Dcns-Unit 1
Dcns-Unit 1
INTRODUCTION TO NETWORKS
A network is a set of devices (often referred to as nodes) connected by
communication links.
A node can be a computer, printer, or any other device capable of sending or
receiving data generated by other nodes on the network.
When we communicate, we are sharing information. This sharing can be local or
remote.
CHARACTERISTICS OF A NETWORK
The effectiveness of a network depends on three characteristics.
Factors that affect the Factors that affect the Factors that affect the
Performance of a network: Reliability of a network: Security of a network:
1
23AD1502 DATA COMMUNICATION AND NETWORK SECURITY
TRANSMISSION MODES
o The way in which data is transmitted from one device to another device is known as
transmission mode.
o The transmission mode is also known as the communication mode.
o Each communication channel has a direction associated with it, and transmission media
provide the direction. Therefore, the transmission mode is also known as a directional
mode.
o The transmission mode is defined in the physical layer.
o Simplex Mode
o Half-duplex Mode
o Full-duplex mode (Duplex Mode)
2
23AD1502 DATA COMMUNICATION AND NETWORK SECURITY
SIMPLEX MODE
o In Simplex mode, the communication is unidirectional, i.e., the data flow in one
direction.
o A device can only send the data but cannot receive it or it can receive the data but
cannot send the data.
o This transmission mode is not very popular as mainly communications require the two-
way exchange of data. The simplex mode is used in the business field as in sales that do
not require any corresponding reply.
o The radio station is a simplex channel as it transmits the signal to the listeners but never
allows them to transmit back.
o Keyboard and Monitor are the examples of the simplex mode as a keyboard can only
accept the data from the user and monitor can only be used to display the data on the
screen.
o The main advantage of the simplex mode is that the full capacity of the
communication channel can be utilized during transmission.
HALF-DUPLEX MODE
o In a Half-duplex channel, direction can be reversed, i.e., the station can transmit and
receive the data as well.
o Messages flow in both the directions, but not at the same time.
o The entire bandwidth of the communication channel is utilized in one direction at a
time.
o In half-duplex mode, it is possible to perform the error detection, and if any error
occurs, then the receiver requests the sender to retransmit the data.
3
23AD1502 DATA COMMUNICATION AND NETWORK SECURITY
o A Walkie-talkie is an example of the Half-duplex mode.
o In Walkie-talkie, one party speaks, and another party listens. After a pause, the other
speaks and first party listens. Speaking simultaneously will create the distorted sound
which cannot be understood.
FULL-DUPLEX MODE
o In Full duplex mode, the communication is bi-directional, i.e., the data flow in both
the directions.
o Both the stations can send and receive the message simultaneously.
o Full-duplex mode has two simplex channels. One channel has traffic moving in one
direction, and another channel has traffic flowing in the opposite direction.
o The Full-duplex mode is the fastest mode of communication between devices.
o The most common example of the full-duplex mode is a Telephone network. When
two people are communicating with each other by a telephone line, both can talk and
listen at the same time.
4
23AD1502 DATA COMMUNICATION AND NETWORK SECURITY
COMPARISON - SIMPLEX, HALF-DUPLEX AND FULL-DUPLEX MODE
Send/Receive A device can only Both the devices can Both the devices
send the data but send and receive the can send and
cannot receive it or data, but one at a receive the data
it can only receive time. simultaneously.
the data but cannot
send it.
Line configuration refers to the way two or more communication devices attach to a link. A
link is a communications pathway that transfers data from one device to another. There are two
possible line configurations:
i. Point to Point (PPP): Provides a dedicated Communication link between two devices.
It is simple to establish. The most common example for Point-to-Point connection is a
computer connected by telephone line. We can connect the two devices by means of a
pair of wires or using a microwave or satellite link.
ii. MultiPoint : It is also called Multidrop configuration. In this connection two or more
devices share a single link. There are two kinds of Multipoint Connections.
Temporal (Time) Sharing: If users must take turns using the link , then
5
23AD1502 DATA COMMUNICATION AND NETWORK SECURITY
its called Temporally shared or Time Shared Line Configuration.
NETWORK TOPOLOGY
Two or more devices connect to a link. Two or more links form a topology. Topology is
defined as
BUS TOPOLOGY
Bus topology is a network type in which every computer and network device is
connected to single cable.
The long single cable acts as a backbone to link all the devices in a network.
When it has exactly two endpoints, then it is called Linear Bus topology.
