Unit 1 Complete
Unit 1 Complete
The physical Bus Network Topology is the simplest and most widely
used of the network designs. It consists of one continuous length of
cable (trunk) that is shared by all the nodes in the network and a
terminating resistor (terminator) at each end that absorbs the signal
when it reaches the end of line.
Bus Network Topology requires a multipoint connection .
T-connectors
Advantages of Bus Topology
Disadvantages
Connecting each device to every other device in the network
makes installation and reconfiguration difficult.
It has high cabling cost as n (n-l)/2 links are required to connect n
nodes.
Tree or Hierarchical Topology
: The type of Topology in which a central 'root' node, the top level
of the hierarchy, is connected to one or more other nodes that are
one level lower in the hierarchy i.e., the second level,
Advantages:
Disadvantages:
Overall length of each segment is limited by the type of cabling used.
If the backbone line breaks, the entire segment goes down. • More
difficult to configure and wire than other topologies.
It has higher cabling cost in setting up a tree structure.
Hybrid Topology
Resource Sharing
Software Applications Sharing
Centralized Data
Disadvantages of LAN or Local Area Network
Privacy Violations
The LAN administrator has the rights to check personal data
files of each and every LAN user.Moreover he can check the internet
history and computer use history of the LAN users.
3. Data Security Threat
Wide Area Network (WAN)
Highly intelligent;
No intelligence; simply Intelligent; sends data
Intelligence determines the best path for
forwards data to the specific device
data
Each port has its own
Collision Each port has its own
Single collision domain broadcast and collision
Domain collision domain
domain
Broadcast Single broadcast Single broadcast Each port has its own
Domain domain domain broadcast domain
Speed Slower Faster Fastest
Device Type Passive Device Active Device Active Device
Internet connections,
Small home networks
Example Usage Office LANs connecting multiple
(outdated)
networks
•Use a Hub for basic network connectivity (rarely used
today).
•Use a Switch for efficient LAN communication.
•Use a Router to connect different networks and enable
internet access.
WHAT IS MAC ADDRESS
1. Network Protocols:
1. In connection oriented service authentication is needed, while connectionless service does not need any
authentication.
2. Connection oriented protocol makes a connection and checks whether message is received or not and
sends again if an error occurs, while connectionless service protocol does not guarantees a message
delivery.
3. Connection oriented service is more reliable than connectionless service.
4. Connection oriented service interface is stream based and connectionless is message based.
DIFFERENCE
•User Interface:
•Provides a way for users to interact with network services via software applications.
•When we say "a way for users to interact with network services," it means that
the Application Layer provides an interface (a bridge) between you (the user)
and the network.
•The Application Layer ensures you can interact with the network without worrying
about how the data is being sent in the background.
•Example: A messaging app interface where you type your text, add emojis, and send files.
•Data Formatting:
•Prepares data in a format compatible with network protocols and the receiving application.
•A suitable format means putting the data (text, image, video, audio) in a
universally accepted and standardized structure so it can be correctly
interpreted and displayed on the receiver's device, regardless of differences in
operating systems or devices.
•Example: Text is converted into a format suitable for network transfer.
•Service Access:
•Enables access to services like messaging, file transfer, or streaming.
•The Application Layer acts like a service manager, allowing you to access
and use network-based services (file transfer, email services, messaging etc)
•Example: WhatsApp accessing servers to send/receive messages.
•Protocol Implementation:
•Ensures correct communication by adhering to protocols like HTTP, HTTPS, SMTP, etc.
•The Application Layer uses protocols like HTTPS to ensure your WhatsApp
messages remain private, secure, and unaltered while traveling across the
network.
•Example: WhatsApp uses HTTPS for secure communication.
WHATSAPP ANALOGY
•User Interface (UI):
•The WhatsApp chat screen is an interface where users can type messages, attach media, and click the
send button.
•Example: You type "Hi, how are you?" in the chatbox and click Send.
•Access to Network Services:
•WhatsApp connects to the internet and uses network services (e.g., TCP/IP protocols) to send data to the
recipient.
•Example: When you send a message, the app ensures that it can access the internet and network
services seamlessly.
•Authentication and Encryption:
•WhatsApp uses End-to-End Encryption (E2EE) protocols to ensure only you and the recipient can read
the messages.
•Example: A lock symbol appears on chats, showing encryption is active.
•Formatting Data:
•Your typed text, emojis, or attached photos are formatted into a suitable data structure for transmission.
