You are on page 1of 31

NETWORK

In the computer world, the term network, describe to or more computer or network device that are connected via wire or wireless and can share, resource, private internet connection. This hole works is called networking. Basically there are three type of network.

1. LAN Local Area Connection. 2. MAN Metropolitans Area Network. 3. WAN Wide Area Network. And other common network are.. 1. CAN Campus Area Network. 2. SAN Storage Area Network. 3. PAN Personal Area Network. 4. NAS Network Attached Storage. LAN: It stands for Local Area Network. This type of network generally use to connect, computers or network device together in a close proximately. A LAN is generally limited to a geographic area such as a school, building or an office, a LAN radios is not more then 600 ft.

Teacher Signature

MAN: Its stands for Metropolitans Area Network. A MAN covers larger geographical area than LAN, such as cilys by inter connecting smaller networks with in a larger geographical area, information is easily determined through the network. Large and any large organization, govt agencies of an use a MAN to established their communication. Such the communication network is not limited to the real state of an organization and must cross public roads and propertys. The network medium wood have to unshed lines (Leashed line) from telephone operators (ISP). Physical security of communication medium is not spreading. The control of organization. Typically the area of a metropolitan area network is not more that 80 KM or 50 Miles. WAN: Its stands for Wide Area Network. This type of network connects larger geographical area then MAN. It covering hundreds and even thousands of kilometers. Such as the hole India or around the globe. Dedicated cabling or satellite communication may be unshed to connect this type of network. A WAN is a complex communication system. It used complex communication interface structure (Both private and public) LANS, MANS global communication network like the internet. Most networking professional defined a WAN as any network that unshed router and public network links. The internet fits the both definition. WAN differ from LAN and MAN in following ways---------------1. WAN cover getter distance. 2. WAN speed are slower. 3. WAN can be connected on demand or can be connected parmently. 4. LAN have permanent communication between stations. 5. WAN can used public or private network transport. Where as LAN primarily use in private network only. Networking: In information technology networking is the construction, design and use of a computer network, including the physical device and media. The selection and use of telecommunication protocol and computer software for using and managing the network, and the establishment of operation policies and produced reliability to the network. 2 Teacher Signature

Real of OS in a Network:
Work group: A work group is collection of individual who share the same file and data base over the network. Roil of computer in a network, host Clint, work station and server. Clint: A client is a computer on a network which unshed all resource and service provider by other computer on a network. It has no security and management. Ex- Windows 95, Windows 98, Windows Me. Work station: It is a me as client but it has low label of service , security and management. Ex- Windows NT, Workstation, Xp professional, Vista. Stand alone server: This computer has very high security and management. It can provide different services to his Clint. Ex 2000 server, 2003 server, 2008 server etc. Domain controller: It is same as stand alone server but can centrally control and secure the enter network. There is three different type of do men controller are in unshed---1. Primary domain controller (Master) 2. Back up domain controller (Additional) 3. Child domain controller (Support) Domain: Domain actually means a centralized management area in which there is a domain controller computer, for implementing different label of squired, and best for professional unshed.

Peer to peer and Clint server:


The two most common network type are peer to peer and client server. Peer to peer: The connected computers has been centralized authority. From an authority point of view all computers are some. A peer to peer network is one in which lacks a dedicated server and every computers act as both Clint and server. This type of networks design primarily for small area network. So some OS like apple, Windows 95/98 are specially feted for peer to peer network access.

Advantage of peer to peer network:


1. It is relativity easy to implement and operate. 2. It can be implemented in simple operating system like Windows 95/98. 3. It is more efficient and felt tolerant then any server base network. 3 Teacher Signature

Disadvantage/ Draw back:


1. Decentralized: There is no responsibility for share data or application. 2. Security: environment. It text the low level of security and never used in business

3. Client server network: This type of network is design to support a large number of users and dedicated server to accomplish this clients login to the servers in order to run application or obtain files. Security management and permission can be managed by one or more admin which cuts down on network users middling with things that they should not be.

