SlideShare a Scribd company logo
1 of 8
Layered Architecture or Network Architecture
The layered architecture consists of the set of layers, as explained in the class, each layer
is nothing but a collection of functions combined in one group. So, bottom line is, all the
layers make the communication process achievable, by dividing functionality among the
layers. Also each layer provides services to the layer above it. In the last lecture, there
were five points why layers are required.

Q. Why layers are required, cannot we make only one layer?
Answer: No, as explained in previous lecture.

Q. What is peer-to-peer communication?
Between machines layer ‘x’ on one machine, communicates with the layer ‘x’ on another
machine, a kind of indirect communication (by taking help of intermediate layers), except
the physical layer. Because the physical layer of one host connects with the physical layer
of another host through the medium directly. Those layers that communicate with the
corresponding layer on another machine are called as peer-to-peer layers and the
communication between peer to peer layers is called as peer-to-peer communication.




Circles with X represent routers. A and B are hosts are communicating, in this example
we are assuming that there are only two routes, whereas in practical there can be multiple
routers in between.
Q. What is Encapsulation?
Answer:




Layer 7 which is the topmost layer in layered architecture interacts with the application,
and the purpose of this layer is to get the message from the sender and forward to the
layer below it i.e. to layer 6 or take message from the layer below it (i.e. layer 6) and
deliver to the application. Application may be interacting with the various applications
running on the computer. Layer 7 is only concerned about interacting with the application
executing on the machine. Layer 7 and Layer 1 don’t attach any header to the message.
All the layers expect layer 7 transform the received message and attach the respective
header or trailer.

Q Why all the layers except layer 7 transform the message?
Answer: Because layer 1 only takes message from the application and forward it to the
layer 6, whereas each layer except layer 1 has some function to perform, which they do
when they receive message from the layer above it, and then attach the header also. Also,
there is no layer above layer 1, so layer 1 has nothing to do for any one else, except the
take the message from the applications in execution or delivers the message to the
application in execution.


Q What is layer to layer interface or Service Access Point?
Answer: Messages are passed from one layer to another layer through an interface; So
that means an interface exist between every pair of layers, i.e.
Layer 7-Layer 6 interface, between layer 7 and layer 6
Layer 6-Layer 5 interface, between layer 6 and layer 5, and so on.
The upper layers are implemented in the software and lower layers are implemented in
both software and hardware, except for the physical layer which is completely hardware.

Q How layered technology helps in achieving communication between two hosts?
Answer: As shown in above figure, with gives an over all view of layered architecture,
L7 data means the data unit at layer 7, L6 data means data unit at layer 6 and so on. The
process starts at layer 7, and then moves from layer n to layer n-1 in descending order at
sending side and ascending order at receiving side. At each layer (except layer 7 and
layer 1), a header is added and at layer 3, a header and trailer are added. When the
formatted data unit passes through the layer 1, it is changed into electromagnetic signal
and transported along a physical link.
                        Upon reaching the destination, the signal passes into layer 1; layer
1 transforms the received signal back into digital data. The data units then move back up
from layer n to layer n+1 through the layered architecture. As each block of data reaches
the next higher layer, the headers and trailers attached to it at the corresponding layer are
removed and actions appropriate to that layer are taken. By the time message reaches
layer 7, the message is in a form that it can be delivered to the application in execution.

ISO/OSI Model
Q What do you mean by ISO/OSI Model?
Answer: ISO is an acronym for International Standards Organization and OSI is an
acronym for Open Systems Interconnection.

Q. What is this ISO for? (You will not be asked this question in exam)
Answer: ISO is a word wide organization that takes formulates the standard and observer
that standards are being followed by everybody. This ensures compatibility and
scalability in future.

Q. What is OSI?
Answer: As told above, OSI is an acronym for Open Systems Interconnection. To
understand it, you need to break these into three words and understand each word
individually.
Open: Open means one who is ready to accept any thing and give any thing but is an
individual. For example: I am open to smoking and drinking, i.e. I don’t mind taking hard
drink and smoke.
System: System, you all know is a computer. But here systems are Open, which means
there are autonomous or individual in nature and can receive messages and send
messages.
Interconnection: Interconnection means connecting in between.

So, if we combine all three of them, what we can make out is, interconnecting
autonomous systems together.

Q. How many layers are in the ISO/OSI Model?
Answer: There are seven layers in the ISO/OSI Model.
   1. Application Layer
   2. Presentation Layer
   3. Session Layer
   4. Transport Layer
5. Network Layer
   6. Data Link Layer
   7. Physical Layer

Application Layer
Q. What is the purpose of Application Layer?
Answer: As explained before, this is the topmost layer in ISO/OSI model, and it interacts
with the applications in execution as shown in figure below.




                               (i)                                    (ii)

In figure (i), Application layer takes message from the user (here user is like some
application, for example chat application or telnet application or ftp application) and
gives that message to the layer below it i.e. presentation layer (for other functions to be
performed on this message) through an interface present between application layer and
presentation layer called as service access point. Note that no header is attached to the
message at this layer.

In figure (ii), Application layer takes messages from the layer below it i.e. presentation
layer, here also messages pass between presentation layer to the application layer through
an interface called as service access point, and deliver it to the appropriate application in
execution for which that message is meant for.

