IP NETWORKS
TCP/IP was initially designed to meet the data communication needs of the
U.S. Department of Defence (DOD).
In the late 1960s the Advanced Research Projects Agency (ARPA, now called
DARPA) of the U.S. Department of Defence began a partnership with U.S.
universities and the corporate research community to design open, standard
protocols and build multi-vendor networks.
In 1974, the design for a new set of core protocols, for the ARPANET, was
proposed in a paper by Vinton G. Cerf and Robert E. Kahn. The official name
for the set of protocols was TCP/IP Internet Protocol Suite, commonly referred
to as TCP/IP, which is taken from the names of the network layer protocol
(Internet protocol [IP]) and one of the transport layer protocols (Transmission
Control Protocol [TCP]).
TCP/IP is a set of network standards that specify the details of how computers
communicate, as well as a set of conventions for interconnecting networks and
routing traffic.
By 1985, the ARPANET was heavily used and congested. In response, the National
Science Foundation (NSF) initiated phase one development of the NSFNET. ARPANET
was officially decommissioned in 1989. The NSFNET was composed of multiple
regional networks and peer networks (such as the NASA Science Network) connected to
a major backbone that constituted the core of the overall NSFNET
In its earliest form, in 1986, the NSFNET created a three-tiered network architecture.
The architecture connected campuses and research organisations to regional networks,
which in turn connected to a main backbone linking six nationally funded super-
computer centres. The original links were 56 kbit/s.
The links were upgraded in 1988 to faster T1 (1.544 Mbit/s) links as a result of the NSFNET
1987 competitive solicitation for a faster network service, awarded to Merit Network, Inc.
and its partners MCI, IBM, and the state of Michigan. The NSFNET T1 backbone connected
a total of 13 sites that included Merit, BARRNET, MIDnet, Westnet, NorthWestNet,
SESQUINET, SURANet, NCAR (National Centre of Atmospheric Research), and five NSF
supercomputer centres.
Routing of IP Packets
IP delivers its packets in a connectionless mode. It does not check to see if the
receiving host can accept data. Furthermore it does not keep a copy in case of errors.
IP is therefore said to fire and forget.
When a packet arrives at a router, the router forwards the packet only if it knows a
route to the destination. If it does not know the destination, it drops the packet. In
practice routers rarely drop packets, because they typically have default routes
defined. The router does not send any acknowledgements to the sending device.
A router analyses the checksum. If it is not correct then the packet is dropped. It also
decreases the Time-To-Live (TTL), and if this value is zero then the packet is
dropped. If necessary the router fragments larger packets into smaller ones and ses
flags and Fragment Offset fields accordingly.
Contents
Main features
: When we communicate, we are sharing information. This sharing can be local or remote.
Between individuals, local communication usually occurs face to face, while remote
communication takes place over distance.
8
1. Message. The message is the information (data) to be communicated. Popular forms of
information include text, numbers, pictures, audio, and video.
2. Sender. The sender is the device that sends the data message. It can be a computer,
workstation, telephone handset, video camera, and so on.
3. Receiver. The receiver is the device that receives the message. It can be a computer,
workstation, telephone handset, television, and so on.
4. Transmission medium. The transmission medium is the physical path by which a message
travels from sender to receiver. Some examples of transmission media include twisted-pair wire,
coaxial cable, fiber-optic cable, and radio waves
Introduction to Protocol
Protocol is the special set of rules that end points in a telecommunication connection use when
they communicate. Protocols specify interactions between the communicating entities.
To request any service or exchange any information between 2 programs there must be an agreed
set of commands and data formats, this is a protocol. So, for example, the commands and data
sent between a World Wide Web browser and a remote server are a protocol. The browser
(probably) uses the GET command follow by the name of the required file (page), this protocol
is recognised and understood by the web server program which responds appropriately. Similarly
the format of packets sent between Ethernet cards and their drivers are a protocol. The programs
exchanging messages are called peers.
9
Syntax: The term syntax refers to the structure or format of the data, meaning the order in which
they are presented.
Semantics: The word semantics refers to the meaning of each section of bits. How is a particular
pattern to be interpreted, and what action is to be taken based on that interpretation?
Timing: The term timing refers to two characteristics: when data should be sent and how fast
they can be sent.
Standards provide guidelines to manufacturers, vendors, government agencies, and other service
providers to ensure the kind of interconnectivity necessary in today's marketplace and in
international communication. Standards are developed through the cooperation of standards
creation committees, forums, and government regulatory agencies.
