Upload
jisskuruvilla
View
29
Download
2
Tags:
Embed Size (px)
DESCRIPTION
networks
Citation preview
MODULE I MCA-402 Computer Networks ADMN 2011-14
Dept. of Computer Science And Applications, SJCET, Palai Page 1
BASIC COMMUNICATION MODEL
Communication is the conveyance of a message from one entity, called the source or transmitter, to another, called the destination or receiver, via a channel of some sort. To give a
very basic example of such a communication system is conversation; people commonly exchange
verbal messages, with the channel consisting of waves of compressed air molecules at frequencies,
which are audible to the human ear. Another example is the exchange of voice signals between two
telephones over the same network
The only way that a message source can be certain that the destination properly received the
message is by some kind of acknowledgment response from the destination. Conversing people might
say "I understand" or nod their head in response to a statement made by their peer. This
acknowledged form of dialogue is the basis of reliable communications - somehow the source must
get feedback that the destination correctly received the message.
(Fig:1.1) Basic Communication Model
The key elements of a communication model are:
Source: This device generates the data to be transmitted; examples are telephones and personal
computers.
Transmitter: Usually, the data generated by a source system are not transmitted directly in the
form in which they were generated. Rather, a transmitter transforms and encodes the information in
such a way as to produce electromagnetic signals that can be transmitted across some sort of
transmission system. For example, a modem takes a digital bit stream from an attached device such as
MODULE I MCA-402 Computer Networks ADMN 2011-14
Dept. of Computer Science And Applications, SJCET, Palai Page 2
a personal computer and transforms that bit stream into an analog signal that can be handled by the
telephone network.
Transmission system: This can be a single transmission line connecting the two systems
communicating or a complex network to which numerous communicating systems are connected.
Receiver: The receiver accepts the signal from the transmission system and converts it into a form
that can be handled by the destination device. For example, a modem will accept an analog signal
coming from a network or transmission line and convert it into a digital bit stream.
Destination: Takes the incoming data from the receiver
(Fig:1.2) Simple Data Communication Model
COMMUNICATIONS MODEL TASKS
Some of the Key tasks to be performed by a Communications System are listed below:
Transmission System Utilization
Interfacing
Signal Generation
Synchronization
Exchange Management
Error detection and correction
Addressing and routing
MODULE I MCA-402 Computer Networks ADMN 2011-14
Dept. of Computer Science And Applications, SJCET, Palai Page 3
Recovery
Message formatting
Security
TRANSMISSION SYSTEM UTILIZATION: refers to the need to make efficient use of transmission
facilities that are typically shared among a number of communicating devices. Various techniques
(referred to as multiplexing) are used to allocate the total capacity of a transmission medium among a
number of users.
INTERFACE:- A device must interface with the transmission system in order to communicate.
SIGNAL GENERATION: All the data that are transmitted over the transmitting system propagate as
Electromagnetic signals. Hence the communicating device must be able to generate and receive these
signals. Signal generation should be such that the resultant signal is capable of being propagated
through the transmission medium and interpretable as data at the receiver.
SYNCHRONIZATION: Unless the receiver and transmitter are in Synchronization the receiver will
not be able to make sense out of received signals. Receiver should know when the transmission of
data starts, when it ends.
EXCHANGE MANAGEMENT: For meaningful data transaction there should be some kind
management of data being exchanged. Both the transmitter and receiver should adhere to some
common convention about the format of data, amount of data that can be sent at a time and so
on. This requires a prior definition of message formatting.
ERROR DETECTION AND CORRECTION: In any communication system transmitted data is prone
to error. Either it is because of transmitted signal getting distorted in the transmission medium
leading to misinterpretation of signal or errors introduced by the intermediate devices. Error
detection and Correction is required in cases where there is no scope for error in the data
transaction. We can think of file transfer between two computers where there is a need for this. But
in some cases it may not be very important as in the case of telephonic conversation.
ADDRESSING AND ROUTING: When more than two devices share a transmission facility, a source
system must indicate the identity(or address) of the intended destination. The transmission system
must assure that the destination system, and only that system, receives the data. Further, the
transmission system may itself be a network through which various paths may be taken. A specific
route through this network must be chosen.
RECOVERY is a concept distinct from that of error correction. Recovery techniques are needed in
situations in which an information exchange, such as a database transaction or file transfer, is
interrupted due to a fault somewhere in the system. The objective is either to be able to resume
activity at the point of interruption or at least to restore the state of the systems involved to the
condition prior to the beginning of the exchange
MODULE I MCA-402 Computer Networks ADMN 2011-14
Dept. of Computer Science And Applications, SJCET, Palai Page 4
MESSAGE FORMATTING has to do with an agreement between two parties as to the form of the
data to be exchanged or transmitted, such as the binary code for characters.
SECURITY: It is important to provide some measure of security in a data communications system.
The sender of data may wish to be assured that only the intended receiver actually receives the data
and the receiver of data may wish to be assured that the received data have not been altered in
transit and that the data actually come from the purported sender
NETWORK MANAGEMENT: Data communications facility is a complex system that cannot create
or run itself. Network management capabilities are needed to configure the system, monitor its
status, react to failures and overloads, and plan intelligently for future growth.
DATA COMMUNICATION MODEL
Data Communication is a process of exchanging data or information between two devices via
some form of transmission medium such as a wire cable. The word data refers to any information
which is presented in a form that is agreed and accepted upon by its creators and users. For data
communication to occur, the communicating devices should be part of a communication system made
up of a combination of hardware and software. The hardware part involves the sender and receiver
devices and the intermediate devices through which the data passes. The software part involves
certain rules which specify what is to be communicated, how it is to be communicated and when. It is
also called as a Protocol.
The effectiveness of any data communications system depends upon the following four fundamental
characteristics:
DELIVERY: The data should be delivered to the correct destination and correct user.
ACCURACY: The communication system should deliver the data accurately, without introducing any
errors. The data may get corrupted during transmission affecting the accuracy of the delivered data.
TIMELINESS: Audio and Video data has to be delivered in a timely manner without any delay; such a
data delivery is called real time transmission of data.
JITTER: It is the variation in the packet arrival time. Uneven Jitter may affect the timeliness of data
being transmitted.
There may be different forms in which data may be represented. Some of the forms of data used in
communications are as follows:
Text: Text includes combination of alphabets in small case as well as upper case. It is stored as a
pattern of bits. Prevalent encoding system : ASCII, Unicode
MODULE I MCA-402 Computer Networks ADMN 2011-14
Dept. of Computer Science And Applications, SJCET, Palai Page 5
Numbers: Numbers include combination of digits from 0 to 9. It is stored as a pattern of bits.
Prevalent encoding system : ASCII, Unicode
Images: In computers images are digitally stored. A Pixel is the smallest element of an image. To
put it in simple terms, a picture or image is a matrix of pixel elements. The pixels are represented
in the form of bits. Depending upon the type of image (black n white or color) each pixel would
require different number of bits to represent the value of a pixel. The size of an image depends
upon the number of pixels (also called resolution) and the bit pattern used to indicate the value of
each pixel.