Q. What is the purpose of Presentation Layer?
Answer: Presentation layer is concerned about the language between used between two
hosts or between two systems, Since two systems are open as explained below, they are
autonomous or individual in nature, so each one of them can have their own language or
character set. Thus one of the jobs that Presentation Layer does is Translation.
Actually there are three functions that Presentation layer does:
    1. Translation
    2. Encryption
    3. Data Compression

Q What is Translation, and why is it required?
Answer: The process in two hosts or two systems are usually exchanging information in
the form character strings, numbers etc. The information is changed to bit, this
conversion of character strings and numbers into bits can be done in two ways, one way
is ASCII and second way is EBCDIC. So let us assume that Host A uses ASCII
representation of converting his message (remember message is combination of strings
and numbers) and Host B uses EBCDIC. If any message in ASCII is sent to Host B, he
will not be able to understand that. The solution to this is, presentation layer at the sender
converts ASCII message to some common format which when received by Host B is
converted into EBCDIC. What that common format is? That is another question, we wont
get into that.

Q What is Encryption? Why is it required?
Answer: Encryption is encoding, i.e. converting message from intelligible form to
unintelligible form. This is done to ensure security, so that while some confidential
message is in transit and some other third person manages to gain access to that message,
he should not be able to know what it means, if the message is not encrypted before
transmission, he can make out the meaning of it. Presentation layer at the sender end
encrypts the message and the encrypted message is transmitted over the medium. After
traveling through the medium, encrypted message reaches the physical layer of the
destination, where encrypted message is again decrypted to get the original message. So,
decryption is done at receive end, and is opposite of encryption. We can define
decryption as, converting message from unintelligible form to intelligible form, so that
one can make out what it mean.

Q. What is Data Compression? Why is it required?
Answer: Data Compression reduces the number of bits contained in the information. To
understand why data compression is done or what the advantages of doing data
compression are, let us take one example.
Suppose host A wants to transmit to Host B. They both are on point-to-point link (i.e.
Host A is on one side of the link and Host B is on the other side of the link, and link is
not shared by anyone else). The link can carry 10 bits/sec that means Host A can place 10
bits on the link in 1 sec. If Host A has a packet of size 20 bits, how much time will it take
to transmit it? Obviously the answer is 2 seconds. If presentation layer of A can compress
that message to half, i.e. after compression the size of the packet is 10 bits, now how
much time will it take? This time the answer is 1 sec, which is less than time taken to
send the same uncompressed packet. So transmission time is reduced by compression.
So, Presentation layer at the source compresses the message and compressed message is
given to the next layer down and finally reaches the physical layer of the source, which
transmits the message on the medium, medium travels through the medium and is
received by the receiver’s physical layer. Physical layer of the receivers gives the
message to the layer in upward direction. Finally message reaches the presentation layer
where message is decompressed to retrieve the original message. (Remember that when a
message travels down the layer, a header is attached to the message at every layer except
the Application layer and physical layer, and in data link layer a trailer is also attached.
Also when a message travels up the layer, headers are removed at every layer except the
application layer and physical layer)

So after message is translated, encrypted and compressed at the presentation layer, it is
passed to the lower layer i.e. Session layer, through interface present between the
presentation and session layer. Figure below depicts the behavior of presentation layer.
Session layer
Q. What is the purpose of Session Layer?
Answer: Session layer enable for processes in two different systems to enter into a dialog.
It allows communication between two processes to take place either in half-duplex or
full-duplex. So Session layer does dialog control.
Session layer allows a process to add checkpoints (also called as synchronization points)
into a stream of data. For example, if a system is sending a file of 2000 pages, it is
advisable to add checkpoints after every 100 pages. Checkpoint helps in acknowledging
that after every 100 page is received, an acknowledge goes to the sender. In this case, if a
crash happens during the transmission of page 523, the only pages that need to be resent
after system recovery are pages 501 to 600, and onwards.

Transport Layer
Q. What is the purpose of Transport Layer
Answer: The transport layer is responsible for source to destination delivery of the entire
message. What I mean by that, transport layer is not concerned how data travel from
source to destination, the only concern of transport layer is that it should reach there with
out any error and without any loss. In must simpler words, transport layer ensures that
data reaches at the destination intact overseeing error control and flow control. The
concern about how data travel is of the lower layer to transport layer, i.e. network layer.
As a matter of fact, lower three layers are concerned about how to route the packet from
source to destination i.e. network layer, data link layer and physical layer. The
responsibilities of transport layer are:
    1. Service Point Addressing
    2. Segmentation and Reassembly
    3. Connection Control
    4. Flow Control
    5. Error Control
Network Layer
Q. What is the purpose of Network Layer?
Answer: The network layer is responsible for source to destination delivery of a packet
possibly across multiple networks; again network layer relies on the layer below it for
actual transmission. The layer below network layer is data link layer. But yes data link
layer define the route that the packet will follow or packet can also take dynamic route
defined by the intermediate routers on the run. But for sending a packet from one router
to another, there is a medium in between, to travel through the medium and data link
layer and physical layer comes into picture, so network layer without the help of data link
layer and physical layer is incomplete. Similarly transport layer relies on network layer,
and transport layer is incomplete without the network layer and layers below network
layer.
The responsibilities of network layer are
    1. Routing
    2. Logical Addressing

Data Link Layer
Q What is the purpose of Data Link Layer?
Answer: The data link layer is responsible for end to end delivery of frames i.e. it is the
data link layer which actually do the job of sending frame from one end of link to other
end of the link (in a point to point link) obviously the actual transmission of frame is
done by the physical layer i.e. putting the bits of the frame on the link. Data link layer has
to take care of flow control, error control between two links that falls in the whole path
from source to destination. The responsibilities of data link layer are
    1. Framing
    2. Physical Addressing
    3. Flow Control
    4. Error Control
    5. Access Control

