Unit 1
Unit 1
UNIT-1
For example, Piconet is Bluetooth-enabled Personal Area Network which may contain up to 8 devices
connected together in a master-slave fashion.
LAN provides a useful way of sharing the resources between end users. The resources such as printers,
file servers, scanners, and internet are easily sharable among computers.
LANs are composed of inexpensive networking and routing equipment. It may contains local servers
serving file storage and other locally shared applications. It mostly operates on private IP addresses and
does not involve heavy routing. LAN works under its own local domain and controlled centrally.
LAN uses either Ethernet or Token-ring technology. Ethernet is most widely employed LAN technology
and uses Star topology, while Token-ring is rarely seen.
Metro Ethernet is a service which is provided by ISPs. This service enables its users to expand their Local
Area Networks. For example, MAN can help an organization to connect all of its offices in a city.
Backbone of MAN is high-capacity and high-speed fiber optics. MAN works in between Local Area
Network and Wide Area Network. MAN provides uplink for LANs to WANs or internet.
Wide Area Network
As the name suggests, the Wide Area Network (WAN) covers a wide area which may span across
provinces and even a whole country. Generally, telecommunication networks are Wide Area Network.
These networks provide connectivity to MANs and LANs. Since they are equipped with very high speed
backbone, WANs use very expensive network equipment.
WAN may use advanced technologies such as Asynchronous Transfer Mode (ATM), Frame Relay, and
Synchronous Optical Network (SONET). WAN may be managed by multiple administration.
Internetwork
A network of networks is called an internetwork, or simply the internet. It is the largest network in
existence on this planet. The internet hugely connects all WANs and it can have connection to LANs and
Home networks. Internet uses TCP/IP protocol suite and uses IP as its addressing protocol. Present day,
Internet is widely implemented using IPv4. Because of shortage of address spaces, it is gradually
migrating from IPv4 to IPv6.
Internet enables its users to share and access enormous amount of information worldwide. It uses
WWW, FTP, email services, audio and video streaming etc. At huge level, internet works on Client-Server
model.
Internet uses very high speed backbone of fiber optics. To inter-connect various continents, fibers are
laid under sea known to us as submarine communication cable.
Internet is widely deployed on World Wide Web services using HTML linked pages and is accessible by
client software known as Web Browsers. When a user requests a page using some web browser located
on some Web Server anywhere in the world, the Web Server responds with the proper HTML page. The
communication delay is very low.
Internet is serving many proposes and is involved in many aspects of life. Some of them are:
Web sites
E-mail
Instant Messaging
Blogging
Social Media
Marketing
Networking
Resource Sharing
Audio and Video Streaming
Network Software
Network software encompasses a broad range of software used for design, implementation, and
operation and monitoring of computer networks. Traditional networks were hardware based with
software embedded. With the advent of Software – Defined Networking (SDN), software is separated
from the hardware thus making it more adaptable to the ever-changing nature of the computer
network.
Application Layer: It contains the typical network applications like intrusion detection, firewall,
and load balancing.
Control Layer: It consists of the SDN controller which acts as the brain of the network. It also
allows hardware abstraction to the applications written on top of it.
Infrastructure Layer: This consists of physical switches which form the data plane and carries
out the actual movement of data packets.
The layers communicate via a set of interfaces called the north-bound APIs(between the application and
control layer) and southbound APIs(between the control and infrastructure layer).
Software Defined Network is a virtual networking A traditional network is the old conventional
approach. networking approach.
Software Defined Network is the open interface. A traditional network is a closed interface.
In Software Defined Network data plane and In a traditional network data plane and control
control, the plane is decoupled by software. plane are mounted on the same plane.
Reliability
Network channels and components may be unreliable, resulting in loss of bits while data transfer. So, an
important design issue is to make sure that the information transferred is not distorted.
Scalability
Networks are continuously evolving. The sizes are continually increasing leading to congestion. Also,
when new technologies are applied to the added components, it may lead to incompatibility issues.
Hence, the design should be done so that the networks are scalable and can accommodate such
additions and alterations.
