out the data compression (number of bits
reduction while transmission), which in return improves the data throughput.
This layer also deals with the issues of string representation.
The presentation layer is also responsible for integrating all the formats into
a standardized format for efficient and effective communication.
This layer encodes the message from the user-dependent format to the
common format and vice-versa for communication between dissimilar
systems.
This layer deals with the syntax and semantics of the messages.
This layer also ensures that the messages which are to be presented to the
upper as well as the lower layer should be standardized as well as in an
accurate format too.
Presentation layer is also responsible for translation, formatting, and delivery
of information for processing or display.
This layer also performs serialization (process of translating a data structure
or an object into a format that can be stored or transmitted easily).
Features of Presentation Layer in the OSI model: Presentation layer, being
the 6th layer in the OSI model, plays a vital role while communication is taking
place between two devices in a network.
List of features which are provided by the presentation layer are:
Presentation layer could apply certain sophisticated compression
techniques, so fewer bytes of data are required to represent the information
when it is sent over the network.
If two or more devices are communicating over an encrypted connection,
then this presentation layer is responsible for adding encryption on the
sender’s end as well as the decoding the encryption on the receiver’s end so
that it can represent the application layer with unencrypted, readable data.
This layer formats and encrypts data to be sent over a network, providing
freedom from compatibility problems.
This presentation layer also negotiates the Transfer Syntax.
This presentation layer is also responsible for compressing data it receives
from the application layer before delivering it to the session layer (which is
the 5th layer in the OSI model) and thus improves the speed as well as the
efficiency of communication by minimizing the amount of the data to be
transferred.
Working of Presentation Layer in the OSI model :
Presentation layer in the OSI model, as a translator, converts the data sent by
the application layer of the transmitting node into an acceptable and compatible
data format based on the applicable network protocol and architecture. Upon
arrival at the receiving computer, the presentation layer translates data into an
acceptable format usable by the application layer. Basically, in other words, this
layer takes care of any issues occurring when transmitted data must be viewed
in a format different from the original format. Being the functional part of the OSI
mode, the presentation layer performs a multitude (large number of) data
conversion algorithms and character translation functions. Mainly, this layer is
responsible for managing two network characteristics: protocol (set of rules)
and architecture.
Presentation Layer Protocols :
Presentation layer being the 6th layer, but the most important layer in the OSI
model performs several types of functionalities, which makes sure that data
which is being transferred or received should be accurate or clear to all the
devices which are there in a closed network.
Presentation Layer, for performing translations or other specified functions,
needs to use certain protocols which are defined below –
Apple Filing Protocol (AFP): Apple Filing Protocol is the proprietary
network protocol (communications protocol) that offers services to macOS or
the classic macOS. This is basically the network file control protocol
specifically designed for Mac-based platforms.
Lightweight Presentation Protocol (LPP): Lightweight Presentation
Protocol is that protocol which is used to provide ISO presentation services
on the top of TCP/IP based protocol stacks.
NetWare Core Protocol (NCP): NetWare Core Protocol is the network
protocol which is used to access file, print, directory, clock synchronization,
messaging, remote command execution and other network service functions.
Network Data Representation (NDR): Network Data Representation is
basically the implementation of the presentation layer in the OSI model,
which provides or defines various primitive data types, constructed data
types and also several types of data representations.
External Data Representation (XDR): External Data Representation (XDR)
is the standard for the description and encoding of data. It is useful for
transferring data between computer architectures and has been used to
communicate data between very diverse machines. Converting from local
representation to XDR is called encoding, whereas converting XDR into local
representation is called decoding.
Secure Socket Layer (SSL): The Secure Socket Layer protocol provides
security to the data that is being transferred between the web browser and
the server. SSL encrypts the link between a web server and a browser,
which ensures that all data passed between them remains private and free
from attacks.
Application Layer
Introduction :
The Application Layer is topmost layer in the Open System Interconnection
(OSI) model. This layer provides several ways for manipulating the data
(information) which actually enables any type of user to access network with
ease. This layer also makes a request to its bottom layer, which is presentation
layer for receiving various types of information from it. The Application Layer
interface directly interacts with application and provides common web
application services. This layer is basically highest level of open system, which
provides services directly for application process.