Physical Layer
Q. What is the purpose of Physical Layer?
Answer: Physical layer is the lower layer, and converts the message into bits; put the bits
on to the medium. The number of bits that the physical layer can put on the medium or
transmit through the medium is called as the transmission rate. Below is the figure the
depicts the transformation done to the message at physical layer.
The physical layer is concerned with the following
   1. Physical characteristics of the interfaces and medium
   2. Representation of bits
   3. Data Rate or Transmission Rate
   4. Link Configuration
   5. Physical topology

Summary of ISO/OSI Model

More Related Content

What's hot

An Effective Privacy-Preserving Data Coding in Peer-To-Peer Network
An Effective Privacy-Preserving Data Coding in Peer-To-Peer NetworkAn Effective Privacy-Preserving Data Coding in Peer-To-Peer Network
An Effective Privacy-Preserving Data Coding in Peer-To-Peer NetworkIJCNCJournal
 
Elgamal signature for content distribution with network coding
Elgamal signature for content distribution with network codingElgamal signature for content distribution with network coding
Elgamal signature for content distribution with network codingijwmn
 
Paper id 42201621
Paper id 42201621Paper id 42201621
Paper id 42201621IJRAT
 
Fajar Purnama 152-d8713 Dynamic Content Synchronization Distributed LMS
Fajar Purnama 152-d8713 Dynamic Content Synchronization Distributed LMSFajar Purnama 152-d8713 Dynamic Content Synchronization Distributed LMS
Fajar Purnama 152-d8713 Dynamic Content Synchronization Distributed LMSFajar Purnama
 
Word2Vec on Italian language
Word2Vec on Italian languageWord2Vec on Italian language
Word2Vec on Italian languageFrancesco Cucari
 
OSI Model of Networking-09-Nov-2019
OSI Model of Networking-09-Nov-2019OSI Model of Networking-09-Nov-2019
OSI Model of Networking-09-Nov-2019Mukesh Tekwani
 
REDUCED COMPLEXITY QUASI-CYCLIC LDPC ENCODER FOR IEEE 802.11N
REDUCED COMPLEXITY QUASI-CYCLIC LDPC ENCODER FOR IEEE 802.11N REDUCED COMPLEXITY QUASI-CYCLIC LDPC ENCODER FOR IEEE 802.11N
REDUCED COMPLEXITY QUASI-CYCLIC LDPC ENCODER FOR IEEE 802.11N VLSICS Design
 
Universal Network Coding-Based Opportunistic Routing for Unicast
Universal Network Coding-Based Opportunistic Routing for UnicastUniversal Network Coding-Based Opportunistic Routing for Unicast
Universal Network Coding-Based Opportunistic Routing for Unicast1crore projects
 
A genetic algorithm for constructing broadcast trees with cost and delay cons...
A genetic algorithm for constructing broadcast trees with cost and delay cons...A genetic algorithm for constructing broadcast trees with cost and delay cons...
A genetic algorithm for constructing broadcast trees with cost and delay cons...IJCNCJournal
 
Applying Deep Learning Machine Translation to Language Services
Applying Deep Learning Machine Translation to Language ServicesApplying Deep Learning Machine Translation to Language Services
Applying Deep Learning Machine Translation to Language ServicesYannis Flet-Berliac
 
AUTOCONFIGURATION ALGORITHM FOR A MULTIPLE INTERFACES ADHOC NETWORK RUNNING...
AUTOCONFIGURATION ALGORITHM FOR A  MULTIPLE INTERFACES ADHOC NETWORK  RUNNING...AUTOCONFIGURATION ALGORITHM FOR A  MULTIPLE INTERFACES ADHOC NETWORK  RUNNING...
AUTOCONFIGURATION ALGORITHM FOR A MULTIPLE INTERFACES ADHOC NETWORK RUNNING...IJCNC
 
Securing Group Communication in Partially Distributed Systems
Securing Group Communication in Partially Distributed SystemsSecuring Group Communication in Partially Distributed Systems
Securing Group Communication in Partially Distributed SystemsIOSR Journals
 

What's hot (13)

An Effective Privacy-Preserving Data Coding in Peer-To-Peer Network
An Effective Privacy-Preserving Data Coding in Peer-To-Peer NetworkAn Effective Privacy-Preserving Data Coding in Peer-To-Peer Network
An Effective Privacy-Preserving Data Coding in Peer-To-Peer Network
 
Elgamal signature for content distribution with network coding
Elgamal signature for content distribution with network codingElgamal signature for content distribution with network coding
Elgamal signature for content distribution with network coding
 
Paper id 42201621
Paper id 42201621Paper id 42201621
Paper id 42201621
 
Fajar Purnama 152-d8713 Dynamic Content Synchronization Distributed LMS
Fajar Purnama 152-d8713 Dynamic Content Synchronization Distributed LMSFajar Purnama 152-d8713 Dynamic Content Synchronization Distributed LMS
Fajar Purnama 152-d8713 Dynamic Content Synchronization Distributed LMS
 
Word2Vec on Italian language
Word2Vec on Italian languageWord2Vec on Italian language
Word2Vec on Italian language
 
OSI Model of Networking-09-Nov-2019
OSI Model of Networking-09-Nov-2019OSI Model of Networking-09-Nov-2019
OSI Model of Networking-09-Nov-2019
 
