CND Unit-2-2
CND Unit-2-2
UNIT-II
Network Models (12 Marks)
_______________________________________________________
1. Physical and Data Link Layers: 2. Network Layer: 3. Transport Layer: 4. Application
Layer:
The TCP/IP protocol suite was developed prior to the OSI model. Therefore, the layers in the
TCP/IP protocol suite do not exactly match those in the OSI model.
The original TCP/IP protocol suite was defined as having four layers: host-to-network, internet,
transport, and application.
The TCP/IP protocol suite is made of five layers: physical, data link, network, transport, and
application. The first four layers provide physical standards, network interfaces,
internetworking, and transport functions that correspond to the first four layers of the OSI
V2V EDTECH LLP
model. The three topmost layers in the OSI model, however, are represented in TCP/IP by a
single layer called the application layer (see Figure 1.23).
At the physical and data link layers, TCP/IP does not define any specific protocol. It supports
all the standard and proprietary protocols. A network in a TCP/IP internetwork can be a local-
area network or a wide-area network.
2. Network Layer:
At the network layer (or, more accurately, the internetwork layer), TCP/IP supports the
Internetworking Protocol. IP, in turn, uses four supporting protocols: ARP, RARP, ICMP, and
IGMP.
The Address Resolution Protocol (ARP) is used to associate a logical address with a physical
address. On a typical physical network, such as a LAN, each device on a link is identified by a
physical or station address, usually imprinted on the network interface card (NIC). ARP is used
to find the physical address of the node when its Internet address is known.
3. Transport Layer:
Traditionally the transport layer was represented in TCP/IP by two protocols: TCP and UDP.
IP is a host-to-host protocol, meaning that it can deliver a packet from one physical device to
another. UDP and TCP are transport level protocols responsible for delivery of a message from
a process (running program) to another process. A new transport layer protocol, SCTP, has
been devised to meet the needs of some newer applications.
V2V EDTECH LLP
a. User Datagram Protocol
The User Datagram Protocol (UDP) is the simpler of the two standard TCP/IP transport
protocols. It is a process-to-process protocol that adds only port addresses, checksum error
control, and length information to the data from the upper layer.
4. Application Layer:
The application layer in TCP/IP is equivalent to the combined session, presentation and
application layers in the OSI model. Many protocols are defined at this layer.
OR
This layer is responsible for the physical transmission of data over the network. It
corresponds to both the Physical Layer and Data Link Layer of the OSI model.
Responsibilities:
o Handles how data is framed and transmitted over physical media (cables,
wireless, etc.).
o Ensures proper hardware addressing (MAC addresses) to identify devices on
the local network.
o Examples: Ethernet, Wi-Fi, and ARP.
The Internet Layer manages the routing of data packets across networks and ensures
they reach the correct destination device.
Responsibilities:
o IP (Internet Protocol) is the primary protocol used for addressing and routing
packets between devices across different networks.
o ICMP helps with error reporting and diagnostics (e.g., ping).
V2V EDTECH LLP
o ARP resolves IP addresses to MAC addresses to enable correct packet
delivery within a local network.
Examples: IP, ICMP, ARP, IGMP.
This layer ensures reliable communication between devices over the network by
providing mechanisms for error detection, flow control, and retransmission.
Responsibilities:
o TCP: Provides reliable, connection-oriented communication (guarantees
packet delivery).
o UDP: Provides connectionless communication, used where reliability is not
critical (e.g., streaming).
Examples: TCP, UDP.
This layer interacts directly with the application software, providing protocols that
facilitate communication between programs on different devices.
Responsibilities:
o Defines the protocols that applications use to communicate over the network,
including web browsing, file transfer, email, etc.
o Ensures that data is correctly formatted and delivered to the appropriate
application.
Examples: HTTP, FTP, SMTP, DNS, POP3, IMAP, Telnet, SNMP.
1. IP (Internet Protocol):
o IPv4 and IPv6 versions are responsible for addressing and routing data
packets between devices across networks.
2. TCP (Transmission Control Protocol):
o Ensures reliable, connection-oriented communication with features like error
detection, retransmission, and flow control.
3. UDP (User Datagram Protocol):
o A connectionless protocol that offers low-latency communication without
guaranteed delivery (used for applications like streaming).
4. HTTP (Hypertext Transfer Protocol):
o Used by web browsers and servers for the transfer of web pages over the
internet.
5. FTP (File Transfer Protocol):
o Used for transferring files between devices over a network.
