SlideShare ist ein Scribd-Unternehmen logo
1 von 26
Course Instructor : Sehrish Rafiq
Department Of Computer Science
University Of Peshawar
Data Communications & Networking
Lecture-06
Lecture overview
Functionalities of Network layer
Functionalities of Transport layer
Functionalities of Session layer
Functionalities of Presentation layer
Functionalities of Application layer
TCP/IP protocol suite or Internet model
Network Layer
A network layer is responsible for the source-to-destination
delivery of a packet possibly across multiple networks(links).
The data link layer oversees the delivery of the packet between
two systems on the same network.
The network layer ensures that each packet gets from its point of
origin to its final destination.
If two systems are connected to the same link, there is usually no
need for a network layer.
Note:- If the two systems are attached to different networks(links) with
connecting devices between networks, there is often a need for the network
layer to accomplish source-to-destination delivery.
Network Layer
Responsibilities of the network layer
Logical addressing
 The physical addressing implemented by the data link layer handles the
addressing problem locally.
 If a packet passes the network boundaries we need another addressing system to
help distinguish the source and destination systems.
 The network layer adds a header to the packet coming from transport layer that
among other things includes the logical addresses of the sender and receiver.
Routing
 When independent networks or links are connected together to create an
internetwork or a large network, the connecting devices (called routers or gate
ways) route the packets to their final destination.
 One of the functions of the network layer is to provide this mechanism.
Source to destination delivery
Example
Transport Layer
 The transport layer is responsible for source-to-destination(end-to-end)
delivery of the entire message.
 The network layer oversees end-to-end delivery of individual packets, it does
not recognize any relationship between those packets.
 The network layer treats each packet independently ,as though each piece
belong to a separate message whether or not it does.
 The transport layer, on the other hand ensures that the whole message arrives
intact and in order, overseeing both error control and flow control at the
source-destination level.
Transport Layer
Transport Layer
 For added security, the transport layer may create a connection between the
two ports.
 A connection is a single logical path between the source & destination that
associated with all packets in a message.
 Creating a connection involves 3 steps:
 Connection establishment
 Data transfer
 Connection release
 By confining transmission of all packets to a single pathway, the transport layer
has more control over sequencing, flow and error detection and correction.
Responsibilities of the transport
layer
Service point addressing
 Computers often run several programs at the same time.
 For this reason source –to-destination delivery means delivery not only from
one computer to the next but also from a specific process on one computer to a
specific process on the other.
 The transport layer header therefore must include a type of address called a
service-point address(or port address).
 The network layer gets each packet to the correct computer, the transport
layer gets the entire message to the correct process on that computer.
Segmentation & reassembly
 A message is divided in to transmittable segments, each segment containing a
sequence number.
Responsibilities of the transport
layer
 These numbers enable the transport layer to reassemble the message correctly
upon arriving at the destination and identify and replace packets that were lost
in the transmission.
Connection control
 The transport layer can be either connectionless or connection oriented.
 A connectionless transport layer treats each segment as an independent packet
and delivers it to the transport layer at the destination machine.
 A connection-oriented transport layer makes a connection with the transport
layer at the destination machine first before delivering the packets.
 After all the data is transmitted, the connection is terminated.
Responsibilities of the transport
layer
Flow control
 Like the data link layer the transport layer is responsible for flow control.
 However, flow control at this level is performed end-to-end rather than across
a single link
Error control
 Like the data Link layer, the transport layer is responsible for error control.
 However error control at this layer is performed end-to-end.
 The sending transport layer makes sure that the entire message arrives at the
receiving transport layer without error( damage, loss or duplication).
 Error correction is usually achieved through retransmission.
Session Layer
Services Provided by the first three layers( physical, data link and
network) are sufficient for some processes.
The session layer is the network dialog controller, establishes,
controls, maintains and synchronizes the interaction between
communicating systems.
Responsibilities of the Session Layer
 Dialog control
 The session layer allows two systems to enter in to a dialog.
 It allows the communication between two processes to take place either in half
duplex mode or full duplex mode.
 Half duplex example: Main frame and terminal.
 Synchronization
 The session Layer allows a process to add check points(synchronization points)
in to a stream of data.
Presentation Layer
The Presentation layer is concerned with the syntax and
semantics of the information exchanged between two
systems.
Responsibilities of the Presentation Layer
Translation
 The processes in two systems are usually exchanging information in the form of
character strings,numbers and so on.
 The information should be changed to bit streams before being transmitted.
 Because different computers use different encoding schemes,the presentation
layer is responsible for interoperability between these different encoding
methods.
 The presentation Layer at the sender changes the information from its sender-
dependent format in to a common format.
 The presentation Layer at the receiving machine changes the common format in
to its receiver dependent format.
Presentation Layer continued…
Encryption
 To carry sensitive information, a system must be able to assure privacy.
 Encryption means that the sender transforms the original information in to
another form and sends the resulting message out over the network.
 Decryption reverses the original process to transform the message back to its
original form.
Compression
 Data compression reduces the number of bits to be transmitted.
 Data compression becomes particularly important in the transmission of multi-
media such as text, audio and video.
Application Layer
The application layer enables the user whether human or software
to access the network.
It provides user interfaces and support for services such as
electronic mail, remote file access and transfer, shared database
management and other types of distributed information services.
No headers or trailers are added at this layer.
Application Layer
Services provided by the application
layer
Network virtual terminal
 A network virtual terminal is a software version of a physical terminal and
allows a user to log on to a remote host.
 To do so, the application creates a software emulation of a terminal at the
remote host.
 The user’s computer talks to the software terminal which in turn talks to the
host and vice versa.
 The remote host believes that it is communicating with one of its own
terminals and allows you log on.
 File Transfer, Access and Management (FTAM)
 This application allows to access files in a remote computer (to make changes
or read data),to retrieve files from a remote computer and to manage or
control files in a remote computer.
Application layer continued…
Mail services
 This application provides the basis for e-mail forwarding and
storage.
Directory Services
 This application provides distributed database sources and access
for global information about various objects and services.
TCP/IP protocol suite or Internet
Model
TCP/IP protocol suite or Internet
Model
The TCP/IP protocol suite used in the Internet was developed
prior to the OSI model.
Therefore, the layers in the TCP/IP suite do not match exactly
with those in the OSI model.
The first four layers provide physical standards, network
interface, internetworking and transport functions that
corresponds to the first four layers of the OSI model.
The three top most layers(application layer, presentation layer,
session layer) are represented in TCP/IP by a single layer called
the application layer.
TCP/IP protocol suite or Internet
Model
TCP/IP protocol suite or Internet
Model
The TCP/IP protocol suite contain relatively independent
protocols that can be mixed and matched depending on the needs
of the system.
The term hierarical means that each upper level protocol is
supported by one or more lower level protocols.
At the transport layer TCP/IP defines two protocols TCP and
UDP.
At the network layer the main protocol defined by TCP/IP is IP,
although there are some other protocols that support data
movement in this layer.

