際際滷

際際滷Share a Scribd company logo
Subject: Data Communication
and Network
Unit 1: Introduction
Presented by  Prof. P. P. Patil-Niphade
Network Software
Network software encompasses a broad range of software used for design,
implementation, and operation and monitoring of computer networks.
Functions of Network Software
Helps to set up and install computer networks
Enables users to have access to network resources in a seamless manner
Allows administrations to add or remove users from the network
Helps to define locations of data storage and allows users to access that data
Helps administrators and security system to protect the network from data
breaches, unauthorized access and attacks on a network
Enables network virtualizations
Types of Networks Software
Network storage software: software that manages the storage and
backup of data on a network.
Data archiving software: software that compresses and stores old
or infrequently used data on a network.
Patch management software: software that updates and fixes the
software on a network.
Security surveillance software: software that monitors and
protects the network from threats and attacks.
Asset management software: software that tracks and controls the
hardware and software assets on a network.
Wireless Networks
Computer networks that are not connected by cables are
called wireless networks.
They generally use radio waves for communication
between the network nodes.
They allow devices to be connected to the network while
roaming around within the network coverage.
Wireless Network
Types of Wireless Networks
Wireless LANs  Connects two or more network devices using
wireless distribution techniques.
Wireless MANs  Connects two or more wireless LANs spreading
over a metropolitan area.
Wireless WANs  Connects large areas comprising LANs, MANs
and personal networks.
Design Issues
The following are the design issues for the layers:
 Reliability: It is a design issue of making a network that operates correctly
even when it is made up of unreliable components.
 Addressing: There are multiple processes running on one machine. Every
layer needs a mechanism to identify senders and receivers.
 Error Control: It is an important issue because physical communication
circuits are not perfect. Many error detecting and error correcting codes are
available. Both sending and receiving ends must agree to use any one code.
 Flow Control: If there is a fast sender at one end sending data to a slow
receiver, then there must be flow control mechanism to control the loss of
data by slow receivers. There are several mechanisms used for flow control
such as increasing buffer size at receivers, slow down the fast sender, and so
on. Some process will not be in position to accept randomly long messages.
This property leads to mechanisms for disassembling, transmitting and the
reassembling messages.
Contd..
 Multiplexing and De-multiplexing: If the data has to be transmitted on
transmission media separately, it is inconvenient or expensive to setup
separate connection for each pair of communicating processes. So,
multiplexing is needed in the physical layer at sender end and de-multiplexing
is need at the receiver end.
 Scalability: When network gets large, new problem arises. Thus scalability is
important so that network can continue to work well when it gets large.
 Routing: When there are multiple paths between source and destination, only
one route must be chosen. This decision is made on the basis of several routing
algorithms, which chooses optimized route to the destination.
 Confidentiality and Integrity: Network security is the most important factor.
Mechanisms that provide confidentiality defend against threats like
eavesdropping. Mechanisms for integrity prevent faulty changes to messages.
Network Models
OSI Reference Model
TCP/IP Model
OSI Reference Model
OSI stands for Open Systems Interconnection. It has been
developed by ISO  International Organization for
Standardization, in the year 1984.
It is a 7-layer architecture with each layer having specific
functionality to perform.
All these 7 layers work collaboratively to transmit the data from
one person to another across the globe.
The seven layers of the OSI Model are a physical layer, data link
layer, network layer, transport layer, session layer, presentation
layer, and application layer.
OSI Model
OSI Reference Model
The main functions of each of the layers are as follows 
Physical Layer  Its function is to transmit individual bits from one node to another over a
physical medium.
Data Link Layer  It is responsible for the reliable transfer of data frames from one node to
another connected by the physical layer.
Network Layer  It manages the delivery of individual data packets from source to destination
through appropriate addressing and routing.
Transport Layer It is responsible for delivery of the entire message from the source host to
destination host.
Session Layer  It establishes sessions between users and offers services like dialog control and
synchronization.
Presentation Layer  It monitors syntax and semantics of transmitted information through
translation, compression, and encryption.
Application Layer  It provides high-level APIs (application program interface) to the users.