Advantage:
1. Centralized: Resource and data security are control through the server. 2. Accessibility: Server can be access remotely and across multiple platforms. 3. Stability: Any or all elements can be replaced individually as needed, to increased.

Disadvantage:
1. Expense: Required in initial environment for investment is to high for a server. 2. Maintains: Large network will required a self to entire operation. 3. Dependence: When server goes down, all operation will cease down access the entire network.

TOPOLOGY
Physical topology: A topology is basically a map of a network. The physical topology of a network describe the layout of cables and watch station and the location of all network components. The cables or connection a physical topology are often referred to as network media or physical media. Basically there are four most common topology are available. 4 Teacher Signature

They are as followed---1. 2. 3. 4. Bus topology Ring topology Star topology Mash topology BUS TOPOLOGY Bus topology: In a bus topology all computers are attached to a single connection cable, that is terminated at both ends, which is simplest way to create a physical network. This type of network is usually peer to peer and thin net cabling (10 base 2). It is configured by connecting a T type connector to the network adaptor and then connection cables to the T connector on the computer on right and left. Both ends of the chain , the network must be terminated with a fifty ohm impedance terminator. If a fail your accurse with a host, it will prevent the other computer to communicate with each other. Missing terminators with a incorrect implements will also cause problem. central point by a separate cable. The central point is a device known as hub/ switch. The star topology user use twisted peer cabling. Although this setup use more cable then a bus topology if a fail your occurs along one of the cables connecting to the hub, only that position of the network is effected not the entire network.

Requirements1. NIC 2. CAT 5 UTP Cable 3. HUB/ SWITCH 4. RJ 45 connector etc 5 Teacher Signature

Advantage :

1. It can be reconfigure quickly. 2. A single cable fail your does not bring down the entire network. 3. It is relatively easy to travel shot. Disadvantage: 1. In stellicastic higher. 2. It has single point of fail your.

RING TOPOLOGY
Ring topology: A ring topology consists of a set of station connected serially by cable. In other words it is a circle or ring of computer. There are no terminated ends to the cable the signal travels around the circle in anti clock wish directions. Note: While ring topology function logically as ring, it is physically wired as star. The central connector is a MAU (Media Access Unit/ Multi Station Access Unit). Under the ring concept a signal is trnsper sequentially via a token from one station to the next. When a station once to transmit it grabs the token. Attach data and an address to it, and then sends it around the ring. The token travels along the ring until it reach the destination address. The receiving computer acknowledges received with a returned massage to the sender. The sender with a return massage is called delivery report, upter all of this sender relished the token for use by another computer. Token Ring: Token Ring remains Ethernets most significant competitor for connecting desktop PCs to the network, but its market share has continued to shrink in recent years. Developed by IBM, Token Ring uses a combination of ring and star topologies. Because Token Ring has its own packet structure, you need special equipment to connect a Token Ring to an Ethernet network.

Teacher Signature

Advantage: 1. All station has equal access. 2. Essay to travel shout. Disadvantage: 1. Expensive 2. Not felt tolerant 3. A single cable felt can being the entire network.

MESH TOPOLOGY
A mesh topology is a network topology in which each communication node is directly connected to all other notes, here device are connected with many redundant interconnections between network nodes. For every station you will have (n-1/2) connection. For example a network of four computers you will have (4*(4-1/2)=6 connection advantage.

Advantage: 1. Network never goes down. 2. If any computer goes down the network remains. Disadvantage: 1. Costly. 2. Hard to explain the network. 3. Congested.

Teacher Signature

HYBRID TOPOLOGY
It is a combination of bus and star topology. It consists of a group of computer in star configured network connection as their segment and bus topology as their back bone cable. Back bone and segment----- with complex networks, we must have a way of indent fine which port of the network we are discussing. For this reason we commonly break a network into back bone and segment.

A backbone is a part of network in which all segments are connected. A back bone produce the structure for a network and it consider the main part of any network. It usually use a high speed communication technology. Ex FDDI. Segment: Segment is a general term for any short section of the network that is not part of the back bone. Segment are connected to the back bone to allow the work station on them, to access to the rest of the network.