Example: if an image is purely black and white (two color) each pixel can be represented by a
value either 0 or 1, so an image made up of 10 x 10 pixel elements would require only 100 bits in
memory to be stored. On the other hand an image that includes gray may require 2 bits to
represent every pixel value (00 - black, 01 dark gray, 10 light gray, 11 white). So the same 10
x 10 pixel image would now require 200 bits of memory to be stored. Commonly used Image
formats : jpg, png, bmp, etc
Audio: Data can also be in the form of sound which can be recorded and broadcasted. Example:
What we hear on the radio is data or information. Audio data is continuous, not discrete.
Video: Video refers to broadcasting of data in form of picture or movie
DATA COMMUNICATION NETWORK
A communication network, in its simplest form, is a set of equipment and facilities that
provides a communication service: the transfer of information between users located at various
geographical points. Examples of such networks include telephone networks, computer networks,
television broadcast networks, cellular telephone networks, and the Internet. The ability of
communication network to transfer information at extremely high speeds allows users to gather
information in large volumes, nearly instantaneously and, with the aid of computers, to almost
immediately exercise action at a distance. These two unique capabilities form the basis for many
existing services and an unlimited number of future network-based services
In its simplest form, data communication takes place between two devices that are directly
connected by some form of point-to-point transmission medium. Often, however, it is impractical for
two devices to be directly, point-to-point connected. This is so for one (or both) of the following
contingencies:
The devices are very far apart. It would be inordinately expensive, for example, to string a
dedicated link between two devices thousands of miles apart.
MODULE I MCA-402 Computer Networks ADMN 2011-14
Dept. of Computer Science And Applications, SJCET, Palai Page 6
There is a set of devices, each of which may require a link to many of the others at various times.
Examples are all of the telephones in the world and all of the terminals and computers owned by
single organization. Except for the case of a very few devices, it is impractical to provide a
dedicated wire between each pair of devices.
The solution to this problem is to attach each device to a communications network like Wide Area
Network (WAN) or Local Area Network(LAN).
COMPUTER NETWORKS
A computer network is simply a collection of computers or other hardware devices that are
connected together, either physically or logically, using special hardware and software, to allow them
to exchange and share information. Networking is the term that describes the processes involved in
designing, implementing, upgrading, managing and otherwise working with networks and network
technologies. Three criteria necessary for an effective and efficient network are:
PERFORMANCE: Performance of the network depends on number of users, type of transmission
medium, the capabilities of the connected h/w and the efficiency of the s/w.
RELIABILITY: Reliability is measured by frequency of failure, the time it takes a link to recover from
the failure and the networks robustness in a catastrophe.
SECURITY: Network security issues include protecting data from unauthorized access, protecting
data from damage and development, and implementing policies and procedures for recovery from
breaches and data losses.
MODULE I MCA-402 Computer Networks ADMN 2011-14
Dept. of Computer Science And Applications, SJCET, Palai Page 7
CLASSIFICATION OF NETWORKS
Computers connected to a network are broadly categorized as servers or workstations.
Servers are generally not used by humans directly, but rather run continuously to provide
"services" to the other computers (and their human users) on the network. Services provided can
include printing and faxing, software hosting, file storage and sharing, messaging, data storage and
retrieval, complete access control (security) for the network's resources, and many others.
Workstations are called such because they typically do have a human user which interacts
with the network through them. Workstations were traditionally considered a desktop, consisting
of a computer, keyboard, display, and mouse, or a laptop, with integrated keyboard, display, and
touchpad. Every computer on a network should be appropriately configured for its use. Depending
upon the geographical area covered by a network, it is classified as:
Local Area Network (LAN)
Metropolitan Area Network (MAN)
Wide Area Network (WAN)
LOCAL AREA NETWORK
A Local Area Network (LAN) is a network that is confined to a relatively small area. It is
generally limited to a geographic area such as a writing lab, school, or building. LANs interconnect
computers and peripherals over a common medium in order that users might share access to host
computers, databases, files, applications, and peripherals. LANs in addition to linking the computer
equipment available in a particular premises can also provide a connection to other networks either
through a computer, which is attached to both networks, or through a, dedicated device called a
gateway. The main users of LANs include business organizations, research and development groups in
science and engineering, industry, educational institutions.
The most common use of LANs is for linking personal computers within a building or office to
share information and expensive peripheral devices such as laser printers. Most local area networks
are built with relatively inexpensive hardware such as Ethernet cables, network adapters, and hubs.
The defining characteristics of LANs, in contrast to WANs (wide area networks), include their higher
data transfer rates, smaller geographic range, and lack of a need for leased telecommunication lines
METROPOLITAN AREA NETWORK
The term Metropolitan Area Network (MAN) is typically used to describe a network that spans
a citywide area or a town. It is confined to a larger area than a LAN and can range from 10km to a
few 100km in length. MANs are larger than traditional LANs and predominantly use high-speed
media, such as fiber optic cable, for their backbones. MANs are common in organizations that need
to connect several smaller facilities together for information sharing. This is often the case for
hospitals that need to connect treatment facilities, outpatient facilities, doctor's offices, labs, and
research offices for access to centralized patient and treatment information
MODULE I MCA-402 Computer Networks ADMN 2011-14
Dept. of Computer Science And Applications, SJCET, Palai Page 8
WIDE AREA NETWORK
A Wide Area Network (WAN) covers a significantly larger geographic area than LANs
or MANs. WAN can range from 100krn to 1000krn and the speed between cities can vary from l.5
Mbps to 2.4 Gbps. Typically, a WAN consists of two or more local-area networks (LANs) or MANs.
They can connect networks across cities, states or even countries. Computers connected to a wide-
area network are often connected through public networks, such as the telephone system. They can
also be connected through leased lines or satellites.
Typically, a WAN consists of a number of interconnected switching nodes. Transmission from
any one device is routed through these internal nodes to the specified destination device. These
nodes (including the boundary nodes to which the devices are connected) are not concerned with
the content of the data; rather, their purpose is to provide a switching facility that will move the data
from node to node until they reach their destination. Traditionally, WANs have been implemented
using one of two technologies: circuit switching and packet switching. More recently, frame
relay and ATM networks have assumed major roles.
In Circuit Switching a dedicated communications channel is established between sender and
receiver for the duration of a given transmission. This works like a normal telephone line works for
voice communication. Packet switched Networks use a networking technology that breaks up a
message into smaller packets where each packet carries the destination address and a sequence
number. Here no dedicated line is being provided for data transmission. So packets may travel
different routes to the destination and they may reach out of sequence or experience different types
of delays.
Frame Relay was developed at a time when digital long-distance transmission facilities exhibited
a relatively high error rate compared to today's facilities. As a result, there is a considerable amount
of overhead built into packet-switched schemes to compensate for errors. The overhead includes
additional bits added to each packet to introduce redundancy and additional processing at the end
stations and the intermediate switching nodes to detect and recover from errors. But with modern
high-speed telecommunication systems, the rate of errors has been dramatically lowered. Frame relay
was developed to take advantage of these high data rates and low error rates. Frame relay puts data
in a variable-size unit called a frame and leaves any necessary error correction (retransmission of
data) up to the end-points, which speeds up overall data transmission.
