0% found this document useful (0 votes)
72 views104 pages

UNIT-1 Chap-1 Computer Networks

Uploaded by

ziyanhussain61
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PPTX, PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
72 views104 pages

UNIT-1 Chap-1 Computer Networks

Uploaded by

ziyanhussain61
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PPTX, PDF, TXT or read online on Scribd
You are on page 1/ 104

COMPUTER NETWORK AND

COMMUNICATION
Course code: CS3001-1

1
Course Learning objectives
1.Outline the principles of computer networks and its application.
2.Understand the basic of physical and data link layer
functionalities and protocols .
3.Study the importance of network layer and differentiate various
routing algorithms .
4.Analyze the process of QoS and congestion control algorithms.
5.Acquire the knowledge of working of transport layer, its protocols
and some application layer protocols.
Syllabus
UNIT-I 15
Hours

1. Introduction: Data Communications, Networks, Network Types,


Connection-Oriented Versus Connectionless Service, Introduction to
network Devices-Modem, Hub, Switch, Router, Network Models: TCP/IP
Protocol Suite, OSI Model, OSI versus TCP/IP.
2. Physical Layer: Introduction to Physical Layer: Digital Signals,
Transmission Impairment, Data Rate Limits, Performance, Example
Problems(self-learning), Line Coding Schemes (Unipolar and Polar only)
3. Transmission Media: Guided Media, Switching: Introduction, Packet
Switching.
4. Data-Link Layer: Introduction, Link-Layer Addressing (up to ARP)
Error Detection and Correction Introduction, Block Coding, Cyclic
Redundancy Check,
5. Media Access Control: CSMA, CSMA/CD. (Textbook T1)
UNIT-II 16 Hours

Data Link Layer Contd.


1. Wired LANs: Ethernet Protocol, Standard Ethernet (up to Access Method),
Wireless LANs: Introduction (Textbook T1)
2. Network Layer: Network-Layer Services, Packet Switching, Network Layer
Performance. IPv4 Addresses, Packet Format of IPv4, IPv6 Address and packet
format, ICMPv4 (Textbook T1)
3. Routing Algorithms up to Multicast Routing, Congestion Control Algorithms,
Quality of Service, Internetworking. (Textbook T2)
4. Routing for Mobile Hosts (self-learning)

UNIT-III 9 hours
5. Transport Layer: Transport Layer Services, Port Numbers, User Datagram
Protocol, Transmission Control Protocol
6. Application Layer: Introduction, Client/Server Paradigm, Standard Client-
Server Protocols: World Wide Web and HTTP, FTP, Electronic Mail, DNS,
(Textbook T1)
7. Telnet and SSH (self-learning)
Suggested List of Experiments
Part-A(Experiments using NS-2/ NS-3)

1. Simulate a three nodes’ point-to-point network with duplex links between them. Set
the queue size, vary the bandwidth and find the number of packets dropped.
2. Simulate a four-node point-to-point network, and connect the links as follows: n0-
n2, n1-n2 and n2-n3. Apply TCP agent between n0-n3 and UDP n1-n3. Apply
relevant applications over TCP and UDP agents changing the parameter and
determine the number of packets by TCP/UDP.
3. Simulate the different types of Internet traffic such as FTP a TELNET over a
network and analyze the throughput.
4. Simulate the transmission of ping messages over a network topology consisting of 6
nodes and find the number of packets dropped due to congestion.
5. Simulate an Ethernet LAN using N-nodes (6-10), change error rate and data rate and
compare the throughput.
6. Simulate an Ethernet LAN using N nodes and set multiple traffic nodes and
determine collision across different nodes.
7. Simulate an Ethernet LAN using N nodes and set multiple traffic nodes and plot
congestion window for different source/destination.
PART B (Experiments using C/C++/Python)

1. Write a program for error detecting code using CRC-CCITT (16-bits).


2. Write a program for frame sorting technique used in buffers.
3. Write a program for distance vector algorithm to find suitable path for transmission.

4. Using TCP/IP sockets, write a client-server program to make client sending the
filename and the server to send back the contents of the requested file if present.

5. Using UDP SOCKETS, write a client-server program to make the client sending two
numbers and an operator, and server responding with the result. Display the result
and appropriate messages for invalid inputs at the client side.
6. Write a program for Hamming Code generation for error detection and correction.