Weitere ähnliche Inhalte

Was ist angesagt?

Computer Network Notes UNIT II
Computer Network Notes UNIT IIComputer Network Notes UNIT II
Computer Network Notes UNIT IINANDINI SHARMA
 
Introduction to Data Communication
Introduction to Data CommunicationIntroduction to Data Communication
Introduction to Data CommunicationPankaj Gautam
 
Data communication and computer networks | Network Topologies
Data communication and computer networks | Network TopologiesData communication and computer networks | Network Topologies
Data communication and computer networks | Network TopologiesMSA Technosoft
 
Computer Networks-1 1st unit (10CS55) VTU
Computer Networks-1 1st unit (10CS55) VTUComputer Networks-1 1st unit (10CS55) VTU
Computer Networks-1 1st unit (10CS55) VTUSiddharaj Junnarkar
 
Networking Basics
Networking BasicsNetworking Basics
Networking BasicsR G Mani
 
Dcn data link_layer
Dcn data link_layerDcn data link_layer
Dcn data link_layermangal das
 
Module 1 computer networks imtroduction,data link layer
Module 1  computer networks imtroduction,data link layerModule 1  computer networks imtroduction,data link layer
Module 1 computer networks imtroduction,data link layerDeepak John
 
Introduction to Computer Networks
Introduction to Computer NetworksIntroduction to Computer Networks
Introduction to Computer NetworksVenkatesh Iyer
 
Computer network (Lecture 1)
Computer network (Lecture 1)Computer network (Lecture 1)
Computer network (Lecture 1)Vishwajit Nandi
 
Computer Network MAC Layer Notes as per RGPV syllabus
Computer Network MAC Layer Notes as per RGPV syllabusComputer Network MAC Layer Notes as per RGPV syllabus
Computer Network MAC Layer Notes as per RGPV syllabusNANDINI SHARMA
 
Powerpoint for data communication
Powerpoint for data communication Powerpoint for data communication
Powerpoint for data communication samanthaanderson21
 
Lecture1 (Transmission Mode in Computer Network)
Lecture1 (Transmission Mode in Computer Network)Lecture1 (Transmission Mode in Computer Network)
Lecture1 (Transmission Mode in Computer Network)kona paul
 

Was ist angesagt? (20)