Addressing
At a particular time, innumerable messages are being transferred between large numbers of computers.
So, a naming or addressing system should exist so that each layer can identify the sender and receivers
of each message.
Error Control
Unreliable channels introduce a number of errors in the data streams that are communicated. So, the
layers need to agree upon common error detection and error correction methods so as to protect data
packets while they are transferred.
Flow Control
If the rate at which data is produced by the sender is higher than the rate at which data is received by
the receiver, there are chances of overflowing the receiver. So, a proper flow control mechanism needs
to be implemented.
Resource Allocation
Computer networks provide services in the form of network resources to the end users. The main design
issue is to allocate and deallocate resources to processes. The allocation/deallocation should occur so
that minimal interference among the hosts occurs and there is optimal usage of the resources.
Statistical Multiplexing
It is not feasible to allocate a dedicated path for each message while it is being transferred from the
source to the destination. So, the data channel needs to be multiplexed, so as to allocate a fraction of
the bandwidth or time to each host.
Routing
There may be multiple paths from the source to the destination. Routing involves choosing an optimal
path among all possible paths, in terms of cost and time. There are several routing algorithms that are
used in network systems.
Security
A major factor of data communication is to defend it against threats like eavesdropping and
surreptitious alteration of messages. So, there should be adequate mechanisms to prevent unauthorized
access to data through authentication and cryptography.
Connection-oriented Service gives the guarantee of Connection-less Service does not give a
reliability. guarantee of reliability.
Ensures data is delivered in the correct order. Data may arrive out of order or not at all.
Less scalable due to the need for maintaining Highly scalable for large networks with many
connections. users.
Ex: TCP (Transmission Control Protocol) Ex: UDP (User Datagram Protocol)
Request − A service node wants some service from its adjacent layer to pass the parameters to mention
the requested service.
Indication − Another Service node or receiver node gets an indication that a procedure has been invoked
by the adjacent service node.
Response − A receiver service node acknowledges or completes some procedure.
Confirm − service nodes acknowledge the permission to get connected or not.
Primitive Explanation
Confirmed service − the connection oriented services are called confirmed services.
Unconfirmed service − the connectionless services are called unconfirmed services.
CONNECT. confirm: Tell the caller whether the call was accepted.
OSI Model
o OSI stands for Open System Interconnection is a reference model that describes how
information from a software application in one computer moves through a physical medium to
the software application in another computer.
o OSI consists of seven layers, and each layer performs a particular network function.
o OSI model was developed by the International Organization for Standardization (ISO) in 1984,
and it is now considered as an architectural model for the inter-computer communications.
o OSI model divides the whole task into seven smaller and manageable tasks. Each layer is
assigned a particular task.
o Each layer is self-contained, so that task assigned to each layer can be performed
independently.
o The OSI model is divided into two layers: upper layers and lower layers.
o The upper layer of the OSI model mainly deals with the application related issues, and they are
implemented only in the software. The application layer is closest to the end user. Both the end
user and the application layer interact with the software applications. An upper layer refers to
the layer just above another layer.
o The lower layer of the OSI model deals with the data transport issues. The data link layer and
the physical layer are implemented in hardware and software. The physical layer is the lowest
layer of the OSI model and is closest to the physical medium. The physical layer is mainly
responsible for placing the information on the physical medium.
1. Physical Layer
2. Data-Link Layer
3. Network Layer
4. Transport Layer
5. Session Layer
6. Presentation Layer
7. Application Layer
Physical layer
o The main functionality of the physical layer is to transmit the individual bits from one node to
another node.
o It is the lowest layer of the OSI model.
o It establishes, maintains and deactivates the physical connection.
o It specifies the mechanical, electrical and procedural network interface specifications.
o Line Configuration: It defines the way how two or more devices can be connected physically.
o Data Transmission: It defines the transmission mode whether it is simplex, half-duplex or full-
duplex mode between the two devices on the network.
o Topology: It defines the way how network devices are arranged.
o Signals: It determines the type of the signal used for transmitting the information.
