CN - Module 1 - Subsection 1
CN - Module 1 - Subsection 1
Module 1-Subsection-1
Introduction
By
❑ Normally refer to the first as a switched WAN and to the second as a point-
to-point WAN.
❑ The switched WAN connects the end systems, which usually comprise a router
(internetworking connecting device) that connects to another LAN or WAN.
❑ The point-to-point WAN is normally a line leased from a telephone or cable
TV provider that connects a home computer or a small LAN to an Internet
service provider (lSP).This type of WAN is often used to provide Internet access.
DATA COMMUNICATIONS Cont...
Metropolitan Area Networks
❑A metropolitan area network (MAN) is a network with a size between a
LAN and a WAN.
❑ It normally covers the area inside a town or a city.
❑ It is designed for customers who need a high-speed connectivity, normally
to the Internet, and have endpoints spread over a city or part of city.
❑ A good example of a MAN is the part of the telephone company network
that can provide a high-speed to the customer.
❑ Another example is the cable TV network that originally was designed for
cable TV
Network Architecture
ISO-OSI Reference Model
❑ OSI stands for Open Systems Interconnection. It has been developed by
ISO – ‘International Organization for Standardization‘, in the year 1984.
❑ It is a 7 layer architecture with each layer having specific functionality to
perform.
❑ Allthese 7 layers work collaboratively to transmit the data from one person to
another across the globe.
Network Architecture Cont...
1. Physical Layer (Layer 1) : The lowest layer of the OSI reference model is
the physical layer.
❑It is responsible for the actual physical connection between the devices. The
physical layer contains information in the form of bits.
❑ It is responsible for transmitting individual bits from one node to the next.
When receiving data, this layer will get the signal received and convert it into 0s
and 1s and send them to the Data Link layer, which will put the frame back
together.
Note: The physical layer is responsible for movements of individual bits from one
hop (node) to the next.
Network Architecture Cont...
The functions of the physical layer are as follows:
❖Bit synchronization: The physical layer provides the synchronization of
the bits by providing a clock. This clock controls both sender and receiver thus
providing synchronization at bit level.
❖ Bit rate control: The Physical layer also defines the transmission rate i.e.
the number of bits sent per second.
❖ Physical topologies: Physical layer specifies the way in which the different,
devices/nodes are arranged in a network i.e. bus, star, or mesh topology.
❖ Transmission mode: Physical layer also defines the way in which the data
flows between the two connected devices. The various transmission modes
possible are Simplex, half-duplex and full-duplex.
2. Data Link Layer (DLL) (Layer 2) :
❑ The data link layer is responsible for the node-to-node delivery of the message.
❑ The main function of this layer is to make sure data transfer is error-
free from one node to another, over the physical layer.
❑When a packet arrives in a network, it is the responsibility of DLL to transmit it
to the Host using its MAC address. Data Link Layer is divided into two
sublayers:
a) Logical Link Control (LLC) b) Media Access Control (MAC)
Network Architecture Cont...
Note: The data link layer is responsible for moving frames from one hop
(node) to the next.
❑The packet received from the Network layer is further divided into frames
depending on the frame size of NIC(Network Interface Card).
❑DLL also encapsulates Sender and Receiver’s MAC address in the header.
❑The Receiver’s MAC address is obtained by placing an ARP(Address Resolution
Protocol) request onto the wire asking “Who has that IP address?” and the
destination host will reply with its MAC address.
The functions of the Data Link layer are :
❖Framing: Framing is a function of the data link layer. It provides a way for a
sender to transmit a set of bits that are meaningful to the receiver. This can be
accomplished by attaching special bit patterns to the beginning and end of the
frame.
Network Architecture Cont...
❖2. Physical addressing: After creating frames, the Data link layer adds
physical addresses (MAC address) of the sender and/or receiver in the
header of each frame.
❖3. Error control: Data link layer provides the mechanism of error control in
which it detects and retransmits damaged or lost frames.
❖4. Flow Control: The data rate (frequency) must be constant on both sides
else the data may get corrupted thus, flow control coordinates the amount of
data that can be sent before receiving acknowledgement.
❖5. Access control: When a single communication channel is shared by
multiple devices, the MAC sub-layer of the data link layer helps to determine
which device has control over the channel at a given time.
3. Network Layer (Layer 3) :
❑The network layer works for the transmission of data from one host to
the other located in different networks.
❑ It also takes care of packet routing i.e. selection of the shortest path to
transmit the packet, from the number of routes available.
❑The sender & receiver’s IP addresses are placed in the header by the network
layer.
Network Architecture Cont...
Note: The network layer is responsible for the delivery of individual packets from
the source host to the destination host.