Asynchronous Transfer Mode (ATM), sometimes referred to as cell relay, is a culmination
of all of the developments in circuit switching and packet switching over the past 25 years. ATM can
be viewed as an evolution from frame relay. The most obvious difference between frame relay and
ATM is that frame relay uses variable-length packets, called frames, and ATM uses fixed-length
packets, called cells. As with frame relay, ATM provides little overhead for error control, depending
on the inherent reliability of the transmission system and on higher layers of logic in the end systems
to catch and correct errors. By using a fixed-packet length, the processing overhead is reduced even
MODULE I MCA-402 Computer Networks ADMN 2011-14
Dept. of Computer Science And Applications, SJCET, Palai Page 9
THE INTERNET
Internet is evolved from the ARPANET, which was developed in 1969 by the Advanced
Research Projects Agency (ARPA) of the U.S. Department of Defense. It was the first operational
packet-switching network whose main aim was to connect stand-alone research computers. It was
the first operational packet-switching network whose main aim was to connect stand-alone research
computers. The Internet is an example of a network that connects many WANs, MANs, and LANs
into the world's largest global network. Internet Service Providers (ISPs) are responsible for
maintaining the integrity of the Internet while providing connectivity between WANs, MANs, and
LANs throughout the world. ISPs provide customers with access to the Internet through the use of
points-of-presence (POP), also called network access points (NAP), in cities throughout the world.
Customers are provisioned access to POPs from their own WANs, MANs, and LANs to Internet
access to their users.
PROTOCOLS
In computer networks, communication occurs between entities in different systems. An entity is
anything capable of sending or receiving information. However, two entities cannot simply send bit
streams to each other and expect to be understood. For communication to occur, the entities must
agree on a protocol. A protocol is a set of rules that govern data communications. A protocol defines
what is communicated, how it is communicated, and when it is communicated. The key elements of a
protocol are syntax, semantics, and timing.
SYNTAX :
The term syntax refers to the structure or format of the data, meaning the order in which they are
presented. For example, a simple protocol might expect the first 8 bits of data to be the address of
the sender, the second 8 bits to be the address of the receiver, and the rest of the stream to be the
message itself.
SEMANTICS:
The word semantics refers to the meaning of each section of bits. How is a particular
pattern to be interpreted, and what action is to be taken based on that interpretation? For example,
does an address identify the route to be taken or the final destination of the message?
TIMING:
The term timing refers to two characteristics: when data should be sent and how fast they can be
sent. For example, if a sender produces data at 100 Mbps but the receiver can process data at only 1
Mbps, the transmission will overload the receiver and some data will be lost.
MODULE I MCA-402 Computer Networks ADMN 2011-14
Dept. of Computer Science And Applications, SJCET, Palai Page 10
NEED FOR PROTOCOL ARCHITECTURE
A computer network must provide general, cost effective, fair, and robust connectivity among a
large number of computers. Networks must also evolve to accommodate changes in both the
underlying technologies upon which they are based as well as changes in the demands placed on them
by application programs.
When computers, terminals, and/or other data processing devices exchange data, the procedures
involved can be quite complex. Consider, for example, the transfer of a file between two computers.
There must be a data path between the two computers either directly or via a communication
network
Typical tasks to be performed are as follow:
The source system must either activate the direct data communication path or inform the
communication network of the identity of the desired destination system.
The source system must ascertain that the destination system is prepared to receive data.
The file transfer application on the source system must ascertain that the file management
program on the destination system is prepared to accept and store the file for this particular
user.
If the file formats used on the two systems are different, one or the other system must
perform a format translation function.
It is clear that there must be a high degree of cooperation between the two computer
systems. Instead of implementing the logic for this as a single module, the task is broken up into
subtasks, each of which is implemented separately. In protocol architecture, the modules are
arranged in a vertical stack. Each layer in the stack performs a related subset of the functions
required to communicate with another system. It relies on the next lower layer to perform more
primitive functions and to conceal the details of those functions. Ideally, layers should be defined so
that changes in one layer do not require changes in other layers. A logical communication may exist
between any two computers through the layers of the same level. Layer-n on one computer may
converse with layer-n on another computer. There are rules and conventions used in the
communication at any given layers, which are known collectively as the layer-n protocol for the nth
layer.
The architecture is considered scalable if it is able to accommodate a number of layers in
either large or small scales. For example, a computer that runs an Internet application may require all
of the layers that were defined for the architectural model. The depth and functionality of this stack
differs from network to network. However, regardless of the differences among all networks, the
MODULE I MCA-402 Computer Networks ADMN 2011-14
Dept. of Computer Science And Applications, SJCET, Palai Page 11
purpose of each layer is to provide certain services (job responsibilities) to the layer above it,
shielding the upper layers from the intricate details of how the services offered are implemented.
Data are not directly transferred from layer-n on one computer to layer-n on another
computer. Rather, each layer passes data and control information to the layer directly below until the
lowest layer is reached. Below layer-1 (the bottom layer), is the physical medium (the hardware)
through which the actual transaction takes place. Logical communication is shown by a broken-line
arrow and physical communication by a solid-line arrow.
Between every pair of adjacent layers is an interface. The interface is a specification that
determines how the data should be passed between the layers. ]t defines what primitive operations
and services the lower layer should offer to the upper layer. One of the most important
considerations when designing a network is to design clean-cut interfaces between the layers. To
create such an interface between the layers would require each layer to perform a specific collection
of well understood functions. A clean-cut interface makes it easier to replace the implementation of
one layer with another implementation because all that is required of the new implementation is that,
it offers, exactly the same set of services to its neighboring layer above as the old implementation did.
A protocol architecture is the layered structure of hardware and software that supports the
exchange of data between systems. At each layer of a protocol architecture, one or more common
protocols are implemented in communicating systems. Each protocol provides a set of rules for the
exchange of data between systems. It acts as a blue print that guides the design and implementation
of networks and there by enables to divide the workload and to simplify the systems design. The
MODULE I MCA-402 Computer Networks ADMN 2011-14
Dept. of Computer Science And Applications, SJCET, Palai Page 12
specification of architecture must contain enough information to allow an implementer to write the
program or build the hardware for each layer so that it will correctly obey the appropriate protocol.
Neither the details of the implementation nor the specification of the interfaces is part of the
architecture because these are hidden away inside the machines and not visible from the outside.
THE OSI REFERENCE MODEL
This model is based on a proposal developed by the International Standards Organization
(ISO) as a first step toward international standardization of the protocols used in the various layers.
It was revised in 1995. The Open Systems Interconnection (OS1) reference model describes how
information from a software application in one computer moves through a network medium to a
software application in another computer. The OSI reference model is a conceptual model composed
of seven layers each specifying particular network functions and into these layers are fitted the
protocol standards developed by the ISO and other standards bodies. The principles that were
applied to arrive at the 7 layers can be summarized as follows:
A layer should be created only when an additional level of abstraction is required.
Each layer should perform a well-defined function.
The function of each layer should be chosen with the goal of defining internationally
standardized protocols.
The number of layers should be large enough to enable distinct functions to be separated, but
few enough to keep the architecture from becoming unwieldy.