6. SMTP (Simple Mail Transfer Protocol):
o Used for sending emails between mail servers.
7. DNS (Domain Name System):
o Resolves human-readable domain names (e.g., www.example.com) into IP
addresses.
V2V EDTECH LLP
8. ICMP (Internet Control Message Protocol):
o Used for network diagnostics and error reporting (e.g., "ping").
9. ARP (Address Resolution Protocol):
o Resolves IP addresses to MAC addresses in a local network.
2.2. ADDRESSING:
Q. Explain port addressing and application specific addressing in TCP/IP reference
model.
Q. On which layer of OSI reference model following protocol works – i) UDP ii) IP iii)
FTP iv) SCTP
Four levels of addresses are used in an internet employing the TCP/IP protocols: physical (link)
addresses, logical (IP) addresses, port addresses, and specific addresses.
a. Physical Addresses:
The physical address, also known as the link address, is the address of a node as defined by its
LAN or WAN. It is included in the frame used by the data link layer. It is the lowest-level
address.
V2V EDTECH LLP
The physical addresses have authority over the network (LAN or WAN). The size and format
of these addresses vary depending on the network. For example, Ethernet uses a 6-byte (48-
bit) physical address that is imprinted on the network interface card (NIC). LocalTalk (Apple),
however, has a I-byte dynamic address that changes each time the station comes up.
b. Logical Addresses
Logical addresses are necessary for universal communications that are independent of
underlying physical networks. Physical addresses are not adequate in an internetwork
environment where different networks can have different address formats. A universal
addressing system is needed in which each host can be identified uniquely, regardless of the
underlying physical network.
The logical addresses are designed for this purpose. A logical address in the Internet is currently
a 32-bit address that can uniquely define a host connected to the Internet.
c. Port Addresses:
The IP address and the physical address are necessary for a quantity of data to travel from a
source to the destination host. However, arrival at the destination host is not the final objective
of data communications on the Internet. A system that sends nothing but data from one
computer to another is not complete. Today, computers are devices that can run multiple
processes at the same time. The end objective of Internet communication is a process
communicating with another process. For example, computer A can communicate with
computer C by using TELNET. At the same time, computer A communicates with computer
B by using the File Transfer Protocol (FTP). For these processes to receive data simultaneously,
we need a method to label the different processes. In other words, they need addresses. In the
TCP/IP architecture, the label assigned to a process is called a port address. A port address in
TCP/IP is 16 bits in length.
d. Specific Addresses:
Some applications have user-friendly addresses that are designed for that specific address.
Examples include the e-mail address and the Universal Resource Locator (URL). The first
defines the recipient of an e-mail; the second is used to find a document on the World Wide
Web. These addresses, however, get changed to the corresponding port and logical addresses
by the sending computer.
OR
Addressing in Networking
There are different types of addressing schemes used in various layers of the OSI and TCP/IP
models. Here are the main types of addressing:
V2V EDTECH LLP
Types of Addressing in Networking:
3. Port Addressing
Summary:
Summary:
Physical Addressing (MAC): Identifies devices on the same local network (Layer 2),
used for data transmission in the local network.
Logical Addressing (IP): Assigns unique identifiers to devices across different
networks, allowing for data routing between them (Layer 3).
Port Addressing: Used to route data to the correct service/application on a device by
using specific port numbers (Layer 4).
Application Addressing (Domain Name): Translates user-friendly domain names
into IP addresses, allowing users to access websites or services using DNS (Layer 7).
2.3.OSI Model:
Q. Describe the functions of i) Transport layer ii) Network layer of OSI model.
Q. Draw layered architecture of the OSI model. State functions of various layers.
Q. Draw layered architecture of the OSI model. State the functions of various layers.
Q. Explain different functions of datalink layer of OSI reference model.
An open system is a set of protocols that allows any two different systems to communicate
regardless of their underlying architecture. The purpose of the OSI model is to show how to
facilitate communication between different systems without requiring changes to the logic of
the underlying hardware and software. The OSI model is not a protocol; it is a model for
understanding and designing a network architecture that is flexible, robust, and interoperable.
The OSI model is a layered framework for the design of network systems that allows
communication between all types of computer systems. It consists of seven separate but related
layers, each of which defines a part of the process of moving information across a network (see
Figure 1.13).
V2V EDTECH LLP
1. Layered architecture:
Figure shows the layers involved when a message is sent from device A to device B. As the
message travels from A to B, it may pass through many intermediate nodes. These intermediate
nodes usually involve only the first three layers of the OSI Model.