American National Standards Institute (ANSI): Despite its name, the American National
Standards Institute is a completely private, nonprofit corporation not affiliated with the U.S.
federal government. However, all ANSI activities are undertaken with the welfare of the United
States and its citizens occupying primary importance.
Institute of Electrical and Electronics Engineers (IEEE): The Institute of Electrical and
Electronics Engineers is the largest professional engineering society in the world. International in
scope, it aims to advance theory, creativity, and product quality in the fields of electrical
engineering, electronics, and radio as well as in all related branches of engineering.
Electronic Industries Association (EIA): Aligned with ANSI, the Electronic Industries
Association is a nonprofit organization devoted to the promotion of electronics manufacturing
concerns. Its activities include public awareness education and lobbying efforts in addition to
standards development.
10
Communication between two devices can be simplex, half-duplex or full-duplex
Simplex
In simplex mode ,the communication is unidirectional. Only one of the devices on a link can
transmit; the other can only receive.
The keyboard can only introduce input.The monitor can only accept output.
Half-duplex
In half-duplex mode ,each station can both transmit and receive but not at the same time. When
one device is sending ,the other can only receive.
The half-duplex mode is like a one-lane road with two directional traffic. The entire capacity of a
channel is taken over by whichever of the two devices is transmitting at the time.
Full-duplex
11
In full-duplex mode ,both stations can transmit and receive simultaneously. It is like a two-way
street with traffic flowing in both directions at the same time. Signals going in either direction
share the capacity of the link.
The full duplex is like a two way street with traffic flowing in both directions at the same time.
Signals going in either direction share the capacity of the link.
When two people are communicating by a telephone line ,both can listen and talk at the same
time.
Definition :
A connected collection of hardware and software that permits information exchange and resource
sharing information = data, text, audio, video, images, resources such as printers, memory,
link bandwidth
12
Local Area Network (LAN)
It is also called LAN and designed for small physical areas such as an office, group of buildings
or a factory. LANs are used widely as it is easy to design and to troubleshoot. Personal
computers and workstations are connected to each other through LANs. We can use different
types of topologies through LAN, these are Star, Ring, Bus, Tree etc.
LAN can be a simple network like connecting two computers, to share files and network among
each other while it can also be as complex as interconnecting an entire building.
LAN networks are also widely used to share resources like printers, shared hard-drive etc.
13
Applications of LAN
One of the computer in a network can become a server serving all the remaining computers
called clients. Software can be stored on the server and it can be used by the remaining
clients.
Connecting Locally all the workstations in a building to let them communicate with each
other locally without any internet access.
Sharing common resources like printers etc are some common applications of LAN.
14
maintain. Communication medium used by WAN are PSTN or Satellite links. WAN operates on
low data rates.
15
Introduction to TCP/IP REFERENCE Model
TCP/IP is transmission control protocol and internet protocol. Protocols are set of rules which
govern every possible communication over the internet. These protocols describe the movement
of data between the host computers or internet and offers simple naming and addressing
schemes.
TCP/IP Reference model is explained in details other chapter.
16
ISO/OSI Model in Communication Networks
There are n numbers of users who use computer network and are located over the world. So to
ensure, national and worldwide data communication, systems must be developed which are
compatible to communicate with each other. ISO has developed this. ISO stands for International
organization of Standardization. This is called a model for Open System Interconnection (OSI)
and is commonly known as OSI model.
The ISO-OSI model is a seven layer architecture. It defines seven layers or levels in a complete
communication system.
17
Feature of OSI Model :
1. Big picture of communication over network is understandable through this OSI model.
2. We see how hardware and software work together.
3. We can understand new technologies as they are developed.
4. Troubleshooting is easier by separate networks.
5. Can be used to compare basic functional relationships on different networks.
18
Functions of Different Layers :
Layer 1: The Physical Layer :
1. Data link layer synchronizes the information which is to be transmitted over the physical
layer.
2. The main function of this layer is to make sure data transfer is error free from one node to
another, over the physical layer.
3. Transmitting and receiving data frames sequentially is managed by this layer.
4. This layer sends and expects acknowledgements for frames received and sent respectively.
Resending of non-acknowledgement received frames is also handled by this layer.
5. This layer establishes a logical layer between two nodes and also manages the Frame traffic
control over the network. It signals the transmitting node to stop, when the frame buffers are
full.
1. It routes the signal through different channels from one node to other.
2. It acts as a network controller. It manages the Subnet traffic.
19
3. It decides by which route data should take.
4. It divides the outgoing messages into packets and assembles the incoming packets into
messages for higher levels.
Transport layer breaks the message (data) into small units so that they are handled more
efficiently by the network layer.