The OSI model divides the tasks involved with moving information between networked
computers into seven smaller, more manageable task groups. A task or group of tasks is then
assigned to each of the seven OSI layers. Each layer is reasonably self-contained so that the tasks
assigned to each layer can be implemented independently. This enables the solutions offered by one
layer to be updated without affecting the other layers. The seven layers of OSI model are:
Application
Presentation
Session
Transport
Network
Data link
Physical
MODULE I MCA-402 Computer Networks ADMN 2011-14
Dept. of Computer Science And Applications, SJCET, Palai Page 13
Although, each layer of the OSI model provides its own set of functions, it is possible to
group the layers into two distinct categories. The first four layers i.e., physical, data link, network, and
transport layer provide the end-to-end services necessary for the transfer of data between two
systems. These layers specify the protocols associated with the communications network used to link
two computers together. Together, these are communication oriented. The top three layers i.e., the
application, presentation, and session layers provide the application services required for the
exchange of information. That is, they allow two applications, each running on a different node of the
network to interact with each other through the services provided by their respective operating
systems. Together, these are data processing oriented.
A message begins at the top application layer and moves down the OSI layers to the
bottom physical layer. As the message descends, each successive OSI model layer adds a header to it.
A header is layer-specific information that basically explains what functions the layer carried out.
When formatted data passes through physical layer it is transformed into appropriate signals and
transmitted. Upon reaching destination signal is transformed back into digital format. Data then
moves up back through the layers and at each layer the headers and trailers are stripped off and the
actions appropriate to that layer are taken. When data reaches top layer it is in a form appropriate to
application and is made available to the recipient. On every sending device, each layer calls upon the
service offered by the layer below it. On every receiving device, each layer calls upon the service
offered by the layer above it.
MODULE I MCA-402 Computer Networks ADMN 2011-14
Dept. of Computer Science And Applications, SJCET, Palai Page 14
PHYSICAL LAYER
The data units on this layer are called bits. This layer defines the mechanical and electrical
definition of the network medium (cable) and network hardware. The physical layer is responsible for
passing bits onto and receiving them from the connecting medium. This layer gives the data-link layer
(layer 2) its ability to transport a stream of serial data bits between two communicating systems; it
conveys the bit that moves along the cable. It is responsible for ensuring that the raw bits get from
one place to another, no matter what shape they are in, and deals with the mechanical and electrical
characteristics of the cable.
The main network device found the Physical layer is a repeater. The purpose of a
repeater (as the name suggests) is simply to receive the digital signal, reform it, and retransmit the
signal. This has the effect of increasing the maximum length of a network, which would not be
possible due to signal deterioration if, a repeater were not available. Each layer, with the exception of
the physical layer, adds information to the data as it travels from the Application layer down to the
physical layer. This extra information is called a header. The physical layer does not append a header
to information because it is concerned with sending and receiving information on the individual bit
level.
The physical layer is also concerned with the following:
REPRESENTATION OF BITS: The physical layer is concerned with transmission of signals from one
device to another which involves converting data (1s & 0s) into signals and vice versa. It is not
concerned with the meaning or interpretation of bits.
DATA RATE: The physical layer defines the data transmission rate i.e. number of bits sent per
second. It is the responsibility of the physical layer to maintain the defined data rate.
SYNCHRONIZATION OF BITS: To interpret correct and accurate data the sender and receiver
have to maintain the same bit rate and also have synchronized clocks.
PHYSICAL TOPOLOGY: The physical layer defines the type of topology in which the device is
connected to the network. In a mesh topology it uses a multipoint connection and other topologies it
uses a point to point connection to send data.
TRANSMISSION MODE: The physical layer defines the direction of data transfer between the sender
and receiver. Two devices can transfer the data in simplex, half duplex or full duplex mode
On the sender side, the physical layer receives the data from Data Link Layer and encodes it into
signals to be transmitted onto the medium. On the receiver side, the physical layer receives the
signals from the transmission medium decodes it back into data and sends it to the Data Link Layer
MODULE I MCA-402 Computer Networks ADMN 2011-14
Dept. of Computer Science And Applications, SJCET, Palai Page 15
DATA LINK LAYER
The data link layer is concerned with the reliable transfer of data over the communication
channel provided by the physical layer. To do this, the data link layer breaks the data into data
frames, transmits the frames sequentially over the channel, and checks for transmission errors by
requiring the receiving end to send back acknowledgment frames. Responsibilities of the data link
layer include the following:
FRAMING: On the sender side, the Data Link layer receives the data from Network Layer and
divides the stream of bits into fixed size manageable units called as Frames and sends it to the physical
layer. On the receiver side, the data link layer receives the stream of bits from the physical layer and
regroups them into frames and sends them to the Network layer.
PHYSICAL ADDRESSING: The Data link layer appends the physical address in the header of the
frame before sending it to physical layer. The physical address contains the address of the sender and
receiver. In case the receiver happens to be on the same physical network as the sender; the receiver
is at only one hop from the sender and the receiver address contains the receivers physical address.
In case the receiver is not directly connected to the sender, the physical address is the address of the
next node where the data is supposed to be delivered.
FLOW CONTROL: The data link layer makes sure that the sender sends the data at a speed at
which the receiver can receive it else if there is an overflow at the receiver side the data will be lost.
The data link layer imposes flow control mechanism over the sender and receiver to avoid
overwhelming of the receiver.
ERROR CONTROL: The data link layer imposes error control mechanism to identify lost or
damaged frames, duplicate frames and then retransmit them. This is achieved by specifying error
control information is present in the trailer of a frame.
MODULE I MCA-402 Computer Networks ADMN 2011-14
Dept. of Computer Science And Applications, SJCET, Palai Page 16
NETWORK LAYER
The network layer is concerned with the routing of data across the network from one end to
another. To do this, the network layer converts the data into packets and ensures that the packets
are delivered to their final destination, where they can be converted back into the original data. In
order to route the data through multiple networks, network layer relies on two things: Logical
Addressing & Routing
LOGICAL ADDRESSING: The network layer uses logical address commonly known as IP address to
recognize devices on the network. The header appended by the network layer contains the actual
sender and receiver IP address. The network layer of intermediate nodes checks for a match of IP
address in the header. If no match is found the packet passes to the data link layer and it is forwarded
to next node
ROUTING: The network layer divides data into units called packets of equal size and bears a
sequence number for rearranging on the receiving end. Each packet is independent of the other and
may travel using different routes to reach the receiver hence may arrive out of turn at the receiver.
Hence every intermediate node which encounters a packet tries to compute the best possible path
for the packet. The best possible path may depend on several factors such as congestion, number of
hops, etc. This process of finding the best path is called as Routing. It is done using routing
algorithms.
When a packet has to travel from one network to another to get to its destination, many
problems can arise. The addressing used by the second network may be different from the first one.
The second one may not accept the packet at all because it is too large. The protocols may differ,
MODULE I MCA-402 Computer Networks ADMN 2011-14
Dept. of Computer Science And Applications, SJCET, Palai Page 17
and so on. It is up to the network layer to overcome all these problems to allow heterogeneous
networks to be interconnected.
TRANSPORT LAYER
The aim of the transport layer is to isolate the upper three layers from the network, so
that any changes to the network equipment technology will be confined to the lower three layers. It
provides a network independent, reliable message interchange service to the top three application-
oriented layers. This layer acts as an interface between the bottom and top three layers. The lower
data link layer (layer 2) is only responsible for delivering packets from one node to another, where as
the transport layer is responsible for overall end-to-end validity and integrity of the transmission i.e.,
it ensures that data is successfully sent and received between two computers. A logical address at
network layer facilitates the transmission of data from source to destination device. But the source
and the destination both may be having multiple processes communicating with each other. To
ensure process to process delivery the transport layer makes use of port address (also known as
Service Point Address) to identify the data from the sending and receiving process.
