SlideShare a Scribd company logo
Protocol Layers and Their Service Models
Communication Architecture
Strategy for connecting host computers and other
communicating equipment.
Defines necessary elements for data communication
between devices.
A communication architecture, therefore, defines a
standard for the communicating hosts.
A programmer formats data in a manner defined by the
communication architecture and passes it on to the
communication software.
Separating communication functions adds flexibility, for
example, we do not need to modify the entire host software
to include more communication devices.
OSI Model
2.3
2-1 LAYERED TASKS
We use the concept of layers in our daily life.
• As an example, let us consider two friends who
communicate through postal mail. The process of
sending a letter to a friend would be complex if there
were no services available from the post office.
2.4
Figure Tasks involved in sending a letter
5
PROTOCOL LAYERS
Protocol is required when two entities need to
communicate. When communication is not simple,
we may divide the complex task of communication
into several layers. In this case, we may need
several protocols, one for each layer.
6
Assume Maria and Ann are neighbors with a lot of common
ideas. However, Maria speaks only Spanish, and Ann speaks
only English. Since both have learned the sign language in their
childhood, they enjoy meeting in a cafe a couple of days per
week and exchange their ideas using signs. Occasionally, they
also use a bilingual dictionary. Communication is face to face
and Happens in one layer as shown in Figure 2.1.
Example 2.1
7
Figure Example 2.1
8
Now assume that Ann has to move to another town because of
her job. Before she moves, the two meet for the last time in the
same cafe. Although both are sad, Maria surprises Ann when
she opens a packet that contains two small machines. The first
machine can scan and transform a letter in English to a secret
code or vice versa. The other machine can scan and translate a
letter in Spanish to the same secret code or vice versa. Ann
takes the first machine; Maria keeps the second one. The two
friends can still communicate using the secret code, as shown
in Figure 2.2.
Example 2.2
9
Figure 2.2 Example 2.2
Layer Architecture
Layer architecture simplifies the network design.
A Layered architecture allows us to discuss a well-defined,
specific part of the layer and complex system.
It is easy to debug network applications in a layered
architecture network.
The network management is easier due to the layered
architecture.
Network layers follow a set of rules, called protocol.
The protocol defines the format of the data being
exchanged, and the control and timing for the handshake
between layers.
OSI Model
Open Systems Interconnection (OSI) Model
International standard organization (ISO) established a
committee in 1977 to develop an architecture for computer
communication.
Open Systems Interconnection (OSI) reference model is the
result of this effort.
In 1984, the Open Systems Interconnection (OSI) reference
model was approved as an international standard for
communications architecture.
Term “open” denotes the ability to connect any two
systems which conform to the reference model and
associated standards.
OSI Model
OSI Reference Model
The OSI model is now considered the primary Architectural model for inter-
computer communications.
The OSI model describes how information or data makes its way from application
programmes (such as spreadsheets) through a network medium (such as wire) to
another application programme located on another network.
The OSI reference model divides the problem of moving information between
computers over a network medium into SEVEN smaller and more manageable
problems .
This separation into smaller more manageable functions is known as layering.
OSI Model
2.13
ISO is the organization.
OSI is the model.
Note
2.14
Figure Seven layers of the OSI model
OSI Reference Model: 7 Layers
OSI Model
OSI: A Layered Network Model
The process of breaking up the functions or tasks of networking into layers
reduces complexity.
Each layer provides a service to the layer above it in the protocol specification.
Each layer communicates with the same layer’s software or hardware on other
computers.
The lower 4 layers (transport, network, data link and physical —Layers 4, 3, 2, and
1) are concerned with the flow of data from end to end through the network.
The upper three layers of the OSI model (application, presentation and session—
Layers 7, 6 and 5) are orientated more toward services to the applications.
Data is Encapsulated with the necessary protocol information as it moves down
the layers before network transit.
OSI Model
FIG. OSI Model
Physical Layer
Provides physical interface for transmission of information.
Defines rules by which bits are passed from one system to another on a physical
communication medium.
Covers all - mechanical, electrical, functional and procedural - aspects for
physical communication.
Such characteristics as voltage levels, timing of voltage changes, physical data
rates, maximum transmission distances, physical connectors, and other similar
attributes are defined by physical layer specifications.
OSI Model
2.19
Figure. Physical layer
2.20
The physical layer is responsible for movements of
individual bits from one hop (node) to the next.
Note
The physical layer is also concerned with the following:
1. Physical characteristics of interfaces and medium
2. Representation of bits.
3. Data rate.
4. Synchronization of bits.
5. Line configuration: this layer is concerned with the connection of devices to the media i.e. point-to-point
or multipoint
6. Physical topology.