REDUCED COMPLEXITY QUASI-CYCLIC LDPC ENCODER FOR IEEE 802.11N
REDUCED COMPLEXITY QUASI-CYCLIC LDPC ENCODER FOR IEEE 802.11N REDUCED COMPLEXITY QUASI-CYCLIC LDPC ENCODER FOR IEEE 802.11N
REDUCED COMPLEXITY QUASI-CYCLIC LDPC ENCODER FOR IEEE 802.11N
 
Universal Network Coding-Based Opportunistic Routing for Unicast
Universal Network Coding-Based Opportunistic Routing for UnicastUniversal Network Coding-Based Opportunistic Routing for Unicast
Universal Network Coding-Based Opportunistic Routing for Unicast
 
D0441722
D0441722D0441722
D0441722
 
A genetic algorithm for constructing broadcast trees with cost and delay cons...
A genetic algorithm for constructing broadcast trees with cost and delay cons...A genetic algorithm for constructing broadcast trees with cost and delay cons...
A genetic algorithm for constructing broadcast trees with cost and delay cons...
 
Applying Deep Learning Machine Translation to Language Services
Applying Deep Learning Machine Translation to Language ServicesApplying Deep Learning Machine Translation to Language Services
Applying Deep Learning Machine Translation to Language Services
 
AUTOCONFIGURATION ALGORITHM FOR A MULTIPLE INTERFACES ADHOC NETWORK RUNNING...
AUTOCONFIGURATION ALGORITHM FOR A  MULTIPLE INTERFACES ADHOC NETWORK  RUNNING...AUTOCONFIGURATION ALGORITHM FOR A  MULTIPLE INTERFACES ADHOC NETWORK  RUNNING...
AUTOCONFIGURATION ALGORITHM FOR A MULTIPLE INTERFACES ADHOC NETWORK RUNNING...
 
Securing Group Communication in Partially Distributed Systems
Securing Group Communication in Partially Distributed SystemsSecuring Group Communication in Partially Distributed Systems
Securing Group Communication in Partially Distributed Systems
 

Viewers also liked

Lecture3layered archi
Lecture3layered archiLecture3layered archi
Lecture3layered archiH K
 
The Second America
The Second AmericaThe Second America
The Second AmericaJohn Hoyte
 
Reggaeton origin
Reggaeton originReggaeton origin
Reggaeton originJohn Hoyte
 
Tribute To Dr.King
Tribute To Dr.KingTribute To Dr.King
Tribute To Dr.KingJohn Hoyte
 
Css 1
Css 1Css 1
Css 1H K
 
Ch03
Ch03Ch03
Ch03H K
 
Pollock Expresionismo Abstracto
Pollock Expresionismo  AbstractoPollock Expresionismo  Abstracto
Pollock Expresionismo AbstractoNeyva
 

Viewers also liked (7)

Lecture3layered archi
Lecture3layered archiLecture3layered archi
Lecture3layered archi
 
The Second America
The Second AmericaThe Second America
The Second America
 
Reggaeton origin
Reggaeton originReggaeton origin
Reggaeton origin
 
Tribute To Dr.King
Tribute To Dr.KingTribute To Dr.King
Tribute To Dr.King
 
Css 1
Css 1Css 1
Css 1
 
Ch03
Ch03Ch03
Ch03
 
Pollock Expresionismo Abstracto
Pollock Expresionismo  AbstractoPollock Expresionismo  Abstracto
Pollock Expresionismo Abstracto
 

Similar to Lecture4 isoosi

Similar to Lecture4 isoosi (20)

OSI Pankaj yadav
OSI  Pankaj yadavOSI  Pankaj yadav
OSI Pankaj yadav
 
Osi , tcp/ip protocol and Addressing
Osi , tcp/ip protocol and Addressing Osi , tcp/ip protocol and Addressing
Osi , tcp/ip protocol and Addressing
 
Osi model
Osi modelOsi model
Osi model
 
OSI Reference Model-Lecture-2.pptx
OSI Reference Model-Lecture-2.pptxOSI Reference Model-Lecture-2.pptx
OSI Reference Model-Lecture-2.pptx
 
Ccna
CcnaCcna
Ccna
 
CCN -UNIT 1 PDF Notes for 7th EC
CCN -UNIT 1 PDF Notes for 7th ECCCN -UNIT 1 PDF Notes for 7th EC
CCN -UNIT 1 PDF Notes for 7th EC
 
OSI model
OSI modelOSI model
OSI model
 
OsI reference model
OsI reference modelOsI reference model
OsI reference model
 
OSI Model
OSI ModelOSI Model
OSI Model
 
OSI Model - Every Detail Explained
OSI Model - Every Detail ExplainedOSI Model - Every Detail Explained
OSI Model - Every Detail Explained
 
Assignment izaz sir
Assignment izaz sirAssignment izaz sir
Assignment izaz sir
 
Osi model
Osi modelOsi model
Osi model
 
3. osi model
3. osi model3. osi model
3. osi model
 
Osi Layer model provided by TopTechy.com
Osi Layer model provided by TopTechy.comOsi Layer model provided by TopTechy.com
Osi Layer model provided by TopTechy.com
 
