OSI Model New11
OSI Model New11
Computer Networks
A network consists of two or more computers
that are linked in order to share resources
(such as printers and CDs), exchange files, or
allow electronic communications.
1
Computer Network (Cont…)
2
Every Network Includes:
1. At least two computers that have
something to share.
5
Network Computing Models
Centralized Computing
(Client-Server Network)
◦ A client-server network is where
every client is connected to the
server .
◦ Server or mainframe computer has
huge storage and processing
capabilities.
6
Network Computing Models
Distributed Computing (Peer-to-Peer
Network)
◦ All devices have same power.
◦ It interconnects one or more computers.
◦ Centralized backup is not possible.
7
Uses of Computer Network
Simultaneous Access
Personal Communication
Easier Backup
8
APPLICATIONS OF NETWOKS
E-mail
Searchable Data (Web Sites)
E-Commerce
News Groups
Internet Telephony (VoIP)
Video Conferencing
Chat Groups
Instant Messengers
Internet Radio
9
What is a Topology?
Network topologies describe the
ways in which the elements of a
network are mapped. They
describe the physical and logical
arrangement of the network
nodes.
Star Topology
Ring Topology
Mesh Topology
Tree Topology
Hybrid Topology
11
Bus Topology
Allthe nodes (file server, workstations, and
peripherals) on a bus topology are
connected by one single cable.
13
Ring Topology
In a ring network, every device has exactly two
neighbours for communication purposes.
14
Ring Topology
15
Star Topology
In a star network, each node (file server, workstations,
and peripherals) is connected to a central device called
a hub.
The hub takes a signal that comes from any node and
passes it along to all the other nodes in the network.
17
Tree Topology
A tree topology (hierarchical topology) can be viewed as
a collection of star networks arranged in a hierarchy.
18
Tree Topology
19
Mesh Topology
In this topology, each node is connected to
every other node in the network.
21
Hybrid Topology
A combination of any two or more
network topologies.
23
Network Types
31
OSI Layers
32
An Exchange Using the OSI Model
33
Physical Layer
34
Physical Layer (Cont…)
37
Data Link Layer (Cont…)
It is responsible for node-to-node delivery
of data.
It receives the data from network layer and
creates FRAMES , add physical address to
these frames & pas them to physical layer
It consist of 2 layers:
Logical Link Layer (LLC) : Defines
the methods and provides addressing
information for communication between
network devices.
Medium Access Control (MAC):
establishes and maintains links between
communicating devices.
38
Functions of Data Link Layer
40
Functions of Data Link Layer
42
Network Layer (Cont…)
Itis responsible for the source to destination
delivery of a packet across multiple networks.
43
Functions of Network Layer
Internetworking: It provides Internetworking.
45
Transport Layer (Cont…)
Itis responsible for process-to-process delivery of the
entire message.
49
Session Layer (Cont…)
Session layer is the fifth layer of
OSI Model
52
Presentation Layer
(Cont…)
Presentation layer is the sixth layer
of OSI Model.
55
Application Layer (Cont…)
It
is the topmost i.e. seventh layer of OSI
Model.
59
Goals on which TCP/IP model was
designed:
The network should connect multiple
networks together.
63
Network Layer
Itis similar to Network Layer of OSI
model in functionality.
Function of UDP:
73
DIFFERENCES
74
DIFFERENCES (Cont…)
TCP/IP appears to be a more simpler model and
this is mainly due to the fact that it has fewer
layers.
77
TCP/IP Layers
OSI TCP/IP
Application Layer Application Layer
TELNET, FTP, SMTP, POP3,
Presentation Layer
SNMP, NNTP, DNS,NIS, NFS,
Session Layer HTTP, ...
78
TCP/IP Some Protocol
Layer Protocol
DNS, TFTP, TLS/SSL, FTP, Gopher, HTTP, IMAP, IRC,
NNTP, POP3, SIP, SMTP, SMPP, SNMP, SSH, Telnet,
Echo, RTP, PNRP, rlogin, ENRP
Applicati
on Routing protocols like BGP and RIP which run over
TCP/UDP, may also be considered part of the
Internet Layer.
Transport TCP, UDP, DCCP, SCTP, IL, RUDP, RSVP
IP (IPv4, IPv6), ICMP, IGMP, and ICMPv6
Internet OSPF for IPv4 was initially considered IP layer
protocol since it runs per IP-subnet, but has been
placed on the Link since RFC 2740.
Link ARP, RARP, OSPF (IPv4/IPv6), IS-IS, NDP
79
UNIT – II
Data Link Protocols
Data Link Protocols are sets of
rule and regulations used to
implement data link layer.
