Computer Network Tutorial

Introduction of Computer Network Types of Computer Network Network Topology Computer Networking Architecture Transmission Modes (Data Flow) Basic Networking Devices Integrate Services Digital Network (ISDN)

Model

OSI Model TCP/IP Model

Physical Layer

Digital Transmission Analog Transmission Transmission Media Switching

Data Link Layer

Error detection and Error correction Data Link Control Multiple Access Aloha

Network Layer

Network Layer - Logical Address Address Mapping Unicast Routing Protocol

Transport Layer

Process to Process Delivery User Datagram Protocol Transmission Control Protocol Stream Control Transmission Protocol Session Layer and Presentation Layer

Application Layer

Domain Name System Application Protocol E-mail Cryptography

Misc

Classes of Routing Protocols Classification of Routing Algorithms Controlled Access Protocols in Computer Networks Differences between IPv4 and IPv6 Fixed and Flooding Routing Algorithms Advantages and Disadvantages of Fibre Optics Cable APIPA Difference between Active and Passive FTP Fiber Optics and its Types Method of Joining and Fusion of Fiber Optic Cable Define Framing in Computer Network Disadvantages of Computer Network Mesh Topology Diagram in Computer Network Ring Topology in Computer Network Star Topology in Computer Networks 4G Mobile Communication Technology Advantages and Disadvantages of LAN Advantages and Disadvantages of MAN Advantages and Disadvantages of WAN Application Layer in OSI Model Cyclic Redundancy Check Example Data link layer in OSI model Difference between Transport and Network Layer Hamming Code Example Network Layer in OSI Model Session Layer in OSI Model Transport Layer in OSI Model Two Port Network in Computer Networks Uses of Computer Networks What is Computer Network What is Framing in a Computer Network Advantages and Disadvantages of Bus Topology Difference between Star Topology and Bus Topology Subnetting in Computer Network Subnetting Questions and Answers What is Bus Topology What is Network Topology and Types in Computer Networks Access Control in Networking Basic Characteristics of Computer Network Benefits of SOCKS5 Proxy in Computer Networks Computer Network viva Questions Difference between BOOTP and RARP Difference Between Network Topologies and Network Protocols Difference between NFC and RFID Difference Between Point-to-Point Link and star Topology Network Differences Between MSS and MTU Differences Between Trunk Port and Access Port Different Modes of Communication in Computer Networks MIME Protocol in Computer Networks Modes of Communication in Computer Networks Network Attack in Computer Network Port Address in Networking Simplest Protocol in Computer Network Sliding Window Protocol in Computer Network Stop And Wait Protocol in Computer Networks TCP 3-Way Handshake Process in Computer Networks What is a Proxy Server What is APPN What is ICMP Protocol What is Point-to-Point Protocol What is Port Address in Networking What is the HDLC Protocol What is VRRP Protocol Difference Between Analog and Digital Signals Difference Between Hub and Repeater Difference between Repeater and Switch Difference Between Transparent Bridge and Source Routing Bridge Source Routing Bridge in Computer Networks Transparent Bridge in Computer Networks Transport Protocol in Computer Networks Types of CSMA in Computer Networks What is Wired and Wireless Networking Network Security in Computer Network Disadvantages of Extranet Difference Between TELNET and FTP Define Protocol in Computer Networks Guided Transmission Media in Computer Network What is a Gateway in a Computer Network IGMP in Computer Networks LAN Protocols in Computer Networks MAN Meaning in Computer Modulation Techniques in Computer Networks Switching in DCN TCP/IP Applications What is IGMP? What is Modem in Networking What is Non-Persistent CSMA Difference between Cell Splitting and Cell Sectoring Forouzen Computer Network Open Loop and Closed Loop Congestion Control Types of Cluster Computing WAP-Wireless Access Point What are the elements of the Transport Protocol Difference between Gateway and Switch Flow Control in Data Link Layer Body Area Network Flooding in Computer Network Token Ring in Computer Networks VoIP in Computer Networks What is Infrared Transmission Congestion Control Techniques Forward Error Correction (FEC) Switching Techniques What is Telnet in Computer Network What are the Types of IPv4 Addresses IEEE 802.6 (DQDB) IEEE 802.15.4 Technology What is HDLC (High-level Data Link Control)? What is SMS Hubbing in Telecom? Circuit Switching in Computer Networks Communication Satellites in Computer Networks Features of HTTP Protocol IMAP4 (Internet Message Access Protocol) Internet Services How to Set up a Wireless Router Internetwork Routing in Computer Networks Distributed Computing System Features of GSM The 802.11 MAC Sublayer Protocol What is IEEE 802.3? What are Hubs and Switches in Computer Networks? What is Modem in a Computer Network? What is multicasting in Computer Networks? GSM -The Mobile Station What is Network