The functions of the Network layer are :
❖Routing: The network layer protocols determine which route is suitable from
source to destination.This function of the network layer is known as routing.
❖Logical Addressing: In order to identify each device on internetwork
uniquely, the network layer defines an addressing scheme.
-The sender & receiver’s IP addresses are placed in the header by the
network layer.
- Such an address distinguishes each device uniquely and universally.
Network Architecture Cont...
4.Transport Layer (Layer 4) :
❑ The transport layer provides services to the application layer and takes
services from the network layer.
❑ The data in the transport layer is referred to as Segments. It is responsible for
the End to End Delivery of the complete message.
❑ The transport layer also provides the acknowledgement of the
successful data transmission and re-transmits the data if an error is
found.
❑ At sender’s side: Transport layer receives the formatted data from the upper
layers, performs Segmentation, and also implements Flow & Error control to
ensure proper data transmission. It also adds Source and Destination port
numbers in its header and forwards the segmented data to the Network Layer.
Note: The sender needs to know the port number associated with the receiver’s
application.
❑ Generally, this destination port number is configured, either by default
or manually.
❑ For example, when a web application makes a request to a web server, it typically
uses port number 80, because this is the default port assigned to web applications.
Many applications have default ports assigned.
Network Architecture Cont...
❑ At receiver’s side: Transport Layer reads the port number from its header
and forwards the Data which it has received to the respective application. It also
performs sequencing and reassembling of the segmented data.
Note: The transport layer is responsible for the delivery of a message from one
process to another.
The functions of the transport layer are as follows:
❖ Segmentation and Reassembly: This layer accepts the message from the
(session) layer, and breaks the message into smaller units. Each of the segments
produced has a header associated with it. The transport layer at the
destination station reassembles the message.
Network Architecture Cont...
❖Service Point Addressing: In order to deliver the message to the correct
process, the transport layer header includes a type of address called service point
address or port address. Thus by specifying this address, the transport layer
makes sure that the message is delivered to the correct process.
The services provided by the transport layer :
A. Connection-Oriented Service: It is a three-phase process that includes
– Connection Establishment
– Data Transfer
– Termination / disconnection
❑ In this type of transmission, the receiving device sends an
acknowledgement, back to the source after a packet or group of
packets is received.
❑ This type of transmission is reliable and secure.
B. Connectionless service: It is a one-phase process and includes Data
Transfer. In this type of transmission, the receiver does not acknowledge
receipt of a packet.
- This approach allows for much faster communication between devices.
- Connection-oriented service is more reliable than connectionless Service.
* Data in the Transport Layer is called as Segments.
Network Architecture Cont...
** Transport layer is operated by the Operating System. It is a part of the OS and
communicates with the Application Layer by making system calls.
Transport Layer is called as Heart of OSI model.
5. Session Layer (Layer 5) :
❑ This layer is responsible for the establishment of connection,
maintenance of sessions, authentication, and also ensures security.
Network Architecture Cont...
The functions of the session layer are :
❖Session establishment, maintenance, and termination: The layer allows
the two processes to establish, use and terminate a connection.
❖Synchronization: This layer allows a process to add checkpoints which are
considered synchronization points into the data.
- These synchronization points help to identify the error so that the data
is re-synchronized properly, and ends of the messages are not cut prematurely
and data loss is avoided.
❖Dialog
Controller: The session layer allows two systems to start
communication with each other in half-duplex or full-duplex.
**All the below 3 layers(including Session Layer) are integrated as a single layer in the
TCP/IP model as “Application Layer”.
**Implementation of these 3 layers is done by the network application itself. These are
also known as Upper Layers or Software Layers.
Network Architecture Cont...
Scenario:
Let us consider a scenario where a user wants to send a message through some
Messenger application running in his browser. The “Messenger” here acts as the
application layer which provides the user with an interface to create the data. This
message or so-called Data is compressed, encrypted (if any secure data), and converted
into bits (0’s and 1’s) so that it can be transmitted.
OSI model acts as a reference model and is not implemented on the Internet because
of its late invention. The current model being used is the TCP/IP model.
Network Architecture Cont...
OSI model in a nutshell
Network Architecture Cont...
TCP/IP PROTOCOL (Transmission Control Protocol/Internet
Protocol) SUITE
❑The TCPIIP protocol suite was developed prior to the OSI model. Therefore,
the layers in the TCP/IP protocol suite do not exactly match those in the OSI
model.
❑ Theoriginal TCP/IP protocol suite was defined as having four layers: host-to-
network, internet, transport, and application.
Network Architecture Cont...
❑TCP/IP is a hierarchical protocol made up of interactive modules, each of which
provides a specific functionality; however, the modules are not necessarily
interdependent.
