SlideShare ist ein Scribd-Unternehmen logo
1 von 78
Computer Network Models
•There are many users who use computer network
and are located all over the world.
•To ensure national and worldwide data
communication ISO (ISO stands for International
Organization of Standardization.) developed this
model. This is called a model for open system
interconnection (OSI) and is normally called as OSI
model.
•OSI model architecture consists of seven layers. It
defines seven layers or levels in a complete
communication system.
OSI Reference model
TCP/IP Reference Model
•There are many users who use computer network
and are located all over the world.
•To ensure national and worldwide data
communication ISO (ISO stands for International
Organization of Standardization.) developed this
model. This is called a model for open system
interconnection (OSI) and is normally called as OSI
model.
•OSI model architecture consists of seven layers. It
defines seven layers or levels in a complete
communication system.
TCP/IP Reference Model
TCP/IP vs. OSI Model
Network Layer - OSI Model
•The network Layer controls the operation of the
subnet. The main aim of this layer is to deliver
packets from source to destination across multiple
links (networks).
•If two computers (system) are connected on the
same link, then there is no need for a network layer.
It routes the signal through different channels to the
other end and acts as a network controller.
•It also divides the outgoing messages into packets
and to assemble incoming packets into messages
for higher levels.
Functions of Network Layer
Functions of Network Layer
•It translates logical network address into physical
address. Concerned with circuit, message or packet
switching.
•Routers and gateways operate in the network layer.
Mechanism is provided by Network Layer for routing
the packets to final destination.
•Connection services are provided including network
layer flow control, network layer error control and
packet sequence control.
•Breaks larger packets into small packets.
Store-and-Forward Packet
Switching
•All PSDNs, WANs and FR operate in “store and
forward” mode:- Packet stored at a node and
transmitted to next node. - Next node receives it
completely in a buffer. - Routing decision selects
outgoing link to “forward” it toward its final
destination. - Steps above repeated until packet fully
received at destination node.
•FR node involves much less processing per frame
than PSDN node but still operates in store and
forward mode. Note: FR=FrameRelay!
Store and Forward Timing
•Timing diagram for simple store and forward:
Minimum times required to transfer a single packet
from Node 1 to Node 4 in the absence of errors and
with no waiting at the node for frames from other
sources.
•Transmission delay of a packet: - TransP = Length
of packet (bits) / (Link transmission rate (bits/ s)) -
Different links may have different transmission rates.
•Propagation delay depends only on length of link.
Effects of Packet Size
•Above figure shows file transfer from Station X to
Station Y through intermediate store-and-forward
nodes a and b.
•Effect of length of packets on file transfer delay:-
Segmentation into smaller packets shortens delay
up to a point by reducing the store and forward
delay at each node.
•But cause extra overhead in packet headers and in
processing requirements at nodes which may
increase processing delays .
Services provided by the Transport
Layer
•Service Point Addressing: Transport Layer header
includes service point address which is port
address. This layer gets the message to the correct
process on the computer unlike Network Layer,
which gets each packet to the correct computer.
•Segmentation and Reassembling: A message is
divided into segments; each segment contains
sequence number, which enables this layer in
reassembling the message. Message is
reassembled correctly upon arrival at the destination
and replaces packets which were lost in
transmission.
Services provided by the Transport
Layer
•Connection Control: It includes 2 types:
•Connectionless Transport Layer : Each segment
is considered as an independent packet and
delivered to the transport layer at the destination
machine.
•Connection Oriented Transport Layer : Before
delivering packets, connection is made with
transport layer at the destination machine.
•Flow Control: In this layer, flow control is
performed end to end.
•Error Control: Error Control is performed end to
end in this layer to ensure that the complete
message arrives at the receiving transport layer
without any error. Error Correction is done through
Connection Oriented Services
•There is a sequence of operation to be followed by
the users of connection oriented service. These are:
Connection is established.
Information is sent.
Connection is released.
•In connection oriented service we have to establish
a connection before starting the communication.
•Connection oriented service is more reliable than
connectionless service.
•Example of connection oriented is TCP
(Transmission Control Protocol) protocol.
•FIG. NEXT SLIDE
Connection Less Services
•It is similar to the postal services, as it carries the
full address where the message (letter) is to be
carried. Each message is routed independently from