Present Layer=> Application Layer
Presentation Layer
Session Layer
Transport Layer
Network Layer
Data Layer
Physical Layer
Functions of Application Layer :
The Application Layer, as discussed above, being topmost layer in OSI model,
performs several kinds of functions which are requirement in any kind of
application or communication process.
Following are list of functions which are performed by Application Layer of OSI
Model –
Data from User <=> Application layer <=> Data from Presentation
Layer
Application Layer provides a facility by which users can forward several
emails and it also provides a storage facility.
This layer allows users to access, retrieve and manage files in a remote
computer.
It allows users to log on as a remote host.
This layer provides access to global information about various services.
This layer provides services which include: e-mail, transferring files,
distributing results to the user, directory services, network resources and so
on.
It provides protocols that allow software to send and receive information and
present meaningful data to users.
It handles issues such as network transparency, resource allocation and so
on.
This layer serves as a window for users and application processes to access
network services.
Application Layer is basically not a function, but it performs application layer
functions.
The application layer is actually an abstraction layer that specifies the
shared protocols and interface methods used by hosts in a communication
network.
Application Layer helps us to identify communication partners, and
synchronizing communication.
This layer allows users to interact with other software applications.
In this layer, data is in visual form, which makes users truly understand data
rather than remembering or visualize the data in the binary format (0’s or
1’s).
This application layer basically interacts with Operating System (OS) and
thus further preserves the data in a suitable manner.
This layer also receives and preserves data from it’s previous layer, which is
Presentation Layer (which carries in itself the syntax and semantics of the
information transmitted).
The protocols which are used in this application layer depend upon what
information users wish to send or receive.
This application layer, in general, performs host initialization followed by
remote login to hosts.
Working of Application Layer in the OSI model :
In the OSI model, this application layer is narrower in scope.
The application layer in the OSI model generally acts only like the interface
which is responsible for communicating with host-based and user-facing
applications. This is in contrast with TCP/IP protocol, wherein the layers below
the application layer, which is Session Layer and Presentation layer, are
clubbed together and form a simple single layer which is responsible for
performing the functions, which includes controlling the dialogues between
computers, establishing as well as maintaining as well as ending a particular
session, providing data compression and data encryption and so on.
At first, client sends a command to server and when server receives that
command, it allocates port number to client. Thereafter, the client sends an
initiation connection request to server and when server receives request, it
gives acknowledgement (ACK) to client through client has successfully
established a connection with the server and, therefore, now client has access
to server through which it may either ask server to send any types of files or
other documents or it may upload some files or documents on server itself.
Features provided by Application Layer Protocols :
To ensure smooth communication, application layer protocols are implemented
the same on source host and destination host.
The following are some of the features which are provided by Application layer
protocols-
The Application Layer protocol defines process for both parties which are
involved in communication.
These protocols define the type of message being sent or received from any
side (either source host or destination host).
These protocols also define basic syntax of the message being forwarded or
retrieved.
These protocols define the way to send a message and the expected
response.
These protocols also define interaction with the next level.
Application Layer Protocols: The application layer provides several protocols
which allow any software to easily send and receive information and present
meaningful data to its users.
The following are some of the protocols which are provided by the application
layer.
TELNET: Telnet stands for Telecommunications Network. This protocol is
used for managing files over the Internet. It allows the Telnet clients to
access the resources of Telnet server. Telnet uses port number 23.
DNS: DNS stands for Domain Name System. The DNS service translates
the domain name (selected by user) into the corresponding IP address. For
example- If you choose the domain name as www.abcd.com, then DNS must
translate it as 192.36.20.8 (random IP address written just for understanding
purposes). DNS protocol uses the port number 53.
DHCP: DHCP stands for Dynamic Host Configuration Protocol. It provides IP
addresses to hosts. Whenever a host tries to register for an IP address with
the DHCP server, DHCP server provides lots of information to the
corresponding host. DHCP uses port numbers 67 and 68.
FTP: FTP stands for File Transfer Protocol. This protocol helps to transfer
different files from one device to another. FTP promotes sharing of files via
remote computer devices with reliable, efficient data transfer. FTP uses port
number 20 for data access and port number 21 for data control.
SMTP: SMTP stands for Simple Mail Transfer Protocol. It is used to transfer
electronic mail from one user to another user. SMTP is used by end users to
send emails with ease. SMTP uses port numbers 25 and 587.