NETWORK MEDIA (CABLES & CONNECTION)

Teacher Signature

Cabling: Cable is the medium, through which information usually moves from one network device to another. The type of cable chooses for a network is validate to the network topology. Protocol and size, there are several type of cables, which are commonly used with lans, sum of them are as followed-----Twisted peer cableThere is two type of twisted peer cable available in present networking media.

1. UTP (Unshielded Twisted Peer Cable) 2. STP (Shielded Twisted Peer Cable) 1. UTP : UTP cable has four peers of wires inside the jacket itch peer is twisted with a deferent number of twisted per inch, to help eliminate interfaces from adjacent peers and other electrical device. The standard connector for a UTP is resister jack-45 (RJ 45) connector. This is a special plastic coated connector that looks like telephone style connector (RJ 11). It is slightly larger then RJ 11 connector, used in star wired network. 2. STP: Its stands for Shielded Twisted Peer cable. Some time a metallic shield is placed around the twisted peer. Hence the name is a STP. This type of cabling is generally used in token ring installation. This cable type is most common today.

1. Cheap 2. Easy to install 3. Faster data communication. 9 Teacher Signature

CO AXIAL CABLE
Co axial cable is familiar to most people as the conductor that carries cable TV into their homes. Co axial has a single copper conductor in its center and a protective material shield around it.

A plastic layer provides insulation between the centre conductor, and the other metal shield. The metal shield helps to block any outside interfaces from fluorescent lights, electromagnetic file etc. Co axial cable is difficult to install but it is highly registrant the signal interface. There is two type of co axial cable available in market. 1. Thin net (10 base 2) 2. Thick net (10 base 5) 1. Thin net cable : This cable is also referred as thin net or 10 base 2 cable, the specification for thin co axial cable caring Ethernet signal. The two refers approximately segment length being 200 meters in a actual fact the maximum segment length is 185 meters. 2. Thick net cable: This cable refers to the specification for thick co axial cable that charring Ethernet signal. The 5 refers to the maximum segment length being 500 meters. Thick coaxial cable has an extra protective plastic cover that helps to keep the noise away from the central conductor. DATA FLOW: Communication between two device can be simplex, half duplex or full duplex. 10 Teacher Signature

SIMPLEX: In simplex mode, the communication is unidirectional, as on a one way street. Only one of the device on a link can transmit the other can only received. Keyboards and traditional monitors are the example of simplex device.

HALF DUPLEX: In half duplex mode itch station can both transmit and received but not at the same time. When one device is sending, the other can only received.

The half- duplex mode is like a one lean road with traffic allowed in both direction. The half duplex mode is used in chases where there is no need for communication in both direction at the same time, the entire capacity of the channel can be utilized for itch direction. FULL- DUPLEX: In full- duplex mode (also call duplex), both station can transmit and received simultaneously.

The full- duplex mode is like a two way street with traffic flowing in both direction at the same time. In duplex mode, signals going in one direction, share the capacity of the link with signals going in the other direction. The sharing can occurs in two ways 1. One common example of full duplex communication is the telephone network. When two people are communication by a telephone line, both can talk and listen at the same time. 2. The full duplex mode is used when communication in both direction is required all the time. The capacity of the channels however must be divide between the two direction. 11 Teacher Signature

Network Connectors
In addition to testing you on the various components you might find on a network, the Network+ exam will ask you to identify the types of connectors found on a network. When installing a network, you need to know which type of connector to use for which component. The type of connector you use depends on the type of network and the type of cable (copper or fiber-optic). In this section, well discuss the connectors commonly used with copper cable: _ D-type _ BNC _ RJ-series _ IBM data

D-type Connectors
The first type of networking connector, the D-type connector, is used to connect many peripherals to a PC. A D-type connector is characterized by its shape. Turned on its side, a D-type connector looks like the letter D and contains rows of pins (male) or sockets (female). Shows a male and female D-type connector.

