Beruflich Dokumente
Kultur Dokumente
Discuss its
significance and working with the help of a diagram.
ANS OSI model (Open Systems Interconnection)
IT professionals use OSI to model or trace how data is sent or received over a
network. This model breaks down data transmission over a series of seven layers,
each of which is responsible for performing specific tasks concerning sending and
receiving data.
The main concept of OSI is that the process of communication between two
endpoints in a network can be divided into seven distinct groups of related
functions, or layers. Each communicating user or program is on a device that can
provide those seven layers of function.
In this architecture, each layer serves the layer above it and, in turn, is served by
the layer below it. So, in a given message between users, there will be a flow of
data down through the layers in the source computer, across the network, and then
46
up through the layers in the receiving computer. Only the application layer, at the
top of the stack, doesn’t provide services to a higher-level layer.
47
Layer 7: The application layer: Enables the user (human or software) to
interact with the application or network whenever the user elects to read
messages, transfer files or perform other network-related activities. Web
browsers and other internet-connected apps, such as Outlook and Skype, use
Layer 7 application protocols.
Layer 6: The presentation layer: Translates or formats data for the
application layer based on the semantics or syntax that the application
accepts. This layer is also able to handle the encryption and decryption that
the application layer requires.
Layer 5: The session layer: Sets up, coordinates and terminates
conversations between applications. Its services include authentication and
reconnection after an interruption. This layer determines how long a system
will wait for another application to respond. Examples of session layer
protocols include X.225, AppleTalk and Zone Information Protocol (ZIP).
Layer 4: The transport layer: Is responsible for transferring data across a
network and provides error-checking mechanisms and data flow controls. It
determines how much data to send, where it gets sent and at what rate. The
Transmission Control Protocol is the best known example of the transport
layer.
Layer 3: The network layer: Primary function is to move data into and
through other networks. Network layer protocols accomplish this by
packaging data with correct network address information, selecting the
appropriate network routes and forwarding the packaged data up the stack to
the transport layer.
Layer 2: The data-link layer: The protocol layer in a program that handles
the moving of data into and out of a physical link in a network. This layer
handles problems that occur as a result of bit transmission errors. It ensures
that the pace of the data flow doesn’t overwhelm the sending and receiving
devices. This layer also permits the transmission of data to Layer 3,
the network layer, where it is addressed and routed.
Layer 1: The physical layer: Transports data using electrical, mechanical
or procedural interfaces. This layer is responsible for sending computer bits
from one device to another along the network. It determines how physical
connections to the network are set up and how bits are represented into
48
predictable signals as they are transmitted either electrically, optically or via
radio waves.
Cross layer functions
Cross-layer functions, services that may affect more than one layer, include:
ARP -- translates IPv4 addresses (OSI layer 3) into Ethernet MAC addresses
(OSI layer 2).
49
Q 11 Explain the working of TCP/IP model with the help of diagrams.
The entire internet protocol suite -- a set of rules and procedures -- is commonly
referred to as TCP/IP, though others are included in the suite.
TCP/IP specifies how data is exchanged over the internet by providing end-to-end
communications that identify how it should be broken into packets, addressed,
transmitted, routed and received at the destination. TCP/IP requires little central
management, and it is designed to make networks reliable, with the ability to
recover automatically from the failure of any device on the network.
The two main protocols in the internet protocol suite serve specific
functions. TCP defines how applications can create channels of communication
across a network. It also manages how a message is assembled into
smaller packets before they are then transmitted over the internet and reassembled
in the right order at the destination address.
IP defines how to address and route each packet to make sure it reaches the right
destination. Each gateway computer on the network checks this IP address to
determine where to forward the message.
The transport layer itself, however, is stateful. It transmits a single message, and its
connection remains in place until all the packets in a message have been received
and reassembled at the destination.
50
Importance of TCP/IP
The TCP/IP model differs slightly from the seven-layer Open Systems
Interconnection (OSI) networking model designed after it, which defines how
applications can communicate over a network.
TCP/IP functionality is divided into four layers, each of which include specific
protocols.
51
Transfer Protocol (SMTP) and Simple Network Management Protocol
(SNMP).
The network layer, also called the internet layer, deals with packets and
connects independent networks to transport the packets across network
boundaries. The network layer protocols are the IP and the Internet Control
Message Protocol (ICMP), which is used for error reporting.
The physical layer consists of protocols that operate only on a link -- the
network component that interconnects nodes or hosts in the network. The
protocols in this layer include Ethernet for local area networks (LANs) and
the Address Resolution Protocol (ARP).
52
Q12 what are network protocols? How are they classified? Discuss in
detail.
ANS Network protocols are formal standards and policies comprised of rules,
procedures and formats that define communication between two or more devices
over a network. Network protocols govern the end-to-end processes of timely,
secure and managed data or network communication.
53
1. Transmission Control Protocol (TCP): TCP is a popular communication
protocol which is used for communicating over a network. It divides any message
into series of packets that are sent from source to destination and there it gets
reassembled at the destination.
2. Internet Protocol (IP): IP is designed explicitly as addressing protocol. It is
mostly used with TCP. The IP addresses in packets help in routing them through
different nodes in a network until it reaches the destination system. TCP/IP is the
most popular protocol connecting the networks.
3. User Datagram Protocol (UDP): UDP is a substitute communication protocol to
Transmission Control Protocol implemented primarily for creating loss-tolerating
and low-latency linking between different applications.
4. Post office Protocol (POP): POP3 is designed for receiving incoming E-mails.
54
6. File Transfer Protocol (FTP): FTP allows users to transfer files from one
machine to another. Types of files may include program files, multimedia files,
text files, and documents, etc.
7. Hyper Text Transfer Protocol (HTTP): HTTP is designed for transferring a
hypertext among two or more systems. HTML tags are used for creating links.
These links may be in any form like text or images. HTTP is designed on Client-
server principles which allow a client system for establishing a connection with
the server machine for making a request. The server acknowledges the request
initiated by the client and responds accordingly.
8. Hyper Text Transfer Protocol Secure (HTTPS): HTTPS is abbreviated as
Hyper Text Transfer Protocol Secure is a standard protocol to secure the
communication among two computers one using the browser and other fetching
data from web server. HTTP is used for transferring data between the client
browser (request) and the web server (response) in the hypertext format, same in
case of HTTPS except that the transferring of data is done in an encrypted format.
So it can be said that https thwart hackers from interpretation or modification of
data throughout the transfer of packets.
9. Telnet: Telnet is a set of rules designed for connecting one system with another.
The connecting process here is termed as remote login. The system which
requests for connection is the local computer, and the system which accepts the
connection is the remote computer.
10. Gopher: Gopher is a collection of rules implemented for searching, retrieving as
well as displaying documents from isolated sites. Gopher also works on the
client/server principle.
55