•Example: Your "Hi 😊" message is converted into an appropriate data format.
•Error Handling:
•If the network fails to send your message, WhatsApp shows an error (e.g., a red exclamation mark).
•Example: "Message not sent. Tap to retry."
PRESENTATION LAYER
The Presentation Layer is the 6th layer of the OSI (Open Systems
Interconnection) Model, positioned between the Application Layer
(Layer 7) and the Session Layer (Layer 5). It acts as a translator
and formatter for data exchanged between the application and the
network.
The main role of the Presentation Layer is to ensure that data sent from
the Application Layer of one system can be understood by the
Application Layer of another system.
Different systems may represent data in different formats. For
example:Text may use ASCII on one system and EBCDIC on another.
Images may be stored as JPEG, PNG, or GIF formats. The Presentation
Layer ensures that these differences are resolved before data is
transmitted.
In simple terms: It’s like a translator between two people speaking
different languages, ensuring they both understand each other perfectly.
KEY FUNCTIONS
a) Data Translation:
• Converts data from application-specific formats into a standardized network
format for transmission.
• At the receiver's end, it converts the data back into a format the application
understands.
• Example: Converting text data into ASCII or Unicode, and image data into JPEG or
PNG formats.
b) Data Encryption and Decryption:
• Encryption: Converts plain data (readable text) into a secure format (ciphertext)
to protect it during transmission.
• Decryption: Converts ciphertext back into plain text after reaching the destination.
• Common encryption standards include AES (Advanced Encryption Standard) and
SSL/TLS protocols.
c) Data Compression:
• Reduces the size of data files before transmission to save bandwidth and speed
up communication.
• It is crucial for large files like videos or high-resolution images.
•
WHATSAPP ANALOGY
•Logical Addressing:
•Every device using WhatsApp has a unique IP address.
•The Network Layer ensures data packets are addressed to the correct IP address of the
recipient's device.
•Routing:
•If your friend is in another city or country, the Network Layer finds the optimal route across
multiple routers to deliver the message.
•Example: Your WhatsApp message travels across various networks (ISP routers, regional
routers) before reaching your friend.
•Packet Forwarding:
•Each router forwards the packet closer to its destination IP address based on routing tables.
•Fragmentation:
•If the data packet is too large for a specific network, it’s split into smaller fragments for
smooth delivery.
NETWORK VS TRANSPORT LAYER
Ensures reliable data transfer and Routes packets to the destination, but doesn't
Focus
error-free communication ensure reliable transfer
End-to-end reliability (error correction, Routing data through multiple networks and
Responsibility
flow control, etc.) determining the best path
TCP, UDP (TCP is reliable, connection- IP (IPv4, IPv6), Routing protocols (e.g., OSPF,
Protocols
oriented) BGP)
The Data Link Layer (Layer 2) is the second layer in the OSI model. It
is responsible for the reliable transmission of data over a physical
link, ensuring that the data is transferred accurately between devices on
the same network. This layer defines how data should be formatted for
transmission over the physical medium and manages error detection
and correction, as well as flow control.
FUNCTIONS OF DLL
Framing:
• The Data Link Layer is responsible for dividing the raw bits from the Physical Layer into
frames. A frame is a structured block of data that includes both the data being sent
(payload) and the necessary information to ensure successful transmission (such as the
header, trailer, and error-checking information).
• Frame Format: It typically includes the header, which holds the address of the source and
destination devices, and the trailer, which contains error-checking information like the CRC
(Cyclic Redundancy Check).
Error Detection and Correction:
• The Data Link Layer ensures that data is transmitted without errors by adding error-
checking mechanisms like CRC (Cyclic Redundancy Check). If errors are detected in the
received data, the layer can request a retransmission of the corrupted frames.
• Error Detection: It uses checksums or CRC to detect if the data was modified or corrupted
during transmission.
• Error Correction: In some protocols, the Data Link Layer may also correct errors
automatically if they are detected (using techniques like ARQ - Automatic Repeat reQuest).
Flow Control:
• The Data Link Layer also deals with flow control, which helps prevent data
overload at the receiving end. It ensures that the sender doesn’t overwhelm the
receiver with more frames than it can handle at a given time. This is particularly
important in high-speed networks where the sender might be much faster than the
receiver.
• Flow control mechanisms like stop-and-wait and sliding window can be used to
manage the rate at which data frames are sent.
