Computer Network
Unit-2 Network Models
AMPICS,
Ganpat University
Design Issues of the Layer
2
Reliability
3
Scalability
4
Addressing
5
Error Control
6
Flow Control
7
Resource Allocation
8
Statistical Multiplexing
9
Routing
There may be multiple paths from the source to the destination. Routing involves choosing an optimal path among all possible paths, in terms of cost and time. There are several routing algorithms that are used in network systems
10
Security
11
Protocol Hierarchies
12
13
14
15
16
OSI Model
17
18
Layers of OSI Model
19
Layer 1- Physical Layer
20
The Functions of the Physical Layer
21
Layer 2- Data Link Layer (DLL)
22
The Functions of the Data Link Layer
23
Layer 3- Network Layer
24
Functions of the Network Layer
25
Layer 4- Transport Layer
26
Functions of the Transport Layer
27
Layer 5- Session Layer
28
Functions of the Session Layer
29
Layer 6- Presentation Layer
30
The Functions of the Presentation Layer are
31
Layer 7- Application Layer
32
The Functions of the Application Layer are
33
Computer Networking Terminology
34
35
36
37
38
Connection-Oriented and Connectionless Service
39
Connection-Oriented Service
40
41
Suppose, a sender wants to send data to the receiver. Then, first, the sender sends a request packet to a receiver in the form of an SYN packet. After that, the receiver responds to the sender's request with an (SYN-ACK) signal/packets. That represents the confirmation is received by the receiver to start the communication between the sender and the receiver. Now a sender can send the message or data to the receiver.
What is a TCP?
42
Connectionless Service
43
44
45
What is UDP?
46
Connection-Oriented vs Connectionless Service
| Comparison Parameter | Connection-oriented Service | Connection Less Service |
1. | Related System | It is designed and developed based on the telephone system. | It is service based on the postal system. |
2. | Definition | It is used to create an end to end connection between the senders to the receiver before transmitting the data over the same or different network. | It is used to transfer the data packets between senders to the receiver without creating any connection. |
3. | Virtual path | It creates a virtual path between the sender and the receiver. | It does not create any virtual connection or path between the sender and the receiver. |
47
4. | Authentication | It requires authentication before transmitting the data packets to the receiver. | It does not require authentication before transferring data packets. |
5. | Data Packets Path | All data packets are received in the same order as those sent by the sender. | Not all data packets are received in the same order as those sent by the sender. |
6. | Bandwidth Requirement | It requires a higher bandwidth to transfer the data packets. | It requires low bandwidth to transfer the data packets. |
7. | Data Reliability | It is a more reliable connection service because it guarantees data packets transfer from one end to the other end with a connection. | It is not a reliable connection service because it does not guarantee the transfer of data packets from one end to another for establishing a connection. |
8. | Congestion | There is no congestion as it provides an end-to-end connection between sender and receiver during transmission of data. | There may be congestion due to not providing an end-to-end connection between the source and receiver to transmit of data packets. |
9 | Examples | Transmission Control Protocol (TCP) | User Datagram Protocol (UDP), Internet Protocol (IP), and Internet Control Message Protocol (ICMP) |
48
TCP/IP Reference model
49
Each upper-layer protocol is supported by two or more lower-level protocols.
50
Physical Network Access Layer
51
Internet Layer
IP Protocol
ARP Protocol
ICMP Protocol
52
IP Protocol: IP protocol is used in this layer, and it is the most significant part of the entire TCP/IP suite.
Following are the responsibilities of this protocol:
ARP Protocol: ARP stands for Address Resolution Protocol. ARP is a network layer protocol which is used to find the physical address from the IP address.
ICMP Protocol: ICMP stands for Internet Control Message Protocol.
53
Transport Layer
54
UDP consists of the following fields:� Source port address: � Destination port address: � Total length: � Checksum:
55
Application Layer
56
Following are the main protocols used in the application layer:
57
58
Comparison of ISO-OSI and TCP/IP Model
Similarities between the OSI and TCP/IP model
59
60
Differences between the OSI and TCP/IP model
OSI Model | TCP/IP Model |
It stands for Open System Interconnection. | It stands for Transmission Control Protocol. |
OSI model has been developed by ISO (International Standard Organization). | It was developed by ARPANET (Advanced Research Project Agency Network). |
It is an independent standard and generic protocol used as a communication gateway between the network and the end user. | It consists of standard protocols that lead to the development of an internet. It is a communication protocol that provides the connection among the hosts. |
In the OSI model, the transport layer provides a guarantee for the delivery of the packets. | The transport layer does not provide the surety for the delivery of packets. But still, we can say that it is a reliable model. |
61
This model is based on a vertical approach. | This model is based on a horizontal approach. |
In this model, the session and presentation layers are separated, i.e., both the layers are different. | In this model, the session and presentation layer are not different layers. Both layers are included in the application layer. |
It is also known as a reference model through which various networks are built. For example, the TCP/IP model is built from the OSI model. It is also referred to as a guidance tool. | It is an implemented model of an OSI model. |
In this model, the network layer provides both connection-oriented and connectionless service. | The network layer provides only connectionless service. |
Protocols in the OSI model are hidden and can be easily replaced when the technology changes. | In this model, the protocol cannot be easily replaced. |
It consists of 7 layers. | It consists of 4 layers. |
62
OSI model defines the services, protocols, and interfaces as well as provides a proper distinction between them. It is protocol independent. | In the TCP/IP model, services, protocols, and interfaces are not properly separated. It is protocol dependent. |
The usage of this model is very low. | This model is highly used. |
It provides standardization to the devices like router, motherboard, switches, and other hardware devices. | It does not provide the standardization to the devices. It provides a connection between various computers. |
63