7. Transmission mode : The physical layer also defines the direction of transmission between two devices:
simplex, half-duplex, or full-duplex
Data Link Layer
Data link layer attempts to provide reliable communication over the physical layer
interface.
Breaks the outgoing data into frames and reassemble the received frames.
Create and detect frame boundaries.
Implement Error Control by implementing an acknowledgement and retransmission
scheme of damaged or lost frames.
Implement flow control.
Supports point-to-point as well as broadcast communication.
Supports simplex, half-duplex or full-duplex communication.
Examples of Link layer protocols are Ethernet, WiFi and PPP
(point-to-point)
OSI Model
2.22
Figure 2.6 Data link layer
Functions of Data Link Layer
• Framing: Frames are the streams of bits received from the network layer into
manageable data units. This division of stream of bits is done by Data Link Layer.
• Physical Addressing: The Data Link layer adds a header to the frame in order to
define physical address of the sender or receiver of the frame, if the frames are to
be distributed to different systems on the network.
• Flow Control: A flow control mechanism to avoid a fast transmitter from running a
slow receiver by buffering the extra bit is provided by flow control. This prevents
traffic jam at the receiver side.
• Error Control: Error control is achieved by adding a trailer at the end of the frame.
Duplication of frames are also prevented by using this mechanism. Data Link
Layers adds mechanism to prevent duplication of frames.
• Access Control: Protocols of this layer determine which of the devices has control
over the link at any given time, when two or more devices are connected to the
same link.
2.25
The data link layer is responsible for moving
frames from one hop (node) to the next.
Note
Network Layer
Implements routing of frames (packets) through the network.
Defines the most optimum path the packet should take from the
source to the destination
Defines logical addressing so that any endpoint can be identified.
Handles congestion in the network.
Facilitates interconnection between heterogeneous networks
(Internetworking).
The network layer also defines how to fragment a packet into smaller
packets to accommodate different media.
OSI Model
2.27
Figure. Network layer
2.28
The network layer is responsible for the
delivery of individual packets from
the source host to the destination host.
Note
Transport Layer
Purpose of this layer is to provide a reliable mechanism for the
exchange of data between two processes in different computers.
Ensures that the data units are delivered error free.
Ensures that data units are delivered in sequence.
Ensures that there is no loss or duplication of data units.
Provides connectionless or connection oriented service.
Provides for the connection management.
Multiplex multiple connection over a single channel.
OSI Model
Session Layer
Session layer provides mechanism for controlling the dialogue between the two end
systems. It defines how to start, control and end conversations (called sessions)
between applications.
This layer requests for a logical connection to be established on an end-user’s request.
Any necessary log-on or password validation is also handled by this layer.
Session layer is also responsible for terminating the connection.
Synchronization : This layer allows a process to add checkpoints which are considered
as synchronization points into stream of data.
Example: If a system is sending a file of 800 pages, adding checkpoints after every 50 pages is
recommended. This ensures that 50 page unit is successfully received and acknowledged. This is
beneficial at the time of crash as if a crash happens at page number 110; there is no need to
retransmit 1 to100 pages.
OSI Model
Presentation Layer
Presentation layer defines the format in which the data is to be
exchanged between the two communicating entities.
Also handles data compression and data encryption.
OSI Model
Application Layer
Application layer interacts with application programs and is the
highest level of OSI model.
Application layer contains management functions to support
distributed applications.
Examples of application layer are applications such as file
transfer (FTP), electronic mail (SMTP), remote login (TELNET),
HTTP, DNS etc.
OSI Model
Functions of Application Layer
• Mail Services: This layer provides the basis for E-mail forwarding and
storage.
• Network Virtual Terminal: It allows a user to log on to a remote host.
• Directory Services: This layer provides access for global information about
various services.
• File Transfer, Access and Management (FTAM): It is a standard mechanism
to access files and manages it. Users can access files in a remote computer
and manage it. They can also retrieve files from a remote computer.
OSI In Action
A message begins at the top application layer and moves down the OSI
layers to the bottom physical layer.
As the message descends, each successive OSI model layer adds a header
to it.
A header is layer-specific information that basically explains what
functions the layer carried out.
Conversely, at the receiving end, headers are striped from the message
as it travels up the corresponding layers.
OSI Model
TCP/IP Model
TCP/IP MODEL
OSI & TCP/IP Models
TCP/IP Model
TCP/IP Model
TCP/IP Model
Application Layer
Application programs using the network
Transport Layer (TCP/UDP)
Management of end-to-end message transmission,
error detection and error correction
Network Layer (IP)
Handling of datagrams : routing and congestion
Data Link Layer
Management of cost effective and reliable data delivery,
access to physical networks
Physical Layer
Physical Media
DCN _ unit 2.pptx
DCN _ unit 2.pptx