Media Access Control (MAC):
• The Data Link Layer is also responsible for controlling access to the shared
communication medium. The MAC sublayer manages how devices on the same
network can send data and avoid collisions when multiple devices try to send data
simultaneously.
• Two common mechanisms are used:
• Ethernet uses a CSMA/CD (Carrier Sense Multiple Access with Collision
Detection) protocol, where devices listen for traffic and only transmit if the channel is
free.
• In wireless networks, the CSMA/CA (Carrier Sense Multiple Access with Collision
Avoidance) protocol is used to avoid collisions.
.
Addressing:
• The Data Link Layer uses physical addresses (MAC addresses) to identify
devices on a local network. Each device on a network has a unique MAC
address, which is used to ensure that frames are delivered to the correct
device within the local network
Link Establishment and Termination:
• The Data Link Layer handles the establishment, maintenance, and
termination of communication links between devices on the same network.
This involves ensuring that the devices are ready for data transmission before
sending frames and closing the connection once the communication is
complete.
Data Link Layer in the Context of WhatsApp
Message Transmission:
1. Framing:
1. The WhatsApp message you send (text, video, etc.) gets divided into frames by the Data
Link Layer. These frames contain information like the MAC address of your device and the
recipient’s device.
2. Error Detection and Correction:
1. The frames containing your WhatsApp message will be checked for errors. If any frame is
corrupted, the Data Link Layer will request a retransmission of that frame.
3. Flow Control:
1. If the receiver’s device (your friend’s phone) is not able to handle the message speed, the
Data Link Layer might slow down the transmission of frames, ensuring that it doesn’t
overwhelm the receiving device.
4. MAC Protocol:
1. When you send your WhatsApp message over Wi-Fi, your phone will use a MAC protocol
(like CSMA/CA) to ensure that it doesn’t interfere with other devices on the same network.
5. Addressing:
1. The WhatsApp message will be sent to the MAC address of the Wi-Fi router or your
friend's device, ensuring that it reaches the correct destination on the local network.
SEGMENT, PACKET, FRAME
SEGMENT: Data is divided into segments to ensure reliable and ordered
delivery between sender and receiver.
PACKET: Packets carry data across different networks. Each packet contains
logical addressing information (e.g., IP address) for routing.
FRAME: Frames are responsible for node-to-node delivery within the same
local network. Each frame contains physical addressing information (e.g., MAC
address).
Analogy: Sending a Letter
1. Segment: The content of your letter is divided into chapters (segments).
2. Packet: Each chapter is placed into an envelope (packet) with a delivery
address.
3. Frame: The envelope is put into a delivery bag (frame) with a local address
tag for the postal worker to deliver locally.
4. Bits: The bag is handed over to the postal system (bits transmitted
physically).
Physical Layer (Layer 1):
The Physical Layer is the lowest layer of the OSI model, directly dealing with the hardware and
physical connection between devices. It focuses on the actual transmission of raw bits (0s and 1s)
over a physical medium, such as cables, wireless signals, or optical fibers.
Purpose of the Physical Layer
• Transmission of Raw Data: Converts digital data (0s and 1s) from higher layers into electrical,
optical, or radio signals for physical transmission.
• Defines Physical Medium: Specifies the type of cables (Ethernet, fiber optics), wireless frequencies
(Wi-Fi, Bluetooth), or connectors used.
• Bit Synchronization: Ensures the sender and receiver are synchronized so that bits are interpreted
correctly.
• Data Rate Control: Determines how fast data can be transmitted over the physical medium (e.g.,
Mbps or Gbps).
• Physical Topology: Defines how devices are physically arranged in a network (e.g., Star, Bus, Ring
topology).
• Transmission Mode: Specifies the mode of data transmission:
• Simplex: Data flows in one direction only.
• Half-duplex: Data flows in both directions, but only one side can transmit at a time.
• Full-duplex: Data flows in both directions simultaneously.
FUNCTIONS
A. Data Encoding
• Converts the digital data (0s and 1s) into electrical, optical, or radio signals for
transmission.
• Example: Ethernet cables use voltage levels to represent binary data.
📊 B. Transmission Medium Selection
• Determines whether data will travel via wired (Ethernet, fiber-optic cables) or
wireless (Wi-Fi, Bluetooth) mediums.
• Example: Ethernet cables are commonly used for wired connections, while Wi-Fi uses
radio frequencies.
