OSI Model Physical Layer (Layer 1)
OSI Model Physical Layer (Layer 1)
OSI Model Physical Layer (Layer 1)
MAC Addresses
MAC Addresses are unique 48-bit hardware numbers of a computer that are embedded into a
network card (known as a Network Interface Card) during manufacturing. The MAC Address is
also known as the Physical Address of a network device.
A 48-bit or 64-bit address, typically represented as six groups of two hexadecimal digits separated
by colons or hyphens (e.g., 00:11:22:33:44:55).
IP address
an IP address is a unique address that is used to identify computers or nodes on the internet.
And these IP addresses are assigned by IANA(known as Internet Corporation For Internet Assigned
Numbers Authority).
What is a Internet?
The Internet is a group of billions of computers and other electronic devices, that allows
people to communicate, access information, and share resources over long distances.
Broadband:
- Transmits multiple signals simultaneously over a single medium (like a cable or fiber)
- Uses modulation techniques (like phase and amplitude modulation) to reduce noise and
interference
- Allows for faster data transfer rates and multiple channels (like TV channels or internet
connections)
- Think of it like a highway with many lanes, where each lane can carry a different signal
Baseband:
In summary, broadband is like a multi-lane highway for multiple signals, while baseband is like a
single-lane road for a single signal.
What is Protocol?
A protocol is a set of rules that determines how data is sent and received over a network in secure
manner.
• Hamming Code:
• Definition: A specific type of FEC that uses multiple parity bits positioned at
specific intervals within the data to detect and correct single-bit errors.
• Advantage: Can detect and correct single-bit errors and detect double-bit errors.
• Disadvantage: Limited to detecting and correcting single-bit errors; more complex
to implement.
Data Link Layer sliding window Techniques:(flow control)
A sliding window protocol is a method used in the data link layer of the OSI model to manage
the flow of data between two devices. It is particularly useful for ensuring that data frames are
transmitted efficiently and without errors.
Key Concepts:
1. Window Size: The "window" refers to a set of consecutive sequence numbers that a sender
is allowed to transmit without waiting for an acknowledgment. The size of the window
determines how many frames can be sent before the sender must wait for an
acknowledgment from the receiver.
2. Sliding Window: As frames are acknowledged, the window "slides" forward, allowing the
sender to transmit new frames. This means the sender can send more frames before having
to stop and wait for an acknowledgment.
3. Acknowledgments (ACKs): The receiver sends an acknowledgment for each frame that it
successfully receives. If a frame is lost or an error is detected, the receiver may request
retransmission.
4. Flow Control: Sliding window protocols provide flow control by ensuring that the sender
does not overwhelm the receiver with too much data at once.
5. Error Control: The protocol can detect and correct errors by retransmitting frames that
were not acknowledged.
Network congestion occurs when the demand for network resources exceeds the available capacity,
leading to slower data transmission, increased latency, packet loss, and reduced overall network
performance. It typically happens when too many devices or applications try to send data
simultaneously over a network with limited bandwidth, causing a bottleneck.
Medium Access Control (MAC) Protocols:
Medium Access Control (MAC) protocols are crucial in network communication, especially
in shared network environments like local area networks (LANs) and wireless networks. The
primary function of a MAC protocol is to manage how multiple devices share a common
communication medium (e.g., a single cable or a wireless channel) to avoid collisions and
ensure efficient data transmission.
Summary:
• Random Access Protocols: Devices compete for the medium; collisions are possible and
handled after they occur.
• Controlled Access Protocols: Access to the medium is controlled or coordinated to prevent
collisions.
• Channelization Protocols: The medium is divided into distinct channels, each assigned to
different devices or transmissions to prevent collisions.
Network Layer
Connection-Oriented Service:
• This service requires a connection to be established between the sender and receiver before
any data is transmitted. The connection remains active throughout the communication
session, ensuring that data is delivered in order and reliably. An example of a connection-
oriented protocol is TCP (Transmission Control Protocol).
• Connectionless Service:
• In this service, data is sent without establishing a dedicated connection between the sender
and receiver. Each packet is treated independently, and there’s no guarantee of delivery,
order, or error correction. An example of a connectionless protocol is UDP (User Datagram
Protocol).
What is an IP Address?