More Related Content

Similar to DCN _ unit 2.pptx

Lecture2
Lecture2Lecture2
Lecture2
Thinesh Nathan
 
Osi model
Osi modelOsi model
Osi model
Umamaheshwariv1
 
OSI models
OSI modelsOSI models
OSI models
Mahesh Kumar Attri
 
Presentation on osi layer
Presentation on osi layerPresentation on osi layer
Presentation on osi layer
Kuldeep Pathak
 
Networking Standards And Protocols
Networking Standards And ProtocolsNetworking Standards And Protocols
Networking Standards And Protocols
Steven Cahill
 
seven layer OSI model
seven layer OSI modelseven layer OSI model
seven layer OSI model
Manjeet MN
 
OSI Model of Networking
OSI Model of NetworkingOSI Model of Networking
OSI Model of Networking
Mukesh Tekwani
 
Network Advantages And Disadvantages
Network Advantages And DisadvantagesNetwork Advantages And Disadvantages
Network Advantages And Disadvantages
Renee Jones
 
OSI and TCP/IP reference models in networking
OSI and TCP/IP reference models in networkingOSI and TCP/IP reference models in networking
OSI and TCP/IP reference models in networking
MeenakshiGupta233101
 
OSI 7 layer Architecture and explain the functions of each layer
OSI 7 layer Architecture and explain the functions of each layerOSI 7 layer Architecture and explain the functions of each layer
OSI 7 layer Architecture and explain the functions of each layer
Ananthkumar6965
 
OSI Model and TCP/IP Model.
OSI Model and TCP/IP Model.OSI Model and TCP/IP Model.
OSI Model and TCP/IP Model.
City University, Dhaka, Bangladesh
 
Osi model and tcpip model.
Osi model and tcpip model.Osi model and tcpip model.
Osi model and tcpip model.
kona paul
 
Topology Chapter 2.pptx
Topology Chapter 2.pptxTopology Chapter 2.pptx
Topology Chapter 2.pptx
TadeseBeyene
 
OSI Network Reference Model
OSI Network Reference ModelOSI Network Reference Model
OSI Network Reference Model
chandrakant Mallick
 
Lecture 05
Lecture 05Lecture 05
Lecture 05
Sehrish Rafiq
 
OSI &TCP/IP Model
OSI &TCP/IP ModelOSI &TCP/IP Model
OSI &TCP/IP Model
Shamima Akther
 
Ch 2 network
Ch 2 networkCh 2 network
Ch 2 network
MohamedAbdELhamed35
 
OSI Reference Model-Lecture-2.pptx
OSI Reference Model-Lecture-2.pptxOSI Reference Model-Lecture-2.pptx
OSI Reference Model-Lecture-2.pptx
vishal choudhary
 
OSI Model
OSI ModelOSI Model
OSI Model
DINESH KAMBLE
 
Osi
OsiOsi

Similar to DCN _ unit 2.pptx (20)

Lecture2
Lecture2Lecture2
Lecture2
 
Osi model
Osi modelOsi model
Osi model
 
OSI models
OSI modelsOSI models
OSI models
 
Presentation on osi layer
Presentation on osi layerPresentation on osi layer
Presentation on osi layer
 
Networking Standards And Protocols
Networking Standards And ProtocolsNetworking Standards And Protocols
Networking Standards And Protocols
 
seven layer OSI model
seven layer OSI modelseven layer OSI model
seven layer OSI model
 