Computer Network Notes UNIT II
Computer Network Notes UNIT IIComputer Network Notes UNIT II
Computer Network Notes UNIT II
 
Introduction to Data Communication
Introduction to Data CommunicationIntroduction to Data Communication
Introduction to Data Communication
 
Class notes 1
Class notes 1Class notes 1
Class notes 1
 
Data communication and computer networks | Network Topologies
Data communication and computer networks | Network TopologiesData communication and computer networks | Network Topologies
Data communication and computer networks | Network Topologies
 
Computer network_network devices
Computer network_network devicesComputer network_network devices
Computer network_network devices
 
Chap 1 introduction
Chap 1 introductionChap 1 introduction
Chap 1 introduction
 
Computer Networks-1 1st unit (10CS55) VTU
Computer Networks-1 1st unit (10CS55) VTUComputer Networks-1 1st unit (10CS55) VTU
Computer Networks-1 1st unit (10CS55) VTU
 
Assignment 2
Assignment 2Assignment 2
Assignment 2
 
Networking Basics
Networking BasicsNetworking Basics
Networking Basics
 
Computer Network - Unit 1
Computer Network - Unit 1Computer Network - Unit 1
Computer Network - Unit 1
 
Bhargavi osi
Bhargavi osiBhargavi osi
Bhargavi osi
 
Dcn data link_layer
Dcn data link_layerDcn data link_layer
Dcn data link_layer
 
Module 1 computer networks imtroduction,data link layer
Module 1  computer networks imtroduction,data link layerModule 1  computer networks imtroduction,data link layer
Module 1 computer networks imtroduction,data link layer
 
Network
NetworkNetwork
Network
 
Introduction to Computer Networks
Introduction to Computer NetworksIntroduction to Computer Networks
Introduction to Computer Networks
 
Computer network (Lecture 1)
Computer network (Lecture 1)Computer network (Lecture 1)
Computer network (Lecture 1)
 
Computer Network MAC Layer Notes as per RGPV syllabus
Computer Network MAC Layer Notes as per RGPV syllabusComputer Network MAC Layer Notes as per RGPV syllabus
Computer Network MAC Layer Notes as per RGPV syllabus
 
Powerpoint for data communication
Powerpoint for data communication Powerpoint for data communication
Powerpoint for data communication
 
Lecture1 (Transmission Mode in Computer Network)
Lecture1 (Transmission Mode in Computer Network)Lecture1 (Transmission Mode in Computer Network)
Lecture1 (Transmission Mode in Computer Network)
 
Networks
Networks   Networks
Networks
 

Andere mochten auch (20)

Lecture 03
Lecture 03Lecture 03
Lecture 03
 
Lecture 07
Lecture 07Lecture 07
Lecture 07
 
Data Communications and Networking Lecture 16
Data Communications and Networking Lecture 16Data Communications and Networking Lecture 16
Data Communications and Networking Lecture 16
 
Lecture 24
Lecture 24Lecture 24
Lecture 24
 
Lecture 18
Lecture 18Lecture 18
Lecture 18
 
Lecture 12
Lecture 12Lecture 12
Lecture 12
 
Lecture 13
Lecture 13Lecture 13
Lecture 13
 
Lecture 21
Lecture 21Lecture 21
Lecture 21
 
Lecture 17
Lecture 17Lecture 17
Lecture 17
 
Lecture 11
Lecture 11Lecture 11
Lecture 11
 
Data communication - Lecture-01
Data communication - Lecture-01 Data communication - Lecture-01
Data communication - Lecture-01
 
Data communication (simple explanation)
Data communication (simple explanation)Data communication (simple explanation)
Data communication (simple explanation)
 
Chapter 1: Introduction to Data Communication and Networks
Chapter 1: Introduction to Data Communication and NetworksChapter 1: Introduction to Data Communication and Networks
Chapter 1: Introduction to Data Communication and Networks
 
Lecture 23
Lecture 23Lecture 23
Lecture 23
 
Lecture 14
Lecture 14Lecture 14
Lecture 14
 
Lecture 15
Lecture 15Lecture 15
Lecture 15
 
Lecture 22
Lecture 22Lecture 22
Lecture 22
 
Lecture 10
Lecture 10Lecture 10
Lecture 10
 
Lecture 20
Lecture 20Lecture 20
Lecture 20
 
RTOS APPLICATIONS
RTOS  APPLICATIONSRTOS  APPLICATIONS
RTOS APPLICATIONS
 

Ähnlich wie Lecture 06 (20)

Computer Network Unit-1 ppt
Computer Network Unit-1 pptComputer Network Unit-1 ppt
Computer Network Unit-1 ppt
 