source to destination. The order of message sent
can be different from the order received.
•In connectionless the data is transferred in one
direction from source to destination without checking
that destination is still there or not or if it prepared to
accept the message. Authentication is not needed in
this.
•Example of Connectionless service is UDP
(User Datagram Protocol) protocol.
Connection-oriented vs. Connection-less
Services.
Flooding
•When node receives broadcast packet, sends copy to
all neighbors.
•Problems: cycles & broadcast storm
•Controlled flooding: Node only broadcasts pkt if it
hasn’t broadcast same packet before.
•Node keeps track of packet ids already broadcasted.
•or reverse path forwarding (RPF): only forward packet
if it arrived on shortest path between node and source.
Shortest Path Routing - Dijkstra's
algorithm
Example
LINK STATE ROUTING ALGORITHM
Hierarchical Routing
Hierarchical Routing
IP Address
•IP (Internet Protocol) Address is an address of your
network hardware. It helps in connecting your computer
to other devices on your network and all over the world.
•An IP Address is made up of numbers or characters.
•An example of an IP address would be: 506.457.14.512
All devices that are connected to an internet connection
have a unique IP address which means there’s a need of
billions of IP addresses. This requirement is fulfilled by
the new IP version IPv6.
Classful Addressing
•IPv4 addressing used the concept of classes. This
architecture is known as classful addressing.
•In the Classful addressing, there are 5 classes in which
the address space is divided: A, B, C, D, and E.
•Each class occupies some fraction of the address
space.
•We can find the class of an address when given the
address in binary notation or dotted-decimal notation by
checking the first few bits or first byte.
Classful Addressing
Classful Addressing
•The "class A addresses" are designed for large
organizations to manage a large number of attached
hosts or routers.
•The "class B addresses" are designed for midsize
organizations to manage tens of thousands of attached
hosts or routers.
•The "class C addresses" are designed for small
organizations to manage a small number of attached
hosts or routers.
Classless Addressing
•Classful addressing leads to address depletion. That's
the big issue for this schema and that's why it's not used
nowadays.
•To overcome the problem of address depletion and to
give more organizations access to the Internet, the
classless addressing was designed and implemented.
•In this scheme of classless addressing, there are no
classes, but the addresses are still granted in blocks.
Classless Addressing
•In classless addressing, when an entity(organization or a
single household (small organization) or whatever which uses
the internet) needs to be connected to the Internet, it is
granted a block (range) of addresses.
•The size of the block (the number of addresses) varies based
on the nature, size, and need of the entity.
•For example, a household (small organization) may be given
only two addresses; a large organization may be given
thousands of addresses.
•On the other hand. An ISP, as the Internet service provider,
may be given hundreds of thousands based on the number of
customers it may serve.
•
Subnets
Subnets
IP addressing: CIDR
NAT: Network Address Translation
DHCP: Dynamic Host Configuration
Protocol
ARP AND RARP
ARP AND RARP EXAMPLE
SOLUTION
INTERNET PROTOCOL VERSION
4(IPV4)
•IPv4 is the first network protocol to
interconnect different networks
regardless of the medium used.
•Globally unique addressing scheme
•Any two nodes can communicate
directly
ICMP: Internet Control Message
Protocol
ICMP Header Format
IP fragmentation
IP fragmentation Example
RIP ( Routing Information Protocol)
Techniques to Improve QoS
•Scheduling
•Packets from different flows arrive at a switch or router
for processing. A good scheduling technique treats the
different flows in a fair and appropriate manner.
•Several scheduling techniques are designed to improve
the quality of service. We discuss three of them here:
FIFO queuing, priority queuing, and weighted fair
queuing.
Congestion Control techniques in Computer Networks
Open Loop Congestion Control
•Retransmission Policy :
It is the policy in which retransmission of the packets are
taken care.
•Window Policy :
The type of window at the sender side may also affect
the congestion.
•Discarding Policy :
A good discarding policy adopted by the routers is that
the routers may prevent congestion and at the same time
partially discards the corrupted or less sensitive package
and also able to maintain the quality of a message.
Open Loop Congestion Control
•Acknowledgment Policy :
Since acknowledgement are also the part of the load in
network, the acknowledgment policy imposed by the
receiver may also affect congestion. Several approaches
can be used to prevent congestion related to
acknowledgment.
•Admission Policy :
In admission policy a mechanism should be used to
prevent congestion. Switches in a flow should first check
the resource requirement of a network flow before
transmitting it further.
Closed Loop Congestion Control
Closed Loop Congestion Control
Closed Loop Congestion Control
Network layer
Network layer