OSI MODEL AND ITS LAYERS FUNCTION
OSI  MODEL AND ITS LAYERS FUNCTIONOSI  MODEL AND ITS LAYERS FUNCTION
OSI MODEL AND ITS LAYERS FUNCTION
 
osi vs tcp/ip
osi vs tcp/iposi vs tcp/ip
osi vs tcp/ip
 
Ch02
Ch02Ch02
Ch02
 
The open system Interconnection (OSI) reference.pptx
The open system Interconnection (OSI) reference.pptxThe open system Interconnection (OSI) reference.pptx
The open system Interconnection (OSI) reference.pptx
 
OSI & TCP model
OSI & TCP modelOSI & TCP model
OSI & TCP model
 
Osi model
Osi modelOsi model
Osi model
 

More from H K

Assignment4
Assignment4Assignment4
Assignment4H K
 
Assignment3
Assignment3Assignment3
Assignment3H K
 
Induction
InductionInduction
InductionH K
 
Solution3
Solution3Solution3
Solution3H K
 
Solution2
Solution2Solution2
Solution2H K
 
Mid-
Mid-Mid-
Mid-H K
 
Assignment4
Assignment4Assignment4
Assignment4H K
 
Assignment4
Assignment4Assignment4
Assignment4H K
 
Dm assignment3
Dm assignment3Dm assignment3
Dm assignment3H K
 
Proof
ProofProof
ProofH K
 
Resolution
ResolutionResolution
ResolutionH K
 
Assignment description
Assignment descriptionAssignment description
Assignment descriptionH K
 
Dm assignment2
Dm assignment2Dm assignment2
Dm assignment2H K
 
Set
SetSet
SetH K
 
Dm assignment1
Dm assignment1Dm assignment1
Dm assignment1H K
 
Logic
LogicLogic
LogicH K
 
Introduction
IntroductionIntroduction
IntroductionH K
 
Assignment 2 sol
Assignment 2 solAssignment 2 sol
Assignment 2 solH K
 
Assignment sw solution
Assignment sw solutionAssignment sw solution
Assignment sw solutionH K
 
Violinphoenix
ViolinphoenixViolinphoenix
ViolinphoenixH K
 

More from H K (20)

Assignment4
Assignment4Assignment4
Assignment4
 
Assignment3
Assignment3Assignment3
Assignment3
 
Induction
InductionInduction
Induction
 
Solution3
Solution3Solution3
Solution3
 
Solution2
Solution2Solution2
Solution2
 
Mid-
Mid-Mid-
Mid-
 
Assignment4
Assignment4Assignment4
Assignment4
 
Assignment4
Assignment4Assignment4
Assignment4
 
Dm assignment3
Dm assignment3Dm assignment3
Dm assignment3
 
Proof
ProofProof
Proof
 
Resolution
ResolutionResolution
Resolution
 
Assignment description
Assignment descriptionAssignment description
Assignment description
 
Dm assignment2
Dm assignment2Dm assignment2
Dm assignment2
 
Set
SetSet
Set
 
Dm assignment1
Dm assignment1Dm assignment1
Dm assignment1
 
Logic
LogicLogic
Logic
 
Introduction
IntroductionIntroduction
Introduction
 
Assignment 2 sol
Assignment 2 solAssignment 2 sol
Assignment 2 sol
 
Assignment sw solution
Assignment sw solutionAssignment sw solution
Assignment sw solution
 
Violinphoenix
ViolinphoenixViolinphoenix
Violinphoenix
 

Recently uploaded

AI as an Interface for Commercial Buildings
AI as an Interface for Commercial BuildingsAI as an Interface for Commercial Buildings
AI as an Interface for Commercial BuildingsMemoori
 
The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024Rafal Los
 
Unblocking The Main Thread Solving ANRs and Frozen Frames
Unblocking The Main Thread Solving ANRs and Frozen FramesUnblocking The Main Thread Solving ANRs and Frozen Frames
Unblocking The Main Thread Solving ANRs and Frozen FramesSinan KOZAK
 
Presentation on how to chat with PDF using ChatGPT code interpreter
Presentation on how to chat with PDF using ChatGPT code interpreterPresentation on how to chat with PDF using ChatGPT code interpreter
Presentation on how to chat with PDF using ChatGPT code interpreternaman860154
 
Maximizing Board Effectiveness 2024 Webinar.pptx
Maximizing Board Effectiveness 2024 Webinar.pptxMaximizing Board Effectiveness 2024 Webinar.pptx
Maximizing Board Effectiveness 2024 Webinar.pptxOnBoard
 
Scaling API-first – The story of a global engineering organization
Scaling API-first – The story of a global engineering organizationScaling API-first – The story of a global engineering organization
Scaling API-first – The story of a global engineering organizationRadu Cotescu
 
Handwritten Text Recognition for manuscripts and early printed texts
Handwritten Text Recognition for manuscripts and early printed textsHandwritten Text Recognition for manuscripts and early printed texts
Handwritten Text Recognition for manuscripts and early printed textsMaria Levchenko
 
Azure Monitor & Application Insight to monitor Infrastructure & Application
Azure Monitor & Application Insight to monitor Infrastructure & ApplicationAzure Monitor & Application Insight to monitor Infrastructure & Application
Azure Monitor & Application Insight to monitor Infrastructure & ApplicationAndikSusilo4
 
Beyond Boundaries: Leveraging No-Code Solutions for Industry Innovation
Beyond Boundaries: Leveraging No-Code Solutions for Industry InnovationBeyond Boundaries: Leveraging No-Code Solutions for Industry Innovation
Beyond Boundaries: Leveraging No-Code Solutions for Industry InnovationSafe Software
 