TCP/IP Model
TCP/IP was designed and developed by the Department of
Defense (DoD) in the 1960s and is based on standard protocols.
It stands for Transmission Control Protocol/Internet Protocol.
The TCP/IP model is a concise version of the OSI model. It
contains four layers, unlike the seven layers in the OSI model.
The number of layers is sometimes referred to as five or four.
The Physical Layer and Data Link Layer are referred to as one
single layer as the Physical Layer or Network Interface Layer
in the 4-layer reference.
networking in cyber security basics of data communication
Why TCP/IP Model ?
The main work of TCP/IP is to transfer the data of a computer
from one device to another.
The main condition of this process is to make data reliable and
accurate so that the receiver will receive the same information
which is sent by the sender.
To ensure that, each message reaches its final destination
accurately, the TCP/IP model divides its data into packets and
combines them at the other end, which helps in maintaining the
accuracy of the data while transferring from one end to another
end.
How Does the TCP/IP Model Work?
Whenever we want to send something over the internet using the
TCP/IP Model, the TCP/IP Model divides the data into packets at
the senders end and the same packets have to be recombined at
the receivers end to form the same data, and this thing happens to
maintain the accuracy of the data.
TCP/IP model divides the data into a 4-layer procedure, where the
data first go into this layer in one order and again in reverse order
to get organized in the same way at the receivers end.
Thank You

More Related Content

Similar to networking in cyber security basics of data communication (20)

OSI model.pptx computer networking ,OSI model
OSI model.pptx computer networking ,OSI modelOSI model.pptx computer networking ,OSI model
OSI model.pptx computer networking ,OSI model
snarajpoot6
OsI reference model
OsI reference modelOsI reference model
OsI reference model
LakshmiSamivel
OSI Model
OSI ModelOSI Model
OSI Model
Mukesh Tekwani
ADITYA BHATIA 28TH FEB2023 to know about.pptx
ADITYA BHATIA  28TH FEB2023 to know about.pptxADITYA BHATIA  28TH FEB2023 to know about.pptx
ADITYA BHATIA 28TH FEB2023 to know about.pptx
khanbybit
DCN notes adi
DCN notes adiDCN notes adi
DCN notes adi
AdiseshaK
Networking concepts
Networking conceptsNetworking concepts
Networking concepts
Prof. Dr. K. Adisesha
CN unit 1 part 2 2023.ppt
CN unit 1 part 2 2023.pptCN unit 1 part 2 2023.ppt
CN unit 1 part 2 2023.ppt
mohanravi1986
Internetworking
InternetworkingInternetworking
Internetworking
Raghu nath
OSI &TCP/IP Model
OSI &TCP/IP ModelOSI &TCP/IP Model
OSI &TCP/IP Model
Shamima Akther
Mid term Topic
Mid term TopicMid term Topic
Mid term Topic
Dulal Miah
OSI layer (Network)
OSI layer (Network)OSI layer (Network)
OSI layer (Network)
swethaRajendran1
BAPANKAR15800121011 SOFT.pptx
BAPANKAR15800121011 SOFT.pptxBAPANKAR15800121011 SOFT.pptx
BAPANKAR15800121011 SOFT.pptx
BapanKar2
Osi model
Osi modelOsi model
Osi model
sayyed sabir
OSI Model of Networking
OSI Model of NetworkingOSI Model of Networking
OSI Model of Networking
Mukesh Tekwani
wns-unit-2-i-need-a-notes-that-has-to-be-useful-for-preparing-my-sem-examinat...
wns-unit-2-i-need-a-notes-that-has-to-be-useful-for-preparing-my-sem-examinat...wns-unit-2-i-need-a-notes-that-has-to-be-useful-for-preparing-my-sem-examinat...
wns-unit-2-i-need-a-notes-that-has-to-be-useful-for-preparing-my-sem-examinat...