HTTP: HTTP stands for Hyper Text Transfer Protocol. It is the foundation of
the World Wide Web (WWW). HTTP works on the client server model. This
protocol is used for transmitting hypermedia documents like HTML. This
protocol was designed particularly for the communications between the web
browsers and web servers, but this protocol can also be used for several
other purposes. HTTP is a stateless protocol (network protocol in which a
client sends requests to server and server responses back as per the given
state), which means the server is not responsible for maintaining the
previous client’s requests. HTTP uses port number 80.
NFS: NFS stands for Network File System. This protocol allows remote
hosts to mount files over a network and interact with those file systems as
though they are mounted locally. NFS uses the port number 2049.
SNMP: SNMP stands for Simple Network Management Protocol. This
protocol gathers data by polling the devices from the network to the
management station at fixed or random intervals, requiring them to disclose
certain information. SNMP uses port numbers 161 (TCP) and 162 (UDP).
Network Layer
The network Layer is the third layer in the OSI model of computer networks. Its
main function is to transfer network packets from the source to the destination.
It is involved both the source host and the destination host. At the source, it
accepts a packet from the transport layer, encapsulates it in a datagram, and
then delivers the packet to the data link layer so that it can further be sent to the
receiver. At the destination, the datagram is decapsulated, and the packet is
extracted and delivered to the corresponding transport layer.
2. Routing
Routing is the process of moving data from one device to another device.
These are two other services offered by the network layer. In a network, there
are a number of routes available from the source to the destination. The
network layer specifies some strategies which find out the best possible route.
This process is referred to as routing. There are a number of routing protocols
that are used in this process and they should be run to help the routers
coordinate with each other and help in establishing communication throughout
the network.
Routing
3. Forwarding
3. Congestion Control
Congestion occurs when the number of datagrams sent by the source is beyond
the capacity of the network or routers. This is another issue in the network layer
protocol. If congestion continues, sometimes a situation may arrive where the
system collapses and no datagrams are delivered. Although congestion
control is indirectly implemented in the network layer, still there is a lack of
congestion control in the network layer.
Advantages of Network Layer Services
Packetization service in the network layer provides ease of transportation of
the data packets.
Packetization also eliminates single points of failure in data communication
systems.
Routers present in the network layer reduce network traffic by creating
collision and broadcast domains.
With the help of Forwarding, data packets are transferred from one place to
another in the network.
Disadvantages of Network Layer Services
There is a lack of flow control in the design of the network layer.
Congestion occurs sometimes due to the presence of too many datagrams
in a network that is beyond the capacity of the network or the routers. Due to
this, some routers may drop some of the datagrams, and some important
pieces of information may be lost.
Although indirect error control is present in the network layer, there is a lack
of proper error control mechanisms as due to the presence of fragmented
data packets, error control becomes difficult to implement.
Transport Layer
The transport Layer is the second layer in the TCP/IP model and the fourth
layer in the OSI model. It is an end-to-end layer used to deliver messages to a
host. It is termed an end-to-end layer because it provides a point-to-point
connection rather than hop-to-hop, between the source host and destination
host to deliver the services reliably. The unit of data encapsulation in the
Transport Layer is a segment.
Working of Transport Layer
The transport layer takes services from the Application layer and provides
services to the Network layer.
At the sender’s side: The transport layer receives data (message) from the
Application layer and then performs Segmentation, divides the actual message
into segments, adds the source and destination’s port numbers into the header
of the segment, and transfers the message to the Network layer.
At the receiver’s side: The transport layer receives data from the Network
layer, reassembles the segmented data, reads its header, identifies the port
number, and forwards the message to the appropriate port in the Application
layer
Responsibilities of a Transport Layer
The Process to Process Delivery
End-to-End Connection between Hosts
Multiplexing and Demultiplexing
Congestion Control
Data integrity and Error correction
Flow control
1. The Process to Process Delivery
While Data Link Layer requires the MAC address (48 bits address contained
inside the Network Interface Card of every host machine) of source-destination
hosts to correctly deliver a frame and the Network layer requires the IP address
for appropriate routing of packets, in a similar way Transport Layer requires a
Port number to correctly deliver the segments of data to the correct process
amongst the multiple processes running on a particular host. A port number is a
16-bit address used to identify any client-server program uniquely.