OSI Model of Networking
OSI Model of NetworkingOSI Model of Networking
OSI Model of Networking
 
Network Advantages And Disadvantages
Network Advantages And DisadvantagesNetwork Advantages And Disadvantages
Network Advantages And Disadvantages
 
OSI and TCP/IP reference models in networking
OSI and TCP/IP reference models in networkingOSI and TCP/IP reference models in networking
OSI and TCP/IP reference models in networking
 
OSI 7 layer Architecture and explain the functions of each layer
OSI 7 layer Architecture and explain the functions of each layerOSI 7 layer Architecture and explain the functions of each layer
OSI 7 layer Architecture and explain the functions of each layer
 
OSI Model and TCP/IP Model.
OSI Model and TCP/IP Model.OSI Model and TCP/IP Model.
OSI Model and TCP/IP Model.
 
Osi model and tcpip model.
Osi model and tcpip model.Osi model and tcpip model.
Osi model and tcpip model.
 
Topology Chapter 2.pptx
Topology Chapter 2.pptxTopology Chapter 2.pptx
Topology Chapter 2.pptx
 
OSI Network Reference Model
OSI Network Reference ModelOSI Network Reference Model
OSI Network Reference Model
 
Lecture 05
Lecture 05Lecture 05
Lecture 05
 
OSI &TCP/IP Model
OSI &TCP/IP ModelOSI &TCP/IP Model
OSI &TCP/IP Model
 
Ch 2 network
Ch 2 networkCh 2 network
Ch 2 network
 
OSI Reference Model-Lecture-2.pptx
OSI Reference Model-Lecture-2.pptxOSI Reference Model-Lecture-2.pptx
OSI Reference Model-Lecture-2.pptx
 
OSI Model
OSI ModelOSI Model
OSI Model
 
Osi
OsiOsi
Osi
 

Recently uploaded

Advanced control scheme of doubly fed induction generator for wind turbine us...
Advanced control scheme of doubly fed induction generator for wind turbine us...Advanced control scheme of doubly fed induction generator for wind turbine us...
Advanced control scheme of doubly fed induction generator for wind turbine us...
IJECEIAES
 
Manufacturing Process of molasses based distillery ppt.pptx
Manufacturing Process of molasses based distillery ppt.pptxManufacturing Process of molasses based distillery ppt.pptx
Manufacturing Process of molasses based distillery ppt.pptx
Madan Karki
 
Generative AI leverages algorithms to create various forms of content
Generative AI leverages algorithms to create various forms of contentGenerative AI leverages algorithms to create various forms of content
Generative AI leverages algorithms to create various forms of content
Hitesh Mohapatra
 
sieving analysis and results interpretation
sieving analysis and results interpretationsieving analysis and results interpretation
sieving analysis and results interpretation
ssuser36d3051
 
Embedded machine learning-based road conditions and driving behavior monitoring
Embedded machine learning-based road conditions and driving behavior monitoringEmbedded machine learning-based road conditions and driving behavior monitoring
Embedded machine learning-based road conditions and driving behavior monitoring
IJECEIAES
 
6th International Conference on Machine Learning & Applications (CMLA 2024)
6th International Conference on Machine Learning & Applications (CMLA 2024)6th International Conference on Machine Learning & Applications (CMLA 2024)
6th International Conference on Machine Learning & Applications (CMLA 2024)
ClaraZara1
 
Recycled Concrete Aggregate in Construction Part III
Recycled Concrete Aggregate in Construction Part IIIRecycled Concrete Aggregate in Construction Part III
Recycled Concrete Aggregate in Construction Part III
Aditya Rajan Patra
 
New techniques for characterising damage in rock slopes.pdf
New techniques for characterising damage in rock slopes.pdfNew techniques for characterising damage in rock slopes.pdf
New techniques for characterising damage in rock slopes.pdf
wisnuprabawa3
 
Harnessing WebAssembly for Real-time Stateless Streaming Pipelines
Harnessing WebAssembly for Real-time Stateless Streaming PipelinesHarnessing WebAssembly for Real-time Stateless Streaming Pipelines
Harnessing WebAssembly for Real-time Stateless Streaming Pipelines
Christina Lin
 
Electric vehicle and photovoltaic advanced roles in enhancing the financial p...
Electric vehicle and photovoltaic advanced roles in enhancing the financial p...Electric vehicle and photovoltaic advanced roles in enhancing the financial p...
Electric vehicle and photovoltaic advanced roles in enhancing the financial p...
IJECEIAES
 