Each layer defines a family of functions distinct from those of the other layers. By defining and
localizing functionality in this fashion, the designers created an architecture that is both
comprehensive and flexible.
2. Peer-to-Peer Processes:
At the physical layer, communication is direct: In Figure, device A sends a stream of bits to
device B (through intermediate nodes). At the higher layers, however, communication must
move down through the layers on device A, over to device B, and then back up through the
layers. Each layer in the sending device adds its own information to the message it receives
from the layer just above it and passes the whole package to the layer just below it.
V2V EDTECH LLP
At layer 1 the entire package is converted to a form that can be transmitted to the receiving
device. At the receiving machine, the message is unwrapped layer by layer, with each process
receiving and removing the data meant for it. For example, layer 2 removes the data meant for
it, and then passes the rest to layer 3. Layer 3 then removes the data meant for it and passes the
rest to layer 4, and so on.
The passing of the data and network information down through the layers of the sending device
and back up through the layers of the receiving device is made possible by an interface between
each pair of adjacent layers.
The seven layers can be thought of as belonging to three subgroups. Layers I, 2, and 3-physical,
data link, and network-are the network support layers; they deal with the physical aspects of
moving data from one device to another. Layers 5, 6, and 7-session, presentation, and
application-can be thought of as the user support layers; they allow interoperability among
unrelated software systems. Layer 4, the transport layer ensures that what the lower layers have
transmitted is in a form that the upper layers can use. The upper OSI layers are almost always
implemented in software; lower layers are a combination of hardware and software, except for
the physical layer, which is mostly hardware.
In Figure, which gives an overall view of the OSI layers, D7 means the data unit at layer 7, D6
means the data unit at layer 6, and so on. The process starts at layer 7 (the application layer),
then moves from layer to layer in descending, sequential order. At each layer, a header, or
possibly a trailer, can be added to the data unit. Commonly, the trailer is added only at layer
2. When the formatted data unit passes through the physical layer (layer 1), it is changed into
an electromagnetic signal and transported along a physical link.
V2V EDTECH LLP
5. Encapsulation:
A packet (header and data) at level 7 is encapsulated in a packet at level 6. The whole packet
at level 6 is encapsulated in a packet at level 5, and so on. In other words, the data portion of a
packet at level N - 1 carries the whole packet (data and header and maybe trailer) from level
N. The concept is called encapsulation; level N - 1 is not aware of which part of the
encapsulated packet is data and which part is the header or trailer. For level N - 1, the whole
packet coming from level N is treated as one integral un
1. Physical Layer
The physical layer coordinates the functions required to carry a bit stream over a physical
medium. It deals with the mechanical and electrical specifications of the interface and
transmission medium.
The physical layer is responsible for movements of individual bits from one hop (node) to
the next.
V2V EDTECH LLP
a. Physical characteristics of interfaces and medium. The physical layer defines the
characteristics of the interface between the devices and the transmission medium.
b. Representation of bits. The physical layer data consists of a stream of bits (sequence of Os
or 1s) with no interpretation.
c. Data rate. The transmission rate-the number of bits sent each second-is also defined by the
physical layer.
d. Synchronization of bits. The sender and receiver not only must use the same bit rate but
also must be synchronized at the bit level.
e. Line configuration. The physical layer is concerned with the connection of devices to the
media; it may be point-to-point configuration or multi-point.
f. Physical topology. The physical topology defines how devices are connected to make a
network. Ex. Mesh, Star, Ring, Bus, or a hybrid topology.
g. Transmission mode. The physical layer also defines the direction of transmission between
two devices: simplex, half-duplex, or full-duplex.
The data link layer transforms the physical layer, a raw transmission facility, to a reliable
link. The data link layer is responsible for moving frames from one hop (node) to the next.
3. Flow control. If the rate at which the data are absorbed by the receiver is less than therate
at which data are produced in the sender, the data link layer imposes a flow control mechanism
to avoid overwhelming the receiver.
4. Error control. The data link layer adds reliability to the physical layer by
addingmechanisms to detect and retransmit damaged or lost frames.
5. Access control. When two or more devices are connected to the same link, data linklayer
protocols are necessary to determine which device has control over the link at any given time.
3. Network Layer:
The network layer is responsible for the source-to-destination delivery of a packet, possibly
across multiple networks (links). Figure 1.18 shows the relationship of the network layer to the
data link and transport layers.
The network layer is responsible for the delivery of individual packets from the source
host to the destination host.