Server? Slotted Aloha in Computer Network What is Ethernet in Computer Networks What is Arpanet? Radio Access Network (RAN) TCP 3-Way Handshake Process PING SWEEP (ICMP SWEEP) Print Server Private IP Address Security Services in Computer Networks Protocol Data Unit (PDU) CSMA with Collision Avoidance (CSMA/CA) What is Gateway in Computer Network? Advantages of Networking Data Link Layer Design Issues DHCP in Computer Networks Internet Security Association and Key Management Protocol (ISAKMP) What is Switch Hub? Telnet Full form in Networking Multimedia Systems Quality of Service in Computer Networks What is Carrier Sense Multiple Access (CSMA)? What is Circuit Switching What is Duplex Network? What is Web Protocol Network LAN Technologies Classes in Computer Network Low-Density Parity Check (LDPC) Wireless Internet Service Providers(Wisps) What is Handshaking? Cache Server What Is WSN Network? Check Sum Error Detection Linear Bus Topology Functions of the Transport Layer Infrared Transmission in Computer Networks Digital Signal in Computer Network Digital Data Transmission in Computer Networks Define Checksum with Example Computer Network Security Requirements Brust Errors in Computer Network Back Side Bus (BSB) 2-Dimension Parity Check in Computer Network Router and Brouter Microwave Transmission in Computer Networks Magnetic Media in Computer Network A One-Bit Sliding Window Protocol CDMA-Near-Far Problem Reference Models in Computer Networks Uni-cast, Broadcast, and Multicast in Computer Networks Uses Of Bridges in Computer Networks What are Gateways in Computer Network? How to Set Up a Home Network – A 7-Step Guide GSM in Computer Networks Multicast Routing Protocols in Computer Networks Network Components Types of Ethernet in Computer Networks BGP vs.EIGRP-What's the difference? Green Cloud Computing and its Strategies Packet Switching Router in Computer Network Advantages and Disadvantages of Routers ATM Network Automatic Repeat ReQuest (ARQ) Static Routing Algorithms in Computer Network TDMA – Technology Data Link Layer services provided to the Network Layer Transmission Impairments in Computer Networks Types of Modems What are Elementary Data Link Layer Protocols What is an Ad-hoc Network? What is the IEEE 802.11 Wireless LAN Standards? What Is Tunneling in Computer Networks? What is Twisted Pair Cable Advantages of Unguided Media Ethernet Topology in Computer Network Optical Fiber Modes and Configurations Optical Sources in Optical Fiber Communication 4 Layers of TCP/IP Hierarchical Routing Algorithm in Computer Networks Meaning of Data Communication Metropolitan Area Network Responsibilities of Transport Layer The Functions of Hub in Networking Tree Topology in Computer Network Types of Connections in Computer Network Authentication in Computer Network Buffering in Computer Networks MAC Protocol and its Classification Difference between Circuit Switching and Packet Switching Difference between Session and Cookies Broadcasting in Computer Networks CDMA in Computer Networks CDMA-Technology Components of Computer Network CRC in Data Communication CSMA-CA Protocol in Computer Network Difference between LAN and VLAN DIFFERENCE BETWEEN PHYSICAL AND LOGICAL TOPOLOGY Difference between TDM and FDM Differences Between URL and IP Address Differentiate between Synchronous TDM and Asynchronous TDM in Computer Network Diffеrеntiate Bеtwееn Datagram Approach and Virtual Circuit in Computer Network FDDI in Computer Network Functions of Bridge IEEE 802.11 in Computer Networks Internetworking in Computer Networks MAC in Data Link Layer Mac Sub Layer in Computer Networks MAN Meaning in Computer Radio Wave Transmission Single Sign-On (SSO) Token Passing in Computer Network Types of Data Transmission Types of Transmission Media in Computer Networks Advantagеs and Disadvantagеs of Li-Fi Benefits of Client Server Computing Bus and its Types Characteristics of Analog Signals Characteristics of NOS Choke Packet in Congestion Control Congestion Control Policy CSMA/CA in Computer Network Data Communication and Transmission Techniques Data Compression in Computer Networks Diffеrеncе bеtwееn SSH and Tеlnеt Diffеrеncе bеtwееn Static IP Addrеss and Dynamic IP Addrеssa Fiber Distributed Data Interface Network Time Protocol(NTP) Routing in Adhoc Networks Working of DNS Time Division Multiplexing (TDM) Types of Packet Switching Types of Protocols Types of Transmission Technology Use of Bluetooth in Computer Networks What is BBS? What is Code Correction? IEEE 802.11 Wireless LAN What is Stateless Protocol? Advantages of Networking in Computers DHCP Protocol in Computer Networks Difference between UTP and STP Cable Explain FTP in Computer Network Explain Hierarchical Model Explain HTTP in Computer Network Explain Nested Structure with Example Open Systems Interconnection Model Parallel Database System SMTP in Computer Network Space Division Switching Transmission Control Protocol (TCP) Types of IP Address Types of Routing in Computer Networks What is Duplex Transmission Data Link Layer Protocols Network Layer Protocols Session Layer Protocols