TalluriMeghana
1_Operating System.ppt
1_Operating System.ppt1_Operating System.ppt
1_Operating System.ppt
SproohaAthalye
COMPUTER NETWORK_OSI & TCP/IP
COMPUTER NETWORK_OSI & TCP/IPCOMPUTER NETWORK_OSI & TCP/IP
COMPUTER NETWORK_OSI & TCP/IP
Sweta Kumari Barnwal
Osi model
Osi modelOsi model
Osi model
MdAnikKhan
Network Protocol and TCP/IP
Network Protocol and TCP/IPNetwork Protocol and TCP/IP
Network Protocol and TCP/IP
Bwsrang Basumatary
Osi model
Osi modelOsi model
Osi model
Priyanka Sharma
OSI model.pptx computer networking ,OSI model
OSI model.pptx computer networking ,OSI modelOSI model.pptx computer networking ,OSI model
OSI model.pptx computer networking ,OSI model
snarajpoot6
OsI reference model
OsI reference modelOsI reference model
OsI reference model
LakshmiSamivel
ADITYA BHATIA 28TH FEB2023 to know about.pptx
ADITYA BHATIA  28TH FEB2023 to know about.pptxADITYA BHATIA  28TH FEB2023 to know about.pptx
ADITYA BHATIA 28TH FEB2023 to know about.pptx
khanbybit
DCN notes adi
DCN notes adiDCN notes adi
DCN notes adi
AdiseshaK
CN unit 1 part 2 2023.ppt
CN unit 1 part 2 2023.pptCN unit 1 part 2 2023.ppt
CN unit 1 part 2 2023.ppt
mohanravi1986
Internetworking
InternetworkingInternetworking
Internetworking
Raghu nath
Mid term Topic
Mid term TopicMid term Topic
Mid term Topic
Dulal Miah
BAPANKAR15800121011 SOFT.pptx
BAPANKAR15800121011 SOFT.pptxBAPANKAR15800121011 SOFT.pptx
BAPANKAR15800121011 SOFT.pptx
BapanKar2
OSI Model of Networking
OSI Model of NetworkingOSI Model of Networking
OSI Model of Networking
Mukesh Tekwani
wns-unit-2-i-need-a-notes-that-has-to-be-useful-for-preparing-my-sem-examinat...
wns-unit-2-i-need-a-notes-that-has-to-be-useful-for-preparing-my-sem-examinat...wns-unit-2-i-need-a-notes-that-has-to-be-useful-for-preparing-my-sem-examinat...
wns-unit-2-i-need-a-notes-that-has-to-be-useful-for-preparing-my-sem-examinat...
TalluriMeghana
1_Operating System.ppt
1_Operating System.ppt1_Operating System.ppt
1_Operating System.ppt
SproohaAthalye
Network Protocol and TCP/IP
Network Protocol and TCP/IPNetwork Protocol and TCP/IP
Network Protocol and TCP/IP
Bwsrang Basumatary

Recently uploaded (20)

Sugarlab AI: How Much Does an XXX AI Porn Generator Cost in 2025
Sugarlab AI: How Much Does an XXX AI Porn Generator Cost in 2025Sugarlab AI: How Much Does an XXX AI Porn Generator Cost in 2025
Sugarlab AI: How Much Does an XXX AI Porn Generator Cost in 2025
Sugarlab AI
SAP Automation with UiPath: Solution Accelerators and Best Practices - Part 6...
SAP Automation with UiPath: Solution Accelerators and Best Practices - Part 6...SAP Automation with UiPath: Solution Accelerators and Best Practices - Part 6...
SAP Automation with UiPath: Solution Accelerators and Best Practices - Part 6...