Exception Handling notes in java exception
Exception Handling notes in java exceptionException Handling notes in java exception
Exception Handling notes in java exception
Ratnakar Mikkili
 
Swimming pool mechanical components design.pptx
Swimming pool  mechanical components design.pptxSwimming pool  mechanical components design.pptx
Swimming pool mechanical components design.pptx
yokeleetan1
 
Wearable antenna for antenna applications
Wearable antenna for antenna applicationsWearable antenna for antenna applications
Wearable antenna for antenna applications
Madhumitha Jayaram
 
A SYSTEMATIC RISK ASSESSMENT APPROACH FOR SECURING THE SMART IRRIGATION SYSTEMS
A SYSTEMATIC RISK ASSESSMENT APPROACH FOR SECURING THE SMART IRRIGATION SYSTEMSA SYSTEMATIC RISK ASSESSMENT APPROACH FOR SECURING THE SMART IRRIGATION SYSTEMS
A SYSTEMATIC RISK ASSESSMENT APPROACH FOR SECURING THE SMART IRRIGATION SYSTEMS
IJNSA Journal
 
spirit beverages ppt without graphics.pptx
spirit beverages ppt without graphics.pptxspirit beverages ppt without graphics.pptx
spirit beverages ppt without graphics.pptx
Madan Karki
 
5214-1693458878915-Unit 6 2023 to 2024 academic year assignment (AutoRecovere...
5214-1693458878915-Unit 6 2023 to 2024 academic year assignment (AutoRecovere...5214-1693458878915-Unit 6 2023 to 2024 academic year assignment (AutoRecovere...
5214-1693458878915-Unit 6 2023 to 2024 academic year assignment (AutoRecovere...
ihlasbinance2003
 
Heat Resistant Concrete Presentation ppt
Heat Resistant Concrete Presentation pptHeat Resistant Concrete Presentation ppt
Heat Resistant Concrete Presentation ppt
mamunhossenbd75
 
RAT: Retrieval Augmented Thoughts Elicit Context-Aware Reasoning in Long-Hori...
RAT: Retrieval Augmented Thoughts Elicit Context-Aware Reasoning in Long-Hori...RAT: Retrieval Augmented Thoughts Elicit Context-Aware Reasoning in Long-Hori...
RAT: Retrieval Augmented Thoughts Elicit Context-Aware Reasoning in Long-Hori...
thanhdowork
 
22CYT12-Unit-V-E Waste and its Management.ppt
22CYT12-Unit-V-E Waste and its Management.ppt22CYT12-Unit-V-E Waste and its Management.ppt
22CYT12-Unit-V-E Waste and its Management.ppt
KrishnaveniKrishnara1
 
2. Operations Strategy in a Global Environment.ppt
2. Operations Strategy in a Global Environment.ppt2. Operations Strategy in a Global Environment.ppt
2. Operations Strategy in a Global Environment.ppt
PuktoonEngr
 

Recently uploaded (20)

Advanced control scheme of doubly fed induction generator for wind turbine us...
Advanced control scheme of doubly fed induction generator for wind turbine us...Advanced control scheme of doubly fed induction generator for wind turbine us...
Advanced control scheme of doubly fed induction generator for wind turbine us...
 
Manufacturing Process of molasses based distillery ppt.pptx
Manufacturing Process of molasses based distillery ppt.pptxManufacturing Process of molasses based distillery ppt.pptx
Manufacturing Process of molasses based distillery ppt.pptx
 
Generative AI leverages algorithms to create various forms of content
Generative AI leverages algorithms to create various forms of contentGenerative AI leverages algorithms to create various forms of content
Generative AI leverages algorithms to create various forms of content
 
sieving analysis and results interpretation
sieving analysis and results interpretationsieving analysis and results interpretation
sieving analysis and results interpretation
 
Embedded machine learning-based road conditions and driving behavior monitoring
Embedded machine learning-based road conditions and driving behavior monitoringEmbedded machine learning-based road conditions and driving behavior monitoring
Embedded machine learning-based road conditions and driving behavior monitoring
 