📊 C. Signal Synchronization
• Ensures that the sender and receiver's clocks are in sync to correctly interpret the
bits being sent.
• Example: A mismatch in synchronization can cause bits to be misinterpreted.
📊 D. Bit Representation
• Ensures the correct representation of 0s and 1s in terms of voltage levels, light
pulses, or radio signals.
• Example: In optical fiber cables, light pulses represent binary data.
• 📊 E. Transmission Modes
• Defines whether data is sent one-way (simplex), alternating directions (half-
duplex), or both directions simultaneously (full-duplex).
• Example: Walkie-talkies are half-duplex, while phone calls are full-duplex.
📊 F. Physical Topology
• Describes the physical layout of devices in the network.
• Common topologies include:
• Star Topology: All devices are connected to a central hub.
• Bus Topology: All devices share a single communication line.
• Ring Topology: Devices are connected in a circular manner.
REAL LIFE ANALOGY
Postal System Example:
• Think of the Physical Layer as the roads and vehicles used to deliver a parcel.
• The parcel (data in binary form) is carried via trucks, ships, or airplanes
(wired or wireless mediums).
• Without roads (physical connections) or proper vehicles (transmission mediums),
the parcel cannot travel from one city to another.
📲 WhatsApp Example:
• Imagine you're using Wi-Fi to send a WhatsApp message.
• The radio signals transmitted from your Wi-Fi router represent the Physical Layer.
• These signals carry the binary data of your message to your ISP's router.
• Similarly, if you're using mobile data (4G/5G), the cellular network converts your
data into radio signals and sends them to the cell tower.
APPLICATION LAYER PROTOCOLS
•The Application Layer is responsible for enabling network applications and end-
user processes to interact with each other.
•It serves as the entry point for data to be transmitted across the network.
•This layer ensures that data is properly formatted, meaningful, and ready for the
user.
Key Responsibilities of the Application Layer
a. Network Resource Access
• Provides access to network resources such as file transfer, remote login, and
network printing.
• Example: Accessing files on a network drive.
📝 b. User Interface and Human Interaction
• Acts as an interface between the user and network services.
• Allows users to interact with network-based applications seamlessly.
• Example: Web browsers (Google Chrome, Firefox) provide an interface to access
websites.
📝 c. Data Representation and Formatting
• Ensures that the data is in a format that the application or user can understand.
• Handles tasks like text formatting, encryption, and compression.
• Example: Formatting an email message in SMTP (Simple Mail Transfer Protocol).
📝 d. Communication and Session Management
• Initiates, manages, and terminates communication sessions between
devices.
• Provides authentication and data integrity during communication.
• Example: Logging into a remote desktop application securely.
📝 e. Network Transparency
• Hides the underlying network details from the user.
• Users don’t need to know how data packets are routed; they only see the end
result.
• Example: When using WhatsApp, users just see “Message Sent” without
worrying about how the message traveled.
Protocols in the Application Layer
Protocol Full Form Purpose Example Use Case
Remote Access
Telnet Terminal Network Remote login
(less secure)
Network
SNMP Simple Network Management Protocol Monitoring devices
Management
WhatsApp Analogy for Application Layer
When you send a message on WhatsApp, the Application Layer performs the
following:
1. User Interface: You type your message and click "Send" on WhatsApp’s user-friendly
interface.
2. Protocol Selection: WhatsApp uses HTTPS protocol to ensure the data is securely
sent to its server.
3. Formatting and Encryption: The message is formatted and encrypted for secure
transfer.
4. Request Sent: The formatted message is handed over to the Transport Layer for
segmentation.
5. Message Delivered: On the recipient's device, the Application Layer decodes the
message and displays it in a readable format.
In short: The Application Layer ensures you can send, receive, and view messages
seamlessly without worrying about the technical details of data transmission.
TRANSPORT LAYER
📦 Sender Side:
1. Data from the Application Layer is segmented into smaller chunks.
2. Each segment is labeled with sequence numbers for reassembly at the receiver’s end.
3. If using TCP, a connection is established before data transfer begins.
4. The segments are passed down to the Network Layer for routing.
📦 Receiver Side:
1. Segments received from the Network Layer are checked for errors.
2. The data is reassembled in the correct order using sequence numbers.
3. Acknowledgments (ACKs) are sent back to the sender for successfully received
segments.