DianaGray10
Threat Modeling a Batch Job System - AWS Security Community Day
Threat Modeling a Batch Job System - AWS Security Community DayThreat Modeling a Batch Job System - AWS Security Community Day
Threat Modeling a Batch Job System - AWS Security Community Day
Teri Radichel
2025-04-05 - Block71 Event - The Landscape of GenAI and Ecosystem.pdf
2025-04-05 - Block71 Event - The Landscape of GenAI and Ecosystem.pdf2025-04-05 - Block71 Event - The Landscape of GenAI and Ecosystem.pdf
2025-04-05 - Block71 Event - The Landscape of GenAI and Ecosystem.pdf
Ivan Tang
New from BookNet Canada for 2025: BNC SalesData and BNC LibraryData
New from BookNet Canada for 2025: BNC SalesData and BNC LibraryDataNew from BookNet Canada for 2025: BNC SalesData and BNC LibraryData
New from BookNet Canada for 2025: BNC SalesData and BNC LibraryData
BookNet Canada
HHUG-04-2025-Close-more-deals-from-your-existing-pipeline-FOR SLIDESHARE.pptx
HHUG-04-2025-Close-more-deals-from-your-existing-pipeline-FOR SLIDESHARE.pptxHHUG-04-2025-Close-more-deals-from-your-existing-pipeline-FOR SLIDESHARE.pptx
HHUG-04-2025-Close-more-deals-from-your-existing-pipeline-FOR SLIDESHARE.pptx
HampshireHUG
STRING FUNCTIONS IN JAVA BY N SARATH KUMAR
STRING FUNCTIONS IN JAVA BY N SARATH KUMARSTRING FUNCTIONS IN JAVA BY N SARATH KUMAR
STRING FUNCTIONS IN JAVA BY N SARATH KUMAR
Sarathkumar Narsupalli
Research Data Management (RDM): the management of dat in the research process
Research Data Management (RDM): the management of dat in the research processResearch Data Management (RDM): the management of dat in the research process
Research Data Management (RDM): the management of dat in the research process
HeilaPienaar
Benefits of Moving Ellucian Banner to Oracle Cloud
Benefits of Moving Ellucian Banner to Oracle CloudBenefits of Moving Ellucian Banner to Oracle Cloud
Benefits of Moving Ellucian Banner to Oracle Cloud
AstuteBusiness
Leadership Spectrum by Sonam Sherpa at GDG Kathmandu March Monthly Meetup
Leadership Spectrum by Sonam Sherpa at GDG Kathmandu March Monthly MeetupLeadership Spectrum by Sonam Sherpa at GDG Kathmandu March Monthly Meetup
Leadership Spectrum by Sonam Sherpa at GDG Kathmandu March Monthly Meetup
GDG Kathmandu
UiPath NY AI Series: Session 4: UiPath AutoPilot for Developers using Studio Web
UiPath NY AI Series: Session 4: UiPath AutoPilot for Developers using Studio WebUiPath NY AI Series: Session 4: UiPath AutoPilot for Developers using Studio Web
UiPath NY AI Series: Session 4: UiPath AutoPilot for Developers using Studio Web
DianaGray10
Building High-Impact Teams Beyond the Product Triad.pdf
Building High-Impact Teams Beyond the Product Triad.pdfBuilding High-Impact Teams Beyond the Product Triad.pdf
Building High-Impact Teams Beyond the Product Triad.pdf
Rafael Burity
Microsoft Digital Defense Report 2024 .pdf
Microsoft Digital Defense Report 2024 .pdfMicrosoft Digital Defense Report 2024 .pdf
Microsoft Digital Defense Report 2024 .pdf
Abhishek Agarwal
Top Tips to Get Your Data AI-Ready
Top Tips to Get Your Data AI-Ready   Top Tips to Get Your Data AI-Ready
Top Tips to Get Your Data AI-Ready
Precisely
TrustArc Webinar - Data Privacy and Cyber Security: A Symbiotic Relationship
TrustArc Webinar - Data Privacy and Cyber Security: A Symbiotic RelationshipTrustArc Webinar - Data Privacy and Cyber Security: A Symbiotic Relationship
TrustArc Webinar - Data Privacy and Cyber Security: A Symbiotic Relationship
TrustArc
Human Centered Design By Gnanasambandham
Human Centered Design By GnanasambandhamHuman Centered Design By Gnanasambandham
Human Centered Design By Gnanasambandham
Gnanasambandham Anbazhagan CSP, CSM, CSPO
EXCEPTION HANDLING IN JAVA BY N SARATH KUMAR
EXCEPTION HANDLING IN JAVA BY N SARATH KUMAREXCEPTION HANDLING IN JAVA BY N SARATH KUMAR