Weitere ähnliche Inhalte

Was ist angesagt?

Circuit and packet_switching
Circuit and packet_switchingCircuit and packet_switching
Circuit and packet_switching
hoanv
 
Spanning tree protocol
Spanning tree protocolSpanning tree protocol
Spanning tree protocol
Muuluu
 
Internetworking
InternetworkingInternetworking
Internetworking
Raghu nath
 

Was ist angesagt? (20)

TCP/IP Protocols With All Layer Description
TCP/IP Protocols With All Layer DescriptionTCP/IP Protocols With All Layer Description
TCP/IP Protocols With All Layer Description
 
PPP (Point to Point Protocol)
PPP (Point to Point Protocol)PPP (Point to Point Protocol)
PPP (Point to Point Protocol)
 
Transmission Control Protocol (TCP)
Transmission Control Protocol (TCP)Transmission Control Protocol (TCP)
Transmission Control Protocol (TCP)
 
Transport layer services
Transport layer servicesTransport layer services
Transport layer services
 
Application layer protocols
Application layer protocolsApplication layer protocols
Application layer protocols
 
Circuit and packet_switching
Circuit and packet_switchingCircuit and packet_switching
Circuit and packet_switching
 
Protocols and the TCP/IP Protocol Suite
Protocols and the TCP/IP Protocol SuiteProtocols and the TCP/IP Protocol Suite
Protocols and the TCP/IP Protocol Suite
 
Data link control & protocol concepts
Data link control & protocol conceptsData link control & protocol concepts
Data link control & protocol concepts
 
Transport layer protocol
Transport layer protocolTransport layer protocol
Transport layer protocol
 
Network layer tanenbaum
Network layer tanenbaumNetwork layer tanenbaum
Network layer tanenbaum
 
Link state routing protocol
Link state routing protocolLink state routing protocol
Link state routing protocol
 
Token bus
Token busToken bus
Token bus
 
Application Layer and Protocols
Application Layer and ProtocolsApplication Layer and Protocols
Application Layer and Protocols
 
Network Layer by-adeel
Network Layer by-adeelNetwork Layer by-adeel
Network Layer by-adeel
 
Spanning tree protocol
Spanning tree protocolSpanning tree protocol
Spanning tree protocol
 
Network Layer,Computer Networks
Network Layer,Computer NetworksNetwork Layer,Computer Networks
Network Layer,Computer Networks
 
TCP and UDP
TCP and UDP TCP and UDP
TCP and UDP
 
Internetworking
InternetworkingInternetworking
Internetworking
 
Tcp IP Model
Tcp IP ModelTcp IP Model
Tcp IP Model
 
TCP & UDP ( Transmission Control Protocol and User Datagram Protocol)
TCP & UDP ( Transmission Control Protocol and User Datagram Protocol)TCP & UDP ( Transmission Control Protocol and User Datagram Protocol)
TCP & UDP ( Transmission Control Protocol and User Datagram Protocol)
 