BNC Connectors
Most commonly used with coaxial cable, BNC connectors are tube-shaped, as Figure 6.9 shows. A twist-lock mechanism prevents the cable from disconnecting. You must push the cables connector onto the connector on the NIC and then twist the connector on the cable to lock it in place. BNC connectors are most commonly found in 10Base2 Ethernet networks, as well as in ARCnet, but they can be used on any network that is connected by coaxial cable.

RJ Connectors
You are probably familiar with the RJ (Registered Jack) family of connectors. The little clip connector at the end of the telephone cable that connects most home phones to the wall jack is an RJ-11 connector. RJ-45 connectors are most commonly found on both 10BaseT and Token Ring networks, but they can be found on any network that uses four-pair, UTP cable. Figure 6.10 shows an RJ-series connector. An RJ-11 connector is smaller than an RJ-45 connector and uses four (or six) wires; the RJ-45 has eight wires housed in its case. Shows an RJ-45 connector that might be used in 10BaseT Ethernet.

12

Teacher Signature

The IBM Data Connector


The IBM data connector is unique in many ways. First, it isnt as universal as the other types of network connectors. Second, there arent male and female versions, as with the others. The IBM data connector is both male and female. Any two data connectors can connect. This connector is most commonly used with IBMs Token Ring technology and Type 1 or Type 2 STP cable.

PROTOCALS
In computer networks, communication occurs between entities indifferent system. An entities is any thing capable of sending or receiving information. How ever two entities can only simple send bit streams two each other, and expect to be under stood. For communication to occur, the entities must agree on a protocol. A protocol is a set of rules that govern data communication. A protocol define what is communicated, how it is communicated, and when it is communicated. The key elements of a protocol are syntax, timing and semantics. Syntax: The terms syntax refers to the structure or format of the data, mining the order in which they are presented. For examplea simple protocol might expect the first 8 bit of data to be the address of the sender. The second 8 bit to be the address of the receiver and the rest of the streme to be the massage itself. 13 Teacher Signature

Semantics: The words semantics refers to the meaning of each section of bits. How is a particular par ten to be interpreted, and what action is to be taken based on the interpretation. For example does and address identity the role to be taken or the final destination of the massage. Timing: The word timing refers to two categories, when data should be send and how fast they can be send. For example if a sender produce data at 100 Mbps but the receiver can process the data at only one Mbps the transmission will over load the receiver some data will be lost. NETWORK DEVICE Now that you are familiar with the various type of network media and connection, you should learn about some device commonly found on todays network. Because these devices connect network entities, they are known as connectivity devices. 1. Network Interface Card (NIC) 2. HUB 3. Switch 4. Bridge 5. Repeater 6. Router 7. Gateway 8. Otherdevice

The Network Interface Card (NIC)


The network interface card (NIC), as its name suggests, is the expansion card

you install in your computer to connect (interface) your computer to the network. This device provides the physical, electrical, and electronic connections to the network media. NICs are either an expansion card (the most popular implementation) or built in to the motherboard of the computer. In most cases, a NIC connects to the computer through expansion slots. 14 Taecher Signatuer

AS an expansion slot connects expansion cards that are plugged in to a slot to the main computer assembly through a deceptively simple looking connector, which is known as a bus. In some notebook computers, NIC adapters can be connected to the printer port or through a PC card slot.

HUB
As you learned earlier, in a star topology Ethernet network, a hub is the device that connects all the segments of that network together. Every device in the network connects directly to the hub through a single cable. Any transmission received on one port will be rebroadcast to all the other ports in the hub. So, if one station sends it, all the others receive it, but only the intended recipient listens to it.