6th International Conference on Machine Learning & Applications (CMLA 2024)
6th International Conference on Machine Learning & Applications (CMLA 2024)6th International Conference on Machine Learning & Applications (CMLA 2024)
6th International Conference on Machine Learning & Applications (CMLA 2024)
 
Recycled Concrete Aggregate in Construction Part III
Recycled Concrete Aggregate in Construction Part IIIRecycled Concrete Aggregate in Construction Part III
Recycled Concrete Aggregate in Construction Part III
 
New techniques for characterising damage in rock slopes.pdf
New techniques for characterising damage in rock slopes.pdfNew techniques for characterising damage in rock slopes.pdf
New techniques for characterising damage in rock slopes.pdf
 
Harnessing WebAssembly for Real-time Stateless Streaming Pipelines
Harnessing WebAssembly for Real-time Stateless Streaming PipelinesHarnessing WebAssembly for Real-time Stateless Streaming Pipelines
Harnessing WebAssembly for Real-time Stateless Streaming Pipelines
 
Electric vehicle and photovoltaic advanced roles in enhancing the financial p...
Electric vehicle and photovoltaic advanced roles in enhancing the financial p...Electric vehicle and photovoltaic advanced roles in enhancing the financial p...
Electric vehicle and photovoltaic advanced roles in enhancing the financial p...
 
Exception Handling notes in java exception
Exception Handling notes in java exceptionException Handling notes in java exception
Exception Handling notes in java exception
 
Swimming pool mechanical components design.pptx
Swimming pool  mechanical components design.pptxSwimming pool  mechanical components design.pptx
Swimming pool mechanical components design.pptx
 
Wearable antenna for antenna applications
Wearable antenna for antenna applicationsWearable antenna for antenna applications
Wearable antenna for antenna applications
 
A SYSTEMATIC RISK ASSESSMENT APPROACH FOR SECURING THE SMART IRRIGATION SYSTEMS
A SYSTEMATIC RISK ASSESSMENT APPROACH FOR SECURING THE SMART IRRIGATION SYSTEMSA SYSTEMATIC RISK ASSESSMENT APPROACH FOR SECURING THE SMART IRRIGATION SYSTEMS
A SYSTEMATIC RISK ASSESSMENT APPROACH FOR SECURING THE SMART IRRIGATION SYSTEMS
 
spirit beverages ppt without graphics.pptx
spirit beverages ppt without graphics.pptxspirit beverages ppt without graphics.pptx
spirit beverages ppt without graphics.pptx
 
5214-1693458878915-Unit 6 2023 to 2024 academic year assignment (AutoRecovere...
5214-1693458878915-Unit 6 2023 to 2024 academic year assignment (AutoRecovere...5214-1693458878915-Unit 6 2023 to 2024 academic year assignment (AutoRecovere...
5214-1693458878915-Unit 6 2023 to 2024 academic year assignment (AutoRecovere...
 
Heat Resistant Concrete Presentation ppt
Heat Resistant Concrete Presentation pptHeat Resistant Concrete Presentation ppt
Heat Resistant Concrete Presentation ppt
 
RAT: Retrieval Augmented Thoughts Elicit Context-Aware Reasoning in Long-Hori...
RAT: Retrieval Augmented Thoughts Elicit Context-Aware Reasoning in Long-Hori...RAT: Retrieval Augmented Thoughts Elicit Context-Aware Reasoning in Long-Hori...
RAT: Retrieval Augmented Thoughts Elicit Context-Aware Reasoning in Long-Hori...
 
22CYT12-Unit-V-E Waste and its Management.ppt
22CYT12-Unit-V-E Waste and its Management.ppt22CYT12-Unit-V-E Waste and its Management.ppt
22CYT12-Unit-V-E Waste and its Management.ppt
 
2. Operations Strategy in a Global Environment.ppt
2. Operations Strategy in a Global Environment.ppt2. Operations Strategy in a Global Environment.ppt
2. Operations Strategy in a Global Environment.ppt
 