It transmits data only in one direction.
6
23AD1502 DATA COMMUNICATION AND NETWORK SECURITY
RING TOPOLOGY
In a ring topology, each device has a dedicated point-to-point connection with only
the two devices on either side of it.
A signal is passed along the ring in one direction, from device to device, until it
reaches its destination.
Each device in the ring incorporates a repeater.
When a device receives a signal intended for another device, its repeater
regenerates the bits and passes them along.
TREE TOPOLOGY
It has a root node and all other nodes are connected to it forming a hierarchy.
It is also called hierarchical topology.
It should at least have three levels to the hierarchy.
7
23AD1502 DATA COMMUNICATION AND NETWORK SECURITY
Tree topology is ideal if workstations are located in groups.
They are used in Wide Area Network.
STAR TOPOLOGY
MESH TOPOLOGY
In a mesh topology, every device has a dedicated point-to-point link to every other
device.
The term dedicated means that the link carries traffic only between the two
devices it connects.
The number of physical links in a fully connected mesh network with n nodes is given
by n (n – 1) / 2.
HYBRID TOPOLOGY
9
23AD1502 DATA COMMUNICATION AND NETWORK SECURITY
NETWORK TYPES
A computer network is a group of computers linked to each other that enables the
computer to communicate with another computer and share their resources, data, and
applications.
A computer network can be categorized by their size.
A computer network is mainly of three types:
1. Local Area Network (LAN)
2. Wide Area Network (WAN)
3. Metropolitan Area Network (MAN)
10
23AD1502 DATA COMMUNICATION AND NETWORK SECURITY
o It is less costly as it is built with inexpensive hardware such as hubs, network
adapters, and ethernet cables.
o The data is transferred at an extremely faster rate in Local Area Network.
o LAN can be connected using a common cable or a Switch.
o A Wide Area Network is not limited to a single location, but it spans over a large
geographical area through a telephone line, fibre optic cable or satellite links.
o The internet is one of the biggest WAN in the world.
o A Wide Area Network is widely used in the field of Business, government, and
education.
o WAN can be either a point-to-point WAN or Switched WAN.
11
23AD1502 DATA COMMUNICATION AND NETWORK SECURITY
Point-to-point WAN Switched WAN
o Communication medium used for MAN are optical fibers, cables etc.
o It has a higher range than Local Area Network(LAN).It is adequate for distributed
computing applications.
INTERNETWORK
Types of Internetwork
Extranet Intranet
An extranet is used for information sharing.
The access to the extranet is restricted to only An intranet belongs to an organization which
those users who have login credentials. An is only accessible by the
extranet is the lowest level of internetworking. organization's employee or members. The
It can be categorized as MAN, WAN or other main aim of the intranet is to share the
computer networks. An extranet cannot have a information and resources among the
single LAN, atleast it must have one organization employees. An intranet provides
connection to the external network. the facility to work in groups and for
teleconferences.
TRANSMISSION MEDIA
o Transmission media is a communication channel that carries the information from the
sender to the receiver.
o Data is transmitted through the electromagnetic signals.
o The main functionality of the transmission media is to carry the information in the
form of bits (Either as Electrical signals or Light pulses).
o It is a physical path between transmitter and receiver in data communication.
o The characteristics and quality of data transmission are determined by the
characteristics of medium and signal.
o Transmission media is of two types : Guided Media (Wired) and UnGuided Media
(wireless).
13
23AD1502 DATA COMMUNICATION AND NETWORK SECURITY
o In guided (wired) media, medium characteristics are more important whereas, in
unguided (wireless) media, signal characteristics are more important.
o Different transmission media have different properties such as bandwidth, delay, cost
and ease of installation and maintenance.
o The transmission media is available in the lowest layer of the OSI reference
model, i.e., Physical layer.
o Attenuation: Attenuation means the loss of energy, i.e., the strength of the signal
decreases with increasing the distance which causes the loss of energy.
o Distortion: Distortion occurs when there is a change in the shape of the signal. This
type of distortion is examined from different signals having different frequencies. Each
frequency component has its own propagation speed, so they reach at a different time
which leads to the delay distortion.
o Noise: When data is travelled over a transmission medium, some unwanted signal is
added to it which creates the noise.
14
23AD1502 DATA COMMUNICATION AND NETWORK SECURITY
TYPES / CLASSES OF TRANSMISSION MEDIA
GUIDED MEDIA
It is defined as the physical medium through which the signals are transmitted.