1. Session layer manages and synchronize the conversation between two different applications.
2. Transfer of data from source to destination session layer streams of data are marked and are
resynchronized properly, so that the ends of the messages are not cut prematurely and data
loss is avoided.
1. Presentation layer takes care that the data is sent in such a way that the receiver will
understand the information (data) and will be able to use the data.
2. While receiving the data, presentation layer transforms the data to be ready for the
application layer.
20
3. Languages(syntax) can be different of the two communicating systems. Under this condition
presentation layer plays a role of translator.
4. It perfroms Data compression, Data encryption, Data conversion etc.
1. OSI model distinguishes well between the services, interfaces and protocols.
2. Protocols of OSI model are very well hidden.
3. Protocols can be replaced by new protocols as technology changes.
4. Supports connection oriented services as well as connectionless service.
21
This layer defines electrical and physical details represented as 0 or a 1. How many pins a
network will contain, when the data can be transmitted or not and how the data would be
synchronized.
1. Representation of Bits: Data in this layer consists of stream of bits. The bits must be encoded
into signals for transmission. It defines the type of encoding i.e. how 0s and 1s are changed
to signal.
2. Data Rate: This layer defines the rate of transmission which is the number of bits per second.
3. Synchronization: It deals with the synchronization of the transmitter and receiver. The sender
and receiver are synchronized at bit level.
4. Interface: The physical layer defines the transmission interface between devices and
transmission medium.
5. Line Configuration: This layer connects devices with the medium: Point to Point
configuration and Multipoint configuration.
6. Topologies: Devices must be connected using the following topologies: Mesh, Star, Ring and
Bus.
7. Transmission Modes: Physical Layer defines the direction of transmission between two
devices: Simplex, Half Duplex, Full Duplex.
8. Deals with baseband and broadband transmission.
22
DATA LINK Layer - OSI Model
Data link layer is most reliable node to node delivery of data. It forms frames from the packets
that are received from network layer and gives it to physical layer. It also synchronizes the
information which is to be transmitted over the data. Error controlling is easily done. The
encoded data are then passed to physical.
Error detection bits are used by the data link layer. It also corrects the errors. Outgoing messages
are assembled into frames. Then the system waits for the acknowledgements to be received after
the transmission. It is reliable to send message.
1. Framing: Frames are the streams of bits received from the network layer into manageable
data units. This division of stream of bits is done by Data Link Layer.
2. Physical Addressing: The Data Link layer adds a header to the frame in order to define
physical address of the sender or receiver of the frame, if the frames are to be distributed to
different systems on the network.
23
3. Flow Control: A flow control mechanism to avoid a fast transmitter from running a slow
receiver by buffering the extra bit is provided by flow control. This prevents traffic jam at the
receiver side.
4. Error Control: Error control is achieved by adding a trailer at the end of the frame.
Duplication of frames are also prevented by using this mechanism. Data Link Layers adds
mechanism to prevent duplication of frames.
5. Access Control: Protocols of this layer determine which of the devices has control over the
link at any given time, when two or more devices are connected to the same link.
24
FUNCTIONS OF NETWORK LAYER:
1. It translates logical network address into physical address. Concerned with circuit, message
or packet switching.
2. Routers and gateways operate in the network layer. Mechanism is provided by Network
Layer for routing the packets to final destination.
3. Connection services are provided including network layer flow control, network layer error
control and packet sequence control.
4. Breaks larger packets into small packets.
25
FUNCTIONS OF TRANSPORT LAYER:
1. Service Point Addressing : Transport Layer header includes service point address which is
port address. This layer gets the message to the correct process on the computer unlike
Network Layer, which gets each packet to the correct computer.
2. Segmentation and Reassembling : A message is divided into segments; each segment
contains sequence number, which enables this layer in reassembling the message. Message is
reassembled correctly upon arrival at the destination and replaces packets which were lost in
transmission.
3. Connection Control : It includes 2 types :
o Connectionless Transport Layer : Each segment is considered as an independent packet
and delivered to the transport layer at the destination machine.
o Connection Oriented Transport Layer : Before delivering packets, connection is made
with transport layer at the destination machine.
4. Flow Control : In this layer, flow control is performed end to end.
26
5. Error Control : Error Control is performed end to end in this layer to ensure that the complete
message arrives at the receiving transport layer without any error. Error Correction is done
through retransmission.
