UNIT 1
TCP/IP PROTOCOL SUITE,
NETWORKS TOPOLOGY
TCP/IP PROTOCOL SUITE
• DesignedanddevelopedbyDepartment of Defense (DoD) in 1960s
andisbasedon standardprotocols.
• TheTCP/IP modelwasdeveloped prior to the OSI model.
• TheTCP/IP modelconsistsof five layers
• Application Layer
• Transport Layer
• Internet Layer
• Host to Network layer/ PhysicalandDatalink Layer
TCP/IP PROTOCOL SUITE CONTD..
TCP/IP VSOSI MODEL
HOST TO NETWORK LAYER
(PHYSICAL AND DATALINK
LAYER)
• Host to network layeristhelowest layer of theTCP/IP model.
• It isthecombinationof thePhysical layer and Data Link layerdefined
in theOSI referencemodel.
• Protocols presentin thislayerallowsfor physical transmission of
data.
• Thislayer ismainlyresponsible for thetransmission of the data
between two devices on the same network.
• Protocols usedbythislayerareethernet, token ring, FDDI, X.25,
frame relay.
INTERNET LAYER
• An internet layeristhesecond layer of theTCP/IP model.
• An internet layerisalsoknownasthenetwork layer.
• It definestheprotocols whichareresponsible for logical transmission
of data over the entire network.
• Protocols usedin thislayer are
• IP- Internet Protocol
• ICMP – Internet Control MessageProtocol.
• ARP– Address ResolutionProtocol.
INTERNET LAYERCONTD..
• IP- Internet Protocol
• Responsiblefor delivering packets from thesourcehostto thedestination
hostbylookingattheIP addresses in thepacket headers.
• IPhas2versions: IPv4andIPv6.
• ICMP – Internet Control MessageProtocol
• It isencapsulatedwithinIPdatagramsandisresponsiblefor providing hostswith
information aboutnetworkproblems.
• ARP– AddressResolutionProtocol
• Usedto find thephysicaladdressfrom theIP address
TRANSPORT LAYER
• Thetransport layerisresponsible for thereliability, flow control, and
correction of data whichisbeingsentover the network.
• Thetwoprotocols usedin thetransport layerareUser Datagram
protocol and Transmission control protocol.
• User Datagram Protocol (UDP)
• It provides connectionlessserviceandend-to-end delivery of transmission.
• It isanunreliableprotocol asit discoverstheerrors but not specifythe error.
• User DatagramProtocol discoverstheerror, andICMP protocol reports theerror to
thesenderthatuserdatagramhasbeendamaged.
TRANSPORT LAYERCONTD..
• TransmissionControl Protocol:(TCP)
• It isaConnection Oriented Protocol -A connectionmustbeestablishedbetween
both endsof atransmissionbefore either cantransmitdata.
• TCP isa reliable protocol asit detectstheerror andretransmitsthedamaged
frames.
• Therefore, it ensures all the segments must be received and acknowledged.
• At thesendingend,TCP dividesthewholemessageinto smallerunitsknownas
segment
• eachsegmentcontainsasequence number whichisrequired for reordering
theframesto form anoriginalmessage.
• At thereceivingend,TCP collects all the segments and reorders them basedon
sequence numbers.
APPLICATION LAYER
• An applicationlayeristhetopmost layer in theTCP/IPmodel.
• It isresponsible for handling high-level protocols
• Thislayerallowstheuser to interact with the application.
• When oneapplication layer protocol wants to communicate with
another application layer, it forwards itsdatato thetransport layer.
• Example:Web browser usingHTTP protocol to interactwiththe
network whereHTTP protocol isanapplicationlayer protocol.
APPLICATION LAYERCONTD.
• Protocols usedin thislayer are
• HTTP: HTTP standsfor Hypertext transfer protocol.
• accessthedataover theworld wide web
• SNMP: SNMPstandsfor SimpleNetwork Management Protocol.
• frameworkusedfor managingthedeviceson theinternet
• SMTP: SMTPstandsfor Simplemailtransferprotocol.
• supportsthee-mail
• DNS: DNS standsfor Domain NameSystem.
• Converts Domain nameinto IP address
• TELNET: It isanabbreviationfor Terminal Network.
• Establishestheconnectionbetweenthelocalcomputerandremote computer
• FTP: FTPstandsfor FileTransferProtocol.
• Transmittingthefilesfrom onecomputerto anothercomputer.
NETWORKS TOPOLOGY
• Topology definesthestructure of thenetwork of howall
thecomponentsareinterconnected to eachother.
BUSTOPOLOGY
• Bustopology isdesignedin suchawaythatallthestationsareconnected
through asingle cable known as a backbone cable.
• Eachnodeiseither connectedto thebackbone cable by drop cable or
directly connected to the backbone cable.
• When anodewantsto sendamessageover thenetwork, it putsamessage
over the network.
• All the stations availablein thenetwork will receive the message whetherit has
beenaddressedor not.
BUSTOPOLOGY CONTD.
• It ismainlyusedin 802.3 (ethernet) and 802.4 standard
networks.
• Theconfiguration of abustopologyisquite simpler ascompared
to other topologies.
• Themostcommonaccessmethodof thebustopologies
isCSMA (Carrier SenseMultiple Access).
• CSMA- mediaaccesscontrol usedto control thedataflow sothat
dataintegrity ismaintained,i.e., thepacketsdo not getlost.