Ähnlich wie Network layer

Web technologies: recap on TCP-IP
Web technologies: recap on TCP-IPWeb technologies: recap on TCP-IP
Web technologies: recap on TCP-IP
Piero Fraternali
 

Ähnlich wie Network layer (20)

Application Layer
Application LayerApplication Layer
Application Layer
 
Dc2 t1
Dc2 t1Dc2 t1
Dc2 t1
 
Osi model
Osi modelOsi model
Osi model
 
Network architecure (3).pptx
Network architecure (3).pptxNetwork architecure (3).pptx
Network architecure (3).pptx
 
ET3003-2 OSI-TCPIP (Semester II 2013-2014)
ET3003-2 OSI-TCPIP (Semester II 2013-2014)ET3003-2 OSI-TCPIP (Semester II 2013-2014)
ET3003-2 OSI-TCPIP (Semester II 2013-2014)
 
OSI Model.ppt
OSI Model.pptOSI Model.ppt
OSI Model.ppt
 
Web technologies: recap on TCP-IP
Web technologies: recap on TCP-IPWeb technologies: recap on TCP-IP
Web technologies: recap on TCP-IP
 
MVA slides lesson 2
MVA slides lesson 2MVA slides lesson 2
MVA slides lesson 2
 
Protocol layer,OSI model & POP3
Protocol layer,OSI model & POP3Protocol layer,OSI model & POP3
Protocol layer,OSI model & POP3
 
Unit 2 ppt-idc
Unit 2 ppt-idcUnit 2 ppt-idc
Unit 2 ppt-idc
 
DS Unit-4-Communication .pdf
DS Unit-4-Communication .pdfDS Unit-4-Communication .pdf
DS Unit-4-Communication .pdf
 
OSI Reference Model and TCP/IP (Lecture #3 ET3003 Sem1 2014/2015)
OSI Reference Model and TCP/IP (Lecture #3 ET3003 Sem1 2014/2015)OSI Reference Model and TCP/IP (Lecture #3 ET3003 Sem1 2014/2015)
OSI Reference Model and TCP/IP (Lecture #3 ET3003 Sem1 2014/2015)
 
Viloria osi layer4-7
Viloria osi layer4-7Viloria osi layer4-7
Viloria osi layer4-7
 
Sargation university's open system interconnection
Sargation university's open system interconnectionSargation university's open system interconnection
Sargation university's open system interconnection
 
Computer Networks basics
Computer Networks basicsComputer Networks basics
Computer Networks basics
 
Osi layer and network protocol
Osi layer and network protocolOsi layer and network protocol
Osi layer and network protocol
 
Networking basics
Networking basicsNetworking basics
Networking basics
 
Computer networks
Computer networksComputer networks
Computer networks
 
Osi
OsiOsi
Osi
 
Computer networks unit iii
Computer networks    unit iiiComputer networks    unit iii
Computer networks unit iii
 

Kürzlich hochgeladen

XXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXX
XXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXX
XXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXX
ssuser89054b
 
AKTU Computer Networks notes --- Unit 3.pdf
AKTU Computer Networks notes ---  Unit 3.pdfAKTU Computer Networks notes ---  Unit 3.pdf
AKTU Computer Networks notes --- Unit 3.pdf
ankushspencer015
 
Call Now ≽ 9953056974 ≼🔝 Call Girls In New Ashok Nagar ≼🔝 Delhi door step de...
Call Now ≽ 9953056974 ≼🔝 Call Girls In New Ashok Nagar  ≼🔝 Delhi door step de...Call Now ≽ 9953056974 ≼🔝 Call Girls In New Ashok Nagar  ≼🔝 Delhi door step de...
Call Now ≽ 9953056974 ≼🔝 Call Girls In New Ashok Nagar ≼🔝 Delhi door step de...
9953056974 Low Rate Call Girls In Saket, Delhi NCR
 
FULL ENJOY Call Girls In Mahipalpur Delhi Contact Us 8377877756
FULL ENJOY Call Girls In Mahipalpur Delhi Contact Us 8377877756FULL ENJOY Call Girls In Mahipalpur Delhi Contact Us 8377877756
FULL ENJOY Call Girls In Mahipalpur Delhi Contact Us 8377877756
dollysharma2066
 