Reference Models in Computer Networks

Reference Models in Computer Networks

What is Reference Model

Reference models are used as a framework which is conceptual, and their purpose is to provide communicational paths among various heterogeneous networks.

In simple words, a reference model of computer networks could be defined as a layout, and its main purpose is to establish a model as to how communication should occur between users and devices.

The main purpose of developing and implementing a reference model is that it will be utilized in providing various standards and mechanisms for creating components of a network. It also plays an important role in implementing multi-vendor communication and its development.

Another main functionality or feature of a reference model is defining and promoting standardization. It is used to describe and authorize which functions are accessed to be performed at which levels.

Mainly, there are two reference models in computer networks. They are:

  1. OSI Reference Model
  2. TCP/IP Reference Model

Let us now understand the functionalities, features, working and implementations of the above-mentioned reference models in computer networks.

OSI Reference Model

Computer networks are being used by lots of users all around the globe. ISO (International Organization of Standardization) is responsible for the development or creation of the OSI model. The OSI model is also referred to as the ISO-OSI model.

OSI Reference model was the initial or first functional model for communications over the network.

Reference Models in Computer Networks

The term OSI stands for Open System Interconnection.

The architecture of the OSI reference model contains seven unique layers or levels. The seven layers of the OSI reference models are interconnected to each other in the architecture.

The layers of the OSI reference model are:

  1. Physical Layer
  2. Data Link Layer
  3. Network Layer
  4. Transport Layer
  5. Session Layer
  6. Presentation Layer
  7. Application Layer

Let us look at the working of these seven layers in a brief manner.

1.Physical Layer

The major functionality of the physical layer in the OSI reference model is to provide a connection between network nodes. The connector, electrical cable or a technology connecting the devices is defined by the physical layer. The physical layer is also responsible for the transfer or transmission of the data, which is in raw format. The raw data can be defined as 0s and 1s.

2.Data Link Layer

The main purpose of the data link layer in the OSI reference model is to establish and terminate a connection which was developed between two nodes which were physically connected on a network. The data link layer breaks the packets of information and converts them into frames. These frames are transmitted from the source to the destination. LLC (Logical Link Control) is used in the identification of network protocols and executes error detection mechanisms. MAC (Media Access Control) utilizes the MAC addresses and connects various devices, and provides access to transfer/receive data. LLC and MAC are the two parts of the Data Link Layer.

3.Network Layer

The network layer in the OSI reference model is use to perform two main operations. One of them is transforming segments into network packets by breaking them up and similarly reassembling the network packets into segments at the receiver's end. Another operation of the network layer in the OSI reference model is identifying the best path over a network and routing packets according to it. Internet protocol addresses are utilized by the network layer to route and transmit packets of data from the source to the destination node.

4.Transport Layer

The transport layer in the OSI reference model takes information or data from the session layer and breaks them into segments. This process is carried out on the receiver's end. Also, the transport layer is the component which will reassemble the broken-down segments and converts them into data. Another major function of the transport layer is that it is utilized to maintain the flow of control and transfer information or data by balancing the connection speed at the receiver's end. It also provides a mechanism for error detection and control and verifies whether the data transfer was successful or not. If not, retransmit it.