7. Write a program for simple RSA algorithm to encrypt and decrypt the data.
Course Outcomes:

1. Develop a foundation in data communications and networking principles, enabling


them to understand and apply networking concepts.
2. Understand the working of data link layer, the protocols and differentiate the types of
LAN.
3. Demonstrate a comprehensive understanding of network layer services and
addressing schemes.
4. Distinguish between various routing and congestion control algorithms and
understand the Quality of Service required for various networking applications.
5. Portray the transport layer protocols and understand the working of various
application layer protocols.
TEXTBOOKS:
1. Behrouz A Forouzan, Data and Communications and Networking, Fifth Edition, McGraw
Hill, Indian Edition.
Ch 1: 1.1, 1.2, 1.3-1.3.1,1.3.2, Ch 2: 2.2, 2.3, Ch 3: 3.3, 3.4, 3.5, 3.6, Ch 4: 4.1.2, Ch 7: 7.2, Ch
8: 8.1, 8.3, Ch 9: 9.1, 9.2-9.2.1, 9.2.2, Ch 10: 10.1, 10.2, 10.3.1, Ch 12: 12.1.2, 12.1.3, Ch 13:
13.1, 13.2-13.2.1,13.2.2, 13.2.3, Ch 15: 15.1, Ch 18: 18.1, 18.2, 18.3, 18.4, Ch 19: 19.1-
19.1.1,19.1.2, 19.2, Ch 22: 22.1-22.1.1, 22.1.2, 22.1.3, 22.2,Ch 23: 23.1.1, Ch 24: 24.1.2, 24.2,
24.3-24.3.1 to 24.3.6, Ch 25: 25.1, 25.2, Ch 26: 26.1, 26.2, 26.3, 26.4, 26.5, 26.6
2. Computer Networks, Andrew S. Tanenbaum David J. Wetherall, 5th Edition, Pearson, ISBN
10: 1292024224, 2014
Ch 1: 1.3.3, Ch 5: 5.2-5.2.1 to 5.2.8, 5.3, 5.4-5.4.1 to 5.4.4
REFERENCE BOOKS:
3. Computer Networking. A Top-down Approach, James F. Kurose, Keith W. Ross, Pearson, ISBN:
1292153598, 2017
4. Data and Computer Communications, 10th Edition, William Stallings, Pearson Education, 2013,
ISBN: 0133506487,9780133506488
5. Larry L Peterson and Brusce S Davie, Computer Networks, fifth edition, ELSEVIER
INTRODUCTION: DATA COMMUNICATIONS

Data communications are the exchange of data between


two devices via some form of transmission medium such as
a wire cable.

Characteristics of Data communications


1. Delivery.
2. Accuracy.
3. Timeliness.
4. Jitter.

9
Components of a data communication system

1. Message
2. Sender
3. Receiver
4. Transmission medium
5. Protocol

10
Data Representation

• Information today comes in different forms


such as text, numbers, images, audio, and video.
• Numbers
– bit patterns
– binary numbers
• Text
– ASCII, Unicode
• Images
• Audio → Samples of continuous signal
• Video → Sequence of bitmap images 11
1
1
Data flow (simplex, half-duplex, and full-duplex)

12
1
2
NETWORKS
A network is the interconnection of a set of devices capable of
communication.

13
Computer Network
A computer network is a system that connects two or more
computing devices for transmitting and sharing information.

Computing devices include everything from a mobile phone to a


server.
These devices are connected using physical wires such as fiber optics,
but they can also be wireless.

14
NETWORKS
Network Criteria
1. Performance
• Transit time
• Response time
• Throughput
• Delay
2. Reliability:
•Accuracy of delivery
•Frequency of failure
•Time a link takes to recover from failure
•Robustness in a catastrophe(sudden damage or disaster)
3. Security
• Protecting data from unauthorised access
• Protecting data from damage and development.
• Implementing policies and procedures for recovery from breaches and
losses.
15
Physical structures of Networks

Types of Connections
Network is two or more devices connected through links.
There are two types of connections
• Point-to-point
• Multipoint (multidrop)

16
Point-To-Point Connection

Link

Provides dedicated link between two devices

17
Multipoint Connection

Link

More than two specific devices share a single link

18
Physical Topology
• The term physical topology refers to the way in which
a network is laid out physically.
• Two or more device connect to a link
• The topology of a network is the geometric
representation of the relationship of all the links and
linking devices to one another.
• There are four basic topologies.
1. Mesh
2. Star
3. Bus
4. Ring

