Installation of Inside Plant Network Intro Notes

Download as pdf or txt
Download as pdf or txt
You are on page 1of 28

INSTALLATION OF INSIDE PLANT

NETWORK

BASICS OF COMPUTER NETWORKING


Computer Networking is the practice of connecting computers together to enable
communication and data exchange between them. In general, Computer Network is a
collection of two or more computers. It helps users to communicate more easily. In this
article, we are going to discuss the basics which everyone must know before going deep
into Computer Networking.

Computer Networking

How Does a Computer Network Work?


Basics building blocks of a Computer network are Nodes and Links. A Network Node
can be illustrated as Equipment for Data Communication like a Modem, Router, etc., or
Equipment of a Data Terminal like connecting two computers or more. Link in
Computer Networks can be defined as wires or cables or free space of wireless
networks.
1. Robert Onsare
The working of Computer Networks can be simply defined as rules or protocols which
help in sending and receiving data via the links which allow Computer networks to
communicate. Each device has an IP Address, that helps in identifying a device.

Basic Terminologies of Computer Networks


 Network: A network is a collection of computers and devices that are connected
together to enable communication and data exchange.
 Nodes: Nodes are devices that are connected to a network. These can include
computers, Servers, Printers, Routers, Switches, and other devices.
 Protocol: A protocol is a set of rules and standards that govern how data is
transmitted over a network. Examples of protocols include TCP/IP, HTTP,
and FTP.
 Topology: Network topology refers to the physical and logical arrangement of
nodes on a network. The common network topologies include bus, star, ring, mesh,
and tree.
 Service Provider Networks: These types of Networks give permission to take
Network Capacity and Functionality on lease from the Provider. Service Provider
Networks include Wireless Communications, Data Carriers, etc.
 IP Address: An IP address is a unique numerical identifier that is assigned to every
device on a network. IP addresses are used to identify devices and enable
communication between them.
 DNS: The Domain Name System (DNS) is a protocol that is used to translate
human-readable domain names (such as www.google.com) into IP addresses that
computers can understand.
 Firewall: A firewall is a security device that is used to monitor and control
incoming and outgoing network traffic. Firewalls are used to protect networks from
unauthorized access and other security threats.
Types of Enterprise Computer Networks
 LAN: A Local Area Network (LAN) is a network that covers a small area, such as
an office or a home. LANs are typically used to connect computers and other devices
within a building or a campus.
 WAN: A Wide Area Network (WAN) is a network that covers a large geographic
area, such as a city, country, or even the entire world. WANs are used to connect
LANs together and are typically used for long-distance communication.
 Cloud Networks: Cloud Networks can be visualized with a Wide Area Network
(WAN) as they can be hosted on public or private cloud service providers and cloud
networks are available if there is a demand. Cloud Networks consist of Virtual
Routers, Firewalls, etc.
These are just a few basic concepts of computer networking. Networking is a vast and
complex field, and there are many more concepts and technologies involved in building
and maintaining networks. Now we are going to discuss some more concepts on
Computer Networking.
 Open system: A system that is connected to the network and is ready for
communication.

2. Robert Onsare
 Closed system: A system that is not connected to the network and can’t be
communicated with.
Types of Computer Network Architecture
Computer Network falls under these broad Categories:
 Client-Server Architecture: Client-Server Architecture is a type of Computer
Network Architecture in which Nodes can be Servers or Clients. Here, the server
node can manage the Client Node Behaviour.
 Peer-to-Peer Architecture: In P2P (Peer-to-Peer) Architecture, there is not any
concept of a Central Server. Each device is free for working as either client or server.
Network Devices
An interconnection of multiple devices, also known as hosts, that are connected using
multiple paths for the purpose of sending/receiving data or media. Computer networks
can also include multiple devices/mediums which help in the communication between
two different devices; these are known as Network devices and include things such as
routers, switches, hubs, and bridges.

Network Devices

Network Topology
The Network Topology is the layout arrangement of the different devices in a network.
Common examples include Bus, Star, Mesh, Ring, and Daisy chain.

Network Topology

3. Robert Onsare
OSI Model
OSI stands for Open Systems Interconnection. It is a reference model that specifies
standards for communications protocols and also the functionalities of each layer. The
OSI has been developed by the International Organization For Standardization and it is
7 layer architecture. Each layer of OSI has different functions and each layer has to
follow different protocols. The 7 layers are as follows:
 Physical Layer
 Data link Layer
 Network Layer
 Transport Layer
 Session Layer
 Presentation Layer
 Application Layer
Protocol
A protocol is a set of rules or algorithms which define the way how two entities can
communicate across the network and there exists a different protocol defined at each
layer of the OSI model. A few such protocols are TCP, IP, UDP, ARP, DHCP, FTP,
and so on.

Unique Identifiers of Network


Hostname: Each device in the network is associated with a unique device name known
as Hostname. Type “hostname” in the command prompt(Administrator Mode) and
press ‘Enter’, this displays the hostname of your machine.