Features:

> HUB always deals with voltage. There is two type of HUB is our present world. One is Active HUB & other is Passive HUB. It is also called as multiport repeater. Active HUB always broadcast signal. Passive HUB always communicates with multicast me SWITCH

Like a hub, a switch connects multiple segments of a network together, with one important difference. Whereas a hub rebroadcasts anything it receives on one port to all the others, a switch makes a direct link between the transmitting device and receiving device. Any party not involved in that communication will not receive the transmission. The benefit of a switch over a hub is that the switch increases performance because it doesnt suffer from the wasted bandwidth of the extra transmissions. 15 Teacher Signature

Featuers:

> Switch is a layer two device, works in data link layer. It deals with MAC address. It has a buffer memory and there is a MAC table for the remote nodes. BRIDGE

A bridge is a network device that connects two similar network segments together. The primary function of a bridge is to keep traffic separated on both sides of the bridge. Traffic is allowed to pass through the bridge only if the transmission is intended for a station on the opposite side. The main reason for putting a bridge in a network is to connect two segments together, or to divide a busy network into two segments. ROUTER

A router is a network device that connects multiple, often dissimilar, network segments into an internetwork. The router, once connected, can make intelligent decisions about how best to get network data to its destination based on network performance data that it gathers from the network itself. Routers are very complex devices. Often, routers are computers unto themselves with their own complex operating systems to manage the routing functions (Ciscos ISO, for example) and CPUs dedicated to the functions of routing packets. Because of their complexity, it is actually possible to configure routers to perform the functions of other types of network devices (like gateways, firewalls etc) by simply implementing the features within the routers software. 16 Teacher Signature

Features:

> It is a layer three device. It deals with IP address It use to connect to or more different type of network. GATEWAYS

A gateway is any hardware and software combination that connects dissimilar network environments. Gateways are the most complex of network devices because they perform translations at multiple layers of the OSI model. For example, a gateway is the device that connects a LAN environment to a mainframe environment. The two environments are completely different. LAN environments use distributed processing, baseband communications, and the ASCII character set. Mainframe environments use centralized processing, broadband and baseband communications, and the EBCDIC character set. Each of the LAN protocols is translated to its mainframe counterpart by the gateway software. Another popular example is the e-mail gateway. Most LAN-based e-mail software, such as Novells GroupWise and Microsofts Exchange, cant communicate directly with Internet mail servers without the use of a gateway. This gateway translates LAN-based mail messages into the SMTP formatthat Internet mail uses.

ADDRASSING
Network Addressing Any network address must provide two pieces of information: it must uniquely identify the machine and it must locate that machine within the larger network. In a TCP/IP network, the IP address identifies the PC and the network on which it resides. IP Addresses In a TCP/IP network, the systems dont have names but rather use IP addresses. The IP address is the unique identification number for your system on the network. Part of the address identifies the network, and part identifies the local computer (host) address on the network. IP addresses consist of four sets of eight binary numbers (octets), each set separated by a period. This is called dotted-decimal notation. So, instead of a computer being called SERVER1, it gets an address like so: 202.34.16.11 Written in binary form, the address would look like this: 11110010.00000101.00000000.00001010 But the TCP/IP folks decided to write the decimal equivalents: 00000000 = 0 00000001 = 1 00000010 = 2 11111111 = 255 17

Teacher Signature

IP addresses are divided into class licenses, which correspond with the potential size of the network: Class A, Class B, and Class C. Class A licenses were intended for huge companies and organizations, such as major multinational corporations, universities, and governmental agencies. Class B licenses were assigned to medium-size companies, and Class C licenses were designated for smaller LANs. Class A networks use the first octet to identify the network address and the remaining three octets to identify the host. Class B networks use the first two octets to identify the network address and the remaining two octets to identify the host. Class C networks use the first three octets to identify the network address and the last octet to identify the host. Table 21-2 lists range (class) assignments.

IPV- Internet Protocol Version. IPV 4

Class A,B,C Used in general. Class D- Used in future. Class E- Used in NASA/Defense. 18 Teacher Signature

CLASS A
10.0.0.1 1= Fixed part 0= Host part Difalt subnet mask- 255.0.0.0 Host part- 3 Net part- 1 Host per net- 256 Total host - 256*3 Private IP class range- (10.0.0.1-254)

Max value of an octet- 255 Min value of an octet 0 Total IP = (0-255)

IP range- (0-127)- A class IP Valid host/net - 255 Valid host in total net- 255*255*255

CLASS B
172. 16. IP range- 128-191 Valid host- 255*255 Valid host per net- 255 Valid host in total net- 63*255*255 0. 1