BUSTOPOLOGY
ADVANTAGES OF BUS TOPOLOGY
• It iscost effective.
• Lessnumberof Cablerequired whencomparedto other
network topology.
• Usedin smallnetworks.
• Easyto expandbyjoiningtwocablestogether.
DISADVANTAGES OF BUS TOPOLOGY
• Cablesfailsthenwholenetwork fails.
• If network traffic is heavy or nodesaremore, the
performance of thenetwork decreases.
• Cablehasa limited length.
• It isslowerthantheringtopology.
RING TOPOLOGY
• Ringtopology islike a bus topology, but withconnectedends.
• Thenodethatreceives the message from the previous
computer willretransmit to the next node.
• The data flows in one direction, i.e., it isunidirectional.
• The data flows in asingle loop continuously known asan
endless loop.
RING TOPOLOGY CONTD.
• It hasno terminated ends, i.e., eachnodeisconnectedto
other nodeandhavingno terminationpoint.
• Thedatain aring topology flowin a clockwise direction.
• Themostcommonaccessmethodof thering topology istoken
passing.
• Token passing: It isanetwork accessmethodin whichtokenispassed
from onenodeto another node.
• Token: It isaframethatcirculatesaroundthe network.
RING TOPOLOGY
ADVANTAGES OF RING TOPOLOGY
• Thepossibilityof collision isminimumin thistypeof
topology.
• Cheapto installandexpand.
DISADVANTAGES OF RING
TOPOLOGY
• Troubleshooting isdifficultin ring topology.
• Addingor deletingthecomputersdisturbs thenetwork
activity.
• Failureof onecomputer disturbs thewhole network.
STAR TOPOLOGY
• Startopologyisanarrangementof thenetwork in whichevery nodeis
connectedto thecentral hub, switch or a central computer.
• Thecentral computer isknownasaserver, andtheperipheraldevices
attachedto theserver areknownasclients.
• Coaxial cable or RJ-45 cables areusedto connectthe computers.
• Hubsor Switchesaremainlyusedasconnectiondevicesin aphysical
star topology.
• Startopologyisthemostpopulartopologyin network implementation.
STAR TOPOLOGY
ADVANTAGES OF STAR TOPOLOGY
• Fastperformance withfewnodesandlownetworktraffic.
• Hub canbeupgradedeasily.
• Easyto troubleshoot.
• Easyto setupandmodify.
• Only failednodesuffers, rest of thenodescanwork
smoothly.
DISADVANTAGES OF STAR
TOPOLOGY
• Cost of installationishigh.
• Expensiveto use.
• If thehubfailsthenthewholenetwork isstoppedbecauseall
thenodesdependon the hub.
TREE TOPOLOGY
• Tree topology combinesthe characteristics of bus topology
and star topology.
• A tree topology isatypeof structure in whichallthecomputersare
connectedwitheachother in hierarchical fashion.
• Thetop-most nodein tree topology isknownasaroot node, and all
other nodesarethedescendants of theroot node.
• There isonly one path existsbetweentwonodesfor thedata
transmission.
• Thus,it formsaparent-childhierarchy.
TREE TOPOLOGY
ADVANTAGES OF TREE
TOPOLOGY
• Extensionof busandstar topologies.
• Expansionof nodesispossibleandeasy.
• Easilymanagedand maintained.
• Error detectioniseasilydone.
DISADVANTAGES OF TREE
TOPOLOGY
• Heavily cabled.
• Costly.
• If more nodesareaddedmaintenanceis difficult.
• Central hubfails,network fails.
MESH TOPOLOGY
• Meshtechnologyisanarrangementof thenetwork in which
computersareinterconnected witheachother through various
redundant connections.
• There aremultiple paths from onecomputer to anothercomputer.
• It doesnot contain the switch, hub or any central computer
whichactsasacentralpoint of communication.
• TheInternet isanexampleof themeshtopology.
MESHTOPOLOGY CONTD.
• Meshtopology ismainlyusedfor WA N implementations where
communicationfailuresareacritical concern.
• Meshtopology ismainlyusedfor wireless networks.
• Meshtopology canbeformed byusingtheformula:
Number of cables = (n*(n-1))/2;
• Where n is the number of nodes that represents the network.
MESH TOPOLOGY
ADVANTAGES OF MESH TOPOLOGY
• Eachconnectioncancarry itsowndata load.
• It isrobust.
• Faultisdiagnosedeasily.
• Providessecurity andprivacy.
DISADVANTAGES OF MESH
TOPOLOGY
• Installationandconfiguration is difficult.
• Cablingcostismore.
• Bulkwiringisrequired.
HYBRID TOPOLOGY
• When twoor more different topologiesarecombinedtogether
istermed asHybridtopology
• if similar topologiesconnectedwitheachother will not result in Hybrid
topology.
• For example,
• if there existaring topology in onebranchof ICICI bankandbus
topology in anotherbranchof ICICI bank,connectingthesetwo
topologieswill result in Hybrid topology.
HYBRID TOPOLOGY
ADVANTAGES OF HYBRID TOPOLOGY
• ReliablebecauseError detectingandtrouble shooting is
easy.
• Effective.
• Scalableassizecanbeincreased easily.
• Flexible.
DISADVANTAGES OF HYBRID
TOPOLOGY
• Complexindesign.
• Costly.
THANK
YOU