At the sending side, the transport layer receives data from the session layer, divides it into units
called segments with a sequence number. These numbers enable the transport layer to reassemble
the message correctly upon arriving at the destination. At the receiving side, the transport layer
receives packets from the network layer, converts and arranges into proper sequence of segments
and sends it to the session layer.
MODULE I MCA-402 Computer Networks ADMN 2011-14
Dept. of Computer Science And Applications, SJCET, Palai Page 18
The transport layer also carries out flow control and error control functions; but unlike data link
layer these are end to end rather than node to node. The data can be transported in a connection
oriented or connectionless manner. In connection oriented transmission, the receiving devices sends
an acknowledgement back to the source after a packet or group of packet is received. It is slower
transmission method. In Connectionless Transmission the receiving devices does not sends an
acknowledgement back to the source. It is faster transmission method.
SESSION LAYER
Session layer has the responsibility of beginning, maintaining and ending the communication
between two devices, called session. It establishes a session between the communicating devices
called dialog and synchronizes their interaction. The session layer at the sending side accepts data
from the presentation layer adds checkpoints to it called syn bits to allow for fast recovery in the
event of a connection failure. The checkpoints or synchronization points is a way of informing the
status of the data transfer. At the receiving end the session layer receives data from the transport
layer removes the checkpoints inserted previously and passes the data to the presentation layer.
PRESENTATION LAYER
Unlike lower layers, which are mostly concerned with moving bits around, the presentation layer
is concerned with the syntax and semantics of the information transmitted. It is also called syntax
layer The main services provided by presentation layer are: Translation, Compression and
Encryption.
TRANSLATION: The sending and receiving devices may run on different platforms (hardware,
software and operating system). Hence it is important that they understand the messages that are
used for communicating. Presentation layer provides a translation service which converts the
message into a common format supported by both sender and receiver.
MODULE I MCA-402 Computer Networks ADMN 2011-14
Dept. of Computer Science And Applications, SJCET, Palai Page 19
COMPRESSION: Data compression reduces the number of bits contained in the information and
there by ensures faster data transfer. The data compressed at sender has to be decompressed at the
receiving end, both performed by the Presentation layer.
ENCRYPTION: It is the process of transforming the original message to change its meaning before
sending it. The reverse process called decryption has to be performed at the receiving end to
recover the original message from the encrypted message. The encryption and decryption services
which ensures privacy of sensitive data
The presentation layer at sending side receives the data from the application layer adds
header which contains information related to encryption and compression and sends it to the session
layer. At the receiving side, the presentation layer receives data from the session layer decompresses
and decrypts the data as required and translates it back as per the encoding scheme used at the
receiver.
APPLICATION LAYER
The application layer is concerned with the semantics of data, i.e., what the data means to
applications. It provides an interface for the end user operating a device connected to a network.
This layer is what the user sees, in terms of loading an application (such as Web browser or e-mail);
that is, this application layer is the data the user views while using these applications. The application
layer provides standards for supporting a variety of application-independent services. In other words
application layer provides a variety of protocols that are commonly needed by users. One widely
used application protocol is HTTP (Hyper Text Transfer Protocol), which is the basis for the World
Wide Web. When a browser wants a Web page, it sends the name of the page it wants to the server
using HTTP. The server then sends the page back. Some of the functionalities provided by
application layer are:
File access and transfer: It allows a use to access, download or upload files from/to a
remote host.
Mail services: It allows the users to use the mail services.
Remote login: It allows logging into a host which is remote
World Wide Web (WWW): Accessing the Web pages is also a part of this layer
MODULE I MCA-402 Computer Networks ADMN 2011-14
Dept. of Computer Science And Applications, SJCET, Palai Page 20
TCP/IP REFERENCE MODEL
TCP/IP originated out of the investigative research into networking protocols that the US
Department of Defense (DoD) initiated in 1969. In 1968, the DoD Advanced Research Projects
Agency (ARPA) began researching the network technology that is called packet switching.
The original focus of this research was to develop a network that is able to survive loss of subnet
hardware, with existing conversations not being broken off. In other words, DoD wanted
connections to remain intact as long as the source and destination nodes were functioning, even if
some of the machines or transmission lines in between were suddenly put out of operation. The
network that was initially constructed as a result of this research was meant to provide a
communication that could function in wartime, then called ARPANET, gradually became known as
the Internet. The TCP/IP protocols played an important role in the development of the Internet. In
the early 1980s, the TCP/IP protocols were developed. In 1983, they became standard protocols for
ARPANET. The protocols within the TCP/IP Suite have been tested, modified, and improved over
time. Because of the history of the TCP/IP protocol suite, it's often referred to as the DoD
protocol suite or the Internet protocol suite.
TCP/IP Reference Model is named from two of the most important protocols in it
The Transmission Control Protocol (TCP) and the Internet Protocol (IP).TCP handles reliable
delivery for messages of arbitrary size, and defines a robust delivery mechanism for all kinds of data
across a network and IP manages the routing of network transmissions from sender to receiver,
along with issues related to network and computer addresses.Some of TCP/IP Ref Model goals are:
To support multiple, packet-switched pathways through the network so that transmissions
can survive all conceivable failures
To permit dissimilar computer systems to easily exchange data
To offer robust, reliable delivery services for both short- and long-distance communications
The TCP/IP model follows a layered architecture very similar to the OSI reference model. Based
on the protocol standards that have been developed, we can organize the communication task for
TCP/IP into four relatively independent layers:
Application layer
Transport layer
Internet layer
Network access layer
NETWORK ACCESS LAYER
This is the lowest layer of the TCP/IP Reference Model, responsible for placing TCP/IP
packets on the network medium and receiving TCP/IP packets of the network medium. TCP/IP was
designed to be independent of the network access method, frame format, and medium. In this way,
MODULE I MCA-402 Computer Networks ADMN 2011-14
Dept. of Computer Science And Applications, SJCET, Palai Page 21
TCP/IP can be used to connect differing network types. The Network Interface Layer encompasses
the Data Link and Physical layers of the OSI Model. Within the TCP/IP protocol suit the network
access layer is commonly viewed as a single layer with two sub layers: The Media Access Control (MAC)
Sub layer and The Physical Sub layer. The MAC sub layer prepares data for transmission and obtains
access to the transmission medium in shared access systems. The Physical sub layer encodes data and
transmits it over the physical network media. It operates with data in the form of bits transmitted
over a variety of electrical and optical cables, as well as radio frequencies. The responsibilities of this
layer include:
Formatting the data into a unit called a frame and converting that frame into the stream of
electric or analog pulses that passes across the transmission medium.
Checking for errors in incoming frames.
Adding error-checking information to outgoing frames so that the receiving computer can check
the frame for errors.
Acknowledging receipt of data frames and resending frames if acknowledgment is not received.
