Network Communication Models and Technologies

TCP/IP Model

Developed by the Department of Defense, the TCP/IP Model is a practical, four or five-layer framework focused on reliable data transfer. It simplifies the OSI Model, aiming to ensure accurate data transmission across networks.

Layers of the TCP/IP Model

Application Layer

Responsible for end-to-end communication and error-free data delivery.

Key protocols include HTTP, HTTPS, SSH, and NTP.

Transport Layer (TCP/UDP)

Ensures reliable data transmission by handling acknowledgment and retransmission of packets.

TCP provides connection-oriented services, while UDP offers connectionless transmission.

Network/Internet Layer (IP)

Facilitates logical transmission of data across networks.

Key protocols include IPv4, IPv6, ICMP, and ARP.

Data Link Layer (MAC)

Identifies network protocol types and provides error prevention and framing.

Examples include Point-to-Point Protocol (PPP) and Ethernet IEEE 802.2 framing.

Physical Layer

Involves the actual hardware transmission of data signals.

Key Functions of Each Layer

  • Application Layer: Manages end-to-end communication and shields upper-layer applications from data complexities.
  • Transport Layer: Facilitates reliable data transfer, acknowledging receipt and retransmitting missing packets.
  • Network/Internet Layer: Routes packets across networks based on IP addresses, ensuring proper delivery.
  • Data Link Layer: Identifies protocol types and provides error prevention mechanisms.
  • Physical Layer: Involves hardware-level transmission of data signals.

Differences between TCP/IP and OSI

  • Protocol Handling: TCP/IP’s TCP and IP handle data transmission, while OSI separates session and presentation layers.
  • Layer Structure: TCP/IP condenses layers compared to OSI’s seven-layer structure.
  • Approach to Packet Delivery: TCP/IP focuses on ensuring accurate data transfer, while OSI emphasizes layered functionalities and packet delivery assurance.

OSI Model

The OSI (Open Systems Interconnection) Model is a conceptual framework that divides network communication into seven distinct layers. Each layer has specific functions and interactions, facilitating standardized network design, implementation, and troubleshooting.

Layers of the OSI Model

Physical Layer

Handles the physical transmission of data signals over the network medium.

Concerned with characteristics such as voltage levels, cable types, and physical connectors.

Data Link Layer

Provides error detection and correction, as well as framing and flow control.

Responsible for organizing data into frames for transmission and ensuring reliable point-to-point communication.

Network Layer

Focuses on logical addressing and routing of data packets across networks.

Determines the best path for data transmission and forwards packets based on destination IP addresses.

Transport Layer

Ensures reliable end-to-end communication between devices.

Manages data segmentation, acknowledgment, and retransmission to guarantee data delivery.

Session Layer

Establishes, maintains, and terminates sessions between applications.

Facilitates dialogue control and synchronization between devices, allowing for orderly data exchange.

Presentation Layer

Handles data formatting, encryption, and compression for efficient transmission.

Converts data into a format suitable for transmission over the network and ensures compatibility between different systems.

Application Layer

Provides network services directly to end-users and applications.

Includes protocols for tasks such as email, file transfer, and remote access, enabling interaction between users and network services.

Key Functions of Each Layer

  • Physical Layer: Handles physical transmission of data signals.
  • Data Link Layer: Provides error detection, framing, and reliable communication.
  • Network Layer: Routes data packets across networks based on logical addressing.
  • Transport Layer: Ensures reliable end-to-end communication through data segmentation and acknowledgment.
  • Session Layer: Manages sessions between applications for orderly data exchange.
  • Presentation Layer: Handles data formatting and ensures compatibility between systems.
  • Application Layer: Provides network services directly to end-users and applications.

Differences between OSI and TCP/IP

  • Protocol Handling: OSI separates session and presentation layers, while TCP/IP integrates them into the application layer.
  • Layer Structure: OSI has seven layers, while TCP/IP has four or five layers, depending on interpretation.
  • Approach to Packet Delivery: OSI focuses on layered functionalities and packet delivery assurance, while TCP/IP emphasizes reliable data transfer.

Virtual Circuit Switching (VCS)

Virtual Circuit is a computer network providing connection-oriented service. It is a connection-oriented network where resources are reserved for the time interval of data transmission between two nodes.

Working of Virtual Circuit

  1. A medium is set up between the two end nodes.
  2. Resources are reserved for the transmission of packets.
  3. A signal is sent to the sender to indicate that the medium is set up and transmission can begin.
  4. It ensures the transmission of all packets in sequence.
  5. A global header is used in the first packet of the connection.
  6. Whenever data is to be transmitted, a new connection is set up.

Congestion Control in Virtual Circuit

When congestion is detected in a virtual circuit network, closed-loop techniques are used:

  • No new connection: No new connections are established when congestion is detected.
  • Participation of congested router invalid: New connections are routed to avoid congested routers.
  • Negotiation: Parameters like traffic shape, volume, and quality of service are negotiated during connection establishment.

Advantages of Virtual Circuit

  1. Packets are delivered to the receiver in the same order sent by the sender.
  2. It is a reliable network circuit.
  3. There is no need for overhead in each packet; a single global packet overhead is used.
  4. Offers efficient data transfer with predictable performance.

Disadvantages of Virtual Circuit

  1. Virtual circuit is costly to implement due to resource reservation.
  2. It provides only connection-oriented service, which may not be suitable for all applications.
  3. Always requires a new connection setup for transmission, which can introduce latency.
  4. May not scale well for large networks or dynamic traffic patterns.

