Computer Network (1)
Computer Network (1)
PREPARED
BY
MR NILACHAKRA DASH
Computer Network Types
• The main functionality of the physical layer is to transmit the individual bits
from one node to another node.
• It is the lowest layer of the OSI model.
• It establishes, maintains and deactivates the physical connection.
• It specifies the mechanical, electrical and procedural network interface
specifications.
• Line Configuration: It defines the way how two or more devices can be
connected physically.
• Data Transmission: It defines the transmission mode whether it is simplex,
half-duplex or full-duplex mode between the two devices on the network.
• Topology: It defines the way how network devices are arranged.
• Signals: It determines the type of the signal used for transmitting the
information.
Data-Link Layer
• This layer is responsible for the error-free transfer of data frames.
• It defines the format of the data on the network.
• It provides a reliable and efficient communication between two or more devices.
• It is mainly responsible for the unique identification of each device that resides on a local
network.
• It contains two sub-layers:
– Logical Link Control Layer
• It is responsible for transferring the packets to the Network layer of the receiver
that is receiving.
• It identifies the address of the network layer protocol from the header.
• It also provides flow control.
– Media Access Control Layer
• A Media access control layer is a link between the Logical Link Control layer and
the network's physical layer.
• It is used for transferring the packets over the network.
• Functions of the Data-link layer
• Framing: The data link layer translates the physical's raw bit stream into packets known as
Frames. The Data link layer adds the header and trailer to the frame. The header which is
added to the frame contains the hardware destination and source address.
• Physical Addressing: The Data link layer adds a header to
the frame that contains a destination address. The frame
is transmitted to the destination address mentioned in
the header.
• Flow Control: Flow control is the main functionality of
the Data-link layer.
• It is the technique through which the constant data rate
is maintained on both the sides so that no data get
corrupted.
• It ensures that the transmitting station such as a server
with higher processing speed does not exceed the
receiving station, with lower processing speed.
• Error Control: Error control is achieved by adding
a calculated value CRC (Cyclic Redundancy Check)
that is placed to the Data link layer's trailer which
is added to the message frame before it is sent to
the physical layer. If any error seems to occurr,
then the receiver sends the acknowledgment for
the retransmission of the corrupted frames.
• Access Control: When two or more devices are
connected to the same communication channel,
then the data link layer protocols are used to
determine which device has control over the link
at a given time.
Network Layer
FEATURES OF NETWORK LAYER
• IP Protocol: IP protocol is used in this layer, and it is the most significant part
of the entire TCP/IP suite.
• Following are the responsibilities of this protocol:
• IP Addressing: This protocol implements logical host addresses known as IP
addresses. The IP addresses are used by the internet and higher layers to
identify the device and to provide internetwork routing.
• Host-to-host communication: It determines the path through which the data
is to be transmitted.
Features of Internet Layer
• Data Encapsulation and Formatting: An IP protocol accepts the data from the
transport layer protocol. An IP protocol ensures that the data is sent and
received securely, it encapsulates the data into message known as IP datagram.
• Fragmentation and Reassembly: The limit imposed on the size of the IP
datagram by data link layer protocol is known as Maximum Transmission unit
(MTU). If the size of IP datagram is greater than the MTU unit, then the IP
protocol splits the datagram into smaller units so that they can travel over the
local network. Fragmentation can be done by the sender or intermediate
router. At the receiver side, all the fragments are reassembled to form an
original message.
• Routing: When IP datagram is sent over the same local network such as LAN,
MAN, WAN, it is known as direct delivery. When source and destination are on
the distant network, then the IP datagram is sent indirectly. This can be
accomplished by routing the IP datagram through various devices such as
routers.
• ARP Protocol
• ARP stands for Address Resolution Protocol.
• ARP is a network layer protocol which is used to find the physical address from the IP address.
• The two terms are mainly associated with the ARP Protocol:
– ARP request: When a sender wants to know the physical address of the device, it broadcasts the ARP request
to the network.
– ARP reply: Every device attached to the network will accept the ARP request and process the request, but only
recipient recognize the IP address and sends back its physical address in the form of ARP reply. The recipient
adds the physical address both to its cache memory and to the datagram header
• ICMP Protocol
• ICMP stands for Internet Control Message Protocol.
• It is a mechanism used by the hosts or routers to send notifications regarding datagram problems
back to the sender.
• A datagram travels from router-to-router until it reaches its destination. If a router is unable to route
the data because of some unusual conditions such as disabled links, a device is on fire or network
congestion, then the ICMP protocol is used to inform the sender that the datagram is undeliverable.
• An ICMP protocol mainly uses two terms:
– ICMP Test: ICMP Test is used to test whether the destination is reachable or not.
– ICMP Reply: ICMP Reply is used to check whether the destination device is responding or not.
• The core responsibility of the ICMP protocol is to report the problems, not correct them. The
responsibility of the correction lies with the sender.
• ICMP can send the messages only to the source, but not to the intermediate routers because the IP
datagram carries the addresses of the source and destination but not of the router that it is passed
to.
Features of
Transmission control protocol.
• The transport layer is responsible for the reliability, flow control, and correction of data which is
being sent over the network.
• The two protocols used in the transport layer are User Datagram protocol and Transmission control
protocol.
• User Datagram Protocol (UDP)
– It provides connectionless service and end-to-end delivery of transmission.
– It is an unreliable protocol as it discovers the errors but not specify the error.
– User Datagram Protocol discovers the error, and ICMP protocol reports the error to the sender
that user datagram has been damaged
– UDP consists of the following fields:
Source port address: The source port address is the address of the application program that has
created the message.
Destination port address: The destination port address is the address of the application
program that receives the message.
Total length: It defines the total number of bytes of the user datagram in bytes.
Checksum: The checksum is a 16-bit field used in error detection.
– UDP does not specify which packet is lost. UDP contains only checksum; it does not contain any
ID of a data segment.
Transmission Control Protocol (TCP)