19

Teacher Signature

Private IP class range- (172.16.0.0- 254)

CLASS C

IP range- (192- 223) Default subnet mask- 255.255.255.0 Valid host - 31*255 Valid host per net - 255 Private IP range - (192.168.10.0- 254) CLASS A ( 0- 127) CLASS B (128- 191 CLASS C ( 192- 223) 200.201.202.0--M.A (Major Address) 200.201.202.1---1st valid IP address 200.201.202.254---- Last valid IP address 200.201.202.255----- B.A IP address 0.0.0.0---- This address is not in used. 127.0.0.1---- It is loop back address( cheek NIC card)

20

Teacher Signature

SM ( Subnet Mask)
255. 11111111 198. 11111111 255 192. 11111111 255 255. 11111111 168. 11111111 255 168. 11111111 255 255. 11111111 10. 11111111 255 10. 11111111 255 0/24 00000000 1 11000000 192 1/25 10000000 128

SUBNATING
CLASS C FormulaFind net 2x =1 Host -- 2y = 0 Valid host-- (2y -1) 192. 11111111 255 168. 11111111 255 10. 11111111 255 0/25 10000000 128

Block size( 256- 128)= 128 Subnet 1 192.168.10.0M.A 192.168.10.1F.V 192.168.10.126L.V 192.168.10.127B.A Subnet 2 192.168.10.128M.A 192.168.10.129F.V 192.168.10.254L.V 192.168.10.255B.A

TCP/IP Services
TCP/IP is a very different type of protocol. Although it supports File and Printer Sharing, it adds a number of special sharing functions unique only to it, lumped together under the umbrella term TCP/IP services. The most famous TCP/IP service is called hypertext transfer protocol (HTTP), the language of the World Wide Web. If you want to surf 21 Teacher Signature

the Web, you must have TCP/IP. But TCP/IP supplies many other services beyond just HTTP. Using a service called Telnet, for example, you can access a remote system as though you were actually in front of that machine. Another example is a handy utility called Ping. Ping enables one machine to check whether it can communicate with another machine. Shows an example of Ping running on a Windows 2000 system. Isnt it interesting that many TCP/IP services run from a command prompt? Good thing you know how to access one! Ill show you other services in a moment.

NETWORK MODELS

TCP/IP Transfer Control Protocol/ Internet Protocol. DODOSIDepartment of Defense. Open System Interconnect. 22 Teacher Signature

TCP/IP

GDD Guaranteed Data Delivery.

OSI

23

Teacher Signature

Established in 1947, the international standered organization (ISO), in is a multinational body dedicated to worldwide agreement on international standered. An ISO standard that covers all aspect at network communication in the open system interconnection model. It was fast introduce in the late 1970 s. An open system is a set of protocol that always any two deference systems to communication regandler of their underline arehitee true. The purpose of their underline or chitecture. The purpose of OSI model is to so how to facilate communication between different system without requiring changer to logic of the under lying hardware and software. The OSI model is not protocol it is a model for understanding and denigning a network that is flexiable, rebort and interoperable. The OSI in the organization OSI is the model. The OSI model is a layered from work for the design of network system that allows communication between all layers of computer system. It consists of server separate but related layers each of which derfins a part of the process of moving information a crop a network . An understanding of the fundamental of the OSI model provider a solid basis for exploring data communication.

LAYERS IN THE OSI MODEL


1.Layer 1:(Physical) The physical layer cordenet the function required to carry a bit streen oven a physical medium. It deals with the machenical and electrical specification of the interface and transmission medium. It also defiance the functions that physical device and interfaces have to perform for transmission to occur. 2.Physacal charrectriestic of interface and medium: The physical layer defince the charrectrie of the interface between the device and the transmission medium. It also defince the type of transmission medium. 3. Representation of bits: The physical layer data consists of a streme of bits (sequence of os or 1st) with no interpretation. To be transmited bits must be encoded into signals electrical or optical. The physical layer defince the type of encoding (how os and 1st) are changing into signals. 4.Data rate/ the transmission rate: The number of bits send each second---- is also defind by the physical layer. In other words, the physical layer define the duration of a bit, which is how long it lost. 24 Teacher Signature