Process to Process Delivery
4. Congestion Control
Congestion is a situation in which too many sources over a network attempt to
send data and the router buffers start overflowing due to which loss of packets
occurs. As a result, the retransmission of packets from the sources increases
the congestion further. In this situation, the Transport layer provides Congestion
Control in different ways. It uses open-loop congestion control to prevent
congestion and closed-loop congestion control to remove the congestion in a
network once it occurred. TCP provides AIMD – additive increases
multiplicative decrease and leaky bucket technique for congestion control.
s
Leaky Bucket Congestion Control Technique
6. Flow Control
The transport layer provides a flow control mechanism between the adjacent
layers of the TCP/IP model. TCP also prevents data loss due to a fast sender
and slow receiver by imposing some flow control techniques. It uses the method
of sliding window protocol which is accomplished by the receiver by sending a
window back to the sender informing the size of data it can receive.
The diagramma tic comparison of the TCP/IP and OSI model is as follows:
TCP/IP and OSI
1. Physical Layer
It is a group of applications requiring network communications. This layer is
responsible for generating the data and requesting connections. It acts on
behalf of the sender and the Network Access layer on the behalf of the receiver.
During this article, we will be talking on the behalf of the receiver.
2. Data Link Layer
The packet’s network protocol type, in this case, TCP/IP, is identified by the
data-link layer. Error prevention and “framing” are also provided by the data-link
layer. Point-to-Point Protocol (PPP) framing and Ethernet IEEE 802.2 framing
are two examples of data-link layer protocols.
3. Internet Layer
This layer parallels the functions of OSI’s Network layer. It defines the protocols
which are responsible for the logical transmission of data over the entire
network. The main protocols residing at this layer are as follows:
IP: IP stands for Internet Protocol and it is responsible for delivering packets
from the source host to the destination host by looking at the IP addresses in
the packet headers. IP has 2 versions: IPv4 and IPv6. IPv4 is the one that
most websites are using currently. But IPv6 is growing as the number of IPv4
addresses is limited in number when compared to the number of users.
ICMP: ICMP stands for Internet Control Message Protocol. It is
encapsulated within IP datagrams and is responsible for providing hosts with
information about network problems.
ARP: ARP stands for Address Resolution Protocol. Its job is to find the
hardware address of a host from a known IP address. ARP has several
types: Reverse ARP, Proxy ARP, Gratuitous ARP, and Inverse ARP.
The Internet Layer is a layer in the Internet Protocol (IP) suite, which is the set
of protocols that define the Internet. The Internet Layer is responsible for routing
packets of data from one device to another across a network. It does this by
assigning each device a unique IP address, which is used to identify the device
and determine the route that packets should take to reach it.
Example: Imagine that you are using a computer to send an email to a friend.
When you click “send,” the email is broken down into smaller packets of data,
which are then sent to the Internet Layer for routing. The Internet Layer assigns
an IP address to each packet and uses routing tables to determine the best
route for the packet to take to reach its destination. The packet is then
forwarded to the next hop on its route until it reaches its destination. When all of
the packets have been delivered, your friend’s computer can reassemble them
into the original email message.
In this example, the Internet Layer plays a crucial role in delivering the email
from your computer to your friend’s computer. It uses IP addresses and routing
tables to determine the best route for the packets to take, and it ensures that
the packets are delivered to the correct destination. Without the Internet Layer,
it would not be possible to send data across the Internet.
4. Transport Layer
The TCP/IP transport layer protocols exchange data receipt acknowledgments
and retransmit missing packets to ensure that packets arrive in order and
without error. End-to-end communication is referred to as such. Transmission
Control Protocol (TCP) and User Datagram Protocol are transport layer
protocols at this level (UDP).
TCP: Applications can interact with one another using TCP as though they
were physically connected by a circuit. TCP transmits data in a way that
resembles character-by-character transmission rather than separate
packets. A starting point that establishes the connection, the whole
transmission in byte order, and an ending point that closes the connection
make up this transmission.
UDP: The datagram delivery service is provided by UDP, the other transport
layer protocol. Connections between receiving and sending hosts are not
verified by UDP. Applications that transport little amounts of data use UDP
rather than TCP because it eliminates the processes of establishing and
validating connections.