VIP Call Girls Palanpur 7001035870 Whatsapp Number, 24/07 Booking
VIP Call Girls Palanpur 7001035870 Whatsapp Number, 24/07 BookingVIP Call Girls Palanpur 7001035870 Whatsapp Number, 24/07 Booking
VIP Call Girls Palanpur 7001035870 Whatsapp Number, 24/07 Booking
dharasingh5698
 
VIP Call Girls Ankleshwar 7001035870 Whatsapp Number, 24/07 Booking
VIP Call Girls Ankleshwar 7001035870 Whatsapp Number, 24/07 BookingVIP Call Girls Ankleshwar 7001035870 Whatsapp Number, 24/07 Booking
VIP Call Girls Ankleshwar 7001035870 Whatsapp Number, 24/07 Booking
dharasingh5698
 

Kürzlich hochgeladen (20)

Call Girls Pimpri Chinchwad Call Me 7737669865 Budget Friendly No Advance Boo...
Call Girls Pimpri Chinchwad Call Me 7737669865 Budget Friendly No Advance Boo...Call Girls Pimpri Chinchwad Call Me 7737669865 Budget Friendly No Advance Boo...
Call Girls Pimpri Chinchwad Call Me 7737669865 Budget Friendly No Advance Boo...
 
Bhosari ( Call Girls ) Pune 6297143586 Hot Model With Sexy Bhabi Ready For ...
Bhosari ( Call Girls ) Pune  6297143586  Hot Model With Sexy Bhabi Ready For ...Bhosari ( Call Girls ) Pune  6297143586  Hot Model With Sexy Bhabi Ready For ...
Bhosari ( Call Girls ) Pune 6297143586 Hot Model With Sexy Bhabi Ready For ...
 
XXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXX
XXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXX
XXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXX
 
Generative AI or GenAI technology based PPT
Generative AI or GenAI technology based PPTGenerative AI or GenAI technology based PPT
Generative AI or GenAI technology based PPT
 
Booking open Available Pune Call Girls Pargaon 6297143586 Call Hot Indian Gi...
Booking open Available Pune Call Girls Pargaon  6297143586 Call Hot Indian Gi...Booking open Available Pune Call Girls Pargaon  6297143586 Call Hot Indian Gi...
Booking open Available Pune Call Girls Pargaon 6297143586 Call Hot Indian Gi...
 
Booking open Available Pune Call Girls Koregaon Park 6297143586 Call Hot Ind...
Booking open Available Pune Call Girls Koregaon Park  6297143586 Call Hot Ind...Booking open Available Pune Call Girls Koregaon Park  6297143586 Call Hot Ind...
Booking open Available Pune Call Girls Koregaon Park 6297143586 Call Hot Ind...
 
VIP Model Call Girls Kothrud ( Pune ) Call ON 8005736733 Starting From 5K to ...
VIP Model Call Girls Kothrud ( Pune ) Call ON 8005736733 Starting From 5K to ...VIP Model Call Girls Kothrud ( Pune ) Call ON 8005736733 Starting From 5K to ...
VIP Model Call Girls Kothrud ( Pune ) Call ON 8005736733 Starting From 5K to ...
 
AKTU Computer Networks notes --- Unit 3.pdf
AKTU Computer Networks notes ---  Unit 3.pdfAKTU Computer Networks notes ---  Unit 3.pdf
AKTU Computer Networks notes --- Unit 3.pdf
 
Call Now ≽ 9953056974 ≼🔝 Call Girls In New Ashok Nagar ≼🔝 Delhi door step de...
Call Now ≽ 9953056974 ≼🔝 Call Girls In New Ashok Nagar  ≼🔝 Delhi door step de...Call Now ≽ 9953056974 ≼🔝 Call Girls In New Ashok Nagar  ≼🔝 Delhi door step de...
Call Now ≽ 9953056974 ≼🔝 Call Girls In New Ashok Nagar ≼🔝 Delhi door step de...
 