Session Layer
It deals with the concept of Sessions i.e. when a user logins to a remote server he should
be authenticated before getting access to the files and application programs. Another job of
session layer is to establish and maintain sessions. If during the transfer of data between two
machines the session breaks down, it is the session layer which re-establishes the connection. It
also ensures that the data transfer starts from where it breaks keeping it transparent to the end
user. e.g. In case of a session with a database server, this layer introduces check points at various
places so that in case the connectoin is broken and reestablished, the transition running on the
database is not lost even if the user has not committed. This activity is called Synchronization.
Another function of this layer is Dialogue Control which determines whose turn is it to speak in
a session. It is useful in video conferencing.
Its main aim is to establish, maintain and synchronize the interaction between communicating
systems. Session layer manages and synchronize the conversation between two different
applications. Transfer of data from one destination to another session layer streams of data are
marked and are resynchronized properly, so that the ends of the messages are not cut prematurely
and data loss is avoided.
27
FUNCTIONS OF SESSION LAYER:
1. Dialog Control : This layer allows two systems to start communication with each other in
half-duplex or full-duplex.
2. Synchronization : This layer allows a process to add checkpoints which are considered as
synchronization points into stream of data. Example: If a system is sending a file of 800
pages, adding checkpoints after every 50 pages is recommended. This ensures that 50 page
unit is successfully received and acknowledged. This is beneficial at the time of crash as if a
crash happens at page number 110; there is no need to retransmit 1 to100 pages.
This layer is concerned with the syntax and semantics of the information transmitted. In order to
make it possible for computers with different data representations to communicate data structures
to be exchanged can be defined in abstract way alongwith standard encoding. It also manages
these abstract data structres and allows higher level of data structres to be defined an exchange. It
encodes the data in standard agreed way(network format). Suppose there are two machines A
and B one follows 'Big Endian' and other 'Little Endian' for data representation. This layer
ensures that the data transmitted by one gets converted in the form compatibale to othe machine.
This layer is concerned with the syntax and semantics of the information transmitted.In order to
make it possible for computers with different data representations to communicate data structures
to be exchanged canbe defined in abstract way alongwith standard encoding. It also manages
these abstract data structres and allows higher level of data structres to be defined an exchange.
Other functions include compression, encryption etc.
The primary goal of this layer is to take care of the syntax and semantics of the information
exchanged between two communicating systems. Presentation layer takes care that the data is
sent in such a way that the receiver will understand the information (data) and will be able to use
the data. Languages (syntax) can be different of the two communicating systems. Under this
condition presentation layer plays a role translator.
28
FUNCTIONS OF PRESENTATION LAYER:
1. Translation : Before being transmitted, information in the form of characters and numbers
should be changed to bit streams. The presentation layer is responsible for interoperability
between encoding methods as different computers use different encoding methods. It
translates data between the formats the network requires and the format the computer.
2. Encryption : It carries out encryption at the transmitter and decryption at the receiver.
3. Compression : It carries out data compression to reduce the bandwidth of the data to be
transmitted. The primary role of Data compression is to reduce the number of bits to be
0transmitted. It is important in transmitting multimedia such as audio, video, text etc.
The seventh layer contains the application protocols with which the user gains access to the
network. The choice of which specific protocols and their associated functions are to be used at
the application level is up to the individual user. Thus the boundary between the presentation
layer and the application layer represents a separation of the protocols imposed by the network
designers from those being selected and implemented by the network users.For example
commonly used protocols are HTTP(for web browsing), FTP(for file transfer) etc.
29
It is the top most layer of OSI Model. Manipulation of data (information) in various ways is done
in this layer which enables user or software to get access to the network. Some services provided
by this layer includes: E-Mail, transferring of files, distributing the results to user, directory
services, network resource etc.
1. Mail Services : This layer provides the basis for E-mail forwarding and storage.
2. Network Virtual Terminal : It allows a user to log on to a remote host. The application
creates software emulation of a terminal at the remote host. Users computer talks to the
software terminal which in turn talks to the host and vice versa. Then the remote host
believes it is communicating with one of its own terminals and allows user to log on.
3. Directory Services : This layer provides access for global information about various services.
4. File Transfer, Access and Management (FTAM) : It is a standard mechanism to access files
and manages it. Users can access files in a remote computer and manage it. They can also
retrieve files from a remote computer.
30
The TCP/IP Reference Model
TCP/IP means Transmission Control Protocol and Internet Protocol. It is the network model used
in the current Internet architecture as well. Protocols are set of rules which govern every possible
communication over a network. These protocols describe the movement of data between the
source and destination or the internet. These protocols offer simple naming and addressing
schemes.
31
Overview of TCP/IP reference model
TCP/IP that is Transmission Control Protocol and Internet Protocol was developed by
Department of Defence's Project Research Agency (ARPA, later DARPA) as a part of a research
project of network interconnection to connect remote machines.