5.Synchronization of bit: The sender and reciver not only must use the same bit rate but also must be synchronizet at the bit label. In other words the sender and the reciver clock must be synchronized. 6.Line configuration: The physical layer is consult with the connection of device to the media in a point configuration, two device are connected through a dedicated link, in a multipoint configuration, a link is shared among several device. 7.Physical topology: The physical topology defince how device are connected to make a network. Device can be connected by using a mesh topology.(Every device is connected to every other device),a star topology (Device are connected through a central device), a ring topology (Each device is connected to the next for ring a ring), aror a bus topology (Every device is on a common link). Transmission mode: The physical layer also defince the derection of transmission between to device simplex, half duplex, full duplex. In simplex mode , only are device can send , the other can only recived, the simplex mode is a one way communication. In the half duplex mode, two device can send and recived, but not at the same time. In a full duplex mode, two device can send and recived the data at the same time.

Data link layer: The data link layer transform the physical layer, a raw transmission facility to a reliable link. It makes the physical layer appearerror free to the upper layer (Network layer). We can so the relationship of the data link layer to the network and physical layers. Other responsibility of the datalink layer include the followings. 1.Framing: The data link layer devide the stream of bits, recived from the network layer into manageable unit called trams. 2.Physical layer: If frems are to be disturb to deferent system on the network, the data link layer ades a hedder of the frame to define the sender and /or reciver of the frame. If the frame is intended for a system outside the senders network, the reciver address is the address of the device that connect the network to the next one. 3.Flow control: If the rate at which the data are absorbed by the reciver is less then the rate at which data are vproduce in the sender, the data link is imposes a flow control mechanism to avoide over whelning (over flow) the reciver. 4.Error control: The data link layer addsrelaiably to the physical layer by adding the mechanism to detect the retransmit damaged or lost frames. It also use a mechanism to recognized duplicate frames. Error control is normaly achivedthrough a trailer added to the end of the frame. 25 Teacher Signature

5.Access contrl: When two or more device are connected to the same link, data link layer protocols are necessary to determine which device has control over the link at any given time. Transport layer : The transport layer is responsible for process to process delivery of the enter massege. A process is an application programme that running on a host. Whereas the network layer over sees shores to destination delivery of individual packets, it does not recognished any relationship between thouse packets. It treats itch one independently , as through itch peces belong to a separate massage, wheather or not it does. The transport layer, on the other hand enseyours that the whole massage arrives intact and in order, oversing both error control and flow control at the shourse to destination cable. The relationship of the transport layer to the network and seasion layer other relationsibility of the transport layer are as followed. 1.Service point addressing: Computers often run several programmes at the same time. For this reason, sourse to destination delivery means delivery natonly fron one computer to the next but also from a specific process on one computer to a specific process on the other, the transport layer hedder must there for include a type of a address called a service point address or port address. The network layer gates itch packet to the correct computer, the transport layer gets the entire massage to the correct process on the computer. 2.Segmentation and reassembly: A massage is devided into transmit able segment, with itch segment containing a sequence number. This number innable transport layer to reassemble the massage correctly. Upon arriving at the destination and to identity and replaced packet that wer lost in transmission. 3.Connection control: The transport layer can be ither connectionless or connection reented. A connectionless transport layer treets itch segment as an independent packet and delivers it to the transport layer at the destination machine. A connection oriented transport layer makes a connection with the connection layer at the destination machine first before delivery the packet. Upter all the data are transfer, the connection is terminated. 4.Flow control: Like the data link layer, the transport layer is responsibil for flow control. However, flow control at this layer is performed end to end rather that across a sing be link. 5.Error control: Like the data link layer, the transport layer is responsible for error control however error at this layer is performed process to process rather that across a single link. The sending transport layer make seyour that the entire massage arrives at the receving transport layer without error. Error connection is usually achived through returns mission. 26 Teacher Signature

