Edited Unit 1 CN 4TH Sem
Edited Unit 1 CN 4TH Sem
1
Criteria of a Good Network
1. Performance: It can be measured in many ways, including
transmit time and response time. Transit time is the amount of
time required for a message to travel from one device to
another. Response time is the elapsed time between an inquiry
and a response. The performance of the network depends on a
number of factors, including the number of users, the type of
medium & Hardware
2. Reliability: In addition to accuracy is measured by frequency
of failure, the time it takes a link to recover from failure, and
the network’s robustness in catastrophe.
3. Security: Network security issues include protecting data from
unauthorized access, protecting data from damage and
development, and implementing policies and procedures for
recovery from breaches and data loss.
2
What Is the OSI Model
The Open Systems Interconnection (OSI) model describes seven layers that
computer systems use to communicate over a network. It was the first
standard model for network communications, adopted by all major
computer and telecommunication companies in the early 1980s
The modern Internet is not based on OSI, but on the simpler TCP/IP model.
However, the OSI 7-layer model is still widely used, as it helps visualize
and communicate how networks operate, and helps isolate and
troubleshoot networking problems.
We’ll describe OSI layers “top down” from the application layer that
directly serves the end user, down to the physical layer.
3
7. Application Layer
Devices : Gateway
Protocol : FTP , HTTP , SMTP , SNMP , TELNET , TFTP , DNS , DHCP , NFS ,
LDP , XWINDOW
6. Presentation Layer
The presentation layer prepares data for the application layer. It defines
how two devices should encode, encrypt, and compress data so it is
received correctly on the other end. The presentation layer takes any data
transmitted by the application layer and prepares it for transmission over
the session layer.
Devices : Gateway
Protocol : SSL , MIME , TLC .
5. Session Layer
Devices : Gateway
Protocol : Net BIOS , RPC , PPTP .
4
4. Transport Layer
The transport layer takes data transferred in the session layer and breaks
it into “segments” on the transmitting end. It is responsible for
reassembling the segments on the receiving end, turning it back into data
that can be used by the session layer. The transport layer carries out flow
control, sending data at a rate that matches the connection speed of the
receiving device, and error control, checking if data was received
incorrectly and if not, requesting it again.
Devices : Gateway
Protocol : TCP , UDP .
3. Network Layer
The network layer has two main functions. One is breaking up segments
into network packets, and reassembling the packets on the receiving end.
The other is routing packets by discovering the best path across a physical
network. The network layer uses network addresses (typically Internet
Protocol addresses) to route packets to a destination node.
The data link layer establishes and terminates a connection between two
physically-connected nodes on a network. It breaks up packets into frames
and sends them from source to destination. This layer is composed of two
parts—Logical Link Control (LLC), which identifies network protocols,
performs error checking and synchronizes frames, and Media Access
Control (MAC) which uses MAC addresses to connect devices and define
permissions to transmit and receive data.
5
1. Physical Layer
6
OSI vs. TCP/IP Model
7
What Does TCP/IP Do?
The main work of TCP/IP is to transfer the data of a computer from one
device to another. The main condition of this process is to make data
reliable and accurate so that the receiver will receive the same
information which is sent by the sender. To ensure that, each message
reaches its final destination accurately, the TCP/IP model divides its data
into packets and combines them at the other end, which helps in
maintaining the accuracy of the data while transferring from one end to
another end.
Whenever we want to send something over the internet using the TCP/IP
Model, the TCP/IP Model divides the data into packets at the sender’s end
and the same packets have to be recombined at the receiver’s end to
form the same data, and this thing happens to maintain the accuracy of
the data. TCP/IP model divides the data into a 4-layer procedure, where
the data first go into this layer in one order and again in reverse order to
get organized in the same way at the receiver’s end.
8
Difference between TCP/IP and OSI Model
TCP/IP OSI
9
What is Network Protocol?
A network protocol is a set of rules that govern data communication
between different devices in the network. It determines what is being
communicated, how it is being communicated, and when it is being
communicated. It permits connected devices to communicate with each
other, irrespective of internal and structural differences.
1. Network Communication
Communication protocols are really important for the functioning of a
network. They are so crucial that it is not possible to have computer
networks without them. These protocols formally set out the rules and
formats through which data is transferred. These protocols handle syntax,
semantics, error detection, synchronization, and authentication. Below
mentioned are some network communication protocol:
10
It is a layer 7 protocol that is designed for transferring a hypertext
between two or more systems. HTTP works on a client-server model, most
of the data sharing over the web is done through using HTTP.
Internet Protocol(IP)
It is a protocol through which data is sent from one host to another over
the internet. It is used for addressing and routing data packets so that
they can reach their destination.
11
These protocols also help in communicating these requirements across
the network to ensure stable communication. Network management
protocols can also be used for troubleshooting connections between a
host and a client.
Gopher
It is a type of file retrieval protocol that provides downloadable files with
some description for easy management, retrieving, and searching of files.
All the files are arranged on a remote computer in a stratified manner.
Gopher is an old protocol and it is not much used nowadays.
Telnet
It is a protocol that allows the user to connect to a remote computer
program and to use it i.e., it is designed for remote
connectivity. Telnet creates a connection between a host machine and a
remote endpoint to enable a remote session.
3. Network Security
12
These protocols secure the data in passage over a network. These
protocols also determine how the network secures data from any
unauthorized attempts to extract or review data. These protocols make
sure that no unauthorized devices, users, or services can access the
network data. Primarily, these protocols depend on encryption to secure
data.
13