HostName

IP Address (Internet Protocol address): Also known as the Logical Address, the IP
Address is the network address of the system across the network. To identify each
device in the world-wide-web, the Internet Assigned Numbers Authority (IANA)
assigns an IPV4 (Version 4) address as a unique identifier to each device on the
Internet. The length of an IPv4 address is 32 bits, hence, we have 232 IP addresses
4. Robert Onsare
available. The length of an IPv6 address is 128 bits.
Type “ipconfig” in the command prompt and press ‘Enter’, this gives us the IP address
of the device.
MAC Address (Media Access Control address): Also known as physical address,
the MAC Address is the unique identifier of each host and is associated with its NIC
(Network Interface Card). A MAC address is assigned to the NIC at the time of
manufacturing. The length of the MAC address is: 12-nibble/ 6 bytes/ 48 bits Type
“ipconfig/all” in the command prompt and press ‘Enter’, this gives us the MAC
address.
Port: A port can be referred to as a logical channel through which data can be
sent/received to an application. Any host may have multiple applications running, and
each of these applications is identified using the port number on which they are
running.
A port number is a 16-bit integer, hence, we have 2 16 ports available which are
categorized as shown below:
Port Types Range

Well known Ports 0 – 1023

Registered Ports 1024 – 49151

Ephemeral Ports 49152 – 65535

Number of ports: 65,536


Range: 0 – 65535
Type “netstat -a” in the command prompt and press ‘Enter’, this lists all the ports being
used.

List of Ports

5. Robert Onsare
Socket: The unique combination of IP address and Port number together is termed a
Socket.

Other Related Concepts

DNS Server: DNS stands for Domain Name System. DNS is basically a server that
translates web addresses or URLs (ex: www.google.com) into their corresponding IP
addresses. We don’t have to remember all the IP addresses of each and every
website. The command ‘nslookup’ gives you the IP address of the domain you are
looking for. This also provides information on our DNS Server. \

Domain IP Address

ARP: ARP stands for Address Resolution Protocol. It is used to convert an IP address
to its corresponding physical address(i.e., MAC Address). ARP is used by the Data Link
Layer to identify the MAC address of the Receiver’s machine.
RARP: RARP stands for Reverse Address Resolution Protocol. As the name
suggests, it provides the IP address of the device given a physical address as input.
But RARP has become obsolete since the time DHCP has come into the picture.

TYPES OF NETWORK TOPOLOGY


In Computer Network ,there are various ways through which different components are
connected to one another. Network Topology is the way that defines the structure, and
how these components are connected to each other.
Types of Network Topology
The arrangement of a network that comprises nodes and connecting lines via sender and
receiver is referred to as Network Topology. The various network topologies are:
 Point to Point Topology

6. Robert Onsare
 Mesh Topology
 Star Topology
 Bus Topology
 Ring Topology
 Tree Topology
 Hybrid Topology

Point to Point Topology

Point-to-Point Topology is a type of topology that works on the functionality of the


sender and receiver. It is the simplest communication between two nodes, in which one
is the sender and the other one is the receiver. Point-to-Point provides high bandwidth.

Point to Point Topology

Mesh Topology

In a mesh topology, every device is connected to another device via a particular channel.
In Mesh Topology, the protocols used are AHCP (Ad Hoc Configuration Protocols),
DHCP (Dynamic Host Configuration Protocol), etc.

Mesh Topology

Figure 1: Every device is connected to another via dedicated channels. These channels
are known as links.
 Suppose, the N number of devices are connected with each other in a mesh topology,
the total number of ports that are required by each device is N-1. In Figure 1, there

7. Robert Onsare
are 5 devices connected to each other, hence the total number of ports required by
each device is 4. The total number of ports required = N * (N-1).
 Suppose, N number of devices are connected with each other in a mesh topology,
then the total number of dedicated links required to connect them is NC2 i.e. N(N-
1)/2. In Figure 1, there are 5 devices connected to each other, hence the total number
of links required is 5*4/2 = 10.
Advantages of Mesh Topology
 Communication is very fast between the nodes.
 Mesh Topology is robust.
 The fault is diagnosed easily. Data is reliable because data is transferred among the
devices through dedicated channels or links.
 Provides security and privacy.
Drawbacks of Mesh Topology
 Installation and configuration are difficult.
 The cost of cables is high as bulk wiring is required, hence suitable for less number
of devices.
 The cost of maintenance is high.
A common example of mesh topology is the internet backbone, where various internet
service providers are connected to each other via dedicated channels. This topology is
also used in military communication systems and aircraft navigation systems.

Star Topology

In Star Topology, all the devices are connected to a single hub through a cable. This
hub is the central node and all other nodes are connected to the central node. The hub
can be passive in nature i.e., not an intelligent hub such as broadcasting devices, at the
same time the hub can be intelligent known as an active hub. Active hubs have repeaters
in them. Coaxial cables or RJ-45 cables are used to connect the computers. In Star
Topology, many popular Ethernet LAN protocols are used as CD(Collision Detection),
CSMA (Carrier Sense Multiple Access), etc.

Star Topology

8. Robert Onsare
Figure 2: A star topology having four systems connected to a single point of connection
i.e. hub.
Advantages of Star Topology
 If N devices are connected to each other in a star topology, then the number of cables
required to connect them is N. So, it is easy to set up.
 Each device requires only 1 port i.e. to connect to the hub, therefore the total number
of ports required is N.
 It is Robust. If one link fails only that link will affect and not other than that.
 Easy to fault identification and fault isolation.
 Star topology is cost-effective as it uses inexpensive coaxial cable.
Drawbacks of Star Topology
 If the concentrator (hub) on which the whole topology relies fails, the whole system
will crash down.
 The cost of installation is high.
 Performance is based on the single concentrator i.e. hub.
A common example of star topology is a local area network (LAN) in an office where
all computers are connected to a central hub. This topology is also used in wireless
networks where all devices are connected to a wireless access point.
For more, refer to the Advantages and Disadvantages of Star Topology.