EXCEPTION HANDLING IN JAVA BY N SARATH KUMAR
Sarathkumar Narsupalli
Beyond the life of a CISO - Head of Trust at GDG Kathmandu Monthly Meetup
Beyond the life of a CISO -  Head of Trust at GDG Kathmandu Monthly MeetupBeyond the life of a CISO -  Head of Trust at GDG Kathmandu Monthly Meetup
Beyond the life of a CISO - Head of Trust at GDG Kathmandu Monthly Meetup
GDG Kathmandu
Artificial Neural Networks, basics, its variations and examples
Artificial Neural Networks, basics, its variations and examplesArtificial Neural Networks, basics, its variations and examples
Artificial Neural Networks, basics, its variations and examples
anandsimple
Recruiting Tech: A Look at Why AI is Actually OG
Recruiting Tech: A Look at Why AI is Actually OGRecruiting Tech: A Look at Why AI is Actually OG
Recruiting Tech: A Look at Why AI is Actually OG
Matt Charney
Sugarlab AI: How Much Does an XXX AI Porn Generator Cost in 2025
Sugarlab AI: How Much Does an XXX AI Porn Generator Cost in 2025Sugarlab AI: How Much Does an XXX AI Porn Generator Cost in 2025
Sugarlab AI: How Much Does an XXX AI Porn Generator Cost in 2025
Sugarlab AI
SAP Automation with UiPath: Solution Accelerators and Best Practices - Part 6...
SAP Automation with UiPath: Solution Accelerators and Best Practices - Part 6...SAP Automation with UiPath: Solution Accelerators and Best Practices - Part 6...
SAP Automation with UiPath: Solution Accelerators and Best Practices - Part 6...
DianaGray10
Threat Modeling a Batch Job System - AWS Security Community Day
Threat Modeling a Batch Job System - AWS Security Community DayThreat Modeling a Batch Job System - AWS Security Community Day
Threat Modeling a Batch Job System - AWS Security Community Day
Teri Radichel
2025-04-05 - Block71 Event - The Landscape of GenAI and Ecosystem.pdf
2025-04-05 - Block71 Event - The Landscape of GenAI and Ecosystem.pdf2025-04-05 - Block71 Event - The Landscape of GenAI and Ecosystem.pdf
2025-04-05 - Block71 Event - The Landscape of GenAI and Ecosystem.pdf
Ivan Tang
New from BookNet Canada for 2025: BNC SalesData and BNC LibraryData
New from BookNet Canada for 2025: BNC SalesData and BNC LibraryDataNew from BookNet Canada for 2025: BNC SalesData and BNC LibraryData
New from BookNet Canada for 2025: BNC SalesData and BNC LibraryData
BookNet Canada
HHUG-04-2025-Close-more-deals-from-your-existing-pipeline-FOR SLIDESHARE.pptx
HHUG-04-2025-Close-more-deals-from-your-existing-pipeline-FOR SLIDESHARE.pptxHHUG-04-2025-Close-more-deals-from-your-existing-pipeline-FOR SLIDESHARE.pptx
HHUG-04-2025-Close-more-deals-from-your-existing-pipeline-FOR SLIDESHARE.pptx
HampshireHUG
STRING FUNCTIONS IN JAVA BY N SARATH KUMAR
STRING FUNCTIONS IN JAVA BY N SARATH KUMARSTRING FUNCTIONS IN JAVA BY N SARATH KUMAR
STRING FUNCTIONS IN JAVA BY N SARATH KUMAR
Sarathkumar Narsupalli
Research Data Management (RDM): the management of dat in the research process
Research Data Management (RDM): the management of dat in the research processResearch Data Management (RDM): the management of dat in the research process
Research Data Management (RDM): the management of dat in the research process
HeilaPienaar
Benefits of Moving Ellucian Banner to Oracle Cloud
Benefits of Moving Ellucian Banner to Oracle CloudBenefits of Moving Ellucian Banner to Oracle Cloud
Benefits of Moving Ellucian Banner to Oracle Cloud
AstuteBusiness
Leadership Spectrum by Sonam Sherpa at GDG Kathmandu March Monthly Meetup
Leadership Spectrum by Sonam Sherpa at GDG Kathmandu March Monthly MeetupLeadership Spectrum by Sonam Sherpa at GDG Kathmandu March Monthly Meetup
Leadership Spectrum by Sonam Sherpa at GDG Kathmandu March Monthly Meetup
GDG Kathmandu
UiPath NY AI Series: Session 4: UiPath AutoPilot for Developers using Studio Web