4. Once all segments are reassembled, the complete data is passed to the Application
Layer.
TCP (Transmission Control
Protocol)
🚦 Overview:
• TCP is a connection-oriented protocol. This means a connection is
established and maintained between the sender and receiver until all
data has been successfully transmitted.
• It ensures reliable data delivery, meaning that every piece of data (or
segment) sent will be acknowledged by the receiver, and if any data is
lost, it will be retransmitted.
🔑 Key Features of TCP:
1. Connection-Oriented:
1. Before sending any data, TCP establishes a connection between the sender
and receiver through a process called the Three-Way Handshake.
2. This process ensures that both sides are ready for communication.
2. Reliability:
1. TCP guarantees that data will be delivered without errors, in the correct order.
If any segments are lost, they will be retransmitted.
2. ACKs (Acknowledgments) are sent for received segments, and if the
sender doesn’t receive an acknowledgment, it will resend the segment.
3. Error Checking:
1. Checksums are used to detect errors in the transmitted data. If the receiver
finds an error, it requests the sender to resend the data.
4. Flow Control:
1. TCP uses mechanisms like Sliding Window Protocol to manage data flow and
prevent congestion. It ensures the sender doesn’t overwhelm the receiver by
sending too much data too quickly.
5. Segmentation and Reassembly:
1. Large chunks of data are divided into smaller segments. These segments are
transmitted and then reassembled at the receiver's end to reconstruct the
original data.
6. Ordered Delivery:
1. TCP ensures that data segments are delivered in the exact order they were
sent. If any segments arrive out of order, TCP will reorder them before passing
them to the application layer.
7. Congestion Control:
1. TCP uses algorithms like slow start and congestion avoidance to detect and
handle network congestion. This helps in adjusting the speed of data
transmission to avoid overwhelming the network.
UDP (User Datagram Protocol)
🚦 Overview:
• UDP is a connectionless protocol. This means that data is sent without
establishing a connection and there is no acknowledgment mechanism
to guarantee the successful delivery of data.
• It is much faster than TCP but unreliable.
🔑 Key Features of UDP:
1. Connectionless:
1. There is no need to establish a connection between the sender and receiver. UDP simply sends data
packets (called datagrams) to the receiver without ensuring that they are ready to receive them.
2. Unreliable:
1. UDP does not guarantee that the data will be delivered or that it will be delivered in the correct order.
There are no acknowledgments or retransmissions if packets are lost or corrupted.
2. It is used for applications where speed is more important than reliability.
3. No Flow Control:
1. UDP does not provide flow control. The sender is free to send data as quickly as possible, without
considering whether the receiver can handle it.
4. Faster Than TCP:
1. Because UDP does not have the overhead of establishing connections, error-checking,
acknowledgments, or retransmissions, it is much faster than TCP.
5. Simple Protocol:
1. UDP has a very simple header and is easy to implement. There’s no connection setup or teardown,
making it suitable for high-speed applications.
6. Used for Real-Time Applications:
1. UDP is ideal for real-time applications where speed is crucial, and occasional data loss is acceptable
(e.g., streaming or gaming).
4. When to Use TCP vs UDP?
• Use TCP when reliability is crucial and you need the assurance that
data is delivered correctly, in order, and without loss. Common use
cases:
• Web browsing (HTTP)
• File transfers (FTP)
• Email (SMTP)
• Remote login (Telnet, SSH)
• Use UDP when speed is the priority and occasional data loss is
acceptable. Common use cases:
• Real-time applications (VoIP, Video Conferencing)
• Streaming (Video, Audio)
• Online gaming
• DNS queries
TCP VS UDP
Feature TCP (Transmission Control Protocol) UDP (User Datagram Protocol)
Connection-Oriented (requires establishing a
Connection Type Connectionless (no need to establish a connection)
connection)
Reliable (ensures data is delivered in order without
Reliability Unreliable (no guarantee of data delivery or order)
errors)
Data Delivery Guarantees delivery of data with acknowledgment
No guarantee of delivery or acknowledgment
Guarantee (ACK)
Provides error detection and correction (e.g., checksum,
Error Handling No built-in error correction or acknowledgment
retransmission)
No flow control (does not manage congestion or
Flow Control Yes, uses mechanisms like sliding window protocol
receiver's capacity)
Transmission Slower due to additional overhead (connection setup, Faster due to low overhead (no connection setup or
Speed acknowledgment, retransmission) retransmission)
Data is divided into segments for transmission and Data is divided into datagrams and sent
Data Segmentation
reassembled at the destination independently
Acknowledgment Sends acknowledgment (ACK) for received data No acknowledgment for received data
Suitable for real-time applications where speed
Suitable for applications requiring reliable data transfer
Use Case matters and data loss is acceptable (e.g., video
(e.g., web browsing, email, file transfer)
streaming, online gaming, VoIP)
Examples HTTP, FTP, SMTP, Telnet, SSH DNS, DHCP, VoIP, Video Streaming
Higher due to connection establishment, error checking, Lower due to no connection establishment or
Overhead
and flow control acknowledgment
Ordering of Data Ensures data is delivered in the correct order Does not ensure ordered delivery
Yes, TCP adjusts data transmission rate based on
Congestion Control No congestion control mechanism
network congestion
Header Size 20 bytes (plus additional options) 8 bytes (smaller header)
NETWORK/INTERNET LAYER
The Network Layer is the third layer of the OSI model and is
responsible for the transmission of data packets from the source to the
destination across multiple networks. This layer operates in both
connectionless and connection-oriented modes, depending on the
protocol being used. The primary function of the network layer is to
determine the best path for data to travel, ensure its delivery, and
handle routing.