Bus Topology

Bus Topology is a network type in which every computer and network device is
connected to a single cable. It is bi-directional. It is a multi-point connection and a non-
robust topology because if the backbone fails the topology crashes. In Bus Topology,
various MAC (Media Access Control) protocols are followed by LAN ethernet
connections like TDMA, Pure Aloha, CDMA, Slotted Aloha, etc.

Bus Topology

Figure 3: A bus topology with shared backbone cable. The nodes are connected to the
channel via drop lines.
Advantages of Bus Topology
 If N devices are connected to each other in a bus topology, then the number of cables
required to connect them is 1, known as backbone cable, and N drop lines are
required.

9. Robert Onsare
 Coaxial or twisted pair cables are mainly used in bus-based networks that support
up to 10 Mbps.
 The cost of the cable is less compared to other topologies, but it is used to build
small networks.
 Bus topology is familiar technology as installation and troubleshooting techniques
are well known.
 CSMA is the most common method for this type of topology.
Drawbacks of Bus Topology
 A bus topology is quite simpler, but still, it requires a lot of cabling.
 If the common cable fails, then the whole system will crash down.
 If the network traffic is heavy, it increases collisions in the network. To avoid this,
various protocols are used in the MAC layer known as Pure Aloha, Slotted Aloha,
CSMA/CD, etc.
 Adding new devices to the network would slow down networks.
 Security is very low.
A common example of bus topology is the Ethernet LAN, where all devices are
connected to a single coaxial cable or twisted pair cable. This topology is also used in
cable television networks. For more, refer to the Advantages and Disadvantages of Bus
Topology.

Ring Topology

In a Ring Topology, it forms a ring connecting devices with exactly two neighboring
devices. A number of repeaters are used for Ring topology with a large number of nodes,
because if someone wants to send some data to the last node in the ring topology with
100 nodes, then the data will have to pass through 99 nodes to reach the 100th node.
Hence to prevent data loss repeaters are used in the network.
The data flows in one direction, i.e. it is unidirectional, but it can be made bidirectional
by having 2 connections between each Network Node, it is called Dual Ring Topology.
In-Ring Topology, the Token Ring Passing protocol is used by the workstations to
transmit the data.

Ring Topology

10. Robert Onsare


Figure 4: A ring topology comprises 4 stations connected with each forming a ring.
The most common access method of ring topology is token passing.
 Token passing: It is a network access method in which a token is passed from one
node to another node.
 Token: It is a frame that circulates around the network.
Operations of Ring Topology
1. One station is known as a monitor station which takes all the responsibility for
performing the operations.
2. To transmit the data, the station has to hold the token. After the transmission is done,
the token is to be released for other stations to use.
3. When no station is transmitting the data, then the token will circulate in the ring.
4. There are two types of token release techniques: Early token release releases the
token just after transmitting the data and Delayed token release releases the token
after the acknowledgment is received from the receiver.
Advantages of Ring Topology
 The data transmission is high-speed.
 The possibility of collision is minimum in this type of topology.
 Cheap to install and expand.
 It is less costly than a star topology.
Drawbacks of Ring Topology
 The failure of a single node in the network can cause the entire network to fail.
 Troubleshooting is difficult in this topology.
 The addition of stations in between or the removal of stations can disturb the whole
topology.
 Less secure.
For more, refer to the Advantages and Disadvantages of Ring Topology.
Tree Topology
This topology is the variation of the Star topology. This topology has a hierarchical flow
of data. In Tree Topology, protocols like DHCP and SAC (Standard Automatic
Configuration ) are used.

Tree Topology

11. Robert Onsare


Figure 5: In this, the various secondary hubs are connected to the central hub which
contains the repeater. This data flow from top to bottom i.e. from the central hub to the
secondary and then to the devices or from bottom to top i.e. devices to the secondary
hub and then to the central hub. It is a multi-point connection and a non-robust topology
because if the backbone fails the topology crashes.
Advantages of Tree Topology
 It allows more devices to be attached to a single central hub thus it decreases the
distance that is traveled by the signal to come to the devices.
 It allows the network to get isolated and also prioritize from different computers.
 We can add new devices to the existing network.
 Error detection and error correction are very easy in a tree topology.
Drawbacks of Tree Topology
 If the central hub gets fails the entire system fails.
 The cost is high because of the cabling.
 If new devices are added, it becomes difficult to reconfigure.
A common example of a tree topology is the hierarchy in a large organization. At the
top of the tree is the CEO, who is connected to the different departments or divisions
(child nodes) of the company. Each department has its own hierarchy, with managers
overseeing different teams (grandchild nodes). The team members (leaf nodes) are at
the bottom of the hierarchy, connected to their respective managers and departments.

Hybrid Topology

This topological technology is the combination of all the various types of topologies we
have studied above. Hybrid Topology is used when the nodes are free to take any form.
It means these can be individuals such as Ring or Star topology or can be a combination
of various types of topologies seen above. Each individual topology uses the protocol
that has been discussed earlier.