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking MenDelhi Call girls
 
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
04-2024-HHUG-Sales-and-Marketing-Alignment.pptxHampshireHUG
 
Injustice - Developers Among Us (SciFiDevCon 2024)
Injustice - Developers Among Us (SciFiDevCon 2024)Injustice - Developers Among Us (SciFiDevCon 2024)
Injustice - Developers Among Us (SciFiDevCon 2024)Allon Mureinik
 
My Hashitalk Indonesia April 2024 Presentation
My Hashitalk Indonesia April 2024 PresentationMy Hashitalk Indonesia April 2024 Presentation
My Hashitalk Indonesia April 2024 PresentationRidwan Fadjar
 
Transforming Data Streams with Kafka Connect: An Introduction to Single Messa...
Transforming Data Streams with Kafka Connect: An Introduction to Single Messa...Transforming Data Streams with Kafka Connect: An Introduction to Single Messa...
Transforming Data Streams with Kafka Connect: An Introduction to Single Messa...HostedbyConfluent
 
Transcript: #StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
Transcript: #StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024Transcript: #StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
Transcript: #StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024BookNet Canada
 
Breaking the Kubernetes Kill Chain: Host Path Mount
Breaking the Kubernetes Kill Chain: Host Path MountBreaking the Kubernetes Kill Chain: Host Path Mount
Breaking the Kubernetes Kill Chain: Host Path MountPuma Security, LLC
 
GenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day PresentationGenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day PresentationMichael W. Hawkins
 
[2024]Digital Global Overview Report 2024 Meltwater.pdf
[2024]Digital Global Overview Report 2024 Meltwater.pdf[2024]Digital Global Overview Report 2024 Meltwater.pdf
[2024]Digital Global Overview Report 2024 Meltwater.pdfhans926745
 
#StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
#StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024#StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
#StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024BookNet Canada
 
How to convert PDF to text with Nanonets
How to convert PDF to text with NanonetsHow to convert PDF to text with Nanonets
How to convert PDF to text with Nanonetsnaman860154
 

Recently uploaded (20)

AI as an Interface for Commercial Buildings
AI as an Interface for Commercial BuildingsAI as an Interface for Commercial Buildings
AI as an Interface for Commercial Buildings
 
The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024
 
Unblocking The Main Thread Solving ANRs and Frozen Frames
Unblocking The Main Thread Solving ANRs and Frozen FramesUnblocking The Main Thread Solving ANRs and Frozen Frames
Unblocking The Main Thread Solving ANRs and Frozen Frames
 
Presentation on how to chat with PDF using ChatGPT code interpreter
Presentation on how to chat with PDF using ChatGPT code interpreterPresentation on how to chat with PDF using ChatGPT code interpreter
Presentation on how to chat with PDF using ChatGPT code interpreter
 
Maximizing Board Effectiveness 2024 Webinar.pptx
Maximizing Board Effectiveness 2024 Webinar.pptxMaximizing Board Effectiveness 2024 Webinar.pptx
Maximizing Board Effectiveness 2024 Webinar.pptx
 
Scaling API-first – The story of a global engineering organization
Scaling API-first – The story of a global engineering organizationScaling API-first – The story of a global engineering organization
Scaling API-first – The story of a global engineering organization
 
Handwritten Text Recognition for manuscripts and early printed texts
Handwritten Text Recognition for manuscripts and early printed textsHandwritten Text Recognition for manuscripts and early printed texts
Handwritten Text Recognition for manuscripts and early printed texts
 
Azure Monitor & Application Insight to monitor Infrastructure & Application
Azure Monitor & Application Insight to monitor Infrastructure & ApplicationAzure Monitor & Application Insight to monitor Infrastructure & Application
Azure Monitor & Application Insight to monitor Infrastructure & Application
 
Beyond Boundaries: Leveraging No-Code Solutions for Industry Innovation
Beyond Boundaries: Leveraging No-Code Solutions for Industry InnovationBeyond Boundaries: Leveraging No-Code Solutions for Industry Innovation
Beyond Boundaries: Leveraging No-Code Solutions for Industry Innovation
 
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
 
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
 
Injustice - Developers Among Us (SciFiDevCon 2024)
Injustice - Developers Among Us (SciFiDevCon 2024)Injustice - Developers Among Us (SciFiDevCon 2024)
Injustice - Developers Among Us (SciFiDevCon 2024)
 
My Hashitalk Indonesia April 2024 Presentation
My Hashitalk Indonesia April 2024 PresentationMy Hashitalk Indonesia April 2024 Presentation
My Hashitalk Indonesia April 2024 Presentation
 
Transforming Data Streams with Kafka Connect: An Introduction to Single Messa...
Transforming Data Streams with Kafka Connect: An Introduction to Single Messa...Transforming Data Streams with Kafka Connect: An Introduction to Single Messa...
Transforming Data Streams with Kafka Connect: An Introduction to Single Messa...
 