Other responsibilities of the network layer include the following:
1. Logical addressing. The network layer adds a header to the packet coming from the upper
layer that, among other things, includes the logical addresses of the sender and receiver.
V2V EDTECH LLP
2. Routing. When independent networks or links are connected to create intemetworks or a
large network, the connecting devices route or switch the packets to their final destination.
4. Transport layer:
The transport layer is responsible for process-to-process delivery of the entire message. A
process is an application program running on a host. The transport layer ensures that the whole
message arrives intact and in order, overseeing both error control and flow control at the source-
to-destination level. Figure 1.19 shows the relationship of the transport layer to the network
and session layers.
The transport layer is responsible for the delivery of a message from one process to
another.
a. Service-point addressing. Source-to-destination delivery means delivery not only from one
computer to the next but also from a specific process (running program) on one computer to a
specific process (running program) on the other. The transport layer header must therefore
include a type of address called a service-point address (or port address).
b. Segmentation and reassembly. A message is divided into transmittable segments, with
each segment containing a sequence number. These numbers enable the transport layer to
reassemble the message correctly upon arriving at the destination and to identify and replace
packets that were lost in transmission.
c. Connection control. The transport layer can be either connectionless or connection oriented.
A connectionless transport layer treats each segment as an independent packet and delivers it
to the transport layer at the destination machine. A connection oriented transport layer makes
a connection with the transport layer at the destination machine first before delivering the
packets. After all the data are transferred, the connection is terminated.
d. Flow control. The transport layer is responsible for flow control. However, flow control at
this layer is performed end to end rather than across a single link.
e. Error control. The transport layer is responsible for error control. However, error control at
this layer is performed process-to-process rather than across a single link.
5. Session Layer:
The session layer is the network dialog controller. It establishes, maintains, and synchronizes
the interaction among communicating systems.
6. Presentation Layer:
The presentation layer is concerned with the syntax and semantics of the information
exchanged between two systems.
The presentation layer is responsible for translation, compression, and encryption.
c. Encryption. A system must be able to ensure privacy. Encryption means that the sender
transforms the original information to another form and sends the resulting message out over
the network. Decryption reverses the original process to transform the message back to its
original form.
d. Compression. Data compression reduces the number of bits contained in the information.
It is very important in the transmission of multimedia such as text, audio, and video.
V2V EDTECH LLP
7. Application Layer:
The application layer enables the user, whether human or software, to access the network. It
provides user interfaces and support for services such as electronic mail, remote file access and
transfer, shared database management, and other types of distributed information services.
b. File transfer, access, and management. This application allows a user to access files in a
remote host, to retrieve files from a remote computer for use in the local computer, and to
manage or control files in a remote computer locally.
c. Mail services. This application provides the basis for e-mail forwarding and storage.
d. Directory services. This application provides distributed database sources and access for
global information about various objects and services.
OR
The OSI Model (Open Systems Interconnection Model) is a conceptual framework used to
understand network interactions in seven layers. It defines the functionalities of each layer
and how they interact with each other. Here is an overview of the functions of each layer in
the OSI model:
Function: Deals with the physical connection between devices and the transmission
of raw binary data (bits) over a communication medium.
Responsibilities:
V2V EDTECH LLP
o Defines the hardware aspects of the network, such as cables, switches, and the
electrical or optical signals used for communication.
o Specifies the voltage levels, pin layout, cable specifications, data rates, etc.
o Provides the means for sending and receiving data through the transmission
medium.
o Examples: Ethernet cables, fiber optics, wireless transmission.
Function: Responsible for the reliable transmission of data frames between two
directly connected devices over the physical layer.
Responsibilities:
o Defines the frame structure and manages error detection and correction.
o Handles MAC (Media Access Control) addressing to ensure data reaches the
correct device on a local network.
o Provides flow control to manage the rate of data transfer.
o Error correction (via checksums or CRC) ensures that data errors due to
noise or interference are detected and corrected.
o Examples: Ethernet, Wi-Fi, PPP (Point-to-Point Protocol).
Function: Responsible for routing data packets across different networks and
ensuring they reach the correct destination device.
Responsibilities:
o Handles IP addressing and the routing of packets based on IP addresses.
o Decides the best path to send data across interconnected networks.
o Manages logical addressing, packet forwarding, and addressing for inter-
network communication.
o Provides fragmentation and reassembly of data to suit the MTU (Maximum
Transmission Unit) of different networks.
o Examples: IP (Internet Protocol), ICMP (Internet Control Message
Protocol), Routers.
__________***_________