Cn4,com net
Cn4,com netCn4,com net
Cn4,com net
 
Osi model
Osi modelOsi model
Osi model
 
3. osi model
3. osi model3. osi model
3. osi model
 
The Osi Model
The Osi ModelThe Osi Model
The Osi Model
 
Osi model
Osi modelOsi model
Osi model
 
Basic concept of networking
Basic concept of networkingBasic concept of networking
Basic concept of networking
 
Chapter#4
Chapter#4Chapter#4
Chapter#4
 
OSI MODEL
OSI MODEL OSI MODEL
OSI MODEL
 
seven layer OSI model
seven layer OSI modelseven layer OSI model
seven layer OSI model
 
OSI &TCP/IP Model
OSI &TCP/IP ModelOSI &TCP/IP Model
OSI &TCP/IP Model
 
Osi model
Osi modelOsi model
Osi model
 
Osi , tcp/ip protocol and Addressing
Osi , tcp/ip protocol and Addressing Osi , tcp/ip protocol and Addressing
Osi , tcp/ip protocol and Addressing
 
The ISO_OSI Reference Model
The ISO_OSI Reference ModelThe ISO_OSI Reference Model
The ISO_OSI Reference Model
 
Topology Chapter 2.pptx
Topology Chapter 2.pptxTopology Chapter 2.pptx
Topology Chapter 2.pptx
 
TCP/IP Protocols With All Layer Description
TCP/IP Protocols With All Layer DescriptionTCP/IP Protocols With All Layer Description
TCP/IP Protocols With All Layer Description
 
Assignment3
Assignment3Assignment3
Assignment3
 
OSI Model
OSI ModelOSI Model
OSI Model
 
OSI Model of Networking
OSI Model of NetworkingOSI Model of Networking
OSI Model of Networking
 
computer network OSI layer
computer network OSI layercomputer network OSI layer
computer network OSI layer
 

Mehr von Sehrish Rafiq

Introduction to Computers Lecture # 14
Introduction to Computers Lecture # 14Introduction to Computers Lecture # 14
Introduction to Computers Lecture # 14Sehrish Rafiq
 
Introduction to Computers Lecture # 13
Introduction to Computers Lecture # 13Introduction to Computers Lecture # 13
Introduction to Computers Lecture # 13Sehrish Rafiq
 
Introduction to Computers Lecture # 12
Introduction to Computers Lecture # 12Introduction to Computers Lecture # 12
Introduction to Computers Lecture # 12Sehrish Rafiq
 
Introduction to Computers Lecture # 11
Introduction to Computers Lecture # 11Introduction to Computers Lecture # 11
Introduction to Computers Lecture # 11Sehrish Rafiq
 
Introduction to Computers Lecture # 10
Introduction to Computers Lecture # 10Introduction to Computers Lecture # 10
Introduction to Computers Lecture # 10Sehrish Rafiq
 
Introduction to Computers Lecture # 9
Introduction to Computers Lecture # 9Introduction to Computers Lecture # 9
Introduction to Computers Lecture # 9Sehrish Rafiq
 
Introduction to Computers Lecture # 8
Introduction to Computers Lecture # 8Introduction to Computers Lecture # 8
Introduction to Computers Lecture # 8Sehrish Rafiq
 
Introduction to Computers Lecture # 7
Introduction to Computers Lecture # 7Introduction to Computers Lecture # 7
Introduction to Computers Lecture # 7Sehrish Rafiq
 
Introduction to computers Lecture # 4
Introduction to computers Lecture # 4Introduction to computers Lecture # 4
Introduction to computers Lecture # 4Sehrish Rafiq
 
Introduction to Computers Lecture # 5
Introduction to Computers Lecture # 5Introduction to Computers Lecture # 5
Introduction to Computers Lecture # 5Sehrish Rafiq
 
Introduction to Computers Lecture # 3
Introduction to Computers Lecture # 3Introduction to Computers Lecture # 3
Introduction to Computers Lecture # 3Sehrish Rafiq
 
Introduction to Computers Lecture # 2
Introduction to Computers Lecture # 2Introduction to Computers Lecture # 2
Introduction to Computers Lecture # 2Sehrish Rafiq
 
Introduction to Computers Lecture # 1
Introduction to Computers Lecture # 1Introduction to Computers Lecture # 1
Introduction to Computers Lecture # 1Sehrish Rafiq
 

Mehr von Sehrish Rafiq (13)

Introduction to Computers Lecture # 14
Introduction to Computers Lecture # 14Introduction to Computers Lecture # 14
Introduction to Computers Lecture # 14
 
Introduction to Computers Lecture # 13
Introduction to Computers Lecture # 13Introduction to Computers Lecture # 13
Introduction to Computers Lecture # 13
 