Network Access Layer protocols must know the details of the underlying network (its packet
structure, addressing, etc.) to correctly format the data being transmitted to comply with the
network constraints. The core protocols are:
PPP(Point to Point Protocol): commonly used to establish a direct physical connection between
two nodes and facilitates the transmission of data packets. PPP is used over many types of physical
networks including serial cable, phone line, specialized radio links, and fiber optic links
SLIP(Serial Line Interface Protocol):Older, simpler serial line protocol that only supports TCP/IP-
based communications. Its main functionality is framing of data for transmission
INTERNET LAYER
The internet layer provides services that are roughly equivalent to the OSI Network layer. The
primary concern of the protocol at this layer is to manage the connections across networks as
information is passed from source to destination. It is at this layer logical addressing, packetization of
data and routing are handled. The various functions provided by Internet layer are:
Translation between logical addresses and physical addresses
Routing from the source to the destination computer
Managing traffic problems, such as switching, routing, and controlling the congestion of data packets
MODULE I MCA-402 Computer Networks ADMN 2011-14
Dept. of Computer Science And Applications, SJCET, Palai Page 22
Maintaining the quality of service requested by the transport layer
The primary protocols that function at the TCP/IP Internet layer are:
Internet Protocol(IP): connectionless protocol that is primarily responsible for addressing and
routing packets between network devices. It is unreliable because packet delivery is not guaranteed
and also the sender or receiver is not informed when a packet is lost or out of sequence. IP is also
responsible for fragmenting and reassembling packets
Address Resolution Protocol (ARP): Network devices must know each others hardware address in
order to communicate on a network. Address resolution is the process of mapping a hosts IP
address to its hardware address. The Address Resolution Protocol (ARP) is responsible for obtaining
hardware addresses of TCP/IP devices on networks. The source will broadcast an ARP request
containing destination IP address to find the intended destinations MAC address. Only the
destination device will respond to the ARP request
Internet Control Message Protocol(ICMP): provides a set of error and control messages to help
track and resolve network problems. ICMP is used to send a destination unreachable message
when there is an error somewhere in the network that is preventing the frame or packet from being
forwarded to the destination device. It includes a type of message, called an Echo Request, which can
be sent from one host to another to see if it is reachable on the network. If it is reachable, the
destination host will reply with the ICMP Echo Reply message.
TRANSPORT LAYER
It is designed to allow peer entities on the source and destination hosts to carry on a
conversation, just as in the OSI transport layer. From Application to Transport Layer, the application
delivers its data to the communications system by passing a Stream of data bytes to the transport
layer along with the socket of the destination machine. Its functions include:
Sequencing and Transmission of packets
Acknowledgment of receipts
Error control
Flow control
The transport layer is implemented by mainly two protocols: Transmission Control Protocol(TCP )
and the User Datagram Protocol (UDP).
TCP: TCP provides a one-to-one, connection-oriented, reliable communications service. TCP is
responsible for the establishment of a TCP connection, the sequencing and acknowledgment of
packets sent, and the recovery of packets lost during transmission. TCP is Slower compared to UDP
MODULE I MCA-402 Computer Networks ADMN 2011-14
Dept. of Computer Science And Applications, SJCET, Palai Page 23
because of additional error checking being performed. It also adds features such as flow control,
sequencing, error detection and correction
UDP: UDP provides a one-to-one or one-to-many, connectionless, unreliable communications
service. UDP is used when the amount of data to be transferred is small (such as the data that would
fit into a single packet), when the overhead of establishing a TCP connection is not desired, or when
the applications or upper layer protocols provide reliable delivery.It is commonly used in Video and
Audio Casting.
APPLICATION LAYER
The top layer of the protocol stack is the application layer. The Application Layer is equivalent to
the top three layers, (Application, Presentation and Session Layers), in the OSI model. It refers to the
programs that initiate communication in the first place. TCP/IP includes several application layer
protocols for mail, file transfer, remote access, authentication and name resolution. These protocols
are embodied in programs that operate at the top layer just as any custom made or packaged
client/server application would.
The most widely known Application Layer protocols are those used for the exchange of user
information, some of them are:
The HyperText Transfer Protocol (HTTP) is used to transfer files that make up the Web
pages of the World Wide Web.
The File Transfer Protocol (FTP) is used for interactive file transfer.
The Simple Mail Transfer Protocol (SMTP) is used for the transfer of mail messages and
attachments.
Telnet, is a terminal emulation protocol, and, is used for remote login to network hosts.
The process by which a TCP/IP host sends data can be viewed as a five-step process:
Step 1 Create and encapsulate the application data with any required application layer headers.
Step 2 Encapsulate the data supplied by the application layer inside a transport layer header. For end-
user applications, a TCP or UDP header is typically used.
Step 3 Encapsulate the data supplied by the transport layer inside an Internet layer (IP) header. IP
defines the IP addresses that uniquely identify each computer.
Step 4 Encapsulate the data supplied by the Internet layer inside a data link layer header and trailer.
This is the only layer that uses both a header and a trailer. The physical layer encodes a signal onto
the medium to transmit the frame.
MODULE I MCA-402 Computer Networks ADMN 2011-14
Dept. of Computer Science And Applications, SJCET, Palai Page 24
COMPARISON OF THE OSI AND TCP/IP REF. MODELS
The OSI and TCP/IP reference models have much in common. Both are based on the
concept of a stack of independent protocols. Also, the functionality of the layers is roughly similar.
For example, in both models the layers up through and including the transport layer are there to
provide an end-to-end, network-independent transport service to processes wishing to
communicate. These layers form the transport provider. Again in both models, the layers above
transport are application-oriented users of the transport service.
Despite these fundamental similarities, the two models also have many differences. Three
concepts are central to the OSI model: Services, Interfaces and Protocols. Probably the biggest
contribution of the OSI model is to make the distinction between these three concepts explicit. Each
layer performs some services for the layer above it. The service definition tells what the layer does,
not how entities above it access it or how the layer works. It defines the layer's semantics. A layer's
interface tells the processes above it how to access it. It specifies what the parameters are and what
results to expect. The peer protocols used in a layer are the layer's own business. It can use any
protocols it wants to, as long as it gets the job done (i.e., provides the offered services). It can also
change them at will without affecting software in. higher layers. The TCP/IP model did not originally
clearly distinguish between service, interface, and protocol, For example, the only real services
offered by the internet layer are As a consequence, the protocols in the OSI model are better hidden
than in the TCP/IP model and can be replaced relatively easily as the technology changes.
The OSI reference model was devised before the corresponding protocols were
invented. This ordering means that the model was not biased toward one particular set of protocols,
a fact that made it quite general. The downside of this ordering is that the designers did not have
much experience with the subject and did not have a good idea of which functionality to put in which
layer. With TCP/IP the reverse was true: the protocols came first, and the model was really just a
description of the existing protocols. There was no problem with the protocols fitting the model.
They fit perfectly
Turning from philosophical matters to more specific ones, an obvious difference between
the two models is the number of layers: the OSI model has seven layers and the TCP/IP has four
layers. Both have (inter) network, transport, and application layers, but the other layers are different.