UiPath NY AI Series: Session 4: UiPath AutoPilot for Developers using Studio WebUiPath NY AI Series: Session 4: UiPath AutoPilot for Developers using Studio Web
UiPath NY AI Series: Session 4: UiPath AutoPilot for Developers using Studio Web
DianaGray10
Building High-Impact Teams Beyond the Product Triad.pdf
Building High-Impact Teams Beyond the Product Triad.pdfBuilding High-Impact Teams Beyond the Product Triad.pdf
Building High-Impact Teams Beyond the Product Triad.pdf
Rafael Burity
Microsoft Digital Defense Report 2024 .pdf
Microsoft Digital Defense Report 2024 .pdfMicrosoft Digital Defense Report 2024 .pdf
Microsoft Digital Defense Report 2024 .pdf
Abhishek Agarwal
Top Tips to Get Your Data AI-Ready
Top Tips to Get Your Data AI-Ready   Top Tips to Get Your Data AI-Ready
Top Tips to Get Your Data AI-Ready
Precisely
TrustArc Webinar - Data Privacy and Cyber Security: A Symbiotic Relationship
TrustArc Webinar - Data Privacy and Cyber Security: A Symbiotic RelationshipTrustArc Webinar - Data Privacy and Cyber Security: A Symbiotic Relationship
TrustArc Webinar - Data Privacy and Cyber Security: A Symbiotic Relationship
TrustArc
EXCEPTION HANDLING IN JAVA BY N SARATH KUMAR
EXCEPTION HANDLING IN JAVA BY N SARATH KUMAREXCEPTION HANDLING IN JAVA BY N SARATH KUMAR
EXCEPTION HANDLING IN JAVA BY N SARATH KUMAR
Sarathkumar Narsupalli
Beyond the life of a CISO - Head of Trust at GDG Kathmandu Monthly Meetup
Beyond the life of a CISO -  Head of Trust at GDG Kathmandu Monthly MeetupBeyond the life of a CISO -  Head of Trust at GDG Kathmandu Monthly Meetup
Beyond the life of a CISO - Head of Trust at GDG Kathmandu Monthly Meetup
GDG Kathmandu
Artificial Neural Networks, basics, its variations and examples
Artificial Neural Networks, basics, its variations and examplesArtificial Neural Networks, basics, its variations and examples
Artificial Neural Networks, basics, its variations and examples
anandsimple
Recruiting Tech: A Look at Why AI is Actually OG
Recruiting Tech: A Look at Why AI is Actually OGRecruiting Tech: A Look at Why AI is Actually OG
Recruiting Tech: A Look at Why AI is Actually OG
Matt Charney

networking in cyber security basics of data communication

  • 1. Subject: Data Communication and Network Unit 1: Introduction Presented by Prof. P. P. Patil-Niphade
  • 2. Network Software Network software encompasses a broad range of software used for design, implementation, and operation and monitoring of computer networks. Functions of Network Software Helps to set up and install computer networks Enables users to have access to network resources in a seamless manner Allows administrations to add or remove users from the network Helps to define locations of data storage and allows users to access that data Helps administrators and security system to protect the network from data breaches, unauthorized access and attacks on a network Enables network virtualizations
  • 3. Types of Networks Software Network storage software: software that manages the storage and backup of data on a network. Data archiving software: software that compresses and stores old or infrequently used data on a network. Patch management software: software that updates and fixes the software on a network. Security surveillance software: software that monitors and protects the network from threats and attacks. Asset management software: software that tracks and controls the hardware and software assets on a network.
  • 4. Wireless Networks Computer networks that are not connected by cables are called wireless networks. They generally use radio waves for communication between the network nodes. They allow devices to be connected to the network while roaming around within the network coverage.