Introduction to Computers Lecture # 12
Introduction to Computers Lecture # 12Introduction to Computers Lecture # 12
Introduction to Computers Lecture # 12
 
Introduction to Computers Lecture # 11
Introduction to Computers Lecture # 11Introduction to Computers Lecture # 11
Introduction to Computers Lecture # 11
 
Introduction to Computers Lecture # 10
Introduction to Computers Lecture # 10Introduction to Computers Lecture # 10
Introduction to Computers Lecture # 10
 
Introduction to Computers Lecture # 9
Introduction to Computers Lecture # 9Introduction to Computers Lecture # 9
Introduction to Computers Lecture # 9
 
Introduction to Computers Lecture # 8
Introduction to Computers Lecture # 8Introduction to Computers Lecture # 8
Introduction to Computers Lecture # 8
 
Introduction to Computers Lecture # 7
Introduction to Computers Lecture # 7Introduction to Computers Lecture # 7
Introduction to Computers Lecture # 7
 
Introduction to computers Lecture # 4
Introduction to computers Lecture # 4Introduction to computers Lecture # 4
Introduction to computers Lecture # 4
 
Introduction to Computers Lecture # 5
Introduction to Computers Lecture # 5Introduction to Computers Lecture # 5
Introduction to Computers Lecture # 5
 
Introduction to Computers Lecture # 3
Introduction to Computers Lecture # 3Introduction to Computers Lecture # 3
Introduction to Computers Lecture # 3
 
Introduction to Computers Lecture # 2
Introduction to Computers Lecture # 2Introduction to Computers Lecture # 2
Introduction to Computers Lecture # 2
 
Introduction to Computers Lecture # 1
Introduction to Computers Lecture # 1Introduction to Computers Lecture # 1
Introduction to Computers Lecture # 1
 

Kürzlich hochgeladen

Developer Data Modeling Mistakes: From Postgres to NoSQL
Developer Data Modeling Mistakes: From Postgres to NoSQLDeveloper Data Modeling Mistakes: From Postgres to NoSQL
Developer Data Modeling Mistakes: From Postgres to NoSQLScyllaDB
 
Commit 2024 - Secret Management made easy
Commit 2024 - Secret Management made easyCommit 2024 - Secret Management made easy
Commit 2024 - Secret Management made easyAlfredo García Lavilla
 
Passkey Providers and Enabling Portability: FIDO Paris Seminar.pptx
Passkey Providers and Enabling Portability: FIDO Paris Seminar.pptxPasskey Providers and Enabling Portability: FIDO Paris Seminar.pptx
Passkey Providers and Enabling Portability: FIDO Paris Seminar.pptxLoriGlavin3
 
The Fit for Passkeys for Employee and Consumer Sign-ins: FIDO Paris Seminar.pptx
The Fit for Passkeys for Employee and Consumer Sign-ins: FIDO Paris Seminar.pptxThe Fit for Passkeys for Employee and Consumer Sign-ins: FIDO Paris Seminar.pptx
The Fit for Passkeys for Employee and Consumer Sign-ins: FIDO Paris Seminar.pptxLoriGlavin3
 
Ensuring Technical Readiness For Copilot in Microsoft 365
Ensuring Technical Readiness For Copilot in Microsoft 365Ensuring Technical Readiness For Copilot in Microsoft 365
Ensuring Technical Readiness For Copilot in Microsoft 3652toLead Limited
 
Gen AI in Business - Global Trends Report 2024.pdf
Gen AI in Business - Global Trends Report 2024.pdfGen AI in Business - Global Trends Report 2024.pdf
Gen AI in Business - Global Trends Report 2024.pdfAddepto
 
SALESFORCE EDUCATION CLOUD | FEXLE SERVICES
SALESFORCE EDUCATION CLOUD | FEXLE SERVICESSALESFORCE EDUCATION CLOUD | FEXLE SERVICES
SALESFORCE EDUCATION CLOUD | FEXLE SERVICESmohitsingh558521
 
Merck Moving Beyond Passwords: FIDO Paris Seminar.pptx
Merck Moving Beyond Passwords: FIDO Paris Seminar.pptxMerck Moving Beyond Passwords: FIDO Paris Seminar.pptx
Merck Moving Beyond Passwords: FIDO Paris Seminar.pptxLoriGlavin3
 
DSPy a system for AI to Write Prompts and Do Fine Tuning
DSPy a system for AI to Write Prompts and Do Fine TuningDSPy a system for AI to Write Prompts and Do Fine Tuning
DSPy a system for AI to Write Prompts and Do Fine TuningLars Bell
 