5.Session Layer

The session layer in the OSI reference model is utilized for the creation of channels for communication. These channels are also called sessions. The sessions are established and created between devices. The main purpose of the session layer is to create sessions, verify they are accessible and open until the data transmission occurs, and terminate them when the transmission ends. Also, the session layer sets checkpoints at the transfer of data. In case the session gets disrupted or an error occurs, the process can be traced and resumed from the checkpoint.

6.Presentation Layer

The presentation layer in the OSI reference model is used to create or prepare data and information for the application layer. The encoding of the devices is defined and carried out by the presentation layer. Also, the presentation layer compresses the data to make sure it can be safely received at the receiver's end. Any type of data and information transferred or transmitted by the application layer is accepted by the presentation layer, and it prepares it to be transmitted to the session layer.

7.Application Layer

The application layer in the OSI reference model is mainly utilized by the user's end software. The user's end software could be a web browser or email client. Various types of protocols which enable the transfer and receive protocols by the software are provided. There are various protocols of the application layer, and they are HTTP (Hypertext Transfer Protocol), FTP (File Transfer Protocol), SMTP (Simple Mail Transfer Protocol), DNS (Domain Name System), POP (Post Office Protocol) etc.

Let us look at the pros and cons of the OSI reference model over the years.

Pros of OSI Model

  • The OSI reference model is considered to be a generic type of model. It also acts as a tool for guidance which can be utilized for the development of any network model.
  • Another important advantage of the OSI reference model is that it is a layered model, meaning that it offers all the features where there is the minimum change between layers.
  • There is another important advantage of the OSI reference model, which is, it can distinctly divide various types of services, interfaces, and protocols. This proves that the OSI reference model is flexible. Also, the protocols in every layer are easily replaced, and they are dependent on the network and its nature.
  • The final advantage of the OSI reference model in computer networks is that it provides and supports both types of services; connection-oriented and connection-less services.

Cons of OSI Model

  • One of the major disadvantages of the OSI reference model is that it is considered as a major theoretical model. Also, it does not utilize the usage and features of various technologies. Its real-time implementation is restricted by this con.
  • Another major disadvantage or con of the OSI reference model in computer networks is its time of release or launching time. There were various TCP/IP protocols available when the OSI reference model was launched. This led to the ignorance of the OSI reference model by companies.
  • One of the biggest cons or disadvantages of the OSI reference model is that it is considered to be very complex. Also, the implementation and the maintaining of it was considered to be very costly and time-consuming.
  • Even though the OSI reference model consists of seven layers in its architecture, a few layers have fewer features and functionality in it. The layers are session and presentation layers. These layers have lesser operations and functionalities as compared to other layers in the OSI reference model.
  • Another major disadvantage of the OSI reference model is that it fails to meet practical needs and is not as efficient and useful as TCP/IP reference model.

TCP/IP Reference Model

TCP is also known as Transmission Control Protocol. IP is also known as Internet Protocol. DoD (Department of Defence) was responsible for the successful creation of the TCP/IP reference model in the late 1960s. The TCP/IP reference model is purely based on standard protocols. IP is a similar version of another reference model, which is known as the OSI (Open System Interconnection) reference model.

As we learned previously, the OSI reference model contains seven layers in its architecture, whereas the TCP/IP reference model contains only four layers. In a few situations, the layers get incremented to five.

Features

  • One of the major functionalities or operations of the TCP/IP reference model is to transmit data from a source point to a destination point. These source and destination points are of a computer.
  • The main focus of the TCP/IP reference model is to make sure the data which is being transmitted from the source to the destination remains safe. Also, the receiver receives the same information or data.
  • The data which needs to be transmitted will be broken down into smaller parts known as packets to achieve this functionality. On the successful transmission of packets from the source to the destination point, the packets will then be combined to gain the original data or information. Action is performed to maintain the integrity and accuracy of the information being transmitted.

TCP & IP

While TCP stands for Transmission Control Protocol, IP stands for Internet Protocol. Both TCP and IP are identified as two different protocols used in computer networks. The only difference between these two mechanisms lies in the transfer of the data or information. The main functionality of IP is to identify and track the mail and its destination. The main operation of TCP is to provide a safe transfer of data from the source point to the destination.

A similar type of protocol is known as UDP, which means User Datagram Protocol. UDP does not utilize the features and functionalities of the IP, unlike TCP, to establish a connection with other computers.