It is also known as Bounded media.
Types of Guided media: Twisted Pair Cable, Coaxial Cable , Fibre Optic Cable
Twisted pair is a physical media made up of a pair of cables twisted with each other.
A twisted pair cable is cheap as compared to other transmission media.
Installation of the twisted pair cable is easy, and it is a lightweight cable.
The frequency range for twisted pair cable is from 0 to 3.5KHz.
A twisted pair consists of two insulated copper wires arranged in a regular spiral
pattern.
15
23AD1502 DATA COMMUNICATION AND NETWORK SECURITY
o Category 2: It can support upto 4Mbps.
o Category 3: It can support upto 16Mbps.
o Category 4: It can support upto 20Mbps.
o Category 5: It can support upto 200Mbps.
o
Advantages :
o It is cheap.
o Installation of the unshielded twisted pair is easy.
o It can be used for high-speed LAN.
Disadvantage:
o This cable can only be used for shorter distances because of attenuation.
A shielded twisted pair is a cable that contains the mesh surrounding the wire that allows the
higher transmission rate.
Advantages :
o The cost of the shielded twisted pair cable is not very high and not very low.
o Installation of STP is easy.
o It has higher capacity as compared to unshielded twisted pair cable.
o It has a higher attenuation.
o It is shielded that provides the higher data transmission rate.
Disadvantages:
o It is more expensive as compared to UTP and coaxial cable.
o It has a higher attenuation rate.
COAXIAL CABLE
16
23AD1502 DATA COMMUNICATION AND NETWORK SECURITY
o Coaxial cable(Coax) is a very commonly used transmission media, for example, TV
wire is usually a coaxial cable.
o The name of the cable is coaxial as it contains two conductors parallel to each other.
o It has a higher frequency as compared to Twisted pair cable.
o The inner conductor of the coaxial cable is made up of copper, and the outer
conductor is made up of copper mesh.
o The middle core is made up of non-conductive cover that separates the inner
conductor from the outer conductor.
o The middle core is responsible for the data transferring whereas the copper mesh
prevents from the EMI(Electromagnetic interference).
o Common applications of coaxial cable are Cable TV networks and traditional
Ethernet LANs.
17
23AD1502 DATA COMMUNICATION AND NETWORK SECURITY
o It provides higher bandwidth.
18
23AD1502 DATA COMMUNICATION AND NETWORK SECURITY
Disadvantages :
o It is more expensive as compared to twisted pair cable.
o If any fault occurs in the cable causes the failure in the entire network.
o Fibre optic cable is a cable that uses electrical signals for communication.
o Fibre optic is a cable that holds the optical fibres coated in plastic that are used to send
the data by pulses of light.
o The plastic coating protects the optical fibres from heat, cold, electromagnetic
interference from other types of wiring.
o Fibre optics provide faster data transmission than copper wires.
Advantages:
o Greater Bandwidth
o Less signal attenuation
o Immunity to electromagnetic interference
o Resistance to corrosive materials
o Light weight
o Greater immunity to tapping
19
23AD1502 DATA COMMUNICATION AND NETWORK SECURITY
Disadvantages :
o Requires Expertise for Installation and maintenance
o Unidirectional light propagation.
o Higher Cost.
Multimode Propagation
Multimode is so named because multiple beams from a light source move through the
core in different paths.
How these beams move within the cable depends on the structure of the core.
20
23AD1502 DATA COMMUNICATION AND NETWORK SECURITY
Single-Mode Propagation
Single-mode uses step-index fiber and a highly focused source of light that limits beams
to a small range of angles, all close to the horizontal.
The single-mode fiber itself is manufactured with a much smaller diameter than that of
multimode fiber, and with substantially lower density (index of refraction).
The decrease in density results in a critical angle that is close enough to 90° to make the
propagation of beams almost horizontal.
In this case, propagation of different beams is almost identical, and delays are negligible.
All the beams arrive at the destination “together” and can be recombined with little
distortion to the signal.
UNGUIDED MEDIA
o An unguided transmission transmits the electromagnetic waves without using any
physical medium. Therefore it is also known as wireless transmission.
o In unguided media, air is the media through which the electromagnetic energy can
flow easily.
RADIO WAVES
o Radio waves are the electromagnetic waves that are transmitted in all the
directions of free space.
o Radio waves are omnidirectional, i.e., the signals are propagated in all the
directions.
o The range in frequencies of radio waves is from 3Khz to 1Khz.
o In the case of radio waves, the sending and receiving antenna are not aligned, i.e., the
wave sent by the sending antenna can be received by any receiving antenna.
o An example of the radio wave is FM radio.