Another difference is in the area of connectionless versus connection oriented
communication. The OSI model supports both connectionless and connection oriented
communication in the network layer, but only connection-oriented communication in the transport
layer, where it counts (because-the transport service is visible to the users). The TCP/IP model has
only one mode in the network layer (connection less) but supports both modes in the transport
layer, giving the users a choice
MODULE I MCA-402 Computer Networks ADMN 2011-14
Dept. of Computer Science And Applications, SJCET, Palai Page 25
A CRITIQUE OF THE OSI MODEL AND PROTOCOLS
Neither the OSI model and its protocols nor the TCP/IP model and its protocols are perfect.
OSI model and its protocols did not take over the world and push everything else out of their way
because of:
Bad timing
Bad technology
Bad implementations
Bad policies
BAD TIMING
The time at which a standard is established is absolutely critical to its success. David Clark from
the MIT has developed the following theory regarding publishing a standard at the right time.
As shown in the figure, in the life cycle of a standard, there are 2 principal peaks of
activity: the research carried out in the field covered by the standard, and the industrial investments
for the implementation and deployment of the standard. These two peaks are separated by a off-peak
of activity that actually appears to be the ideal moment for the publication of the standard
When the subject is first discovered, there is a burst of research activity in the form of
discussions, papers, and meetings. After a while this activity subsides, corporations discover the
subject, and the billion-dollar wave of investment hits. It is essential that the standards be written in
the trough in between the two "peaks. If the standards are written too early, before the research is
finished, the subject may still be poorly understood; the result is bad standards. If they are written
too late, so many companies may have already made major investments in different ways of doing
things that the standards are effectively ignored. If the interval between the two curves is very short
(because everyone is in a hurry to get started), the people developing the standards may get crushed
MODULE I MCA-402 Computer Networks ADMN 2011-14
Dept. of Computer Science And Applications, SJCET, Palai Page 26
It now appears that the standard OSI protocols got crushed. The competing TCP/IP
protocols were already in widespread use by research universities by the time the OSI protocols
appeared. While the billion-dollar wave of investment had not yet hit, the academic market was large
enough that many vendors had begun cautiously offering TCP/IP products. When OSI came around,
they did not want to support a second protocol stack until they were forced to, so there were no
initial offerings. With every company waiting for every other company to go first, no company went
first and OSI never happened.
BAD TECHNOLOGY
The second reason that OSI never caught on is that both the model and the protocols
are flawed. The choice of seven layers was more political than technical, and two of the layers
(session and presentation) are nearly empty, whereas two other ones (data link and network) are
overfull. The OSI model, along with the associated service definitions and protocols, is extraordinarily
complex. They are also difficult to implement and inefficient in operation. In addition to being
incomprehensible, another problem with OSI is that some functions, such .as addressing, flow
control, and error control, reappear again and again in each layer.
BAD IMPLEMENTATIONS
Given the enormous complexity of the model and the protocols, it will come as no
surprise that the initial implementations were huge, unwieldy, and slow. It did not take long for
people to associate "OSI" with "poor quality." Although the products improved in the course of time,
the image stuck. In contrast, one of the first implementations of TCP/IP was quite good (not to
mention, free). People began using it quickly, which led to a large user community, which led to
improvements, which led to an even larger community.
BAD POLICIES
On account of the initial implementation, many people, especially in academia, thought of
TCP/IP as part of UNIX.OSI, on the other hand, was widely thought to be the creature of the
European telecommunication ministries, the European Community, and later the U.S. Government.
This belief was only partly true, but the very idea of a bunch of government bureaucrats trying to
shove a technically inferior standard down the throats of the poor researchers and programmers
down in the trenches actually developing computer networks did not help much.
CRITIQUE OF THE TCP/IP REFERENCE MODEL
The TCPI/IP model and protocols have their problems too. First, the model does not
clearly distinguish the concepts of service, interface, and protocol. Good software engineering
practice requires differentiating between the specification and the implementation, something that
OSI does very carefully, and TCPI/IP does not. Consequently, the TCPI/IP model is not much of a
guide for designing new networks using new technologies.
MODULE I MCA-402 Computer Networks ADMN 2011-14
Dept. of Computer Science And Applications, SJCET, Palai Page 27
Second, the TCPI/IP model is not at all general and is poorly suited to describing any
protocol stack other than TCPI/IP. Third, the TCP/IP model does not distinguish (or even mention)
the physical and data link layers. These are completely different. The physical layer has to do with the
transmission characteristics of copper wire, fiber optics, and wireless communication. The data link
layer's job is to delimit the start and end of frames and get them from one side to the other with the
desired degree of reliability. A proper model should include both as separate layers. The TCP/IP
model does not do this.
Finally, although the IP and TCP protocols were carefully thought out and well
implemented, many of the other protocols were ad hoc, generally produced by a couple of graduate
students hacking away until they got tired. The protocol implementations were then distributed free,
which resulted in their becoming widely used, deeply entrenched, and thus hard to replace.
NOVEL NETWARE
Novell NetWare is the most popular network system in the PC world. It provides transparent
remote file access and numerous other distributed network services, including printer sharing and
support for various applications such as electronic mail transfer. NetWare was developed by Novell,
Inc., and introduced in the early 1980s.It was derived from Xerox Network Systems (XNS), which
was created by Xerox Corporation in the late 1970s.NetWare runs on virtually any kind of
computer system, from PCs to mainframes
Novell Networks are based on the client/server model in which at least one computer functions
as a network file server, which runs all of the NetWare protocols and maintains the networks shared
data on one or more disk drives. File servers generally allow users on other PCs to access
application software or data files i.e., it provides services to other network computers called clients.
NOVEL NETWARE PROTOCOL SUITE
Novell provides a suite of protocols developed specifically for NetWare. The five main protocols
used by NetWare are:
Media Access Protocol.
Internetwork Packet Exchange/Sequenced Packet Exchange (IPX/SPX).
Routing Information Protocol (RIP).
Service Advertising Protocol (SAP).
NetWare Core Protocol (NCP).
These protocols wh It defines the connection control and service request encoding that
make it possible for clients and servers to interact.
MODULE I MCA-402 Computer Networks ADMN 2011-14
Dept. of Computer Science And Applications, SJCET, Palai Page 28
This is the protocol that provides transport and session services.
NetWare security is also provided within this protocol. ich are associated with Novel Network
follows an enveloping pattern. More specifically, the upper-lever protocols (NCP, SAP, and RIP) are
enveloped by IPX/SPX.A Media Access Protocol header and trailer then envelop IPX/SPX. . The
following figure shows a Comparison between NetWare and OSI reference models
Media Access Protocols: The NetWare suite of protocols supports several media-access protocols,
including Ethernet/IEEE 802.3, Token Ring/IEEE 802.5, Fiber Distributed Data Interface (FDDI), and
Point-to-Point Protocol (PPP)
IPX(Internetwork Packet Exchange protocol):Routing and networking protocol at Network layer.
When a device to be communicated with is located on a different network, IPX routes the
information to the destination through any intermediate networks. It datagram-based, connectionless,
unreliable protocol that is equivalent to the IP
SPX(Sequenced Packet Exchange protocol): Control protocol at the transport layer (layer 3) for
reliable, connection-oriented datagram transmission. SPX is similar to TCP in the TCP/IP suite.