  • 6. Types of Wireless Networks Wireless LANs Connects two or more network devices using wireless distribution techniques. Wireless MANs Connects two or more wireless LANs spreading over a metropolitan area. Wireless WANs Connects large areas comprising LANs, MANs and personal networks.
  • 7. Design Issues The following are the design issues for the layers: Reliability: It is a design issue of making a network that operates correctly even when it is made up of unreliable components. Addressing: There are multiple processes running on one machine. Every layer needs a mechanism to identify senders and receivers. Error Control: It is an important issue because physical communication circuits are not perfect. Many error detecting and error correcting codes are available. Both sending and receiving ends must agree to use any one code. Flow Control: If there is a fast sender at one end sending data to a slow receiver, then there must be flow control mechanism to control the loss of data by slow receivers. There are several mechanisms used for flow control such as increasing buffer size at receivers, slow down the fast sender, and so on. Some process will not be in position to accept randomly long messages. This property leads to mechanisms for disassembling, transmitting and the reassembling messages.
  • 8. Contd.. Multiplexing and De-multiplexing: If the data has to be transmitted on transmission media separately, it is inconvenient or expensive to setup separate connection for each pair of communicating processes. So, multiplexing is needed in the physical layer at sender end and de-multiplexing is need at the receiver end. Scalability: When network gets large, new problem arises. Thus scalability is important so that network can continue to work well when it gets large. Routing: When there are multiple paths between source and destination, only one route must be chosen. This decision is made on the basis of several routing algorithms, which chooses optimized route to the destination. Confidentiality and Integrity: Network security is the most important factor. Mechanisms that provide confidentiality defend against threats like eavesdropping. Mechanisms for integrity prevent faulty changes to messages.
  • 9. Network Models OSI Reference Model TCP/IP Model
  • 10. OSI Reference Model OSI stands for Open Systems Interconnection. It has been developed by ISO International Organization for Standardization, in the year 1984. It is a 7-layer architecture with each layer having specific functionality to perform. All these 7 layers work collaboratively to transmit the data from one person to another across the globe. The seven layers of the OSI Model are a physical layer, data link layer, network layer, transport layer, session layer, presentation layer, and application layer.
  • 12. OSI Reference Model The main functions of each of the layers are as follows Physical Layer Its function is to transmit individual bits from one node to another over a physical medium. Data Link Layer It is responsible for the reliable transfer of data frames from one node to another connected by the physical layer. Network Layer It manages the delivery of individual data packets from source to destination through appropriate addressing and routing. Transport Layer It is responsible for delivery of the entire message from the source host to destination host. Session Layer It establishes sessions between users and offers services like dialog control and synchronization. Presentation Layer It monitors syntax and semantics of transmitted information through translation, compression, and encryption. Application Layer It provides high-level APIs (application program interface) to the users.
  • 13. TCP/IP Model TCP/IP was designed and developed by the Department of Defense (DoD) in the 1960s and is based on standard protocols. It stands for Transmission Control Protocol/Internet Protocol. The TCP/IP model is a concise version of the OSI model. It contains four layers, unlike the seven layers in the OSI model. The number of layers is sometimes referred to as five or four. The Physical Layer and Data Link Layer are referred to as one single layer as the Physical Layer or Network Interface Layer in the 4-layer reference.
  • 15. Why TCP/IP Model ? The main work of TCP/IP is to transfer the data of a computer from one device to another. The main condition of this process is to make data reliable and accurate so that the receiver will receive the same information which is sent by the sender. To ensure that, each message reaches its final destination accurately, the TCP/IP model divides its data into packets and combines them at the other end, which helps in maintaining the accuracy of the data while transferring from one end to another end.
  • 16. How Does the TCP/IP Model Work? Whenever we want to send something over the internet using the TCP/IP Model, the TCP/IP Model divides the data into packets at the senders end and the same packets have to be recombined at the receivers end to form the same data, and this thing happens to maintain the accuracy of the data. TCP/IP model divides the data into a 4-layer procedure, where the data first go into this layer in one order and again in reverse order to get organized in the same way at the receivers end.