Key Functions of the Network Layer:
1. Routing:
1. Routing is the process of determining the best path for data packets to travel from the
source to the destination across one or more networks. This is done by routers, which
operate at the network layer.
2. Routing can be static or dynamic:
1. Static routing: Predefined paths are manually set by the network administrator.
2. Dynamic routing: Routers dynamically calculate the best path based on current network
conditions, using routing protocols (e.g., RIP, OSPF, BGP).
2. Packet Forwarding:
1. Once the path is determined, the packet forwarding function comes into play. Data
packets are forwarded from one router to the next until they reach their final destination.
Routers do this by examining the destination IP address of the packet and forwarding it
toward the destination network.
3. Logical Addressing:
1. At the network layer, devices are assigned logical addresses (usually IP addresses). This
logical addressing allows devices to be identified across different networks and enables
routing between devices in different geographical locations.
1. IPv4 (Internet Protocol version 4) and IPv6 (Internet Protocol version 6) are the most widely
used protocols for logical addressing.
4. Fragmentation and Reassembly:
1. When a data packet is too large for the network (for example, when it exceeds the
Maximum Transmission Unit or MTU of the network), the network layer fragments
the packet into smaller pieces.
2. These smaller pieces (called fragments) are sent separately, and once they reach
the destination, they are reassembled back into the original data packet. This
ensures that large packets can be transmitted even over networks with smaller
MTUs.
5. Error Handling:
1. While error detection is primarily handled at lower layers (such as the data link
layer), the network layer may be responsible for discarding corrupted or
unreachable packets. If a packet is undeliverable, the network layer may send a
notification to the sender, depending on the protocol being used (e.g., ICMP for error
reporting).
6. Congestion Control:
1. The network layer can also assist in managing network congestion by rerouting
traffic or applying policies to prevent overload. However, this function is often
handled by higher layers in practice.
7. Encapsulation:
1. The network layer takes data from the transport layer and adds a network layer
header to create a packet. This header typically contains the source IP address
and the destination IP address. This encapsulation allows the packet to be routed
across different networks.
Protocols at the Network Layer:
• IP (Internet Protocol): This is the most important protocol at the network layer.
It defines the addressing scheme and is responsible for routing packets across
networks. There are two main versions:
• IPv4 (Internet Protocol version 4): The most widely used version, using 32-bit
addressing.
• IPv6 (Internet Protocol version 6): An updated version using 128-bit addressing to
overcome the limitations of IPv4.
• ICMP (Internet Control Message Protocol): Used for diagnostic and error-
reporting purposes. It is most commonly seen in ping and traceroute utilities.
ICMP helps in error reporting and control messages.
• ARP (Address Resolution Protocol): ARP maps a 32-bit IP address to a MAC
(Media Access Control) address on the local network. It works at both the network
and data link layers.
• Routing Protocols: These protocols help routers determine the best path for
forwarding data across networks. Examples include:
• RIP (Routing Information Protocol)
• OSPF (Open Shortest Path First)
• BGP (Border Gateway Protocol)
IP PROTOCOL
•Logical Addressing:
•IP addresses are used to uniquely identify devices on a network. These addresses are assigned
to each device (such as a computer, router, or server) connected to a network. IP addressing allows
devices to find each other and communicate.