Routing Information Protocol (RIP): Facilitate the exchange of routing information on a NetWare
network. In RIP, an extra field of data was added to the packet to improve the decision criteria for
selecting the fastest route to a destination
Service Advertisement Protocol (SAP): It is an IPX protocol through which network resources,
such as file servers and print servers, advertise their addresses and the services they provide.
Advertisements are sent via SAP every 60 seconds. This SAP packet contains information regarding
the servers which provide services. Using these SAP packets, clients on the network are able to
obtain the internetwork address of any servers they can access
NetWare Core Protocol (NCP): It defines the connection control and service request encoding that
make it possible for clients and servers to interact. This is the protocol that provides transport and
session services. NetWare security is also provided within this protocol.
DATA LINK LAYER
In data communication, physical layer deals with transmission of signals over different
transmission medium. While sending data, the signals may get impaired due to the noise encountered
during transmission. The data flow rate between the source and destination also should be kept
under control. Therefore in order to achieve an efficient and reliable communication a data flow
control mechanism needs to be implemented. Data link layer deals with frame formation, flow
control, error control and addressing and ensures error free transfer of bits from one device to
another. For the effective data communication data link layer needs to perform a number of specified
functions.
MODULE I MCA-402 Computer Networks ADMN 2011-14
Dept. of Computer Science And Applications, SJCET, Palai Page 29
Services provided to network layer: The main functionality of this layer is to transfer data from the
network layer on source machine to the network layer on destination machine
Flow Control: The source machine should sent data at a rate faster than the destination machine can
accept them
Framing: The bits to be transmitted is broken down into discrete frames. A frame contains user data
and control fields.
Error Control: All the frames should be delivered from source to the destination. The errors made
in bits during transmission must be detected and corrected
Addressing: On a multipoint line, such as many machines connected together, identity of individual
machines must be specified while transmitting data frames
FRAME
Frame is a data structure used in transmissions at DLL. The data link layer takes the packets it
gets from the network layer and encapsulates them into frames for transmission. Each frame contains
a frame header with fields for addressing and is located at the beginning of the frame, a payload field
for holding the packet and a frame trailer. The trailer contains fields are used for error detection and
mark the end of the frame.
FRAME SYNCHRONIZATION
Frame synchronization or simply framing is the process of defining and locating frame boundaries
(start and end of the frame) on a bit sequence. Converting the bit stream into frames is a tedious
process. The frame format is designed in a way that enables the receiver to always locate the
beginning of a frame and its various fields and should be able to separate the data field. To identify a
frame and its various fields, field identifiers are incorporated. These are unique symbols that indicate
by their presence the beginning and end of a frame. Four methods can be used to mark the start and
end of each frame:
MODULE I MCA-402 Computer Networks ADMN 2011-14
Dept. of Computer Science And Applications, SJCET, Palai Page 30
Character count
Flag bytes with byte stuffing
Starting and ending flags, with bit stuffing
Physical layer coding violations
CHARACTER COUNT
Character count, uses a header field to specify the number of characters in the frame. The
Data Link Layer at the destination checks the header field to know the size of the frame and hence,
the end of frame. The process is shown in the following figure for a four frame of size 5, 5,8 and 8
respectively.
However, problems may arise due to changes in character count value during transmission. For
example, in the second frame if the character count 5 changes to7, the destination will receive data
out of synchronization and hence, it will not be able to identify the start of the next frame.
FLAG BYTES WITH BYTE STUFFING
Byte Stuffing also known as Character Stuffing is one of the earliest schemes adopted for
delimiting packets containing character data. This method employees three special control characters
in ASCII for the purpose of framing: DLE -Data Link Escape, STX - Start of Text and ETX -End of
Text. The pattern DLE STX denotes the beginning of each frame and DLE ETX specifies the end of
each frame.
MODULE I MCA-402 Computer Networks ADMN 2011-14
Dept. of Computer Science And Applications, SJCET, Palai Page 31
However, there is a still a problem we have to solve. It may happen that the flag byte occurs in the
data. For example, if a DLE occurs in the middle of the data and interferes with the data during
framing then, sender stuffs an extra DLE into the data stream just before each occurrence of an
accidental DLE in the data stream. The data link layer on the receiving end discards the first DLE
and the second DLE is regarded as data.
BIT STUFFING
Bit Stuffing is similar to the Byte Stuffing, except that, the method of bit stuffing allows
insertion of bits instead of the entire character (8 bits). Here frames can contain an arbitrary number
of bits made up of units of any size. Each frame begins and ends with a special bit pattern, 01111110
or 0x7E in hexadecimal. Whenever the sender's data link layer encounters five consecutive 1s in the
data, it automatically stuffs a 0 bit into the outgoing bit stream. This bit stuffing is analogous to byte
stuffing.
When the receiver sees five consecutive incoming 1 bits, followed by a 0 bit, it
automatically removes the 0 bit. Just as byte stuffing is completely transparent to the network layer in
both computers, so is bit stuffing. With bit stuffing, the boundary between two frames can be
unambiguously recognized by the flag pattern. Thus, if the receiver loses track of where it is, all it has
to do is scan the input for flag sequences, since they can only occur at frame boundaries and never
within the data.
MODULE I MCA-402 Computer Networks ADMN 2011-14
Dept. of Computer Science And Applications, SJCET, Palai Page 32
With both bit and byte stuffing, a side effect is that the length of a frame now depends on the
contents of the data it carries. For instance, if there are no flag bytes in the data, 100 bytes might be
carried in a frame of roughly 100 bytes. If, however, the data consists solely of flag bytes, each flag
byte will be escaped and the frame will become roughly 200 bytes long. With bit stuffing, the increase
would be roughly 12.5% as 1 bit is added to every byte.
FRAMING BY ILLEGAL CODE (CODE VIOLATION)
A fourth method is based on any redundancy in the coding scheme. In this method, we simply
identify an illegal bit pattern, and use it as a beginning or end marker. For example, in Manchester
Encoding 1- can be coded into two parts i.e., high to low = 1 0 and can be coded into two parts i.e.,
low to high = 0 1.Codes of all low (000) or all high (111) arent used for the data and therefore, can
be used for framing.
Many data link protocols use a combination of a character count with one of the other
methods for extra safety. When a frame arrives, the count field is used to locate the end of the
frame. Only if the appropriate delimiter is present at that position and the checksum is correct is the
frame accepted as valid. Otherwise, the input stream is scanned for the next delimiter.
FLOW CONTROL
Another important issue for the data link layer is dealing with the situation which occurs
when the sender transmits frames faster than the receiver can accept or process them. This situation
can easily occur when the sender is running on a fast computer and the receiver is running on a slow
machine. The sender keeps pumping the frames out at a high rate until the receiver is completely
swamped. Even if the transmission is error free, at a certain point the receiver will simply be unable
to handle the frames as they arrive and will start to lose some. To prevent this situation during
transmission, an approach is introduced called the Flow Control.
Flow Control is a set of procedures that tells the sender how much data it can transmit
before it must wait for an acknowledgment from the receiver. The flow of data should not be
allowed to overwhelm the receiver. Receiver should also be able to inform the transmitter before its
limits (this limit may be amount of memory used to store the incoming data or the processing power
at the receiver end) are reached and the sender must send fewer frames. Hence, Flow control refers
to the set of procedures used to restrict the amount of data the transmitter can send before waiting
fo