chapter 5.pptx: drainage and irrigation engineering
chapter 5.pptx: drainage and irrigation engineeringchapter 5.pptx: drainage and irrigation engineering
chapter 5.pptx: drainage and irrigation engineering
 
Intze Overhead Water Tank Design by Working Stress - IS Method.pdf
Intze Overhead Water Tank  Design by Working Stress - IS Method.pdfIntze Overhead Water Tank  Design by Working Stress - IS Method.pdf
Intze Overhead Water Tank Design by Working Stress - IS Method.pdf
 
FULL ENJOY Call Girls In Mahipalpur Delhi Contact Us 8377877756
FULL ENJOY Call Girls In Mahipalpur Delhi Contact Us 8377877756FULL ENJOY Call Girls In Mahipalpur Delhi Contact Us 8377877756
FULL ENJOY Call Girls In Mahipalpur Delhi Contact Us 8377877756
 
VIP Call Girls Palanpur 7001035870 Whatsapp Number, 24/07 Booking
VIP Call Girls Palanpur 7001035870 Whatsapp Number, 24/07 BookingVIP Call Girls Palanpur 7001035870 Whatsapp Number, 24/07 Booking
VIP Call Girls Palanpur 7001035870 Whatsapp Number, 24/07 Booking
 
Java Programming :Event Handling(Types of Events)
Java Programming :Event Handling(Types of Events)Java Programming :Event Handling(Types of Events)
Java Programming :Event Handling(Types of Events)
 
The Most Attractive Pune Call Girls Budhwar Peth 8250192130 Will You Miss Thi...
The Most Attractive Pune Call Girls Budhwar Peth 8250192130 Will You Miss Thi...The Most Attractive Pune Call Girls Budhwar Peth 8250192130 Will You Miss Thi...
The Most Attractive Pune Call Girls Budhwar Peth 8250192130 Will You Miss Thi...
 
PVC VS. FIBERGLASS (FRP) GRAVITY SEWER - UNI BELL
PVC VS. FIBERGLASS (FRP) GRAVITY SEWER - UNI BELLPVC VS. FIBERGLASS (FRP) GRAVITY SEWER - UNI BELL
PVC VS. FIBERGLASS (FRP) GRAVITY SEWER - UNI BELL
 
KubeKraft presentation @CloudNativeHooghly
KubeKraft presentation @CloudNativeHooghlyKubeKraft presentation @CloudNativeHooghly
KubeKraft presentation @CloudNativeHooghly
 
Thermal Engineering Unit - I & II . ppt
Thermal Engineering  Unit - I & II . pptThermal Engineering  Unit - I & II . ppt
Thermal Engineering Unit - I & II . ppt
 
VIP Call Girls Ankleshwar 7001035870 Whatsapp Number, 24/07 Booking
VIP Call Girls Ankleshwar 7001035870 Whatsapp Number, 24/07 BookingVIP Call Girls Ankleshwar 7001035870 Whatsapp Number, 24/07 Booking
VIP Call Girls Ankleshwar 7001035870 Whatsapp Number, 24/07 Booking
 
NFPA 5000 2024 standard .
NFPA 5000 2024 standard                                  .NFPA 5000 2024 standard                                  .
NFPA 5000 2024 standard .
 