19
Mesh Topology
E

A
D

B C

• In mesh topology every device has a dedicated point to point link to every other device
• We need n(n-1) links
• Communication is duplex mode
• Every device on the network must have n-1 i/o ports to connect to the other n-1
20
devices.
Mesh Topology
• Pros:
– Dedicated links
– Robustness
– Privacy
– Easy to identify fault
• Cons:
– A lot of cabling
– I/O ports
– Difficult to move

17
22
Star Topology
A D

Hub

B C

23
Star Topology
A D

B C

 More cabling is required than other topologies

24
Bus Topology

Drop
line

Tap Tap Tap Tap

Cable Cable
End End

20
25
Bus Topology

26
Ring Topology

D
Repeater
B Repeater
Repeater
Repeater

27
Ring Topology

• Pros:
– Easy to install
– Easy to identify fault

• Cons:
– Delay in large ring
– Break in the ring stops all
transmission
28
Hybrid Topologies

24
29
Network Types
The criteria used for distinguishing the
network type
•Size
•Geographical coverage
•Ownership

Network types
• Local Area Network (LAN)
• Wide Area Network (WAN)
• Metropolitan Area Network (MAN)

30
Local Area Networks
• It is a privately owned network in a single office, building, or
campus.
• Each host in the LAN has an address.
• A packet carries source host address and destination host address

31
Wide Area Networks
• Has wider geographical coverage
• Spanning a town, a state, a country or even the world.
• WAN interconnects connecting devices.

32
Two distinct examples of WAN:

• Point-to-point WANs
• Switched WANs

Point-to-point WANs
• Two communicating devices are connected

33
Switched WANs
• Network with more than two ends
• WAN is combination of several point-to-pont WANs connected by switches

34
Examples

35
36
The Internet

An internet (note the lowercase i) is two or more networks that can


communicate with each other.

The most notable internet is called the Internet (uppercase I) and is


composed of millions of interconnected networks.

37
Figure 1.13 The Internet today
A network topology representing the internet shows several backbones connected to several provider networks and
peering points. The peering points connect to the provider networks. The provider networks connect to multiple
customer networks. The provider networks establish connections between them. Similarly, the customer networks
have connections between them.
38
Accessing the Internet

Using Telephone Networks


Dial-up Service
DSL Service

Using Cable Networks

Using Wireless Networks

Direct Connection to the Internet

39
Connection-Oriented Versus Connectionless Service

Layers can offer two different types of service to the layers above
them: connection- oriented and connectionless.

In this section we will look at these two types and examine the
differences between them.

Connection-oriented service is modeled after the telephone system.

To talk to someone, you pick up the phone, dial the number, talk, and
then hang up. Similarly, to use a connection-oriented network
service, the service user first establishes a connection, uses the
connection, and then releases the connection.

40
Connection-Oriented Versus Connectionless Service

In some cases when a connection is established, the sender, receiver,


and subnet conduct a negotiation about the parameters to be used,
such as maximum message size, quality of service required, and
other issues.
Typically, one side makes a proposal and the other side can accept it,
reject it, or make a counterproposal.
A circuit is another name for a connection with associated resources,
such as a fixed bandwidth. This dates from the telephone network in
which a circuit was a path over copper wire that carried a phone
conversation.

41
Connection-Oriented Versus Connectionless Service

• In contrast to connection-oriented service, connectionless service


is modeled after the postal system.
• Each message (letter) carries the full destination address, and each
one is routed through the intermediate nodes inside the system
independent of all the subsequent messages.
• Each kind of service can further be characterized by its
reliability. Some services are reliable in the sense that they never
lose data. Usually, a reliable service is implemented by having the
receiver acknowledge the receipt of each message so the sender is
sure that it arrived.
• The acknowledgement process introduces overhead and delays,
which are often worth it but are sometimes undesirable.