"ML in Production",Oleksandr Bagan
"ML in Production",Oleksandr Bagan"ML in Production",Oleksandr Bagan
"ML in Production",Oleksandr BaganFwdays
 
Streamlining Python Development: A Guide to a Modern Project Setup
Streamlining Python Development: A Guide to a Modern Project SetupStreamlining Python Development: A Guide to a Modern Project Setup
Streamlining Python Development: A Guide to a Modern Project SetupFlorian Wilhelm
 
Nell’iperspazio con Rocket: il Framework Web di Rust!
Nell’iperspazio con Rocket: il Framework Web di Rust!Nell’iperspazio con Rocket: il Framework Web di Rust!
Nell’iperspazio con Rocket: il Framework Web di Rust!Commit University
 
Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)
Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)
Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)Mark Simos
 
DevoxxFR 2024 Reproducible Builds with Apache Maven
DevoxxFR 2024 Reproducible Builds with Apache MavenDevoxxFR 2024 Reproducible Builds with Apache Maven
DevoxxFR 2024 Reproducible Builds with Apache MavenHervé Boutemy
 
Digital Identity is Under Attack: FIDO Paris Seminar.pptx
Digital Identity is Under Attack: FIDO Paris Seminar.pptxDigital Identity is Under Attack: FIDO Paris Seminar.pptx
Digital Identity is Under Attack: FIDO Paris Seminar.pptxLoriGlavin3
 
How to write a Business Continuity Plan
How to write a Business Continuity PlanHow to write a Business Continuity Plan
How to write a Business Continuity PlanDatabarracks
 
Dev Dives: Streamline document processing with UiPath Studio Web
Dev Dives: Streamline document processing with UiPath Studio WebDev Dives: Streamline document processing with UiPath Studio Web
Dev Dives: Streamline document processing with UiPath Studio WebUiPathCommunity
 
From Family Reminiscence to Scholarly Archive .
From Family Reminiscence to Scholarly Archive .From Family Reminiscence to Scholarly Archive .
From Family Reminiscence to Scholarly Archive .Alan Dix
 
SAP Build Work Zone - Overview L2-L3.pptx
SAP Build Work Zone - Overview L2-L3.pptxSAP Build Work Zone - Overview L2-L3.pptx
SAP Build Work Zone - Overview L2-L3.pptxNavinnSomaal
 

Kürzlich hochgeladen (20)

Developer Data Modeling Mistakes: From Postgres to NoSQL
Developer Data Modeling Mistakes: From Postgres to NoSQLDeveloper Data Modeling Mistakes: From Postgres to NoSQL
Developer Data Modeling Mistakes: From Postgres to NoSQL
 
Commit 2024 - Secret Management made easy
Commit 2024 - Secret Management made easyCommit 2024 - Secret Management made easy
Commit 2024 - Secret Management made easy
 
Passkey Providers and Enabling Portability: FIDO Paris Seminar.pptx
Passkey Providers and Enabling Portability: FIDO Paris Seminar.pptxPasskey Providers and Enabling Portability: FIDO Paris Seminar.pptx
Passkey Providers and Enabling Portability: FIDO Paris Seminar.pptx
 
The Fit for Passkeys for Employee and Consumer Sign-ins: FIDO Paris Seminar.pptx
The Fit for Passkeys for Employee and Consumer Sign-ins: FIDO Paris Seminar.pptxThe Fit for Passkeys for Employee and Consumer Sign-ins: FIDO Paris Seminar.pptx
The Fit for Passkeys for Employee and Consumer Sign-ins: FIDO Paris Seminar.pptx
 
Ensuring Technical Readiness For Copilot in Microsoft 365
Ensuring Technical Readiness For Copilot in Microsoft 365Ensuring Technical Readiness For Copilot in Microsoft 365
Ensuring Technical Readiness For Copilot in Microsoft 365
 
Gen AI in Business - Global Trends Report 2024.pdf
Gen AI in Business - Global Trends Report 2024.pdfGen AI in Business - Global Trends Report 2024.pdf
Gen AI in Business - Global Trends Report 2024.pdf
 
SALESFORCE EDUCATION CLOUD | FEXLE SERVICES
SALESFORCE EDUCATION CLOUD | FEXLE SERVICESSALESFORCE EDUCATION CLOUD | FEXLE SERVICES
SALESFORCE EDUCATION CLOUD | FEXLE SERVICES
 
Merck Moving Beyond Passwords: FIDO Paris Seminar.pptx
Merck Moving Beyond Passwords: FIDO Paris Seminar.pptxMerck Moving Beyond Passwords: FIDO Paris Seminar.pptx
Merck Moving Beyond Passwords: FIDO Paris Seminar.pptx
 