5. Application Layer
This layer is analogous to the transport layer of the OSI model. It is responsible
for end-to-end communication and error-free delivery of data. It shields the
upper-layer applications from the complexities of data. The three main protocols
present in this layer are:
HTTP and HTTPS: HTTP stands for Hypertext transfer protocol. It is used
by the World Wide Web to manage communications between web browsers
and servers. HTTPS stands for HTTP-Secure. It is a combination of HTTP
with SSL(Secure Socket Layer). It is efficient in cases where the browser
needs to fill out forms, sign in, authenticate, and carry out bank transactions.
SSH: SSH stands for Secure Shell. It is a terminal emulations software
similar to Telnet. The reason SSH is preferred is because of its ability to
maintain the encrypted connection. It sets up a secure session over a
TCP/IP connection.
NTP: NTP stands for Network Time Protocol. It is used to synchronize the
clocks on our computer to one standard time source. It is very useful in
situations like bank transactions. Assume the following situation without the
presence of NTP. Suppose you carry out a transaction, where your computer
reads the time at 2:30 PM while the server records it at 2:28 PM. The server
can crash very badly if it’s out of sync.
The host-to-host layer is a layer in the OSI (Open Systems Interconnection)
model that is responsible for providing communication between hosts
(computers or other devices) on a network. It is also known as the transport
layer.
Some common use cases for the host-to-host layer include:
1. Reliable Data Transfer: The host-to-host layer ensures that data is
transferred reliably between hosts by using techniques like error correction
and flow control. For example, if a packet of data is lost during transmission,
the host-to-host layer can request that the packet be retransmitted to ensure
that all data is received correctly.
2. Segmentation and Reassembly: The host-to-host layer is responsible for
breaking up large blocks of data into smaller segments that can be
transmitted over the network, and then reassembling the data at the
destination. This allows data to be transmitted more efficiently and helps to
avoid overloading the network.
3. Multiplexing and Demultiplexing: The host-to-host layer is responsible for
multiplexing data from multiple sources onto a single network connection,
and then demultiplexing the data at the destination. This allows multiple
devices to share the same network connection and helps to improve the
utilization of the network.
4. End-to-End Communication: The host-to-host layer provides a connection-
oriented service that allows hosts to communicate with each other end-to-
end, without the need for intermediate devices to be involved in the
communication.
Example: Consider a network with two hosts, A and B. Host A wants to send a
file to host B. The host-to-host layer in host A will break the file into smaller
segments, add error correction and flow control information, and then transmit
the segments over the network to host B. The host-to-host layer in host B will
receive the segments, check for errors, and reassemble the file. Once the file
has been transferred successfully, the host-to-host layer in host B will
acknowledge receipt of the file to host A.
In this example, the host-to-host layer is responsible for providing a reliable
connection between host A and host B, breaking the file into smaller segments,
and reassembling the segments at the destination. It is also responsible for
multiplexing and demultiplexing the data and providing end-to-end
communication between the two hosts.
Other Common Internet Protocols
TCP/IP Model covers many Internet Protocols. The main rule of these Internet
Protocols is how the data is validated and sent over the Internet. Some
Common Internet Protocols include:
HTTP (Hypertext Transfer Protocol): HTTP takes care of Web Browsers
and Websites.
FTP (File Transfer Protocol): FTP takes care of how the file is to be sent
over the Internet.
SMTP (Simple Mail Transfer Protocol): SMTP is used to send and receive
data.
Difference between TCP/IP and OSI Model
TCP/IP OSI
Basics of Packet
A packet is the unit of data that is routed between an origin of computer or device to another on
the Internet or any other packet-switched network. When any file (e-mail message, HTML file,
Graphics Interchange Format file, Uniform Resource Locator request, and so forth) is sent from
one place of network to another place of network on the Internet, the Transmission
Control Protocol (TCP) layer of TCP/IP of network.
What is in a packet?
Divides the file into “chunks” of an efficient size for routing. Each of these packets is
separately numbered, data size, and other useful information and includes the Internet
address of the destination. The individual packets for a given file may travel different
routes through the Internet. When they have all arrived, they are reassembled into the
original file (by the TCP layer at the receiving end).
A packet-switching scheme is an efficient way to handle transmissions on a
connectionless networking such as the Internet. An alternative scheme, circuit-
switched, is used for networks allocated for voice connections. In circuit-switching,
lines in the network are shared among many users as with packet-switching, but each
connection requires the dedication of a particular path for the duration of the
connection.