Network layer

  • 1. Computer Network Models •There are many users who use computer network and are located all over the world. •To ensure national and worldwide data communication ISO (ISO stands for International Organization of Standardization.) developed this model. This is called a model for open system interconnection (OSI) and is normally called as OSI model. •OSI model architecture consists of seven layers. It defines seven layers or levels in a complete communication system.
  • 3. TCP/IP Reference Model •There are many users who use computer network and are located all over the world. •To ensure national and worldwide data communication ISO (ISO stands for International Organization of Standardization.) developed this model. This is called a model for open system interconnection (OSI) and is normally called as OSI model. •OSI model architecture consists of seven layers. It defines seven layers or levels in a complete communication system.
  • 6. Network Layer - OSI Model •The network Layer controls the operation of the subnet. The main aim of this layer is to deliver packets from source to destination across multiple links (networks). •If two computers (system) are connected on the same link, then there is no need for a network layer. It routes the signal through different channels to the other end and acts as a network controller. •It also divides the outgoing messages into packets and to assemble incoming packets into messages for higher levels.
  • 8. Functions of Network Layer •It translates logical network address into physical address. Concerned with circuit, message or packet switching. •Routers and gateways operate in the network layer. Mechanism is provided by Network Layer for routing the packets to final destination. •Connection services are provided including network layer flow control, network layer error control and packet sequence control. •Breaks larger packets into small packets.
  • 9. Store-and-Forward Packet Switching •All PSDNs, WANs and FR operate in “store and forward” mode:- Packet stored at a node and transmitted to next node. - Next node receives it completely in a buffer. - Routing decision selects outgoing link to “forward” it toward its final destination. - Steps above repeated until packet fully received at destination node. •FR node involves much less processing per frame than PSDN node but still operates in store and forward mode. Note: FR=FrameRelay!
  • 10.
  • 11. Store and Forward Timing •Timing diagram for simple store and forward: Minimum times required to transfer a single packet from Node 1 to Node 4 in the absence of errors and with no waiting at the node for frames from other sources. •Transmission delay of a packet: - TransP = Length of packet (bits) / (Link transmission rate (bits/ s)) - Different links may have different transmission rates. •Propagation delay depends only on length of link.
  • 12.
  • 13. Effects of Packet Size •Above figure shows file transfer from Station X to Station Y through intermediate store-and-forward nodes a and b. •Effect of length of packets on file transfer delay:- Segmentation into smaller packets shortens delay up to a point by reducing the store and forward delay at each node. •But cause extra overhead in packet headers and in processing requirements at nodes which may increase processing delays .
  • 14. Services provided by the Transport Layer •Service Point Addressing: Transport Layer header includes service point address which is port address. This layer gets the message to the correct process on the computer unlike Network Layer, which gets each packet to the correct computer. •Segmentation and Reassembling: A message is divided into segments; each segment contains sequence number, which enables this layer in reassembling the message. Message is reassembled correctly upon arrival at the destination and replaces packets which were lost in transmission.
  • 15.
  • 16. Services provided by the Transport Layer •Connection Control: It includes 2 types: •Connectionless Transport Layer : Each segment is considered as an independent packet and delivered to the transport layer at the destination machine. •Connection Oriented Transport Layer : Before delivering packets, connection is made with transport layer at the destination machine. •Flow Control: In this layer, flow control is performed end to end. •Error Control: Error Control is performed end to end in this layer to ensure that the complete message arrives at the receiving transport layer without any error. Error Correction is done through
  • 17. Connection Oriented Services •There is a sequence of operation to be followed by the users of connection oriented service. These are: Connection is established. Information is sent. Connection is released. •In connection oriented service we have to establish a connection before starting the communication. •Connection oriented service is more reliable than connectionless service. •Example of connection oriented is TCP (Transmission Control Protocol) protocol. •FIG. NEXT SLIDE
  • 18.