❑ Whereas the OSI model specifies which functions belong to each of its layers,
the layers of the TCP/IP protocol suite contain relatively independent protocols that can
be mixed and matched depending on the needs of the system.
❑ The term hierarchical means that each upper-level protocol is supported by one
or more lower-level protocols.
❑ At the transport layer, TCP/IP defines three protocols: Transmission Control
Protocol (TCP), User Datagram Protocol (UDP), and Stream Control
Transmission Protocol (SCTP).
❑ At the network layer, the main protocol defined by TCP/IP is the
Internetworking Protocol (IP); there are also some other protocols that
support data movement in this layer.
Network Architecture Cont...
1. Physical and Data Link Layers
❑ At the physical and data link layers, TCPIIP does not define any specific protocol. It
supports all the standard and proprietary protocols. A network in a TCPIIP
internetwork can be a local-area network or a wide-area network.
Network Architecture Cont...
2. Network Layer
❑ At the network layer (or, more accurately, the internetwork layer), TCP/IP
supports the Internetworking Protocol.
❑ The primary component of the Internet layer is the Internet Protocol
(IP).Many of the TCP/IP routing protocols are also classified as part of the
Internet layer such as ARP (Address Resolution Protocol), RARP (Reverse
Address Resolution Protocol).
Internetworking Protocol (IP)
-The Internetworking Protocol (IP) is the transmission mechanism used by the
TCP/IP protocols.
-It is an unreliable and connectionless protocol-a best-effort delivery service.
-The term best effort means that IP provides no error checking or tracking.
- IP assumes the unreliability of the underlying layers and does its best to get a
transmission through to its destination, but with no guarantees.
-IP transports data in packets called datagrams, each of which is transported
separately.
-Datagrams can travel along different routes and can arrive out of sequence or
be duplicated.
Network Architecture Cont...
❑IP does not keep track of the routes and has no facility for reordering
datagrams once they arrive at their destination.
❑The limited functionality of IP should not be considered a weakness, however. IP
provides bare-bones transmission functions that free the user to add only those
facilities necessary for a given application and thereby allows for maximum
efficiency.
Address Resolution Protocol
-The Address Resolution Protocol (ARP) is used to associate a logical address
with a physical address.
-On a typical physical network, such as a LAN, each device on a link is identified
by a physical or station address, usually imprinted on the network interface card
(NIC).
- ARPis used to find the physical address of the node when its Internet address is
known.
Reverse Address Resolution Protocol
-The Reverse Address Resolution Protocol (RARP) allows a host to discover its
Internet address when it knows only its physical address.
-It is used when a computer is connected to a network for the first time
or when a diskless computer is booted.
Network Architecture Cont...
3.Transport Layer
❑ Traditionally the transport layer was represented in TCP/IP by two protocols: TCP
and UDP.
❑ IP is a host-to-host protocol, meaning that it can deliver a packet from one
physical device to another.
❑UDP and TCP are transport level protocols responsible for delivery of a
message from a process (running program) to another process.
User Datagram Protocol
-The User Datagram Protocol (UDP) is the simpler of the two standard
TCPIIP transport protocols.
-It is a process-to-process protocol that adds only port addresses, checksum
error control, and length information to the data from the upper layer.
Transmission Control Protocol
-The Transmission Control Protocol (TCP) provides full transport-layer services
to applications.TCP is a reliable stream transport protocol.
-The term stream, in this context, means connection-oriented: A connection must
be established between both ends of a transmission before either can transmit
data.
Network Architecture Cont...
-Atthe sending end of each transmission, TCP divides a stream of data into
smaller units called segments.
-Each segment includes a sequence number for reordering after receipt, together
with an acknowledgment number for the segments received.
- Segments are carried across the internet inside of IP datagrams.
- At the receiving end, TCP collects each datagram as it comes in and reorders
the transmission based on sequence numbers.
4. Application Layer
❑The application layer in TCPIIP is equivalent to the combined session,
presentation, and application layers in the OSI model.
❑ Many protocols are defined at this layer.
Network Architecture Cont...
Network Architecture Cont...
Similarities between the TCP/IP and OSI models
❖Both the models are based upon layered structuring.
❖In both models, data are mainly used to convert raw data into packets and
help them reach their destination node.
❖In both models, protocols are defined in a layer-wise manner.
❖The layers in the models are compared with each other. The physical layer and
the data link layer of the OSI model correspond to the link layer of the TCP/IP
model.
❖The session layer, the presentation layer and the application layer of the OSI
model together form the application layer of the TCP/IP model.
❖The network layers and the transport layers are the same in both models.
Thank You