The features that stood out during the research, which led to making the TCP/IP reference model
were:
Support for a flexible architecture. Adding more machines to a network was easy.
The network was robust, and connections remained intact untill the source and destination
machines were functioning.
The overall idea was to allow one application on one computer to talk to(send data packets)
another application running on different computer.
32
Layer 3: Transport Layer
1. It operated independently.
2. It is scalable.
33
3. Client/server architecture.
4. Supports a number of routing protocols.
5. Can be used to establish a connection between two computers.
Demerits of TCP/IP
1. OSI is a generic, protocol independent 1. TCP/IP model is based on standard protocols around
standard, acting as a communication which the Internet has developed. It is a communication
gateway between the network and end user. protocol, which allows connection of hosts over a
network.
2. In OSI model the transport layer 2. In TCP/IP model the transport layer does not
guarantees the delivery of packets. guarantees delivery of packets. Still the TCP/IP model is
more reliable.
4. OSI model has a separate Presentation 4. TCP/IP does not have a separate Presentation layer or
34
layer and Session layer. Session layer.
5. OSI is a reference model around which 5. TCP/IP model is, in a way implementation of the OSI
the networks are built. Generally it is used as model.
a guidance tool.
6. Network layer of OSI model provides 6. The Network layer in TCP/IP model provides
both connection oriented and connectionless connectionless service.
service.
7. OSI model has a problem of fitting the 7. TCP/IP model does not fit any protocol
protocols into the model.
8. Protocols are hidden in OSI model and are 8. In TCP/IP replacing protocol is not easy.
easily replaced as the technology changes.
9. OSI model defines services, interfaces and 9. In TCP/IP, services, interfaces and protocols are not
protocols very clearly and makes clear clearly separated. It is also protocol dependent.
distinction between them. It is protocol
independent.
Global Capacity
History:
Global Capacity, originally known as Global Capacity Group, was founded in Houston, Texas in
2000, as a wholesale broadband trading company. The two founders, John Abraham and David
Walsh, had worked together at Enron's broadband unit and realized the potential demand for a
broadband market trading company.[6] The company began creating individualized
35
communications networks that didn't rely on any one network, allowing the company to offer the
best connections at the cheapest price.
By 2006, the company had expanded its services from broadband delivery to network operations
management and consulting services, creating and building secure, private data and voice
networks for other businesses.
In December 2006, the company was sold to Capital Growth Systems (CGS), and was combined
with two other companies, Centrepath, a provider of network management services, and 20/20
Technologies, a provider of telecommunications quoting and configuration software. 20/20
Technologies, which had been bought by CGS, had earlier acquired software vendor Magenta
NetLogic in 2004. The combined company continued to do business as Global Capacity.
In November 2008, Global Capacity paid $15M to acquire Vanco Direct USA, a network service
provider of consulting services for global corporate networks, and the owner of LATTIS (Local
Area Transport Tariff Information System), an information tool for circuit pricing
In 2009, Global Capacity announced their organization into two groups: Optimization Solutions
and Connectivity Solutions. Optimization Solutions were targeted to improving network
efficiency for clients and offered network pricing, monitoring and engineering services.
Connectivity solutions were targeted at simplifying the network connectivity procurement
process for customers. Also in 2009, Global Capacity launched One MarketplaceTM, a network
connectivity trading platform that combines network capacity from multiple suppliers and uses
telecommunications switching equipment to deploy this capacity toward market demand.
REFRENCE
[1]https://ocw.mit.edu/courses/electrical-engineering-and-computer-science/6-263j-data-
communication-networks-fall-2002/lecture-notes/Lecture1.pdf
[2]http://www.cse.iitk.ac.in/users/dheeraj/cs425/lec02.html/lec01.html
[3] http://www.studytonight.com/computer-networks/reference-models
[4]https://www.tutorialspoint.com/data_communication_computer_network/computer_network_t
opologies.htm
[5]http://www.studytonight.com/computer-networks/transmission-mediums
[6] http://fmcet.in/EEE/CS2363_uw.pdf
[7]https://www.tutorialspoint.com/data_communication_computer_network/data_communicatio
n_computer_network_tutorial.pdf
36
[8] https://ocw.mit.edu/courses/electrical-engineering-and-computer-science/6-02-introduction-
to-eecs-ii-digital-communication-systems-fall-2012/readings/MIT6_02F12_chap05.pdf.
[9]http://searchsecurity.techtarget.com/definition/cable-modem
37