Hybrid Topology

12. Robert Onsare


Figure 6: The above figure shows the structure of the Hybrid topology. As seen it
contains a combination of all different types of networks.
Advantages of Hybrid Topology
 This topology is very flexible.
 The size of the network can be easily expanded by adding new devices.
Drawbacks of Hybrid Topology
 It is challenging to design the architecture of the Hybrid Network.
 Hubs used in this topology are very expensive.
 The infrastructure cost is very high as a hybrid network requires a lot of cabling
and network devices.
A common example of a hybrid topology is a university campus network. The network
may have a backbone of a star topology, with each building connected to the backbone
through a switch or router. Within each building, there may be a bus or ring topology
connecting the different rooms and offices. The wireless access points also create a
mesh topology for wireless devices. This hybrid topology allows for efficient
communication between different buildings while providing flexibility and redundancy
within each building.

WHAT IS OSI MODEL? – LAYERS OF


OSI MODEL
OSI stands for Open Systems Interconnection. It was developed by ISO – ‘International
Organization for Standardization’, in the year 1984. It is a 7-layer architecture with each
layer having specific functionality to perform. All these 7 layers work collaboratively
to transmit the data from one person to another across the globe.

What is OSI Model?


The OSI model, created in 1984 by ISO, is a reference framework that explains the
process of transmitting data between computers. It is divided into seven layers that work
together to carry out specialised network functions, allowing for a more systematic
approach to networking.

13. Robert Onsare


What are the 7 layers of the OSI Model?
The OSI model consists of seven abstraction layers arranged in a top-down order:
1. Physical Layer
2. Data Link Layer
3. Network Layer
4. Transport Layer
5. Session Layer
6. Presentation Layer
7. Application Layer
Physical Layer – Layer 1
The lowest layer of the OSI reference model is the physical layer. It is responsible for
the actual physical connection between the devices. The physical layer contains
information in the form of bits. It is responsible for transmitting individual bits from
one node to the next. When receiving data, this layer will get the signal received and
convert it into 0s and 1s and send them to the Data Link layer, which will put the frame
back together.

14. Robert Onsare


Functions of the Physical Layer

 Bit synchronization: The physical layer provides the synchronization of the bits by
providing a clock. This clock controls both sender and receiver thus providing
synchronization at the bit level.
 Bit rate control: The Physical layer also defines the transmission rate i.e. the
number of bits sent per second.
 Physical topologies: Physical layer specifies how the different, devices/nodes are
arranged in a network i.e. bus, star, or mesh topology.
 Transmission mode: Physical layer also defines how the data flows between the
two connected devices. The various transmission modes possible are Simplex,
half-duplex and full-duplex.
Note:
1. Hub, Repeater, Modem, and Cables are Physical Layer devices.
2. Network Layer, Data Link Layer, and Physical Layer are also known as Lower
Layers or Hardware Layers.
Data Link Layer (DLL) – Layer 2
The data link layer is responsible for the node-to-node delivery of the message. The
main function of this layer is to make sure data transfer is error-free from one node to
another, over the physical layer. When a packet arrives in a network, it is the
responsibility of the DLL to transmit it to the Host using its MAC address.
The Data Link Layer is divided into two sublayers:
1. Logical Link Control (LLC)
2. Media Access Control (MAC)
The packet received from the Network layer is further divided into frames depending
on the frame size of the NIC(Network Interface Card). DLL also encapsulates Sender
and Receiver’s MAC address in the header.
The Receiver’s MAC address is obtained by placing an ARP(Address Resolution
Protocol) request onto the wire asking “Who has that IP address?” and the destination
host will reply with its MAC address.

Functions of the Data Link Layer

 Framing: Framing is a function of the data link layer. It provides a way for a
sender to transmit a set of bits that are meaningful to the receiver. This can be
accomplished by attaching special bit patterns to the beginning and end of the
frame.
 Physical addressing: After creating frames, the Data link layer adds physical
addresses (MAC addresses) of the sender and/or receiver in the header of each
frame.
 Error control: The data link layer provides the mechanism of error control in which
it detects and retransmits damaged or lost frames.

15. Robert Onsare


 Flow Control: The data rate must be constant on both sides else the data may get
corrupted thus, flow control coordinates the amount of data that can be sent before
receiving an acknowledgment.
 Access control: When a single communication channel is shared by multiple
devices, the MAC sub-layer of the data link layer helps to determine which device
has control over the channel at a given time.

Note:
1. Packet in the Data Link layer is referred to as Frame.
2. Data Link layer is handled by the NIC (Network Interface Card) and device
drivers of host machines.
3. Switch & Bridge are Data Link Layer devices.
Network Layer – Layer 3
The network layer works for the transmission of data from one host to the other located
in different networks. It also takes care of packet routing i.e. selection of the shortest
path to transmit the packet, from the number of routes available. The sender &
receiver’s IP addresses are placed in the header by the network layer.