They contain rules for:
◦ Line Discipline
◦ Flow Control
◦ Error Control
80
Types of Data Link Protocols
Data Link Protocols are divided
into two categories:
◦ Asynchronous Protocols
◦ Synchronous Protocols
81
Asynchronous Protocols
Asynchronous protocols treat each
character in a bit stream
independently.
These protocols are used in
modems.
They use start and stop bits, and
variable gaps between characters.
They are slower than synchronous
protocols in transmitting data.
82
Asynchronous Protocols
(Cont…)
The different asynchronous
protocols are:
◦ XMODEM
◦ YMODEM
◦ ZMODEM
◦ Block Asynchronous Transmission
(BLAST)
◦ Kermit
83
XMODEM
It is a half duplex stop & wait
protocol.
It is used for telephone line
communication between PCs.
The sender sends a frame to
receiver & waits for ACK frame.
The receiver can send one cancel
signal (CAN) to abort the
transmission.
SOH Header Data CRC
1 Byte 2 128
The frame
Bytes format
Bytesof XMODEM is:
84
YMODEM
This protocol is similar to XMODEM
with the following major
differences:
◦ Two cancel signals (CAN) are used to
abort the transmission.
◦ The data field is 1024 bytes long.
◦ ITU-T CRC-16 is used for error
ZMODEM
checking.
Kermit
It is a terminal program as well as file
transfer protocol.
It is similar in operation to XMODEM, except
that sender has to wait for a negative
acknowledgement (NAK) before it starts
transmission.
86
Kermit
It is a terminal program as well as
file transfer protocol.
It is similar in operation to
XMODEM, except that sender has
to wait for a negative
acknowledgement (NAK) before it
starts transmission.
87
Synchronous Protocols
Synchronous Protocols take the
whole bit stream and divide it into
characters of equal size.
These protocols have high speed
and are used for LAN, WAN and
MAN.
Synchronous protocols are
categorized into two groups:
◦ Character-Oriented Protocol
◦ Bit-Oriented Protocol
88
Character-Oriented Protocol
It interprets frame as a series of
characters.
These are also known as Byte-
Oriented Protocols.
Control information is inserted as
separate control frames or as
addition to existing data frame.
The example of character-oriented
protocol is Binary Synchronous
Communication (BSC) developed
by IBM. 89
Bit-Oriented Protocol
It interprets frame as a series of bits.
Control information can be inserted
as bits depending on the information
to be contained in the frame
Bit-oriented protocol can pack more
information into shorter frames.
The examples of bit-oriented
protocol are:
Synchronous Data Link Control (SDLC)
High Level Data Link Control (HDLC)
90
Synchronous Data Link Control
(SDLC) Protocol
SDLC protocol was developed by IBM in
1975.
After developing SDLC, IBM submitted it
to American National Standard Institute
(ANSI) and to International Standard
Organization (ISO) for acceptance.
ANSI modified it to ADCCP (Advanced
Data Communication Control Procedure.
ISO modified it to HDLC (High Level Data
Link Control).
91
Synchronous Data Link Control
(SDLC) Protocol (Cont…)
The format of SDLC is:
0111111
frame 0111111
0 Flag Address Control User Data ECF 0 Flag
93
High Level Data Link Control
(HDLC) Protocol
HDLC came into existence after
ISO modified the SDLC protocol.
It is a bit-oriented protocol that
supports both half and full duplex
communication.
Systems using HDLC are
characterized by:
◦ Station Types
◦ Configuration.
◦ Response Modes
94
Station Types
To make HDLC protocol applicable
to various network configurations,
three types of stations have been
defined:
◦ Primary Station
◦ Secondary Station
◦ Combined Station
95
Primary Station
It has complete control over the
link at any time.
It has the responsibility of
connecting & disconnecting the
link.
The frames sent by primary
station are called commands.
96
Secondary Station
All the secondary stations work
under the control of primary
station.
The frames sent by secondary
station are called responses.
Combined Station
A combined station can behave either as
primary or as secondary station.
It can send commands as well as
responses.
97
Symmetrical Configuration
In this configuration, both sites
contain two stations: one primary
and one secondary.
Primary station of one site is linked
with secondary station of the other
andPrimary
vice versa. Primary
Command
Response
Secondary Secondary
Command
Response
Site A Site B 98
Balanced Configuration
Inthis configuration, both sites
have combined stations.
These combined stations are
connected with single link.
This single link can be controlled
by either station.
99
Important Questions
2 Marks
What is Network?
List out OSI layer in order.
What is Frame relay?
Define Distributed System.
What is broadcasting?
What is Multicasting?
Write down types of networks.
What is host?
What is hub? 100
Important Questions
2 Marks (Cont…)
What is router?
What is repeater?
What is transmission media?
What is twisted pair?
What is coaxial cable?
List out types of wireless
transmission,
What is communication satellite.
What is MODEM? 101
Important Questions
5 Marks
104