• Definition: An IP (Internet Protocol) address is a unique identifier assigned to each device
connected to a network, allowing it to communicate with other devices over the Internet or a
local network.
• Function: It acts as a mailing address for devices, ensuring data sent over a network reaches
the correct destination.
Types of IP Addresses
1. Based on Version:
• IPv4:
• Format: 32-bit address (e.g., 192.168.1.1).
• Total Addresses: Approximately 4.3 billion.
• IPv6:
• Format: 128-bit address (e.g., 2001:0db8:85a3:0000:0000:8a2e:0370:7334).
• Total Addresses: Vastly larger address space than IPv4.
Routing algorithms are essential for determining the optimal path for data packets
across a network.
1.Broadcast Routing:Broadcast routing sends a packet from a source node to all nodes in
the network or a specific subnet.(one to many)
2.Multicast Routing: Multicast routing sends a packet from a source node to a specific
group of nodes that have expressed interest in receiving the information.(one to group)
Congestion Control
when network traffic is high then response time of network is slow down.
• Definition: Congestion control refers to mechanisms and strategies used to manage and
alleviate network congestion by controlling the amount of data entering the network,
ensuring that the network's capacity is not exceeded and preventing packet loss, delays, and
degradation in performance.
• Leaky Bucket:
• Definition: The leaky bucket algorithm is a congestion control method where data is added
to a bucket at a constant rate. If the bucket overflows (i.e., if data arrives too quickly),
excess data is discarded, thereby controlling the rate at which data is sent into the network
and smoothing out bursts of traffic.
• Token Bucket:
• Definition: The token bucket algorithm is a congestion control method where tokens are
added to a bucket at a fixed rate. Each token represents permission to send a unit of data. If
there are tokens available, data can be sent. If the bucket is empty, data must wait until
tokens are available, allowing for bursty traffic while controlling the overall rate of data
transmission.
An acknowledgment segment is
Acknowledgment No acknowledgment segment.
present.
Sequencing of data is a feature of
Transmission Control Protocol (TCP). There is no sequencing of data in
Sequence this means that packets arrive in order UDP. If the order is required, it has to
at the receiver. be managed by the application layer.
The Domain Name System (DNS) in the Application Layer translates human-readable domain
names (like www.example.com) into IP addresses that computers use to identify each other on the
network. It acts as the internet's phone book, enabling users to access websites using easy-to-
remember names.
Types of Domain
There are various kinds of domains:
• Generic Domains: .com(commercial), .edu(educational), .mil(military), .org(nonprofit
organization), .net(similar to commercial) all these are generic domains.
• Country Domain: .in (India) .us .uk
• Inverse Domain: if we want to know what is the domain name of the website. IP to domain
name mapping. So DNS can provide both the mapping for example to find the IP addresses
of geeksforgeeks.org then we have to type
nslookup www.geeksforgeeks.org
• Root Domain Server: Highest-level DNS servers that direct queries to TLD servers.
• Top-Level Domain (TLD): DNS categories like .com or .org that direct queries to
authoritative servers.
• Authoritative Server: DNS servers that provide definitive answers for specific domain
names.
Basic Protocals
• Stateful: The server maintains context and state across multiple interactions (e.g.,
SMTP, FTP).
• Stateless: Each interaction is independent, with no retained context (e.g., HTTP).
• In-Band: Control and data messages are transmitted through the same channel (e.g., HTTP).
• Out-of-Band: Control messages are transmitted through a separate channel from the data
(e.g., network management protocols).
In-Band/Out- Stateful/ Default
Protocol TCP/UDP Definition
of-Band Stateless Port
Simple Mail Transfer Protocol:
SMTP TCP Out-of-Band Stateless 25 Used for sending emails between
servers.(only 7 bit ascii)
Multipurpose Internet Mail
N/A (Not a Extensions: An extension to
MIME transport N/A N/A N/A SMTP that allows for sending
protocol) multimedia content in emails.
(non ascii also)
WWW A system of interlinked
(World TCP In-Band Stateless N/A hypertext documents accessed
Wide Web) via the internet.
Hypertext Transfer Protocol:
Used for transferring hypertext
HTTP TCP In-Band Stateless 80
requests and information on the
web.
File Transfer Protocol: Used for
FTP TCP In-Band Stateful 21 transferring files between client
and server over a network.