Unit 2
Unit 2
Networks
Layered architecture in computer networks refers to dividing a
network’s functioning into different layers, each responsible for a
certain communication component. The major goal of this layered
architecture is to separate the complex network communication
process into manageable, smaller activities that can be better
developed. In this article, we will discuss Layered Architecture in
Computer Networks.
Introduction to Layered Architecture
Every network consists of a specific number of functions, layers,
and tasks to perform. Layered Architecture in a computer network
is defined as a model where a whole network process is divided
into various smaller sub-tasks. These divided sub-tasks are then
assigned to a specific layer to perform only the dedicated tasks. A
single layer performs only a specific type of task. To run the
application and provide all types of services to clients a lower
layer adds its services to the higher layer present above it.
Therefore layered architecture provides interactions between the
sub-systems. If any type of modification is done in one layer it
does not affect the next layer.
Layered Architecture
1. OSI Model
OSI stands for Open Systems Interconnection. OSI is a seven
layered architecture. All these seven layers work collaboratively to
transmit data from one layer to another. Below are the layers of
OSI Model.
Physical Layer: Physical layer is the lowest layer of OSI model
and is responsible for the physical connection between all the
required devices. The information present in physical layer is in
the form of bits. Physical layer performs various functions such
as bit rate control, bit synchronization, transmission mode etc.
Data Link Layer: Data Link layer provides with successful
delivery of message from one node to the another. It checks
whether this delivery of message is error free. Other functions
performed by data link layer are error control, framing, flow
control etc.
Network Layer: Network Layer is responsible for the
transmission of data from one host to another host that is
connected in different network. It performs other tasks such
routing and logical addressing.
Transport Layer: Transport Layer is defined as a layer that
takes services from network layer and provides services to
application layer. Other tasks performed by transport layer are
service point addressing, segmentation and reassembling.
Session Layer: Session layer is defined as a layer that is
responsible for establishing a connection, maintenance of
session and to provide with security. Other functions of session
Layer are to establish session, termination and
synchronization.
Presentation Layer: The data from application layer is
extracted at the presentation layer. This layer is also known as
translation layer. The functions of presentation layer are
encryption, decryption, compression and translation.
Application Layer: Application layer is the topmost layer of
OSI Model. Application layer is also known as desktop layer. It
provides with other functions such as directory services, mail
services, network virtual terminal etc.
2. TCP/IP Model
1. Network Access Layer
It is a group of applications requiring network communications.
This layer is responsible for generating the data and requesting
connections. It acts on behalf of the sender and the Network
Access layer on the behalf of the receiver. During this article, we
will be talking on the behalf of the receiver.
The packet’s network protocol type, in this case, TCP/IP, is
identified by network access layer. Error prevention and “framing”
are also provided by this layer. Point-to-Point Protocol
(PPP) framing and Ethernet IEEE 802.2 framing are two examples
of data-link layer protocols.
2. Internet Layer
This layer parallels the functions of OSI’s Network layer. It defines
the protocols which are responsible for the logical transmission of
data over the entire network. The main protocols residing at this
layer are as follows:
IP: IP stands for Internet Protocol and it is responsible for
delivering packets from the source host to the destination host
by looking at the IP addresses in the packet headers. IP has 2
versions: IPv4 and IPv6. IPv4 is the one that most websites are
using currently. But IPv6 is growing as the number of IPv4
addresses is limited in number when compared to the number of
users.
ICMP: ICMP stands for Internet Control Message Protocol. It is
encapsulated within IP datagrams and is responsible for
providing hosts with information about network problems.
ARP: ARP stands for Address Resolution Protocol. Its job is to
find the hardware address of a host from a known IP address.
ARP has several types: Reverse ARP, Proxy ARP, Gratuitous
ARP, and Inverse ARP.
3. Transport Layer
The TCP/IP transport layer protocols exchange data receipt
acknowledgments and retransmit missing packets to ensure that
packets arrive in order and without error. End-to-end
communication is referred to as such. Transmission Control
Protocol (TCP) and User Datagram Protocol are transport layer
protocols at this level (UDP).