42
Connection-Oriented Versus Connectionless Service

• A typical situation in which a reliable connection-oriented service is


appropriate is file transfer. The owner of the file wants to be sure that
all the bits arrive correctly and in the same order they were sent.
• Very few file transfer customers would prefer a service that
occasionally scrambles or loses a few bits, even if it is much faster.
Reliable connection-oriented service has two minor variations:
In message sequences variant, the message boundaries are preserved.
When two 1024-byte messages are sent, they arrive as two distinct
1024-byte messages, never as one 2048-byte message.
In byte streams. , the connection is simply a stream of bytes, with no
message boundaries. When 2048 bytes arrive at the receiver, there is no
way to tell if they were sent as one 2048-byte message, two 1024-byte
messages, or 2048 1-byte messages.
Example :
1. If the pages of a book are sent over a network to a phototypesetter as
separate messages, it might be important to preserve the message
boundaries.
2. On the other hand, to download a DVD movie, a byte stream from the
server to the user’s computer is all that is needed. Message
boundaries within the movie are not relevant. 43
Connection-Oriented Versus Connectionless Service

Not all applications require connections.


• For example, spammers send electronic junk-mail to
many recipients. The spammer probably does not
want to go to the trouble of setting up and later
tearing down a connection to a recipient just to send
them one item.
• Nor is 100 percent reliable delivery essential,
especially if it costs more. All that is needed is a way
to send a single message that has a high probability
of arrival, but no guarantee.
• Unreliable (meaning not acknowledged)
• connectionless service is often called datagram service, in
analogy with telegram service, which also does not return an
acknowledgement to the sender.
44
Connection-Oriented Versus Connectionless Service

• For some applications, the transit delays introduced by acknowledgements are


unacceptable. One such application is digitized voice traffic for voice over IP.
• It is less disruptive for telephone users to hear a bit of noise on the line from
time to time than to experience a delay waiting for acknowledgements.
• In other situations, the convenience of not having to establish a connection to
send one message is desired, but reliability is essential.
• The acknowledged datagram service can be provided for these applications.
• Still another service is the request-reply service. In this service the sender
transmits a single datagram containing a request; the reply contains the answer.
• Request-reply is commonly used to implement communication in the client-
server model: the client issues a request and the server responds to it.
• For example, a mobile phone client might send a query to a map server to
retrieve the map data for the current location.

45
Summary of the types of services discussed

46
Introduction to network Devices

Network Devices: Network devices, also known as networking


hardware, are physical devices that allow hardware on a computer
network to communicate and interact with one another.
For example Repeater, Hub, Bridge, Switch, Routers, Gateway,
Brouter, and NIC, etc

1. Modem
The main purpose of a modem is to modulate and demodulate -- or
convert -- signals between devices, such as analog to digital.
Nowadays, the most common type of modem is an internet modem,
which facilitates internet access by receiving signals from an
ISP(Internet Service Provider) and converting them into a format
that connected devices can use, such as radio or digital signals.

47
Introduction to network Devices

• A modem typically connects to a router, which receives internet


access from the modem and sends it to other devices on the
network. Modems can use Ethernet cable, DSL, fiber or wireless
mediums for connectivity. ISPs frequently provide modems that
have combined routing and firewalling capabilities.
• Depending on the type, a modem operates at Layer 1 or Layer 2
of the OSI model.

48
Introduction to network Devices

2. Hub
• A hub is a physical device used to join multiple devices on the
same LAN. For example, a laptop, desktop computer and printer
can connect into a hub's ports with Ethernet cables and be part of
the same local network.
• Unlike a bridge, router or switch, a hub broadcasts messages it
receives from one port to all remaining ports without examining
the frames or isolating the message for the intended destination
• A hub must connect to a router or switch in order to communicate
outside its LAN.

49
Introduction to network Devices

3.Switch
• A network switch forwards data to its destination by examining an
incoming frame's MAC address and sending it to the device with
the matching address.
• Devices connect into a switch's ports usually via an Ethernet
cable. The switch stores those devices' MAC addresses in an
address table it uses as a reference when transferring frames.
• While a router forwards data to an IP address or network, a switch
sends the information directly to the specific destination port

50
Introduction to network Devices

4. Router
• A router directs data requests from one network to another.
Routers examine incoming packets to determine the appropriate
destination IP address and then forward the packet to that
destination.
• A router can also enable internet access through its connection to
a modem, or as a combined modem-router.
• As with a bridge, routers maintain and use routing tables that
contain route information, such as IP addresses and interfaces.
• Once a router inspects a packet, it refers to the routing table to
find the best path toward the destination.
• Routers use routing protocols to communicate and exchange data.