Functions of the Network Layer

 Routing: The network layer protocols determine which route is suitable from
source to destination. This function of the network layer is known as routing.
 Logical Addressing: To identify each device on Internetwork uniquely, the
network layer defines an addressing scheme. The sender & receiver’s IP addresses
are placed in the header by the network layer. Such an address distinguishes each
device uniquely and universally.
Note:
1. Segment in the Network layer is referred to as Packet.
2. Network layer is implemented by networking devices such as routers and
switches.
16. Robert Onsare
Transport Layer – Layer 4
The transport layer provides services to the application layer and takes services from
the network layer. The data in the transport layer is referred to as Segments. It is
responsible for the End to End Delivery of the complete message. The transport layer
also provides the acknowledgment of the successful data transmission and re-transmits
the data if an error is found.
At the sender’s side: The transport layer receives the formatted data from the upper
layers, performs Segmentation, and also implements Flow & Error control to ensure
proper data transmission. It also adds Source and Destination port numbers in its header
and forwards the segmented data to the Network Layer.
Note: The sender needs to know the port number associated with the receiver’s
application.
Generally, this destination port number is configured, either by default or manually.
For example, when a web application requests a web server, it typically uses port
number 80, because this is the default port assigned to web applications. Many
applications have default ports assigned.
At the receiver’s side: Transport Layer reads the port number from its header and
forwards the Data which it has received to the respective application. It also performs
sequencing and reassembling of the segmented data.

Functions of the Transport Layer

 Segmentation and Reassembly: This layer accepts the message from the (session)
layer, and breaks the message into smaller units. Each of the segments produced
has a header associated with it. The transport layer at the destination station
reassembles the message.
 Service Point Addressing: To deliver the message to the correct process, the
transport layer header includes a type of address called service point address or
port address. Thus by specifying this address, the transport layer makes sure that
the message is delivered to the correct process.
Services Provided by Transport Layer
1. Connection-Oriented Service
2. Connectionless Service
1. Connection-Oriented Service: It is a three-phase process that includes
 Connection Establishment
 Data Transfer
 Termination/disconnection
In this type of transmission, the receiving device sends an acknowledgment, back to the
source after a packet or group of packets is received. This type of transmission is reliable
and secure.
2. Connectionless service: It is a one-phase process and includes Data Transfer. In this
type of transmission, the receiver does not acknowledge receipt of a packet. This
approach allows for much faster communication between devices. Connection-oriented
service is more reliable than connectionless Service.
17. Robert Onsare
Note:
1. Data in the Transport Layer is called Segments.
2. Transport layer is operated by the Operating System. It is a part of the OS and
communicates with the Application Layer by making system calls.
3. The transport layer is called as Heart of the OSI model.
4. Device or Protocol Use : TCP, UDP NetBIOS, PPTP
Session Layer – Layer 5
This layer is responsible for the establishment of connection, maintenance of sessions,
and authentication, and also ensures security.

Functions of the Session Layer

 Session establishment, maintenance, and termination: The layer allows the two
processes to establish, use and terminate a connection.
 Synchronization: This layer allows a process to add checkpoints that are
considered synchronization points in the data. These synchronization points help to
identify the error so that the data is re-synchronized properly, and ends of the
messages are not cut prematurely and data loss is avoided.
 Dialog Controller: The session layer allows two systems to start communication
with each other in half-duplex or full-duplex.
Note:
1. All the below 3 layers(including Session Layer) are integrated as a single layer in
the TCP/IP model as the ????pplication Layer”.
2. Implementation of these 3 layers is done by the network application itself. These
are also known as Upper Layers or Software Layers.
3. Device or Protocol Use : NetBIOS, PPTP.
for Example:-
Let us consider a scenario where a user wants to send a message through some
Messenger application running in his browser. The “Messenger” here acts as the
application layer which provides the user with an interface to create the data. This
message or so-called Data is compressed, encrypted (if any secure data), and converted
into bits (0’s and 1’s) so that it can be transmitted.

Communication in Session Layer

18. Robert Onsare


Presentation Layer – Layer 6
The presentation layer is also called the Translation layer. The data from the application
layer is extracted here and manipulated as per the required format to transmit over the
network.

Functions of the Presentation Layer

 Translation: For example, ASCII to EBCDIC.


 Encryption/ Decryption: Data encryption translates the data into another form or
code. The encrypted data is known as the ciphertext and the decrypted data is
known as plain text. A key value is used for encrypting as well as decrypting data.
 Compression: Reduces the number of bits that need to be transmitted on the
network.
Note: Device or Protocol Use : JPEG, MPEG, GIF
Application Layer – Layer 7
At the very top of the OSI Reference Model stack of layers, we find the Application
layer which is implemented by the network applications. These applications produce
the data, which has to be transferred over the network. This layer also serves as a
window for the application services to access the network and for displaying the
received information to the user.
Example: Application – Browsers, Skype Messenger, etc.
Note: 1. The application Layer is also called Desktop Layer.
2. Device or Protocol Use : SMTP

Functions of the Application Layer

The main functions of application layer are given below.


 Network Virtual Terminal: It allows a user to log on to a remote host.
 FTAM- File transfer access and management : This application allows a user to
access file in a remote host, retrieve files in remote host and manage or
control files from a remote computer.
 Mail Services : Provide email service.
 Directory Services : This application provides distributed database sources
and access for global information about various objects and services.
Note: OSI model acts as a reference model and is not implemented on the Internet
because of its late invention. The current model being used is the TCP/IP model.

19. Robert Onsare


OSI Model in a Nutshell
Information
Layer Layer Form(Data Device or
No Name Responsibility Unit) Protocol

Helps in identifying the


Application
client and synchronizing Message SMTP
Layer
7 communication.

Data from the application


layer is extracted and
Presentation JPEG,
manipulated in the Message
Layer MPEG, GIF
required format for
6 transmission.

Establishes Connection,
Session Maintenance, Ensures
Message Gateway
Layer Authentication, and
5 Ensures security.

Take Service from


Transport Network Layer and
Segment Firewall
Layer provide it to the
4 Application Layer.