TCP: Applications can interact with one another using TCP as
though they were physically connected by a circuit. TCP
transmits data in a way that resembles character-by-character
transmission rather than separate packets. A starting point that
establishes the connection, the whole transmission in byte
order, and an ending point that closes the connection make up
this transmission.
UDP: The datagram delivery service is provided by UDP, the
other transport layer protocol. Connections between receiving
and sending hosts are not verified by UDP. Applications that
transport little amounts of data use UDP rather than TCP
because it eliminates the processes of establishing and
validating connections.
4. Application Layer
This layer is analogous to the transport layer of the OSI model. It
is responsible for end-to-end communication and error-free
delivery of data. It shields the upper-layer applications from the
complexities of data. The three main protocols present in this layer
are:
HTTP and HTTPS: HTTP stands for Hypertext transfer
protocol. It is used by the World Wide Web to manage
communications between web browsers and servers. HTTPS
stands for HTTP-Secure. It is a combination of HTTP with
SSL(Secure Socket Layer). It is efficient in cases where the
browser needs to fill out forms, sign in, authenticate, and carry
out bank transactions.
SSH: SSH stands for Secure Shell. It is a terminal emulations
software similar to Telnet. The reason SSH is preferred is
because of its ability to maintain the encrypted connection. It
sets up a secure session over a TCP/IP connection.
NTP: NTP stands for Network Time Protocol. It is used to
synchronize the clocks on our computer to one standard time
source. It is very useful in situations like bank transactions.
Assume the following situation without the presence of NTP.
Suppose you carry out a transaction, where your computer
reads the time at 2:30 PM while the server records it at 2:28
PM. The server can crash very badly if it’s out of sync.
Benefits of Layered Architecture
Modularity
Interoperability
Flexibility
Reusability
Scalability
Security
Challenges in Layered Architecture
Performance Overhead
Complexity in Implementation
Resource Utilization
Debugging and Troubleshooting
Protocol Overhead
Real-World Applications and Examples
Internet Browsing
Email Communication
Video Streaming
Online Gaming
Voice over IP (VoIP)
Smart Home Devices
Cloud Computing
Blockchain Networks
Conclusion
Layered architecture in computer networks significantly simplifies
the complex process involved in network communication by
dividing them into smaller process, each with its own function and
responsibility. This method improves modularity, interoperability,
flexibility, and security, making network systems easier to design,
manage, and expand. Despite problems like as performance
overhead and implementation complexity, the layered model’s
benefits may be seen in real-world applications such as internet
browsing, email communication, video streaming, and more,
emphasising its importance in modern networking.
Note:
Packet in the Data Link layer is referred to as Frame.
Data Link layer is handled by the NIC (Network Interface Card)
and device drivers of host machines.
Switch & Bridge are Data Link Layer devices.
Example
Let us consider a scenario where a user wants to send a message
through some Messenger application running in their browser. The
“ Messenger ” here acts as the application layer which provides
the user with an interface to create the data. This message or so-
called Data is compressed, optionally encrypted (if the data is
sensitive), and converted into bits (0’s and 1’s) so that it can be
transmitted.
Helps in
identifying the
Applicatio
client and Message SMTP
n Layer
synchronizing
7 communication.
Establishes
Connection,
Maintenance, Message (or
Session
Ensures encrypted Gateway
Layer
Authentication message)
and Ensures
5 security.
Take Service
from Network
Transport Layer and
Segment Firewall
Layer provide it to the
Application
4 Layer.
Transmission of
data from one
Network host to another,
Packet Router
Layer located in
different
3 networks.
Informati
on Form
Laye Layer Responsibil (Data Device or
r No Name ity Unit) Protocol
Node to Node
Data Link
Delivery of Frame Switch , Bridge
Layer
2 Message.
Establishing
Physical
Physical Hub , Repeater , Mod
Connections Bits
Layer em , Cables
between
1 Devices.