2) Data-Link Layer
o Framing: The data link layer translates the physical's raw bit stream into packets known as
Frames. The Data link layer adds the header and trailer to the frame. The header which is added
to the frame contains the hardware destination and source address.
o Physical Addressing: The Data link layer adds a header to the frame that contains a
destination address. The frame is transmitted to the destination address mentioned in the
header.
o Flow Control: Flow control is the main functionality of the Data-link layer. It is the technique
through which the constant data rate is maintained on both the sides so that no data get
corrupted. It ensures that the transmitting station such as a server with higher processing speed
does not exceed the receiving station, with lower processing speed.
o Error Control: Error control is achieved by adding a calculated value CRC (Cyclic Redundancy
Check) that is placed to the Data link layer's trailer which is added to the message frame before
it is sent to the physical layer. If any error seems to occur, then the receiver sends the
acknowledgment for the retransmission of the corrupted frames.
o Access Control: When two or more devices are connected to the same communication
channel, then the data link layer protocols are used to determine which device has control over
the link at a given time.
3) Network Layer
o It is a layer 3 that manages device addressing, tracks the location of devices on the network.
o It determines the best path to move data from source to the destination based on the network
conditions, the priority of service, and other factors.
o The Data link layer is responsible for routing and forwarding the packets.
o Routers are the layer 3 devices, they are specified in this layer and used to provide the routing
services within an internetwork.
o The protocols used to route the network traffic are known as Network layer protocols. Examples
of protocols are IP and Ipv6.
o The Transport layer is a Layer 4 ensures that messages are transmitted in the order in which
they are sent and there is no duplication of data.
o The main responsibility of the transport layer is to transfer the data completely.
o It receives the data from the upper layer and converts them into smaller units known as
segments.
o This layer can be termed as an end-to-end layer as it provides a point-to-point connection
between source and destination to deliver the data reliably.
The two protocols used in this layer are:
o Service-point addressing: Computers run several programs simultaneously due to this reason,
the transmission of data from source to the destination not only from one computer to another
computer but also from one process to another process. The transport layer adds the header
that contains the address known as a service-point address or port address. The responsibility of
the network layer is to transmit the data from one computer to another computer and the
responsibility of the transport layer is to transmit the message to the correct process.
o Segmentation and reassembly: When the transport layer receives the message from the
upper layer, it divides the message into multiple segments, and each segment is assigned with a
sequence number that uniquely identifies each segment. When the message has arrived at the
destination, then the transport layer reassembles the message based on their sequence
numbers.
o Connection control: Transport layer provides two services Connection-oriented service and
connectionless service. A connectionless service treats each segment as an individual packet,
and they all travel in different routes to reach the destination. A connection-oriented service
makes a connection with the transport layer at the destination machine before delivering the
packets. In connection-oriented service, all the packets travel in the single route.
o Flow control: The transport layer also responsible for flow control but it is performed end-to-
end rather than across a single link.
o Error control: The transport layer is also responsible for Error control. Error control is
performed end-to-end rather than across the single link. The sender transport layer ensures that
message reach at the destination without any error.
5) Session Layer
o Dialog control: Session layer acts as a dialog controller that creates a dialog between two
processes or we can say that it allows the communication between two processes which can be
either half-duplex or full-duplex.
o Synchronization: Session layer adds some checkpoints when transmitting the data in a
sequence. If some error occurs in the middle of the transmission of data, then the transmission
will take place again from the checkpoint. This process is known as Synchronization and
recovery.
6) Presentation Layer
o A Presentation layer is mainly concerned with the syntax and semantics of the information
exchanged between the two systems.
o It acts as a data translator for a network.
o This layer is a part of the operating system that converts the data from one presentation format
to another format.
o The Presentation layer is also known as the syntax layer.
o Translation: The processes in two systems exchange the information in the form of character
strings, numbers and so on. Different computers use different encoding methods, the
presentation layer handles the interoperability between the different encoding methods. It
converts the data from sender-dependent format into a common format and changes the
common format into receiver-dependent format at the receiving end.
o Encryption: Encryption is needed to maintain privacy. Encryption is a process of converting the
sender-transmitted information into another form and sends the resulting message over the
network.
o Compression: Data compression is a process of compressing the data, i.e., it reduces the
number of bits to be transmitted. Data compression is very important in multimedia such as
text, audio, video.