•There are two major versions of the IP address:
•IPv4 (Internet Protocol version 4): Uses 32-bit addresses, resulting in about 4.3 billion
unique IP addresses.
•IPv6 (Internet Protocol version 6): Uses 128-bit addresses, offering an extremely large
number of IP addresses to meet the demands of a growing number of devices.
•Routing:
•The IP protocol is responsible for routing packets of data across networks, ensuring they travel from
the source to the destination by determining the best possible path. This is done by routers, which
examine the IP address in the packet header and forward the packet to the next router or the
destination.
•Routers use routing tables and routing protocols (e.g., RIP, OSPF, BGP) to make decisions about
which path the packet should take.
•Fragmentation and Reassembly:
•IP is responsible for fragmenting large data packets into smaller pieces (fragments) if they
exceed the Maximum Transmission Unit (MTU) of the network. Each fragment is sent
separately and may take different routes to the destination.
•Once the fragments reach the destination, the receiving device reassembles them to
reconstruct the original packet.
•Packet Forwarding:
•When a packet is sent from one device to another, it is forwarded from one router to the
next, using the IP address in the packet's header. Routers are responsible for determining
the best route based on their routing tables.
•Best-Effort Delivery:
•IP is a best-effort protocol, meaning it does not guarantee packet delivery, order, or error
checking. If a packet is lost or corrupted, it is up to higher layers (like the transport layer) to
handle errors and retransmission.
NETWORK ACCESS LAYER
The Network Access Layer (often referred to as the Link Layer) is the
lowest layer of the TCP/IP reference model. It is responsible for the
physical transmission of data over the network, providing the
mechanisms to transfer data between devices on the same network.
This layer essentially defines how data is transmitted over different
types of physical media such as Ethernet cables, Wi-Fi, and fiber
optics.
It combines the functions of both the Data Link Layer and the
Physical Layer from the OSI model, making it crucial for managing
how devices communicate over a network.
Key Functions of the Network Access Layer
1. Framing:
1. Data is transmitted in the form of frames. The Network Access Layer encapsulates higher-layer data
into frames that can be transmitted over the physical medium.
2. A frame typically contains:
1. Header: Includes important information such as source and destination MAC addresses.
2. Payload: The actual data being sent.
3. Trailer: Error detection and other control information (e.g., a checksum or Frame Check Sequence (FCS)).
2. Addressing:
1. At the Network Access Layer, addressing is done using MAC (Media Access Control) addresses.
Every device on the network (e.g., computers, routers, switches) has a unique MAC address assigned
to its network interface card (NIC). This address is used to direct frames to the correct device on the
local network.
2. The MAC address is 48 bits long and is usually represented in hexadecimal format.
3. Error Detection:
1. The Network Access Layer performs error detection on the transmitted frames using techniques such
as CRC (Cyclic Redundancy Check) or checksum.
2. If errors are detected in a frame (due to noise, signal loss, or collisions), it is typically discarded, and the
data needs to be retransmitted (this might be handled by higher layers like the Transport Layer, such as
in the case of TCP).
4. Access Control:
1. The Network Access Layer manages access to the shared physical medium,
ensuring that multiple devices can send and receive data without interfering with
each other. This is especially important in shared media (like Wi-Fi).
2. It handles Media Access Control (MAC) protocols, such as Carrier Sense
Multiple Access with Collision Detection (CSMA/CD) for Ethernet or Carrier
Sense Multiple Access with Collision Avoidance (CSMA/CA) for Wi-Fi. These
protocols ensure devices only transmit data when the network is clear.
5. Physical Layer Interaction:
1. The Network Access Layer interacts with the Physical Layer to convert frames
into signals that can travel over the network medium (such as electrical signals
over copper cables, optical signals over fiber, or radio waves in wireless networks).
2. The Physical Layer is concerned with the actual physical medium (wires,
wireless radio frequencies, etc.) and the transmission of bits as electrical or optical
signals. The Network Access Layer helps convert frames into these signals.
6. Flow Control:
1. In some cases, the Network Access Layer may also perform simple flow control to
ensure that the sender does not overwhelm the receiver with data. This is more
common in technologies like Ethernet.
OSI VS TCP/IP
Feature OSI Model TCP/IP Model
Application The Application, Presentation, and Session layers Merges all three layers (Application, Presentation, and
Layer are distinct. Session) into one "Application" layer.
