Escolar Documentos
Profissional Documentos
Cultura Documentos
2 Layers of Networks
logical path
Application layer Application layer
Transport layer (TCP, UDP) Transport layer (TCP, UDP)
†
Internet layer(IP) Internet layer(IP)
† †
† †
The Host - to -Network Layer(Ethernet,Localtalk,FDDI)
† †
physical path
To make this complexity manageable , the different aspect of network
communication are separated into multiple layers. Each layer (see the
picture above )has a limted function . such as each layer will talk to the
† immediate above or below layer only.
†
The Host-to-Network Layer ( also known as Link layer , data link
layer or network -interface layer )
Step 2. As the physical layer is analog and the bits & bytes are digital
this involves a digital -to- analog at the sending end & vice -versa on the
receiving end.
Step 3. As all the real analog system have noise error correction and
redundancy need to be built into the way data is translated into electricity.
All the above steps are done in the DATA LINK LAYER.
The most widely used network layer protocol is the Internet protocol (IP)
Prof.T.N.shanmugam
http://www.annauniv.edu/shan
16.1.2 Layers of Networks
The other protocols used are
Note that each network layer protocol is independant of the lowerr layers.
hence all the above protocols can be used on Ethernet , Token Ring and
other data link layer.
Prof.T.N.shanmugam
http://www.annauniv.edu/shan
16.1.2 Layers of Networks
6) 3 -bit flags The first bit is ‘0’ second bit is ‘0’ if this datagram may be
fragmented , 1 if it may not be ; second bit is ‘0’ if this is the last datagram 1
if there are more fragments.
Number of Nodes through which the datagram can pass before being
discarded; used to avoid infinite loops.
9) 1-byte protocol
Six for TCP, 17 for UDP, or a different number between 0 and 255 for
each of more than 100 different protocols refer the web site
http://www.jsi.edu/in-notes/iana/assignments/protocol-numbers
complete current list.
Prof.T.N.shanmugam
http://www.annauniv.edu/shan
16.1.2 Layers of Networks
Source address
destination address
options
data
Prof.T.N.shanmugam
http://www.annauniv.edu/shan
16.1.2 Layers of Networks
b) UDP ( User Datagram protocol) allows the receiver to detect
corrupted packets but does not guarenty that the packets are delivered in
the correct order , some times it may not be delivered at all and hence not
-reliable
Application Layer .
The layer that delivers data to the user is called the application Layer.
This Layer only decides what to do with the data after it is transfered.
Some of the Application Layer protocols are
a) For the World Wide Web. HTTP : (hyper text transfer protocol)
b) For the e-mail the protocols are SMTP ( Send mail transfer protocol),
POP ( post office protocol) , IMAP
c) For file transfer , FTP , FSP, TFTP
d) For file acess NFS, TELNET
e) For news transfer NNTP
f) Our programs can define their own application layer protocols
whenever necesary.
Prof.T.N.shanmugam
http://www.annauniv.edu/shan