Transcript: #StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
Transcript: #StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024Transcript: #StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
Transcript: #StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
 
Breaking the Kubernetes Kill Chain: Host Path Mount
Breaking the Kubernetes Kill Chain: Host Path MountBreaking the Kubernetes Kill Chain: Host Path Mount
Breaking the Kubernetes Kill Chain: Host Path Mount
 
GenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day PresentationGenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day Presentation
 
[2024]Digital Global Overview Report 2024 Meltwater.pdf
[2024]Digital Global Overview Report 2024 Meltwater.pdf[2024]Digital Global Overview Report 2024 Meltwater.pdf
[2024]Digital Global Overview Report 2024 Meltwater.pdf
 
#StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
#StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024#StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
#StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
 
How to convert PDF to text with Nanonets
How to convert PDF to text with NanonetsHow to convert PDF to text with Nanonets
How to convert PDF to text with Nanonets
 

Lecture4 isoosi

  • 1. Layered Architecture or Network Architecture The layered architecture consists of the set of layers, as explained in the class, each layer is nothing but a collection of functions combined in one group. So, bottom line is, all the layers make the communication process achievable, by dividing functionality among the layers. Also each layer provides services to the layer above it. In the last lecture, there were five points why layers are required. Q. Why layers are required, cannot we make only one layer? Answer: No, as explained in previous lecture. Q. What is peer-to-peer communication? Between machines layer ‘x’ on one machine, communicates with the layer ‘x’ on another machine, a kind of indirect communication (by taking help of intermediate layers), except the physical layer. Because the physical layer of one host connects with the physical layer of another host through the medium directly. Those layers that communicate with the corresponding layer on another machine are called as peer-to-peer layers and the communication between peer to peer layers is called as peer-to-peer communication. Circles with X represent routers. A and B are hosts are communicating, in this example we are assuming that there are only two routes, whereas in practical there can be multiple routers in between.
  • 2. Q. What is Encapsulation? Answer: Layer 7 which is the topmost layer in layered architecture interacts with the application, and the purpose of this layer is to get the message from the sender and forward to the layer below it i.e. to layer 6 or take message from the layer below it (i.e. layer 6) and deliver to the application. Application may be interacting with the various applications running on the computer. Layer 7 is only concerned about interacting with the application executing on the machine. Layer 7 and Layer 1 don’t attach any header to the message. All the layers expect layer 7 transform the received message and attach the respective header or trailer. Q Why all the layers except layer 7 transform the message? Answer: Because layer 1 only takes message from the application and forward it to the layer 6, whereas each layer except layer 1 has some function to perform, which they do when they receive message from the layer above it, and then attach the header also. Also, there is no layer above layer 1, so layer 1 has nothing to do for any one else, except the take the message from the applications in execution or delivers the message to the application in execution. Q What is layer to layer interface or Service Access Point? Answer: Messages are passed from one layer to another layer through an interface; So that means an interface exist between every pair of layers, i.e. Layer 7-Layer 6 interface, between layer 7 and layer 6 Layer 6-Layer 5 interface, between layer 6 and layer 5, and so on.
  • 3. The upper layers are implemented in the software and lower layers are implemented in both software and hardware, except for the physical layer which is completely hardware. Q How layered technology helps in achieving communication between two hosts? Answer: As shown in above figure, with gives an over all view of layered architecture, L7 data means the data unit at layer 7, L6 data means data unit at layer 6 and so on. The process starts at layer 7, and then moves from layer n to layer n-1 in descending order at sending side and ascending order at receiving side. At each layer (except layer 7 and layer 1), a header is added and at layer 3, a header and trailer are added. When the formatted data unit passes through the layer 1, it is changed into electromagnetic signal and transported along a physical link. Upon reaching the destination, the signal passes into layer 1; layer 1 transforms the received signal back into digital data. The data units then move back up from layer n to layer n+1 through the layered architecture. As each block of data reaches the next higher layer, the headers and trailers attached to it at the corresponding layer are removed and actions appropriate to that layer are taken. By the time message reaches layer 7, the message is in a form that it can be delivered to the application in execution. ISO/OSI Model Q What do you mean by ISO/OSI Model? Answer: ISO is an acronym for International Standards Organization and OSI is an acronym for Open Systems Interconnection. Q. What is this ISO for? (You will not be asked this question in exam) Answer: ISO is a word wide organization that takes formulates the standard and observer that standards are being followed by everybody. This ensures compatibility and scalability in future. Q. What is OSI? Answer: As told above, OSI is an acronym for Open Systems Interconnection. To understand it, you need to break these into three words and understand each word individually. Open: Open means one who is ready to accept any thing and give any thing but is an individual. For example: I am open to smoking and drinking, i.e. I don’t mind taking hard drink and smoke. System: System, you all know is a computer. But here systems are Open, which means there are autonomous or individual in nature and can receive messages and send messages. Interconnection: Interconnection means connecting in between. So, if we combine all three of them, what we can make out is, interconnecting autonomous systems together. Q. How many layers are in the ISO/OSI Model? Answer: There are seven layers in the ISO/OSI Model. 1. Application Layer 2. Presentation Layer 3. Session Layer 4. Transport Layer