  • 19. Connection Less Services •It is similar to the postal services, as it carries the full address where the message (letter) is to be carried. Each message is routed independently from source to destination. The order of message sent can be different from the order received. •In connectionless the data is transferred in one direction from source to destination without checking that destination is still there or not or if it prepared to accept the message. Authentication is not needed in this. •Example of Connectionless service is UDP (User Datagram Protocol) protocol.
  • 21. Flooding •When node receives broadcast packet, sends copy to all neighbors. •Problems: cycles & broadcast storm •Controlled flooding: Node only broadcasts pkt if it hasn’t broadcast same packet before. •Node keeps track of packet ids already broadcasted. •or reverse path forwarding (RPF): only forward packet if it arrived on shortest path between node and source.
  • 22. Shortest Path Routing - Dijkstra's algorithm
  • 23.
  • 25.
  • 26.
  • 27.
  • 28.
  • 29.
  • 30.
  • 31.
  • 32.
  • 33.
  • 34. LINK STATE ROUTING ALGORITHM
  • 37. IP Address •IP (Internet Protocol) Address is an address of your network hardware. It helps in connecting your computer to other devices on your network and all over the world. •An IP Address is made up of numbers or characters. •An example of an IP address would be: 506.457.14.512 All devices that are connected to an internet connection have a unique IP address which means there’s a need of billions of IP addresses. This requirement is fulfilled by the new IP version IPv6.
  • 38. Classful Addressing •IPv4 addressing used the concept of classes. This architecture is known as classful addressing. •In the Classful addressing, there are 5 classes in which the address space is divided: A, B, C, D, and E. •Each class occupies some fraction of the address space. •We can find the class of an address when given the address in binary notation or dotted-decimal notation by checking the first few bits or first byte.
  • 40. Classful Addressing •The "class A addresses" are designed for large organizations to manage a large number of attached hosts or routers. •The "class B addresses" are designed for midsize organizations to manage tens of thousands of attached hosts or routers. •The "class C addresses" are designed for small organizations to manage a small number of attached hosts or routers.
  • 41. Classless Addressing •Classful addressing leads to address depletion. That's the big issue for this schema and that's why it's not used nowadays. •To overcome the problem of address depletion and to give more organizations access to the Internet, the classless addressing was designed and implemented. •In this scheme of classless addressing, there are no classes, but the addresses are still granted in blocks.
  • 42. Classless Addressing •In classless addressing, when an entity(organization or a single household (small organization) or whatever which uses the internet) needs to be connected to the Internet, it is granted a block (range) of addresses. •The size of the block (the number of addresses) varies based on the nature, size, and need of the entity. •For example, a household (small organization) may be given only two addresses; a large organization may be given thousands of addresses. •On the other hand. An ISP, as the Internet service provider, may be given hundreds of thousands based on the number of customers it may serve. •
  • 46. NAT: Network Address Translation
  • 47. DHCP: Dynamic Host Configuration Protocol
  • 49. ARP AND RARP EXAMPLE
  • 51. INTERNET PROTOCOL VERSION 4(IPV4) •IPv4 is the first network protocol to interconnect different networks regardless of the medium used. •Globally unique addressing scheme •Any two nodes can communicate directly
  • 52. ICMP: Internet Control Message Protocol
  • 56. RIP ( Routing Information Protocol)
  • 57.
  • 58.
  • 59.
  • 60.
  • 61.
  • 62.
  • 63.
  • 64.
  • 65.
  • 66.
  • 67. Techniques to Improve QoS •Scheduling •Packets from different flows arrive at a switch or router for processing. A good scheduling technique treats the different flows in a fair and appropriate manner. •Several scheduling techniques are designed to improve the quality of service. We discuss three of them here: FIFO queuing, priority queuing, and weighted fair queuing.
  • 68.
  • 69.
  • 70.
  • 71. Congestion Control techniques in Computer Networks
  • 72. Open Loop Congestion Control •Retransmission Policy : It is the policy in which retransmission of the packets are taken care. •Window Policy : The type of window at the sender side may also affect the congestion. •Discarding Policy : A good discarding policy adopted by the routers is that the routers may prevent congestion and at the same time partially discards the corrupted or less sensitive package and also able to maintain the quality of a message.
  • 73. Open Loop Congestion Control •Acknowledgment Policy : Since acknowledgement are also the part of the load in network, the acknowledgment policy imposed by the receiver may also affect congestion. Several approaches can be used to prevent congestion related to acknowledgment. •Admission Policy : In admission policy a mechanism should be used to prevent congestion. Switches in a flow should first check the resource requirement of a network flow before transmitting it further.