Transmission of data
Network from one host to another,
Packet Router
Layer located in different
3 networks.

Data Link Node to Node Delivery of Switch,


Frame
2 Layer Message. Bridge

Hub,
Establishing Physical
Physical Repeater,
Connections between Bits
Layer Modem,
Devices.
1 Cables

20. Robert Onsare


PROTOCOL AND STANDARD IN
COMPUTER NETWORKS
Computer networks are dependent on protocols and standards which plays a vital role,
which enables communication between different devices and systems with one another
and share data seamlessly. Network protocol ensures that different technologies and
components of the network are compatible with one another, reliable, and able to
function together.

Overview of Protocol
In Order to make communication successful between devices , some rules and
procedures should be agreed upon at the sending and receiving ends of the system. Such
rules and procedures are called as Protocols . Different types of protocols are used for
different types of communication.

In above diagrams Protocols are shown as set of rules . Such that Communication
between Sender and Receiver is not possible without Protocol.
Key Element of Protocol
 Syntax : syntax refers to the structure or the format of the data that gets exchanged
between the devices. Syntax of message includes the type of data, composition of
message and sequencing of message. The starting 8 bits of data is considered as the
address of the sender. The next 8 bits is considered to be the address of the receiver.
The remaining bits are considered as the message itself.
 Semantics : Semantics defines data transmitted between devices. It provides rules
and norms for understanding message or data element values and actions.
 Timing : Timing refers to the synchronization and coordination between devices
while transferring the data. Timing ensures at what time data should be sent and how
21. Robert Onsare
fast data can be sent. For example, If a sender sends 100 Mbps but the receiver can
only handle 1 Mbps, the receiver will overflow and lose data. Timing ensures
preventing data loss, collisions and other timing related issues.
 Sequence control : Sequence control ensures the proper ordering of data packets.
The main responsibility of sequence control is to acknowledge the data while it get
received, and the retransmission of lost data. Through this mechanism the data is
delivered in correct order.
 Flow Control : Flow control regulates device data delivery. It limits the sender’s
data or asks the receiver if it’s ready for more. Flow control prevents data congestion
and loss.
 Error Control : Error control mechanisms detect and fix data transmission faults.
They include error detection codes, data resend, and error recovery. Error control
detects and corrects noise, interference, and other problems to maintain data
integrity.
 Security : Network security safeguards data confidentiality, integrity, and
authenticity. which includes encryption, authentication, access control, and other
security procedures. Network communication’s privacy and trustworthiness are
protected by security standards.
Standards
Standards are the set of rules for data communication that are needed for exchange of
information among devices. It is important to follow Standards which are created by
various Standard Organization like IEEE , ISO , ANSI etc.
Types of Standards
Standards are of two types :
 De Facto Standard.
 De Jure Standard.
De Facto Standard : The meaning of the work ” De Facto ” is ” By Fact ” or “By
Convention”.These are the standard s that have not been approved by any Organization
, but have been adopted as Standards because of it’s widespread use. Also , sometimes
these standards are often established by Manufacturers.
For example : Apple and Google are two companies which established their own rules
on their products which are different . Also they use some same standard rules for
manufacturing for their products.
De Jure Standard : The meaning of the word “De Jure” is “By Law” or
“By Regulations”.Thus , these are the standards that have been approved by officially
recognized body like ANSI , ISO , IEEE etc. These are the standard which are important
to follow if it is required or needed.
For example : All the data communication standard protocols like SMTP , TCP , IP
, UDP etc. are important to follow the same when we needed them.

22. Robert Onsare


Types of Protocol
 Network Layer Protocols : Network layer protocols operate in the network layer
which is also known as the Layer 3 of the network architecture. Network layer
protocols are responsible for packet routing, forwarding and addressing of data
packets throughout the network . IP and ICMP are the network layer protocols.
 Transport layer Protocols : Transport layer protocols works in transport layer which
provides end-to-end service ensuring data transfer across apps on different
devices. TCP and UDP are the most popular transport layer protocols.
 Application Layer Protocol : Application layer protocol working in the application
layer of the network architecture provides communication between applications
running on different devices. The application layer protocols enable cross-device
communication. They format, exchange, and interpret application data. HTTP, FTP,
and SMTP are examples.
 Wireless Protocols : Wireless protocols basically used in wireless communication
which enables data transfer through wireless networks. Bluetooth, Wi-Fi, and LTE
protocols are examples.
 Routing Protocols : Routing protocol establishes the best/optimal network pathways
throughout the network for fastest data transmission. Routers share information to
develop and maintain routing tables. RIP, OSPF, and BGP are examples.
 Security Protocols : security protocol protects data confidentiality, integrity, and
authenticity while transmission of data over the network. They include SSL and
TLS, encryption methods, and authentication protocols for providing data security.
 Internet Protocols : IP identifies devices uniquely. Internet protocol provides data
communication through routing and forwarding data packets from one device to
another by unique addressing scheme.
Protocol and Standard Compliance in Network Security
Protocol and standard compliance protects data, resources, and networks. Protocol and
standard compliance are crucial to network security for these reasons:
 Interoperability : Protocols and standards allow devices and systems to
communicate. These protocols ensure network components can function together,
avoiding risks and security gaps produced by incompatible or unsupported systems.
 Security Baseline : Protocols and standards contain security principles and best
practices that help secure network infrastructure. These protocols allow
organizations to protect sensitive data via encryption, authentication, and access
controls.
 Vulnerability Management : Network security protocols and standards help
organizations find and fix vulnerabilities. Many standards requires regular security
assessments, vulnerability scanning, and penetration testing to discover network
infrastructure flaws. Organizations can prevent cyberattacks and address
vulnerabilities by following these compliance criteria.