DCN _ unit 2.pptx

  • 1. Protocol Layers and Their Service Models
  • 2. Communication Architecture Strategy for connecting host computers and other communicating equipment. Defines necessary elements for data communication between devices. A communication architecture, therefore, defines a standard for the communicating hosts. A programmer formats data in a manner defined by the communication architecture and passes it on to the communication software. Separating communication functions adds flexibility, for example, we do not need to modify the entire host software to include more communication devices. OSI Model
  • 3. 2.3 2-1 LAYERED TASKS We use the concept of layers in our daily life. • As an example, let us consider two friends who communicate through postal mail. The process of sending a letter to a friend would be complex if there were no services available from the post office.
  • 4. 2.4 Figure Tasks involved in sending a letter
  • 5. 5 PROTOCOL LAYERS Protocol is required when two entities need to communicate. When communication is not simple, we may divide the complex task of communication into several layers. In this case, we may need several protocols, one for each layer.
  • 6. 6 Assume Maria and Ann are neighbors with a lot of common ideas. However, Maria speaks only Spanish, and Ann speaks only English. Since both have learned the sign language in their childhood, they enjoy meeting in a cafe a couple of days per week and exchange their ideas using signs. Occasionally, they also use a bilingual dictionary. Communication is face to face and Happens in one layer as shown in Figure 2.1. Example 2.1
  • 8. 8 Now assume that Ann has to move to another town because of her job. Before she moves, the two meet for the last time in the same cafe. Although both are sad, Maria surprises Ann when she opens a packet that contains two small machines. The first machine can scan and transform a letter in English to a secret code or vice versa. The other machine can scan and translate a letter in Spanish to the same secret code or vice versa. Ann takes the first machine; Maria keeps the second one. The two friends can still communicate using the secret code, as shown in Figure 2.2. Example 2.2
  • 10. Layer Architecture Layer architecture simplifies the network design. A Layered architecture allows us to discuss a well-defined, specific part of the layer and complex system. It is easy to debug network applications in a layered architecture network. The network management is easier due to the layered architecture. Network layers follow a set of rules, called protocol. The protocol defines the format of the data being exchanged, and the control and timing for the handshake between layers. OSI Model
  • 11. Open Systems Interconnection (OSI) Model International standard organization (ISO) established a committee in 1977 to develop an architecture for computer communication. Open Systems Interconnection (OSI) reference model is the result of this effort. In 1984, the Open Systems Interconnection (OSI) reference model was approved as an international standard for communications architecture. Term “open” denotes the ability to connect any two systems which conform to the reference model and associated standards. OSI Model
  • 12. OSI Reference Model The OSI model is now considered the primary Architectural model for inter- computer communications. The OSI model describes how information or data makes its way from application programmes (such as spreadsheets) through a network medium (such as wire) to another application programme located on another network. The OSI reference model divides the problem of moving information between computers over a network medium into SEVEN smaller and more manageable problems . This separation into smaller more manageable functions is known as layering. OSI Model
  • 13. 2.13 ISO is the organization. OSI is the model. Note
  • 14. 2.14 Figure Seven layers of the OSI model
  • 15. OSI Reference Model: 7 Layers OSI Model
  • 16. OSI: A Layered Network Model The process of breaking up the functions or tasks of networking into layers reduces complexity. Each layer provides a service to the layer above it in the protocol specification. Each layer communicates with the same layer’s software or hardware on other computers. The lower 4 layers (transport, network, data link and physical —Layers 4, 3, 2, and 1) are concerned with the flow of data from end to end through the network. The upper three layers of the OSI model (application, presentation and session— Layers 7, 6 and 5) are orientated more toward services to the applications. Data is Encapsulated with the necessary protocol information as it moves down the layers before network transit. OSI Model
  • 18. Physical Layer Provides physical interface for transmission of information. Defines rules by which bits are passed from one system to another on a physical communication medium. Covers all - mechanical, electrical, functional and procedural - aspects for physical communication. Such characteristics as voltage levels, timing of voltage changes, physical data rates, maximum transmission distances, physical connectors, and other similar attributes are defined by physical layer specifications. OSI Model
  • 20. 2.20 The physical layer is responsible for movements of individual bits from one hop (node) to the next. Note The physical layer is also concerned with the following: 1. Physical characteristics of interfaces and medium 2. Representation of bits. 3. Data rate. 4. Synchronization of bits. 5. Line configuration: this layer is concerned with the connection of devices to the media i.e. point-to-point or multipoint 6. Physical topology. 7. Transmission mode : The physical layer also defines the direction of transmission between two devices: simplex, half-duplex, or full-duplex