•Key Features:
•Error Control: Every packet is verified, and damaged packets are retransmitted.
•Connection-Oriented: A virtual connection is established before data transmission begins.
•Slow Speeds: Operates at a lower speed compared to modern networks like Ethernet.
•Applications:
•ATMs (Automated Teller Machines) for secure banking transactions.
•Early email systems and file transfer services.
•Real-life analogy:
Imagine sending parcels through a courier service where every parcel is opened, checked, and
resealed at each step to ensure nothing is lost or damaged. This thorough checking ensures
reliable delivery but can slow things down.
Frame Relay
•Key Features:
•Fast Data Transfer: Designed for speed over reliability.
•Cost-Efficient: Uses shared bandwidth, reducing costs for businesses.
•Connection-Oriented: Creates a virtual connection before transmitting data.
•Applications:
•Corporate networks for connecting branch offices.
•Telecommunication services like voice and video calls.
•Real-life analogy:
Imagine a carpool service where multiple passengers share the same car to save costs and travel
faster. Unlike a luxury taxi (X.25), it’s quicker but may not guarantee the same level of comfort or
reliability.
ISDN
The ISDN technology (Integrated Services Digital Network, or ISDN)
means complete digitization so that all communication established in
digital form, providing a wide range of services.
Integrated Services Digital Network is a telephone system network. It is
a wide area network becoming widely available. Prior to the ISDN, the
phone system was viewed as a way to transport voice, with some
special services available for data. The key feature of the ISDN is that it
integrates speech and data on the same lines, adding features that were
not available in the classic telephone system.
•What it is:
ISDN is a set of communication standards that allow the transmission of voice, video, and data over
traditional telephone lines. It digitizes the communication process, replacing analog systems for
faster and more efficient transmission. ISDN was widely used in the 1980s and 1990s for video
conferencing, Internet connections, and business communications.
•Key Features:
•Digital Transmission: Ensures clearer signals and faster speeds.
•Multiple Channels: Supports simultaneous transmission of different types of data (voice, video, and
text).
•Types:
•Basic Rate Interface (BRI): For small businesses and home users.
•Primary Rate Interface (PRI): For larger businesses with higher communication needs.
•Applications:
•Video conferencing.
•Early Internet services like dial-up.
•Real-life analogy:
ISDN is like upgrading from a single-lane road (analog phone line) to a multi-lane highway. Instead of
sending one type of vehicle (voice calls), you can send multiple vehicles (voice, video, data)
simultaneously.
Asynchronous Transfer Mode (ATM) in
Computer Network
•Key Features:
•Speed: Modern Ethernet supports speeds from 100 Mbps to 100 Gbps.
•Wired Connection: Uses physical cables for stable connectivity.
•Broadcasting: Data is sent to all devices in the network, but only the intended
recipient processes it.
•Applications:
•Offices and schools for shared Internet access and resources.
•Data centers for high-speed connectivity between servers.
•Real-life analogy:
Imagine an office where all employees are connected by cables to a central printer
and file system. These cables allow them to share resources quickly and reliably.
WiFi
•Wi-Fi, short for Wireless Fidelity, is a wireless networking technology that allows
devices to connect to the internet or communicate with one another without using
physical cables. Wi-Fi is based on the IEEE 802.11 standard and has become a
critical component of modern communication, enabling connectivity in homes,
offices, public spaces, and beyond.
•Wi-Fi provides high-speed internet and network connections using radio frequency
(RF) waves. It eliminates the need for physical cables, allowing multiple devices
such as smartphones, laptops, and smart appliances to connect wirelessly.
•Wireless LAN, commonly known as Wi-Fi, connects devices to a network without using
cables. It uses radio waves to transmit data, making it a convenient solution for laptops,
smartphones, and tablets. Wi-Fi is widely used in homes, cafes, airports, and public
places.
•Key Features:
•Wireless Connectivity: No need for physical cables.
•Mobility: Devices can connect from anywhere within the Wi-Fi range.
•Speed: Modern Wi-Fi standards support high speeds, rivaling Ethernet.
•Applications:
•Home and office networks.
•Public hotspots in cafes, airports, and hotels.
•Real-life analogy:
Wi-Fi is like a cordless phone. Instead of being tied to a specific spot with a wire, you
can move around freely while staying connected.