23. Robert Onsare


Conclusion

Protocols and standards enable secure and efficient computer network communication.
They regulate data exchange, formatting, endpoints, and reliable device
communication.
These protocols and standards ensure network security and performance. Complying
can prevent data breaches and system breakdowns.

TCP/IP MODEL
The OSI Model we just looked at is just a reference/logical model. It was designed to
describe the functions of the communication system by dividing the communication
procedure into smaller and simpler components.
TCP/IP was designed and developed by the Department of Defense (DoD) in the 1960s
and is based on standard protocols. It stands for Transmission Control Protocol/Internet
Protocol. The TCP/IP model is a concise version of the OSI model. It contains four
layers, unlike the seven layers in the OSI model.
The number of layers is sometimes referred to as five or four. Here In this article, we’ll
study five layers. The Physical Layer and Data Link Layer are referred to as one single
layer as the ‘Physical Layer’ or ‘Network Interface Layer’ in the 4-layer reference.
What Does TCP/IP Do?
The main work of TCP/IP is to transfer the data of a computer from one device to
another. The main condition of this process is to make data reliable and accurate so that
the receiver will receive the same information which is sent by the sender. To ensure
that, each message reaches its final destination accurately, the TCP/IP model divides its
data into packets and combines them at the other end, which helps in maintaining the
accuracy of the data while transferring from one end to another end.
What is the Difference between TCP and IP?
TCP and IP are different protocols of Computer Networks. The basic difference
between TCP (Transmission Control Protocol) and IP (Internet Protocol) is in the
transmission of data. In simple words, IP finds the destination of the mail and TCP has
the work to send and receive the mail. UDP is another protocol, which does not require
IP to communicate with another computer. IP is required by only TCP. This is the basic
difference between TCP and IP.
How Does the TCP/IP Model Work?
Whenever we want to send something over the internet using the TCP/IP Model, the
TCP/IP Model divides the data into packets at the sender’s end and the same packets
have to be recombined at the receiver’s end to form the same data, and this thing
happens to maintain the accuracy of the data. TCP/IP model divides the data into a 4-
layer procedure, where the data first go into this layer in one order and again in reverse
order to get organized in the same way at the receiver’s end.
For more, you can refer to TCP/IP in Computer Networking.
24. Robert Onsare
Layers of TCP/IP Model
1. Application Layer
2. Transport Layer(TCP/UDP)
3. Network/Internet Layer(IP)
4. Data Link Layer (MAC)
5. Physical Layer
The diagrammatic comparison of the TCP/IP and OSI model is as follows:

TCP/IP and OSI

1. Physical Layer
It is a group of applications requiring network communications. This layer is
responsible for generating the data and requesting connections. It acts on behalf of the
sender and the Network Access layer on the behalf of the receiver. During this article,
we will be talking on the behalf of the receiver.
2. Data Link Layer
The packet’s network protocol type, in this case, TCP/IP, is identified by the data-link
layer. Error prevention and “framing” are also provided by the data-link layer. Point-
to-Point Protocol (PPP) framing and Ethernet IEEE 802.2 framing are two examples of
data-link layer protocols.
3. Internet Layer
This layer parallels the functions of OSI’s Network layer. It defines the protocols which
are responsible for the logical transmission of data over the entire network. The main
protocols residing at this layer are as follows:
 IP: IP stands for Internet Protocol and it is responsible for delivering packets from
the source host to the destination host by looking at the IP addresses in the packet
headers. IP has 2 versions: IPv4 and IPv6. IPv4 is the one that most websites are
using currently. But IPv6 is growing as the number of IPv4 addresses is limited in
number when compared to the number of users.

25. Robert Onsare


 ICMP: ICMP stands for Internet Control Message Protocol. It is encapsulated
within IP datagrams and is responsible for providing hosts with information about
network problems.
 ARP: ARP stands for Address Resolution Protocol. Its job is to find the hardware
address of a host from a known IP address. ARP has several types: Reverse ARP,
Proxy ARP, Gratuitous ARP, and Inverse ARP.
The Internet Layer is a layer in the Internet Protocol (IP) suite, which is the set of
protocols that define the Internet. The Internet Layer is responsible for routing packets
of data from one device to another across a network. It does this by assigning each
device a unique IP address, which is used to identify the device and determine the route
that packets should take to reach it.
Example: Imagine that you are using a computer to send an email to a friend. When you
click “send,” the email is broken down into smaller packets of data, which are then sent
to the Internet Layer for routing. The Internet Layer assigns an IP address to each packet
and uses routing tables to determine the best route for the packet to take to reach its
destination. The packet is then forwarded to the next hop on its route until it reaches its
destination. When all of the packets have been delivered, your friend’s computer can
reassemble them into the original email message.
In this example, the Internet Layer plays a crucial role in delivering the email from your
computer to your friend’s computer. It uses IP addresses and routing tables to determine
the best route for the packets to take, and it ensures that the packets are delivered to the
correct destination. Without the Internet Layer, it would not be possible to send data
across the Internet.
4. Transport Layer
The TCP/IP transport layer protocols exchange data receipt acknowledgments and
retransmit missing packets to ensure that packets arrive in order and without error. End-
to-end communication is referred to as such. Transmission Control Protocol (TCP) and
User Datagram Protocol are transport layer protocols at this level (UDP).
 TCP: Applications can interact with one another using TCP as though they were
physically connected by a circuit. TCP transmits data in a way that resembles
character-by-character transmission rather than separate packets. A starting point
that establishes the connection, the whole transmission in byte order, and an
ending point that closes the connection make up this transmission.
 UDP: The datagram delivery service is provided by UDP, the other transport layer
protocol. Connections between receiving and sending hosts are not verified by
UDP. Applications that transport little amounts of data use UDP rather than TCP
because it eliminates the processes of establishing and validating connections.
5. Application Layer
This layer is analogous to the transport layer of the OSI model. It is responsible for end-
to-end communication and error-free delivery of data. It shields the upper-layer
applications from the complexities of data. The three main protocols present in this layer
are:
 HTTP and HTTPS: HTTP stands for Hypertext transfer protocol. It is used by the
World Wide Web to manage communications between web browsers and servers.
HTTPS stands for HTTP-Secure. It is a combination of HTTP with SSL(Secure