Seasion layer: The service provided by the first three layer(Physical, Datalink & Network) are not sufficient for some process. The seasion layer is the network dilog controller, it stablished, maintance and synchronized the instruction among communicating system. Spicific responsibility of the season layer include the following. 1.Dilog control: The seasion layer allowed to systems to entire into a dilog. It allow the communication between two process to take place in either half duplex or full duplex mode. 2.Synchronization: The seasion layer allow a process to add chake points it also called synchronization point, to a streme of data. For example it a system is sending a file of 2000 pages, it is advisable to in sent chake point upter every 100 pages to enseyour that each 100 pages unit is recived the acknowledge independency or independently. In this case if a case crash happence during the transmission of page 523, the only page that need to be recent upter system recovery are pages 501 to 523 pages provide to 501 need not be recent thats why only the page of 5 to 3 has been resent again. Presentation layer: The presentation layer is concernt with the syntax and same times of the information exchange between two systems figure 2.13 shouse the relationship between the presentation layer and the application and the seasion layer. 1.Translation layer: The process(running programmes) into system are usually exchanging information in the form of charactorstrick, numbers and soon the information must be changed to bit streams before being transmited. Because different computer use use different encoding system, the presentation layer is responsible for interperability between this different encoding methods. The presentation layer at the sender changes the information from its sender dependent format into a common format. The presentation layer at the reciving machine changes the common format into its reciverdependend format. 2.Encryption: To carry sencitive information a system must be availe ensure privsey. Encryption means that the sender transfer the original information to another from and sends the resulting massage out over the network. Description recivers the original process to transfer the massage back to its original form. 3.Compression: Data compreation reduce number of bits connected in the information. Data comprehenction becomes particularly important in the transmission of multimedia such as text, audio and video. Application layer: The application layer enables the uses, whether human or software , to access the network. It provides user interface and support for services such as electronic mail remote file access and transfer, shared data base management and other type of distribute information service. 27 Teacher Signature

1.Network virtual terminal: A network virtual terminal is a software virsion of a physical terminal, and it always a user to log on to a remote host. The users computer talk to a software terminal which in turn, talks to the host, and viceversa. The remote host belives it is communation with one of its own terminals and allows the user to log on. 2.File transfer access management: This application allow a user to access files in a remote host (to make change or read data) to retrieve files from a remote computer for use in the local computer, and to manage or controls files in a remote computer locally. 3.Mail service: This application provides the basis for email forwarding and storage. 4.Directory services: This application provides distributed data base sources and access for global information about various objects and services.

OSI Model:Layers
7 6 5 4 3 2 1 Application Presentation Session Transport Network/Internet Data Link Phsical OST MODEL (Open System Interconncetion Model) PDU Protocols (Protocol Data Unit) Not Applicable Not Applicable Not Applicable Segments Packets Frams Bits Telnet,FTP,SMTP,HTTP JPEG,GIF,MPEG,MP3 Protocols port number-23,20,21,80 TCP,UDP IP,ARP,RARP Frame Relay, HDLC Ethernet,Fast Ethernet,Gigabit Ethernet

Devices
Not Applicable Not Applicable Not Applicable Not Applicable Router Bridge and switch HUB, Repeater, NIC

OSI Layers Function:1. 2. 3.


Application: It provides file transfer, print service, message transfer, and database connectivity and application services. Presentation: It provides data inscription, compression, translation, coding and conversion functions. Session: It provides dialog control between devices and maintains the communication in simplex, half duplex and full duplex mode. It generates different sessions, maintains them and terminates them as needed using their software port numbers. 4. Transport: It provides end to end data transport services and provides connection oriented service. It provides flow control by maintaining the amount of data to be sent. Each data send is acknowledged sliding window protocol is used in this layer to control the amount of data transmitted.

28 Signature

Teacher

5. 6.

Network Layer: It provides the routing facility.

Data link: It provides the physical transmission of data and handles error notification, network topology and flow control.

7.

Physical: It converts the signal to bits in serial order and transmits it over the media.

29

Teacher Signature

You might also like