Comparison with Datagram

  • Virtual Circuit Switching (VCS):
    • Connection Setup: Requires a setup phase where a dedicated path is established before data transfer.
    • Resource Allocation: Resources are reserved along the established path for the duration of the connection.
    • Predictability: Offers more predictable performance once the circuit is set up.
  • Datagram:
    • No Setup Phase: Each packet is routed independently, without prior setup.
    • Resource Allocation: Resources are allocated on a per-packet basis, leading to potentially variable performance.
    • Flexibility: More flexible in handling dynamic traffic patterns and network changes.

Data Link Layer

The data link layer, also known as Layer 2 of the OSI model, is responsible for the reliable transmission of data across a physical link.

Key Features of the Data Link Layer

  1. Frame Synchronization: Data is organized into frames, and the data link layer ensures proper synchronization by delineating where frames start and end. This helps receivers correctly identify the boundaries of each frame.
  2. Addressing: Each device on a network has a unique identifier known as a MAC (Media Access Control) address. The data link layer uses MAC addresses for communication within the same local network segment.
  3. Error Detection and Correction: The data link layer detects errors that occur during transmission using techniques like CRC (Cyclic Redundancy Check). Some protocols in this layer also incorporate error correction mechanisms to retransmit lost or corrupted frames.
  4. Flow Control: Flow control mechanisms regulate the flow of data between sender and receiver to prevent the sender from overwhelming the receiver with data. This ensures that data is transmitted at a rate that the receiver can handle.
  5. Media Access Control (MAC): The data link layer governs access to the physical transmission medium, such as Ethernet cables or wireless radio frequencies. It implements protocols like CSMA/CD (Carrier Sense Multiple Access with Collision Detection) for shared media or CSMA/CA (Carrier Sense Multiple Access with Collision Avoidance) for wireless networks.
  6. Logical Link Control (LLC): The LLC sublayer of the data link layer manages communication between devices over the data link. It provides services such as error detection, flow control, and frame synchronization to higher layers of the OSI model.
  7. Frame Addressing: Frames include header information containing source and destination MAC addresses, allowing devices to determine whether they are the intended recipients of transmitted data. This addressing enables point-to-point and multi-point communication within a network.
  8. Fragmentation and Reassembly: When data is too large to fit into a single frame, the data link layer may fragment it into smaller units for transmission. At the receiving end, these fragments are reassembled to reconstruct the original data.
  9. Duplexing: The data link layer supports both half-duplex and full-duplex communication modes. In half-duplex mode, communication occurs in both directions, but not simultaneously. In full-duplex mode, communication can occur simultaneously in both directions.
  10. Media Access Methods: The data link layer implements various media access methods, such as contention-based (e.g., Ethernet) and controlled access (e.g., Token Ring), to coordinate access to the transmission medium and manage network traffic efficiently.

These features collectively enable the data link layer to facilitate reliable, efficient, and orderly communication between devices connected to the same network segment.

Multiple Access Techniques

Frequency Division Multiple Access (FDMA)

Principle: FDMA divides the available frequency spectrum into multiple non-overlapping frequency bands or channels.

Operation: Each user or device is assigned a unique frequency band for communication. Multiple users can transmit simultaneously, with each user occupying a separate frequency band.

Example: In an FDMA system, such as traditional analog FM radio broadcasting, different radio stations are assigned specific frequency bands within the allocated spectrum. Each station broadcasts within its assigned frequency band, ensuring that multiple stations can operate simultaneously without interfering with each other.

Time Division Multiple Access (TDMA)

Principle: TDMA divides the available transmission time into sequential time slots.

Operation: Users are assigned specific time slots during which they can transmit data. These time slots are cyclically allocated, allowing multiple users to share the same frequency channel by taking turns transmitting in different time slots.

Example: In TDMA-based cellular networks like GSM (Global System for Mobile Communications), each user is allocated a dedicated time slot within a frame. Users take turns transmitting during their assigned time slots.

Code Division Multiple Access (CDMA)

Principle: CDMA assigns a unique code to each user or device to distinguish their transmissions.

Operation: Users transmit data simultaneously over the entire available bandwidth. Each user’s data is modulated with a unique spreading code, which spreads the signal across a wide frequency band. This allows multiple users to share the same frequency band without causing interference, as their signals appear as noise to other users.

Example: In CDMA cellular networks like CDMA2000 or WCDMA (Wideband CDMA), each user’s data is spread across the entire frequency spectrum using unique spreading codes. Despite overlapping transmissions, each user’s signal can be distinguished at the receiver by correlating it with the corresponding spreading code.

Channelization Protocols

Polling Protocol (e.g., Polling MAC Protocol)

  • A central controller polls users one by one to grant access to the channel.
  • Users transmit data only when polled by the controller.
  • Provides centralized control over channel access, reducing collisions.
  • Suitable for networks with a moderate number of users and bursty traffic.
  • Overhead increases with the number of users, and the controller may become a bottleneck in large-scale networks.

Token-passing Protocol (e.g., Token Ring)

  • Users must possess a token to transmit data over the network.
  • The token circulates among users in a predefined sequence.
  • Only the user holding the token can transmit data, ensuring fair access.
  • Provides a distributed mechanism for controlling access to the channel.
  • Suitable for networks with fixed or variable-sized frames and stringent QoS requirements.

Reservation-based Protocol (e.g., Reservation ALOHA)

:

Users reserve slots in advance for transmitting data.

Time slots are allocated to users based on requests or reservations.

Ensures predictable access to the channel and minimizes collisions.

Suitable for applications with periodic or predictable traffic patterns.

Reservation overhead and complexity may increase with the number of users.