21
23AD1502 DATA COMMUNICATION AND NETWORK SECURITY
MICROWAVES
Terrestrial Microwave
o Terrestrial Microwave transmission is a technology that transmits the focused beam of a
radio signal from one ground-based microwave transmission antenna to another.
o Microwaves are the electromagnetic waves having the frequency in the range from
1GHz to 1000 GHz.
o Microwaves are unidirectional as the sending and receiving antenna is to be aligned, i.e.,
the waves sent by the sending antenna are narrowly focused.
o In this case, antennas are mounted on the towers to send a beam to another antenna
which is km away.
o It works on the line of sight transmission, i.e., the antennas mounted on the towers are at
the direct sight of each other.
22
23AD1502 DATA COMMUNICATION AND NETWORK SECURITY
Satellite Microwave
o A satellite is a physical object that revolves around the earth at a known height.
o Satellite communication is more reliable nowadays as it offers more flexibility than
cable and fibre optic systems.
o We can communicate with any point on the globe by using satellite
communication.
o The satellite accepts the signal that is transmitted from the earth station, and it
amplifies the signal. The amplified signal is retransmitted to another earth station.
23
23AD1502 DATA COMMUNICATION AND NETWORK SECURITY
INFRARED WAVES
Characteristics of Infrared:
o It supports high bandwidth, and hence the data rate will be very high.
o Infrared waves cannot penetrate the walls. Therefore, the infrared communication in
one room cannot be interrupted by the nearby rooms.
o An infrared communication provides better security with minimum interference.
o Infrared communication is unreliable outside the building because the sun rays will
interfere with the infrared waves.
SWITCHING
o The technique of transferring the information from one computer network to
another network is known as switching.
o Switching in a computer network is achieved by using switches.
o Switches are devices capable of creating temporary connections between two or more
devices linked to the switch.
24
23AD1502 DATA COMMUNICATION AND NETWORK SECURITY
o Switches are used to forward the packets based on MAC addresses.
o A Switch is used to transfer the data only to the device that has been addressed. It
verifies the destination address to route the packet appropriately.
o It is operated in full duplex mode.
o It does not broadcast the message as it works with limited bandwidth.
Advantages of Switching:
o Switch increases the bandwidth of the network.
o It reduces the workload on individual PCs as it sends the information to only that
device which has been addressed.
o It increases the overall performance of the network by reducing the traffic on the
network.
o There will be less frame collision as switch creates the collision domain for each
connection.
Disadvantages of Switching:
o A Switch is more expensive than network bridges.
o A Switch cannot determine the network connectivity issues easily.
o Proper designing and configuration of the switch are required to handle multicast
packets.
25
23AD1502 DATA COMMUNICATION AND NETWORK SECURITY
26
23AD1502 DATA COMMUNICATION AND NETWORK SECURITY
CIRCUIT SWITCHING
2. Data transfer - Once the circuit has been established, data and voice are transferred
from the source to the destination. The dedicated connection remains as long as the end
parties communicate.
27
23AD1502 DATA COMMUNICATION AND NETWORK SECURITY
Advantages
It is suitable for long continuous transmission, since a continuous transmission route
is established, that remains throughout the conversation.
The dedicated path ensures a steady data rate of communication.
No intermediate delays are found once the circuit is established. So, they are
suitable for real time communication of both voice and data transmission.
Disadvantages
Circuit switching establishes a dedicated connection between the end parties. This
dedicated connection cannot be used for transmitting any other data, even if the data
load is very low.
Bandwidth requirement is high even in cases of low data volume.
There is underutilization of system resources. Once resources are allocated to a
particular connection, they cannot be used for other connections.
Time required to establish connection may be high.
It is more expensive than other switching techniques as a dedicated path is required for
each connection.
PACKET SWITCHING
o The packet switching is a switching technique in which the message is sent in one go,
but it is divided into smaller pieces, and they are sent individually.
o The message splits into smaller pieces known as packets and packets are given a
unique number to identify their order at the receiving end.
o Every packet contains some information in its headers such as source address,
destination address and sequence number.
o Packets will travel across the network, taking the shortest path as possible.
o All the packets are reassembled at the receiving end in correct order.
o If any packet is missing or corrupted, then the message will be sent to resend the
message.
o If the correct order of the packets is reached, then the acknowledgment message will
be sent.