DSPy a system for AI to Write Prompts and Do Fine Tuning
DSPy a system for AI to Write Prompts and Do Fine TuningDSPy a system for AI to Write Prompts and Do Fine Tuning
DSPy a system for AI to Write Prompts and Do Fine Tuning
 
"ML in Production",Oleksandr Bagan
"ML in Production",Oleksandr Bagan"ML in Production",Oleksandr Bagan
"ML in Production",Oleksandr Bagan
 
Streamlining Python Development: A Guide to a Modern Project Setup
Streamlining Python Development: A Guide to a Modern Project SetupStreamlining Python Development: A Guide to a Modern Project Setup
Streamlining Python Development: A Guide to a Modern Project Setup
 
Nell’iperspazio con Rocket: il Framework Web di Rust!
Nell’iperspazio con Rocket: il Framework Web di Rust!Nell’iperspazio con Rocket: il Framework Web di Rust!
Nell’iperspazio con Rocket: il Framework Web di Rust!
 
Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)
Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)
Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)
 
DevoxxFR 2024 Reproducible Builds with Apache Maven
DevoxxFR 2024 Reproducible Builds with Apache MavenDevoxxFR 2024 Reproducible Builds with Apache Maven
DevoxxFR 2024 Reproducible Builds with Apache Maven
 
Digital Identity is Under Attack: FIDO Paris Seminar.pptx
Digital Identity is Under Attack: FIDO Paris Seminar.pptxDigital Identity is Under Attack: FIDO Paris Seminar.pptx
Digital Identity is Under Attack: FIDO Paris Seminar.pptx
 
How to write a Business Continuity Plan
How to write a Business Continuity PlanHow to write a Business Continuity Plan
How to write a Business Continuity Plan
 
Dev Dives: Streamline document processing with UiPath Studio Web
Dev Dives: Streamline document processing with UiPath Studio WebDev Dives: Streamline document processing with UiPath Studio Web
Dev Dives: Streamline document processing with UiPath Studio Web
 
From Family Reminiscence to Scholarly Archive .
From Family Reminiscence to Scholarly Archive .From Family Reminiscence to Scholarly Archive .
From Family Reminiscence to Scholarly Archive .
 
DMCC Future of Trade Web3 - Special Edition
DMCC Future of Trade Web3 - Special EditionDMCC Future of Trade Web3 - Special Edition
DMCC Future of Trade Web3 - Special Edition
 
SAP Build Work Zone - Overview L2-L3.pptx
SAP Build Work Zone - Overview L2-L3.pptxSAP Build Work Zone - Overview L2-L3.pptx
SAP Build Work Zone - Overview L2-L3.pptx
 

