Network Models
Network Models
Network Models
1.1 Introduction to Data Communication:
Data Communications is the transfer of data or information between a source
and a receiver. The meanings of source and receiver are very simple. The
device that transmits the data is known as source and the device that receives
the transmitted data is known as receiver. The rules and regulations are called
protocols and standards in Data Communications.
1. Simplex
2. Half duplex
3. Full duplex
1. Simplex:
In simplex data flow only in one direction. Its mean in simplex if two
devices are connected only one device will send data the other device will only
receive data it cannot send.
Example of this type is: Mouse, Radio (it can only input data etc.)
2. Half duplex:
In this type of data flow, data will flow in both directions but not at
the same time.i.e.data flow in both directions but only one at a time. Two
devices are connected both of them can send information to each other but
not at the same time. When one device will send data the other will receive it
cannot send back at the same time after receiving it can send data.
3. Full Duplex:
In Full Duplex data will flow in both directions at the same time.
For Example: If two devices are connected in communication both of them can
send and receive data at the same time.
1.4 Design issues of Layers:
The following are the design issues for the layers:
1. Reliability
2. Scalability
When network gets large, new problem arises. Thus scalability is important so
that network can continue to work well when it gets large.
3. Addressing
There are multiple processes running on one machine. Every layer needs a
mechanism to identify senders and receivers.
4. Error Control
Unreliable channels introduce a number of errors produced. So, the layers
need to agree upon common error detection and error correction methods so
as to protect data packets while they are transferred.
5. Flow Control
If the rate at which data is produced by the sender is higher than the rate at
which data is received by the receiver, there are chances of overflowing the
receiver. So, a proper flow control mechanism needs to be implemented.
6. Routing
When there are multiple paths between source and destination, only one
route must be chosen. This decision is made on the basis of several routing
algorithms, which chooses optimized route to the destination.
7. Security
A major factor of data communication is to prevent unauthorized access to
data through authentication and cryptography.
Example:
1) Let us consider a situation where Device A wants to send a message to
Device B.
2) Device A passes its information to the highest layer. As soon as a data
stream reaches a layer, it performs some specified functions on it and passes it
to the layer below.
3) This continues until the data stream reaches the lowest layer. Layer 1 passes
a bit stream of 0s and 1s to the physical medium that communicates it to the
Layer 1 of the receiving end.
4) Each layer in the receiving end performs certain functions on the data
stream adhering to the protocol with its peer and passes it to the layer above.
5) This continues until the information reaches the highest layer. The highest
layer then conveys the message to Device B in the same format sent by Device
A.
S.N
In connection-oriented In connection-less
5. possible. possible.
In connection-oriented In connection-less
Layer 7 - Application
Layer 6 - Presentation
Layer 5 - Session
Layer 4 - Transport
Layer 3 - Network
Layer 2 - Data Link
Layer 1 - Physical
Diagrams for OSI model is following:
1. The main function of this layer is to reliable transfer of data frames from
one node to another connected by the physical layer.
2. Transmitting and receiving data frames sequentially is managed by this
layer.
3. This layer sends and expects acknowledgements for frames received and
sent respectively.
Layer 4-Application
Layer 3-Transport
Layer 2-Network/Internet
Layer 1-Host-to-Network/Network Access
1. It operated independently.
2. It is scalable.
3. Client/server architecture.
4. Supports a number of routing protocols.
5. Can be used to establish a connection between two computers.
Demerits of TCP/IP
2. In OSI model the transport layer 2. In TCP/IP model the transport layer does not
guarantees the delivery of packets. guarantees delivery of packets. Still the TCP/IP
model is more reliable.
8. Network layer of OSI model 8. The Network layer in TCP/IP model provides
provides both connection oriented connectionless service.
and connectionless service.
9. OSI model has a problem of fitting 9. TCP/IP model does not fit any protocol
the protocols into the model.
10. Protocols are hidden in OSI model 10. In TCP/IP replacing protocol is not easy.
and are easily replaced as the
technology changes.
11. OSI model defines services, 11. In TCP/IP, services, interfaces and
interfaces and protocols very clearly protocols are not clearly separated. It is also
and makes clear distinction between protocol dependent.
them. It is protocol independent.