28
23AD1502 DATA COMMUNICATION AND NETWORK SECURITY
29
23AD1502 DATA COMMUNICATION AND NETWORK SECURITY
In this example, all four packets (or datagrams) belong to the same message, but may travel
different paths to reach their destination.
Routing Table
In this type of network, each switch (or packet switch) has a routing table which is based on the
destination address. The routing tables are dynamic and are updated periodically. The
destination addresses and the corresponding forwarding output ports are recorded in the tables.
30
23AD1502 DATA COMMUNICATION AND NETWORK SECURITY
Example :
Source A sends a frame to Source B through Switch 1, Switch 2 and Switch 3.
31
23AD1502 DATA COMMUNICATION AND NETWORK SECURITY
32
23AD1502 DATA COMMUNICATION AND NETWORK SECURITY
PACKET SWITCHING
CIRCUIT
SWITCHING
Virtual Circuit Switching Datagram Switching
A dedicated path exists A dedicated path exists for No dedicated path exists for
for data transfer data transfer data transfer
All the packets take the All the packets take the same All the packets may not take the
same path path same path
Inefficient in terms of Provides better efficiency than Provides better efficiency than
resource utilization circuit switched systems message switched systems
33
23AD1502 DATA COMMUNICATION AND NETWORK SECURITY
MESSAGE SWITCHING
PROTOCOL LAYERING
In networking, a protocol defines the rules that both the sender and receiver and all
intermediate devices need to follow to be able to communicate effectively.
A protocol provides a communication service that the process use to exchange
messages.
When communication is simple, we may need only one simple protocol.
When the communication is complex, we may need to divide the task between different
layers, in which case we need a protocol at each layer, or protocol layering.
Protocol layering is that it allows us to separate the services from the implementation.
A layer needs to be able to receive a set of services from the lower layer and to give the
services to the upper layer.
Any modification in one layer will not affect the other layers.
34
23AD1502 DATA COMMUNICATION AND NETWORK SECURITY
Protocol Graph
The set of protocols that make up a network system is called a protocol graph.
The nodes of the graph correspond to protocols, and the edges represent a dependence
relation.
For example, the Figure below illustrates a protocol graph consists of protocols RRP
(Request/Reply Protocol) and MSP (Message Stream Protocol) implement two different
types of process-to-process channels, and both depend on the HHP (Host-to- Host
Protocol) which provides a host-to-host connectivity service
35
23AD1502 DATA COMMUNICATION AND NETWORK SECURITY
OSI MODEL
o OSI stands for Open System Interconnection.
o It is a reference model that describes how information from a software application in one
computer moves through a physical medium to the software application in another
computer.
o OSI consists of seven layers, and each layer performs a particular network function.
o OSI model was developed by the International Organization for Standardization (ISO) in
1984, and it is now considered as an architectural model for the inter- computer
communications.
o OSI model divides the whole task into seven smaller and manageable tasks. Each layer
is assigned a particular task.
o Each layer is self-contained, so that task assigned to each layer can be performed
independently.
36
23AD1502 DATA COMMUNICATION AND NETWORK SECURITY
1. PHYSICAL LAYER
The physical layer coordinates the functions required to transmit a bit stream over a physical
medium.
The physical layer is concerned with the following functions:
Physical characteristics of interfaces and media - The physical layer defines the
characteristics of the interface between the devices and the transmission medium.
Representation of bits - To transmit the stream of bits, it must be encoded to
signals. The physical layer defines the type of encoding.
Signals: It determines the type of the signal used for transmitting the information.
Data Rate or Transmission rate - The number of bits sent each second –is also defined
by the physical layer.
Synchronization of bits - The sender and receiver must be synchronized at the bit level.
Their clocks must be synchronized.
Line Configuration - In a point-to-point configuration, two devices are connected
together through a dedicated link. In a multipoint configuration, a link is shared between
several devices.
Physical Topology - The physical topology defines how devices are connected to make
a network. Devices can be connected using a mesh, bus, star or ring topology.
37
23AD1502 DATA COMMUNICATION AND NETWORK SECURITY
It is responsible for transmitting frames from one node to the next node. The other
responsibilities of this layer are
Framing - Divides the stream of bits received into data units called frames.
Physical addressing – If frames are to be distributed to different systems on the
network , data link layer adds a header to the frame to define the sender and receiver.