7) Application Layer
o An application layer serves as a window for users and application processes to access network
service.
o It handles issues such as network transparency, resource allocation, etc.
o An application layer is not an application, but it performs the application layer functions.
o This layer provides the network services to the end-users.
o File transfer, access, and management (FTAM): An application layer allows a user to access
the files in a remote computer, to retrieve the files from a computer and to manage the files in a
remote computer.
o Mail services: An application layer provides the facility for email forwarding and storage.
o Directory services: An application provides the distributed database sources and is used to
provide that global information about various objects.
TCP/IP model
o The TCP/IP model was developed prior to the OSI model.
o The TCP/IP model is not exactly similar to the OSI model.
o The TCP/IP model consists of five layers: the application layer, transport layer, network layer,
data link layer and physical layer.
o The first four layers provide physical standards, network interface, internetworking, and
transport functions that correspond to the first four layers of the OSI model and these four
layers are represented in TCP/IP model by a single layer called the application layer.
o TCP/IP is a hierarchical protocol made up of interactive modules, and each of them provides
specific functionality.
Here, hierarchical means that each upper-layer protocol is supported by two or more lower-level protocols.
Internet Layer
o IP Addressing: This protocol implements logical host addresses known as IP addresses. The IP
addresses are used by the internet and higher layers to identify the device and to provide
internetwork routing.
o Host-to-host communication: It determines the path through which the data is to be
transmitted.
o Data Encapsulation and Formatting: An IP protocol accepts the data from the transport layer
protocol. An IP protocol ensures that the data is sent and received securely, it encapsulates the
data into message known as IP datagram.
o Fragmentation and Reassembly: The limit imposed on the size of the IP datagram by data link
layer protocol is known as Maximum Transmission unit (MTU). If the size of IP datagram is
greater than the MTU unit, then the IP protocol splits the datagram into smaller units so that
they can travel over the local network. Fragmentation can be done by the sender or
intermediate router. At the receiver side, all the fragments are reassembled to form an original
message.
o Routing: When IP datagram is sent over the same local network such as LAN, MAN, WAN, it is
known as direct delivery. When source and destination are on the distant network, then the IP
datagram is sent indirectly. This can be accomplished by routing the IP datagram through
various devices such as routers.
ARP Protocol
o The two terms are mainly associated with the ARP Protocol:
o ARP request: When a sender wants to know the physical address of the device, it
broadcasts the ARP request to the network.
o ARP reply: Every device attached to the network will accept the ARP request and
process the request, but only recipient recognize the IP address and sends back its
physical address in the form of ARP reply. The recipient adds the physical address both
to its cache memory and to the datagram header
ICMP Protocol
TCP refers to Transmission Control Protocol. OSI refers to Open Systems Interconnection.
TCP/IP uses both the session and presentation layer OSI uses different session and presentation
in the application layer itself. layers.
The Transport layer in TCP/IP does not provide In the OSI model, the transport layer provides
assurance delivery of packets. assurance delivery of packets.
Evolution of Networks
A network additionally enables associated PCs to share documents and information and also equipment
assets, i.e., scanners, plotters, projectors, and storage devices, making it simpler to gather and
administer data, and enabling clients to work together. The system was simply not advanced in one day;
rather took a long time to be an all the more incredible, productive, and dependable system.
Advancement of systems administration began path back in 1969’s with the improvement of the first
system called ARPANET, which prompted the improvement of the web. At that point, constant everyday
upgradation occurs in the system innovation. The system has gone through a few phases which are
described below:
Interspace
An Interspaces is a software that allows multiple users in a client-server environment to communicate
with each other to send and receive data of various types such as data files, video, audio, and textual
data. Interspaced gives the most exceptional type forms of communication available on the Internet
today.