  • 21. Data Link Layer Data link layer attempts to provide reliable communication over the physical layer interface. Breaks the outgoing data into frames and reassemble the received frames. Create and detect frame boundaries. Implement Error Control by implementing an acknowledgement and retransmission scheme of damaged or lost frames. Implement flow control. Supports point-to-point as well as broadcast communication. Supports simplex, half-duplex or full-duplex communication. Examples of Link layer protocols are Ethernet, WiFi and PPP (point-to-point) OSI Model
  • 22. 2.22 Figure 2.6 Data link layer
  • 23. Functions of Data Link Layer • Framing: Frames are the streams of bits received from the network layer into manageable data units. This division of stream of bits is done by Data Link Layer. • Physical Addressing: The Data Link layer adds a header to the frame in order to define physical address of the sender or receiver of the frame, if the frames are to be distributed to different systems on the network. • Flow Control: A flow control mechanism to avoid a fast transmitter from running a slow receiver by buffering the extra bit is provided by flow control. This prevents traffic jam at the receiver side. • Error Control: Error control is achieved by adding a trailer at the end of the frame. Duplication of frames are also prevented by using this mechanism. Data Link Layers adds mechanism to prevent duplication of frames. • Access Control: Protocols of this layer determine which of the devices has control over the link at any given time, when two or more devices are connected to the same link.
  • 24.
  • 25. 2.25 The data link layer is responsible for moving frames from one hop (node) to the next. Note
  • 26. Network Layer Implements routing of frames (packets) through the network. Defines the most optimum path the packet should take from the source to the destination Defines logical addressing so that any endpoint can be identified. Handles congestion in the network. Facilitates interconnection between heterogeneous networks (Internetworking). The network layer also defines how to fragment a packet into smaller packets to accommodate different media. OSI Model
  • 28. 2.28 The network layer is responsible for the delivery of individual packets from the source host to the destination host. Note
  • 29. Transport Layer Purpose of this layer is to provide a reliable mechanism for the exchange of data between two processes in different computers. Ensures that the data units are delivered error free. Ensures that data units are delivered in sequence. Ensures that there is no loss or duplication of data units. Provides connectionless or connection oriented service. Provides for the connection management. Multiplex multiple connection over a single channel. OSI Model
  • 30. Session Layer Session layer provides mechanism for controlling the dialogue between the two end systems. It defines how to start, control and end conversations (called sessions) between applications. This layer requests for a logical connection to be established on an end-user’s request. Any necessary log-on or password validation is also handled by this layer. Session layer is also responsible for terminating the connection. Synchronization : This layer allows a process to add checkpoints which are considered as synchronization points into stream of data. Example: If a system is sending a file of 800 pages, adding checkpoints after every 50 pages is recommended. This ensures that 50 page unit is successfully received and acknowledged. This is beneficial at the time of crash as if a crash happens at page number 110; there is no need to retransmit 1 to100 pages. OSI Model
  • 31. Presentation Layer Presentation layer defines the format in which the data is to be exchanged between the two communicating entities. Also handles data compression and data encryption. OSI Model
  • 32. Application Layer Application layer interacts with application programs and is the highest level of OSI model. Application layer contains management functions to support distributed applications. Examples of application layer are applications such as file transfer (FTP), electronic mail (SMTP), remote login (TELNET), HTTP, DNS etc. OSI Model
  • 33. Functions of Application Layer • Mail Services: This layer provides the basis for E-mail forwarding and storage. • Network Virtual Terminal: It allows a user to log on to a remote host. • Directory Services: This layer provides access for global information about various services. • File Transfer, Access and Management (FTAM): It is a standard mechanism to access files and manages it. Users can access files in a remote computer and manage it. They can also retrieve files from a remote computer.
  • 34. OSI In Action A message begins at the top application layer and moves down the OSI layers to the bottom physical layer. As the message descends, each successive OSI model layer adds a header to it. A header is layer-specific information that basically explains what functions the layer carried out. Conversely, at the receiving end, headers are striped from the message as it travels up the corresponding layers. OSI Model
  • 36. OSI & TCP/IP Models TCP/IP Model
  • 37. TCP/IP Model TCP/IP Model Application Layer Application programs using the network Transport Layer (TCP/UDP) Management of end-to-end message transmission, error detection and error correction Network Layer (IP) Handling of datagrams : routing and congestion Data Link Layer Management of cost effective and reliable data delivery, access to physical networks Physical Layer Physical Media