Flow control- If the rate at which the data are absorbed by the receiver is less than the
rate produced in the sender ,the Data link layer imposes a flow ctrl mechanism.
Error control- Used for detecting and retransmitting damaged or lost frames and to
prevent duplication of frames. This is achieved through a trailer added at the end of the
frame.
Medium Access control -Used to determine which device has control over the link at
any given time.
3. NETWORK LAYER
This layer is responsible for the delivery of packets from source to destination.
It determines the best path to move data from source to the destination based on the network
conditions, the priority of service, and other factors.
The other responsibilities of this layer are
Logical addressing - If a packet passes the network boundary, we need another
addressing system for source and destination called logical address. This addressing is
used to identify the device on the internet.
Routing – Routing is the major component of the network layer, and it determines the
best optimal path out of the multiple paths from source to the destination.
4. TRANSPORT LAYER
It is responsible for Process to Process delivery. That is responsible for source-to- destination (end-
to-end) delivery of the entire message, It also ensures whether the message arrives in order or
not.
The other responsibilities of this layer are
Port addressing / Service Point addressing - The header includes an address called
port address / service point address. This layer gets the entire message to the correct
process on that computer.
Segmentation and reassembly - The message is divided into segments and each
segment is assigned a sequence number. These numbers are arranged correctly on the
arrival side by this layer.
Flow control - The transport layer also responsible for flow control but it is
performed end-to-end rather than across a single link.
Error Control - Error control is performed end-to-end rather than across the single
link..
5. SESSION LAYER
This layer establishes, manages and terminates connections between applications. The other
responsibilities of this layer are
Dialog control - Session layer acts as a dialog controller that creates a dialog between
two processes or we can say that it allows the communication between two processes
which can be either half-duplex or full-duplex.
Synchronization- Session layer adds some checkpoints when transmitting the data in a
sequence. If some error occurs in the middle of the transmission of data, then the
transmission will take place again from the checkpoint. This process is known as
Synchronization and recovery.
6. PRESENTATION LAYER
It is concerned with the syntax and semantics of information exchanged between two systems.
The other responsibilities of this layer are
Translation – Different computers use different encoding system, this layer is
responsible for interoperability between these different encoding methods. It will change
the message into some common format.
Encryption and decryption-It means that sender transforms the original information to
another form and sends the resulting message over the n/w. and vice versa.
Compression and expansion-Compression reduces the number of bits contained in the
information particularly in text, audio and video.
7. APPLICATION LAYER
This layer enables the user to access the network. It handles issues such as network transparency,
resource allocation, etc. This allows the user to log on to remote user.
The other responsibilities of this layer are
FTAM (File Transfer, Access, Management) - Allows user to access files in a
remote host.
Mail services - Provides email forwarding and storage.
Directory services - Provides database sources to access information about
39
23AD1502 DATA COMMUNICATION AND NETWORK SECURITY
APPLICATION LAYER
An application layer incorporates the function of top three OSI layers. An
application layer is the topmost layer in the TCP/IP model.
It is responsible for handling high-level protocols, issues of representation.
This layer allows the user to interact with the application.
When one application layer protocol wants to communicate with another
application layer, it forwards its data to the transport layer.
Protocols such as FTP, HTTP, SMTP, POP3, etc running in the application layer
provides service to other program running on top of application layer
40
23AD1502 DATA COMMUNICATION AND NETWORK SECURITY
TRANSPORT LAYER
The transport layer is responsible for the reliability, flow control, and correction of data
which is being sent over the network.
The two protocols used in the transport layer are User Datagram protocol and
Transmission control protocol.
o UDP – UDP provides connectionless service and end-to-end delivery of
transmission. It is an unreliable protocol as it discovers the errors but not
specify the error.
o TCP – TCP provides a full transport layer services to applications. TCP is a
reliable protocol as it detects the error and retransmits the damaged frames.
INTERNET LAYER
The internet layer is the second layer of the TCP/IP model.
An internet layer is also known as the network layer.
The main responsibility of the internet layer is to send the packets from any
network, and they arrive at the destination irrespective of the route they take.
Internet layer handle the transfer of information across multiple networks through router
and gateway .
IP protocol is used in this layer, and it is the most significant part of the entire
TCP/IP suite.
41
23AD1502 DATA COMMUNICATION AND NETWORK SECURITY
2 Service interface and protocols are Service interface and protocols were not
clearly distinguished before clearly distinguished before
7 All packets are reliably delivered TCP reliably delivers packets, IP does not
reliably deliver packets
42