26. Robert Onsare


Socket Layer). It is efficient in cases where the browser needs to fill out forms,
sign in, authenticate, and carry out bank transactions.
 SSH: SSH stands for Secure Shell. It is a terminal emulations software similar to
Telnet. The reason SSH is preferred is because of its ability to maintain the
encrypted connection. It sets up a secure session over a TCP/IP connection.
 NTP: NTP stands for Network Time Protocol. It is used to synchronize the clocks
on our computer to one standard time source. It is very useful in situations like
bank transactions. Assume the following situation without the presence of NTP.
Suppose you carry out a transaction, where your computer reads the time at 2:30
PM while the server records it at 2:28 PM. The server can crash very badly if it’s
out of sync.
The host-to-host layer is a layer in the OSI (Open Systems Interconnection) model that
is responsible for providing communication between hosts (computers or other devices)
on a network. It is also known as the transport layer.
Some common use cases for the host-to-host layer include:
1. Reliable Data Transfer: The host-to-host layer ensures that data is transferred
reliably between hosts by using techniques like error correction and flow control.
For example, if a packet of data is lost during transmission, the host-to-host layer
can request that the packet be retransmitted to ensure that all data is received
correctly.
2. Segmentation and Reassembly: The host-to-host layer is responsible for breaking
up large blocks of data into smaller segments that can be transmitted over the
network, and then reassembling the data at the destination. This allows data to be
transmitted more efficiently and helps to avoid overloading the network.
3. Multiplexing and Demultiplexing: The host-to-host layer is responsible for
multiplexing data from multiple sources onto a single network connection, and
then demultiplexing the data at the destination. This allows multiple devices to
share the same network connection and helps to improve the utilization of the
network.
4. End-to-End Communication: The host-to-host layer provides a connection-
oriented service that allows hosts to communicate with each other end-to-end,
without the need for intermediate devices to be involved in the communication.
Example: Consider a network with two hosts, A and B. Host A wants to send a file to
host B. The host-to-host layer in host A will break the file into smaller segments, add
error correction and flow control information, and then transmit the segments over the
network to host B. The host-to-host layer in host B will receive the segments, check for
errors, and reassemble the file. Once the file has been transferred successfully, the host-
to-host layer in host B will acknowledge receipt of the file to host A.
In this example, the host-to-host layer is responsible for providing a reliable connection
between host A and host B, breaking the file into smaller segments, and reassembling
the segments at the destination. It is also responsible for multiplexing and
demultiplexing the data and providing end-to-end communication between the two
hosts.

27. Robert Onsare


Other Common Internet Protocols
TCP/IP Model covers many Internet Protocols. The main rule of these Internet Protocols
is how the data is validated and sent over the Internet. Some Common Internet Protocols
include:
 HTTP (Hypertext Transfer Protocol): HTTP takes care of Web Browsers and
Websites.
 FTP (File Transfer Protocol): FTP takes care of how the file is to be sent over the
Internet.
 SMTP (Simple Mail Transfer Protocol): SMTP is used to send and receive data.
Difference between TCP/IP and OSI Model
TCP/IP OSI

TCP refers to Transmission Control OSI refers to Open Systems


Protocol. Interconnection.

TCP/IP uses both the session and


OSI uses different session and
presentation layer in the application layer
presentation layers.
itself.

TCP/IP follows connectionless a


OSI follows a vertical approach.
horizontal approach.

The Transport layer in TCP/IP does not In the OSI model, the transport layer
provide assurance delivery of packets. provides assurance delivery of packets.

While in the OSI model, Protocols are


Protocols cannot be replaced easily in
better covered and are easy to replace
TCP/IP model.
with the technology change.

TCP/IP model network layer only provides Connectionless and connection-oriented


connectionless (IP) services. The transport services are provided by the network
layer (TCP) provides connections. layer in the OSI model.

FAQ:
Q.1 Which IP Addresses Do TCP/IP Work With?
Answer:
TCP/IP generally works with both the IP that is, IPv4 and IPv6. If you are using IPv4
or IPv6, it seems that you are already working on TCP/IP Model.

28. Robert Onsare

You might also like