Lecture 06

  • 1. Course Instructor : Sehrish Rafiq Department Of Computer Science University Of Peshawar Data Communications & Networking Lecture-06
  • 2. Lecture overview Functionalities of Network layer Functionalities of Transport layer Functionalities of Session layer Functionalities of Presentation layer Functionalities of Application layer TCP/IP protocol suite or Internet model
  • 3. Network Layer A network layer is responsible for the source-to-destination delivery of a packet possibly across multiple networks(links). The data link layer oversees the delivery of the packet between two systems on the same network. The network layer ensures that each packet gets from its point of origin to its final destination. If two systems are connected to the same link, there is usually no need for a network layer. Note:- If the two systems are attached to different networks(links) with connecting devices between networks, there is often a need for the network layer to accomplish source-to-destination delivery.
  • 5. Responsibilities of the network layer Logical addressing  The physical addressing implemented by the data link layer handles the addressing problem locally.  If a packet passes the network boundaries we need another addressing system to help distinguish the source and destination systems.  The network layer adds a header to the packet coming from transport layer that among other things includes the logical addresses of the sender and receiver. Routing  When independent networks or links are connected together to create an internetwork or a large network, the connecting devices (called routers or gate ways) route the packets to their final destination.  One of the functions of the network layer is to provide this mechanism.
  • 8. Transport Layer  The transport layer is responsible for source-to-destination(end-to-end) delivery of the entire message.  The network layer oversees end-to-end delivery of individual packets, it does not recognize any relationship between those packets.  The network layer treats each packet independently ,as though each piece belong to a separate message whether or not it does.  The transport layer, on the other hand ensures that the whole message arrives intact and in order, overseeing both error control and flow control at the source-destination level.
  • 10. Transport Layer  For added security, the transport layer may create a connection between the two ports.  A connection is a single logical path between the source & destination that associated with all packets in a message.  Creating a connection involves 3 steps:  Connection establishment  Data transfer  Connection release  By confining transmission of all packets to a single pathway, the transport layer has more control over sequencing, flow and error detection and correction.
  • 11. Responsibilities of the transport layer Service point addressing  Computers often run several programs at the same time.  For this reason source –to-destination delivery means delivery not only from one computer to the next but also from a specific process on one computer to a specific process on the other.  The transport layer header therefore must include a type of address called a service-point address(or port address).  The network layer gets each packet to the correct computer, the transport layer gets the entire message to the correct process on that computer. Segmentation & reassembly  A message is divided in to transmittable segments, each segment containing a sequence number.
  • 12. Responsibilities of the transport layer  These numbers enable the transport layer to reassemble the message correctly upon arriving at the destination and identify and replace packets that were lost in the transmission. Connection control  The transport layer can be either connectionless or connection oriented.  A connectionless transport layer treats each segment as an independent packet and delivers it to the transport layer at the destination machine.  A connection-oriented transport layer makes a connection with the transport layer at the destination machine first before delivering the packets.  After all the data is transmitted, the connection is terminated.
  • 13. Responsibilities of the transport layer Flow control  Like the data link layer the transport layer is responsible for flow control.  However, flow control at this level is performed end-to-end rather than across a single link Error control  Like the data Link layer, the transport layer is responsible for error control.  However error control at this layer is performed end-to-end.  The sending transport layer makes sure that the entire message arrives at the receiving transport layer without error( damage, loss or duplication).  Error correction is usually achieved through retransmission.
  • 14. Session Layer Services Provided by the first three layers( physical, data link and network) are sufficient for some processes. The session layer is the network dialog controller, establishes, controls, maintains and synchronizes the interaction between communicating systems.
  • 15. Responsibilities of the Session Layer  Dialog control  The session layer allows two systems to enter in to a dialog.  It allows the communication between two processes to take place either in half duplex mode or full duplex mode.  Half duplex example: Main frame and terminal.  Synchronization  The session Layer allows a process to add check points(synchronization points) in to a stream of data.
  • 16. Presentation Layer The Presentation layer is concerned with the syntax and semantics of the information exchanged between two systems.
  • 17. Responsibilities of the Presentation Layer Translation  The processes in two systems are usually exchanging information in the form of character strings,numbers and so on.  The information should be changed to bit streams before being transmitted.  Because different computers use different encoding schemes,the presentation layer is responsible for interoperability between these different encoding methods.  The presentation Layer at the sender changes the information from its sender- dependent format in to a common format.  The presentation Layer at the receiving machine changes the common format in to its receiver dependent format.
  • 18. Presentation Layer continued… Encryption  To carry sensitive information, a system must be able to assure privacy.  Encryption means that the sender transforms the original information in to another form and sends the resulting message out over the network.  Decryption reverses the original process to transform the message back to its original form. Compression  Data compression reduces the number of bits to be transmitted.  Data compression becomes particularly important in the transmission of multi- media such as text, audio and video.
  • 19. Application Layer The application layer enables the user whether human or software to access the network. It provides user interfaces and support for services such as electronic mail, remote file access and transfer, shared database management and other types of distributed information services. No headers or trailers are added at this layer.
  • 21. Services provided by the application layer Network virtual terminal  A network virtual terminal is a software version of a physical terminal and allows a user to log on to a remote host.  To do so, the application creates a software emulation of a terminal at the remote host.  The user’s computer talks to the software terminal which in turn talks to the host and vice versa.  The remote host believes that it is communicating with one of its own terminals and allows you log on.  File Transfer, Access and Management (FTAM)  This application allows to access files in a remote computer (to make changes or read data),to retrieve files from a remote computer and to manage or control files in a remote computer.
  • 22. Application layer continued… Mail services  This application provides the basis for e-mail forwarding and storage. Directory Services  This application provides distributed database sources and access for global information about various objects and services.
  • 23. TCP/IP protocol suite or Internet Model
  • 24. TCP/IP protocol suite or Internet Model The TCP/IP protocol suite used in the Internet was developed prior to the OSI model. Therefore, the layers in the TCP/IP suite do not match exactly with those in the OSI model. The first four layers provide physical standards, network interface, internetworking and transport functions that corresponds to the first four layers of the OSI model. The three top most layers(application layer, presentation layer, session layer) are represented in TCP/IP by a single layer called the application layer.
  • 25. TCP/IP protocol suite or Internet Model
  • 26. TCP/IP protocol suite or Internet Model The TCP/IP protocol suite contain relatively independent protocols that can be mixed and matched depending on the needs of the system. The term hierarical means that each upper level protocol is supported by one or more lower level protocols. At the transport layer TCP/IP defines two protocols TCP and UDP. At the network layer the main protocol defined by TCP/IP is IP, although there are some other protocols that support data movement in this layer.