51
Introduction to network Devices

Types of routers typically used in enterprise networks include the


following:

• edge routers
• core routers
• distribution routers
• wireless routers

52
Network Models:

THE OSI (Open System Interconnection) MODEL

• Established in 1947, the ISO (International Standard


Organization) is a multinational body dedicated to worldwide
agreement on international standards.
• An ISO standard that covers all aspects of network
communications is the OSI model.
• It was first introduced in the late 1970s.
• Open System refers to a set protocols that allows two computers
to communicate regardless of underlying architecture.
• OSI is not a protocol; but it is a model for understanding and
design of a network architecture that is robust , flexible and
interoperable.

53
The OSI model

• The OSI model is a layered framework for the design of network


systems that allows communication between all types of computer
systems.
• It consists of seven separate but related layers, each of which
defines a part of the process of moving information across a
network

54
55
The OSI 7 Layers

56
The interaction between layers in the OSI model

57
An exchange using the OSI model

58
LAYERS IN THE OSI MODEL

1. Physical layer:

Defining the Characteristics of the interface between the devices and the
transmission medium.
Representations of the bits : Sequences of 1’s and 0’s and encoding these bits into
signals.
Data rate : No. of bits sent per second
Synchronization of bits : Receiver and senders clock synchronization.

Line Configuration :Connection of the devices to the media.


Point to point
Multi point

Physical Topology : Defines the structure of a network.

Transmission mode: Simplex , half-duplex , full-duplex

59
Physical layer

60
61
2. Data link layer

62
Data link layer functionalities

Responsible for hop to hop delivery

Framing : Division of stream of bits into manageable data.

Physical Addressing : Adding sender and receiver addressing


information to the frame

Flow Control : Controlling the flow of data to avoid bottleneck.

Error Control : Avoiding the loss of data

Access Control : Determining which device has the control over the
transmission line.

63
64
Hop-to-hop delivery

65
Figure 2.8 Network layer
Network layer functionalities
Responsible for source to destination delivery of packet
across multiple networks.

Logical Addressing : Adding sender and receiver


addressing information to the Packet.

Routing : Forwarding the packets to one of the networks.


Router or switches are responsible for forwarding these
packets.
Note

The network layer is responsible for the


delivery of individual packets from
the source host to the destination host.
Figure 2.9 Source-to-destination delivery
Figure 2.10 Transport layer
Transport layer functionalities
Responsible for process to process delivery
Service Point Addressing : Specifying port address of
receiver process.
Segmentation and Reassembly : Dividing a message into
transmittable segments, with each segments containing a
sequence number.
Connection Control :
Connection Oriented.
Connection less.
Flow Control : Here it is performed end to end process
Error Control : Avoiding data loss.
Note

The transport layer is responsible for the delivery


of a message from one process to another.
Figure 2.11 Reliable process-to-process delivery of a message
Figure 2.12 Session layer
Session layer functionalities

It establishes , maintaining and synchronizes the


interaction among communicating systems. It is
called dialog controller

Dialog Control : Allowing two systems to process to


communicate in half duplex or full – duplex mode.

Synchronization : Adding the check points to the data.


Note

The session layer is responsible for dialog


control and synchronization.
Figure 2.13 Presentation layer
Presentation layer functionalities
Translation : Changing information of the sender into its receiver
– dependent format.
Encryption : Sending original information in another form for
security of the information.
Compression: Reducing the data for transmission to use the line
(physical media) efficiently.
Note

The presentation layer is responsible for translation,


compression, and encryption.
Figure 2.14 Application layer
Application layer functionalities
It provides user interfaces and support for services such as
electronic mail , remote file access and transfer.
Network Virtual Terminal : Emulation of software version of
physical terminal
File Transfer ,access and management : Allowing user to access
remote computer to retrial file and use in local computer .
Mail Services : Email forwarding and storage.
Directory Services : Provides Distributed Data base sources and
access for global information about various objects and services.
Note

The application layer is responsible for


providing services to the user.
Figure 2.15 Summary of layers
84
TCP/IP PROTOCOL SUITE
•It is also called Internet Protocol Suite as it consists of set
of communication protocols used for the Internet and other
similar networks.
•Two most important Protocols : TCP & IP.
• The layers in the TCP/IP protocol suite do not exactly
match those in the OSI model. The original TCP/IP
protocol suite was defined as having four layers:

1. host-to-network layer  (physical + data link layer) of OSI


2. Internet  Network Layer of OSI
3. Transport  Transport layer of OSI.
4. application (Session + Presentation + application) of
OSI model.
Figure 2.16 TCP/IP model
TCP/IP Layers
Physical and Data Link Layers :
It supports all the standard and proprietary data base
Network Layers :
Internet Protocol (IP) : Used to send datagram (packets)
from the source host to the destination host solely based on its
address.
Unreliable and connection less
Best effort service
IP data is called datagrams
Address Resolution Protocol (ARP) : Used to find physical
address when its internet address is known.
Reverse Address Resolution Protocol (RARP): Used to find
internet address when its physical address is known.
Internet Control Message Protocol (ICMP) : Used to send
query and error reporting messages.
TCP/IP Layers
Internet Group Message Protocol (IGMP) : Simultaneous
transmission to a group of recipients
• Transport Layers :
• User Datagram Protocol : Used to send short messages
sometimes known as datagram. Process to Process
protocol that adds only port address , checksum , error
control and length information to the data.
• UDP does not guarantee reliability or ordering
• Transmission Control Protocol : Connection oriented
and reliable
• Data is called segments
• reordering of the segments
• Stream Control Protocol : Newer application support,
such as voice over network.
• Application Layer : Equivalent to combined session ,
presentation and application layers of the OSI model.
2-5 ADDRESSING

Four levels of addresses are used in an internet employing


the TCP/IP protocols: physical, logical, port, and specific.

Topics discussed in this section:


Physical Adresses
Logical Adresses
Port Addresses
Specific Addresses
Figure 2.17 Addresses in TCP/IP
Figure 2.18 Relationship of layers and addresses in TCP/IP
Example 2.1

In Figure 2.19 a node with physical address 10 sends a


frame to a node with physical address 87. The two nodes
are connected by a link (bus topology LAN). As the
figure shows, the computer with physical address 10 is
the sender, and the computer with physical address 87 is
the receiver.
Figure 2.19 Physical addresses
Example 2.2

As we will see in Chapter 13, most local-area networks


use a 48-bit (6-byte) physical address written as 12
hexadecimal digits; every byte (2 hexadecimal digits) is
separated by a colon, as shown below:

07:01:02:01:2C:4B

A 6-byte (12 hexadecimal digits) physical address.


Example 2.3

Figure 2.20 shows a part of an internet with two routers


connecting three LANs. Each device (computer or
router) has a pair of addresses (logical and physical) for
each connection. In this case, each computer is
connected to only one link and therefore has only one
pair of addresses. Each router, however, is connected to
three networks (only two are shown in the figure). So
each router has three pairs of addresses, one for each
connection.
Figure 2.20 IP addresses
Example 2.4

Figure 2.21 shows two computers communicating via the


Internet. The sending computer is running three
processes at this time with port addresses a, b, and c. The
receiving computer is running two processes at this time
with port addresses j and k. Process a in the sending
computer needs to communicate with process j in the
receiving computer. Note that although physical
addresses change from hop to hop, logical and port
addresses remain the same from the source to
destination.
Figure 2.21 Port addresses
Note

The physical addresses will change from hop to hop,


but the logical addresses usually remain the same.
Example 2.5

As we will see in Chapter 23, a port address is a 16-bit


address represented by one decimal number as shown.

753

A 16-bit port address represented


as one single number.
Note

The physical addresses change from hop to hop,


but the logical and port addresses usually remain the same.
102
OSI versus TCP/IP

• When we compare the two models, we find that two layers,


session and presentation are missing from the TCP/IP protocol
suite.
• These two layers were not added to the TCP/IP protocol suite
after the publication of the OSI model.
• The application layer in the suite is usually considered to be the
combination of three layers in the OSI model, as shown in Figure

103
OSI versus TCP/IP

104
OSI versus TCP/IP

Two reasons were mentioned for this decision.


 First, TCP/IP has more than one transport-layer protocol. Some
of the functionalities of the session layer are available in some of
the transport-layer protocols.
 Second, the application layer is not only one piece of software.
Many applications can be developed at this layer.
 If some of the functionalities mentioned in the session and
presentation layers are needed for a particular application, they
can be included in the development of that piece of software.

105

You might also like