Working

For instance, a sample of data or information needs to be transmitted over the internet from a source point to a given destination point using the TCP/IP reference model; then, the TCP/IP reference model will initially break down or divide the given data into smaller parts known as packets. After the successful creation of packets, they will be transmitted over the internet to the destination point, and then the packets will be combined to gain the original information or data. This results in higher accuracy and security of the information as the transmission takes place through the internet.

The architecture of the TCP/IP reference model contains four layers and, in a few situations, five layers. Let us now discuss the layers of the TCP/IP reference model.

The layers of the TCP/IP reference model are:

  • Application Layer
  • Transport Layer
  • Network/Internet Layer
  • Data Link Layer
  • Physical Layer

1.Physical Layer

The physical layer in the TCP/IP reference model can be defined as a set of defined applications which are used for the operations of network communications. The generation of data/information and requisition of connections is carried out by the physical layer in the TCP/IP reference model. The physical layer operates by the side of the sender or transmitter of the data.

2.Data Link Layer

The main function of the data link layer in the TCP/IP reference model is to identify the network protocol types of the packets. Other functionalities provided by the data link layer in the TCP/IP reference model are error detection, error prevention and framing. Ethernet IEEE 802.2 and PPP (Point-to-Point Protocol) are the two examples of protocols used in the data link layer.

3.Internet Layer

All available functions of the network layer of the OSI reference model are paralleled by the internet layer in TCP/IP reference model. In TCP/IP reference model, there are certain protocols whose main purpose is to carry out the logical transfer of information and data through the entire network. All those protocols are defined by the internet layer in the TCP/IP reference model.

A few of the protocols defined by the internet layer in the TCP/IP reference model are:

  • IP: The full form of the term IP is Internet Protocol. Data will be divided into packets; the main purpose of IP is to carry out the transmission of those packets from the source point to the destination point by locating and verifying the IP addresses present in the headers of each packet. In TCP/IP reference model, the Internet Protocol has two major versions, and they are IPv4 and IPv6. Currently, all the major websites utilize the IPv4 version. Whereas the usage and implementation of IPv6 are increasing exponentially.
  • ARP: The full form of ARP is Address Resolution Protocol. The purpose of using ARP is to locate the hardware address related to the host using a known IP address. There are various types of ARP, and they are Inverse ARP, Gratuitous ARP and Reverse ARP.

The Internet Protocol Suite contains the Internet layer in it. Internet protocol is mainly utilized in providing a group of protocols which are used in defining the Internet. The routing of data packets from a source point to a destination point is the primary function of the internet layer in the TCP/IP reference model. The main function of the internet layer is carried out by providing each device with a unique IP address. Using the unique IP address, the routing of the packets can be done easily by locating the IP address of the source and destination points.

4.Transport Layer

The transport layer in the TCP/IP reference model is used in providing protocols which are utilized in exchanging receipts of data acknowledgements. Also, another major function of the transport layer is to retransmit the packets which were declared as missing, and this is done to make sure that all the packets arrive in the same order at the destination point. Also, the transmission of the data packets from the source point to the destination point without any errors is another feature of the transport layer in the TCP/IP reference model.

There are mainly two protocols which are provided and utilized by the transport layer in the TCP/IP reference model. They are TCP (Transmission Control Protocol) and UDP (User Datagram Protocol).

5.TCP (Transmission Control Protocol):

When two or more applications interact with one another, it is carried out by the usage of the Transmission Control Protocol. The Transmission Control Protocol follows a character-by-character rule while transmitting data instead of separate packets.

6. UDP (User Datagram Protocol)

User Datagram Protocol provides a datagram delivery service. In UDP, the verification of connections is not followed before and after the process. User Datagram Protocol is mainly used by applications that require the transmission of small amounts of data.

7. Application Layer

The application layer of the TCP/IP reference model is parallel to the transport layer of the OSI reference model. The main functionalities provided by the application layer in the TPC/IP reference model are end-to-end communication with other error detection and error prevention, along with the safe transmission of data from the source point to the destination point. The applications of the upper layers are shielded or protected by the data complexities.

There are mainly three protocols used in the application layer of the TCP/IP reference model. They are HTTP, HTTPS, SSH and NTP.

This was everything related to the Transmission Control Protocol/Internet Protocol reference model in the computer networks. This is the reference model which was derived from the functionalities of the Open System Interconnection reference model.