Structure of a Data Packet
The structure of a Data Packet depends on the protocol it used. The header section of
packet keeps overhead information, the service, and other transmission related data.
• Source address: which is the IP address of sender.
• Destination address: which is the IP address of recipient.
• Sequence number: A packet number that puts in order such that when they are reassembled
on the destination.
Circuit Switching in Computer Network
In circuit switching network resources (bandwidth) are divided into pieces and
bit delay is constant during a connection. The dedicated path/circuit established
between sender and receiver provides a guaranteed data rate. Data can be
transmitted without any delays once the circuit is established.
Telephone system network is one of the example of Circuit switching. TDM
(Time Division Multiplexing) and FDM (Frequency Division
Multiplexing) are two methods of multiplexing multiple signals into a single
carrier.
drawbacks:
drawbacks:
Advantages:
⇢ Better performance at a higher data rate in comparison to UTP
⇢ Eliminates crosstalk
⇢ Comparatively faster
Disadvantages:
⇢ Comparatively difficult to install and manufacture
⇢ More expensive
⇢ Bulky
Applications:
The shielded twisted pair type of cable is most frequently used in extremely cold
climates, where the additional layer of outer covering makes it perfect for
withstanding such temperatures or for shielding the interior components.
(ii) Coaxial Cable –
It has an outer plastic covering containing an insulation layer made of PVC or
Teflon and 2 parallel conductors each having a separate insulated protection
cover. The coaxial cable transmits information in two modes: Baseband
mode(dedicated cable bandwidth) and Broadband mode(cable bandwidth is
split into separate ranges). Cable TVs and analog television networks widely
use Coaxial cables.
Advantages:
High Bandwidth
Better noise Immunity
Easy to install and expand
Inexpensive
Disadvantages:
Single cable failure can disrupt the entire network
Applications:
Radio frequency signals are sent over coaxial wire. It can be used for cable
television signal distribution, digital audio (S/PDIF), computer network
connections (like Ethernet), and feedlines that connect radio transmitters and
receivers to their antennas.
(iii) Optical Fiber Cable –
It uses the concept of refraction of light through a core made up of glass or
plastic. The core is surrounded by a less dense glass or plastic covering called
the cladding. It is used for the transmission of large volumes of data.
The cable can be unidirectional or bidirectional. The WDM (Wavelength Division
Multiplexer) supports two modes, namely unidirectional and bidirectional mode.
Advantages:
Increased capacity and bandwidth
Lightweight
Less signal attenuation
Immunity to electromagnetic interference
Resistance to corrosive materials
Disadvantages:
Difficult to install and maintain
High cost
Fragile
Applications:
Medical Purpose: Used in several types of medical instruments.
Defence Purpose: Used in transmission of data in aerospace.
For Communication: This is largely used in formation of internet cables.
Industrial Purpose: Used for lighting purposes and safety measures in
designing the interior and exterior of automobiles.
(iv) Stripline
Stripline is a transverse electromagnetic (TEM) transmission line medium
invented by Robert M. Barrett of the Air Force Cambridge Research Centre in
the 1950s. Stripline is the earliest form of the planar transmission line. It uses a
conducting material to transmit high-frequency waves it is also called a
waveguide. This conducting material is sandwiched between two layers of the
ground plane which are usually shorted to provide EMI immunity.
(v) Microstripline
In this, the conducting material is separated from the ground plane by a layer of
dielectric.
2. Unguided Media:
It is also referred to as Wireless or Unbounded transmission media. No physical
medium is required for the transmission of electromagnetic signals.
Features:
The signal is broadcasted through air
Less Secure
Used for larger distances
There are 3 types of Signals transmitted through unguided media:
(i) Radio waves –
These are easy to generate and can penetrate through buildings. The sending
and receiving antennas need not be aligned. Frequency Range:3KHz – 1GHz.
AM and FM radios and cordless phones use Radio waves for transmission.
Microwave Transmission
(iii) Infrared –
Infrared waves are used for very short distance communication. They cannot
penetrate through obstacles. This prevents interference between systems.
Frequency Range:300GHz – 400THz. It is used in TV remotes, wireless mouse,
keyboard, printer, etc.