  • 4. 5. Network Layer 6. Data Link Layer 7. Physical Layer Application Layer Q. What is the purpose of Application Layer? Answer: As explained before, this is the topmost layer in ISO/OSI model, and it interacts with the applications in execution as shown in figure below. (i) (ii) In figure (i), Application layer takes message from the user (here user is like some application, for example chat application or telnet application or ftp application) and gives that message to the layer below it i.e. presentation layer (for other functions to be performed on this message) through an interface present between application layer and presentation layer called as service access point. Note that no header is attached to the message at this layer. In figure (ii), Application layer takes messages from the layer below it i.e. presentation layer, here also messages pass between presentation layer to the application layer through an interface called as service access point, and deliver it to the appropriate application in execution for which that message is meant for. Q. What is the purpose of Presentation Layer? Answer: Presentation layer is concerned about the language between used between two hosts or between two systems, Since two systems are open as explained below, they are autonomous or individual in nature, so each one of them can have their own language or character set. Thus one of the jobs that Presentation Layer does is Translation. Actually there are three functions that Presentation layer does: 1. Translation 2. Encryption 3. Data Compression Q What is Translation, and why is it required? Answer: The process in two hosts or two systems are usually exchanging information in the form character strings, numbers etc. The information is changed to bit, this conversion of character strings and numbers into bits can be done in two ways, one way is ASCII and second way is EBCDIC. So let us assume that Host A uses ASCII representation of converting his message (remember message is combination of strings
  • 5. and numbers) and Host B uses EBCDIC. If any message in ASCII is sent to Host B, he will not be able to understand that. The solution to this is, presentation layer at the sender converts ASCII message to some common format which when received by Host B is converted into EBCDIC. What that common format is? That is another question, we wont get into that. Q What is Encryption? Why is it required? Answer: Encryption is encoding, i.e. converting message from intelligible form to unintelligible form. This is done to ensure security, so that while some confidential message is in transit and some other third person manages to gain access to that message, he should not be able to know what it means, if the message is not encrypted before transmission, he can make out the meaning of it. Presentation layer at the sender end encrypts the message and the encrypted message is transmitted over the medium. After traveling through the medium, encrypted message reaches the physical layer of the destination, where encrypted message is again decrypted to get the original message. So, decryption is done at receive end, and is opposite of encryption. We can define decryption as, converting message from unintelligible form to intelligible form, so that one can make out what it mean. Q. What is Data Compression? Why is it required? Answer: Data Compression reduces the number of bits contained in the information. To understand why data compression is done or what the advantages of doing data compression are, let us take one example. Suppose host A wants to transmit to Host B. They both are on point-to-point link (i.e. Host A is on one side of the link and Host B is on the other side of the link, and link is not shared by anyone else). The link can carry 10 bits/sec that means Host A can place 10 bits on the link in 1 sec. If Host A has a packet of size 20 bits, how much time will it take to transmit it? Obviously the answer is 2 seconds. If presentation layer of A can compress that message to half, i.e. after compression the size of the packet is 10 bits, now how much time will it take? This time the answer is 1 sec, which is less than time taken to send the same uncompressed packet. So transmission time is reduced by compression. So, Presentation layer at the source compresses the message and compressed message is given to the next layer down and finally reaches the physical layer of the source, which transmits the message on the medium, medium travels through the medium and is received by the receiver’s physical layer. Physical layer of the receivers gives the message to the layer in upward direction. Finally message reaches the presentation layer where message is decompressed to retrieve the original message. (Remember that when a message travels down the layer, a header is attached to the message at every layer except the Application layer and physical layer, and in data link layer a trailer is also attached. Also when a message travels up the layer, headers are removed at every layer except the application layer and physical layer) So after message is translated, encrypted and compressed at the presentation layer, it is passed to the lower layer i.e. Session layer, through interface present between the presentation and session layer. Figure below depicts the behavior of presentation layer.
  • 6. Session layer Q. What is the purpose of Session Layer? Answer: Session layer enable for processes in two different systems to enter into a dialog. It allows communication between two processes to take place either in half-duplex or full-duplex. So Session layer does dialog control. Session layer allows a process to add checkpoints (also called as synchronization points) into a stream of data. For example, if a system is sending a file of 2000 pages, it is advisable to add checkpoints after every 100 pages. Checkpoint helps in acknowledging that after every 100 page is received, an acknowledge goes to the sender. In this case, if a crash happens during the transmission of page 523, the only pages that need to be resent after system recovery are pages 501 to 600, and onwards. Transport Layer Q. What is the purpose of Transport Layer Answer: The transport layer is responsible for source to destination delivery of the entire message. What I mean by that, transport layer is not concerned how data travel from source to destination, the only concern of transport layer is that it should reach there with out any error and without any loss. In must simpler words, transport layer ensures that data reaches at the destination intact overseeing error control and flow control. The concern about how data travel is of the lower layer to transport layer, i.e. network layer. As a matter of fact, lower three layers are concerned about how to route the packet from source to destination i.e. network layer, data link layer and physical layer. The responsibilities of transport layer are: 1. Service Point Addressing 2. Segmentation and Reassembly 3. Connection Control 4. Flow Control 5. Error Control
  • 7. Network Layer Q. What is the purpose of Network Layer? Answer: The network layer is responsible for source to destination delivery of a packet possibly across multiple networks; again network layer relies on the layer below it for actual transmission. The layer below network layer is data link layer. But yes data link layer define the route that the packet will follow or packet can also take dynamic route defined by the intermediate routers on the run. But for sending a packet from one router to another, there is a medium in between, to travel through the medium and data link layer and physical layer comes into picture, so network layer without the help of data link layer and physical layer is incomplete. Similarly transport layer relies on network layer, and transport layer is incomplete without the network layer and layers below network layer. The responsibilities of network layer are 1. Routing 2. Logical Addressing Data Link Layer Q What is the purpose of Data Link Layer? Answer: The data link layer is responsible for end to end delivery of frames i.e. it is the data link layer which actually do the job of sending frame from one end of link to other end of the link (in a point to point link) obviously the actual transmission of frame is done by the physical layer i.e. putting the bits of the frame on the link. Data link layer has to take care of flow control, error control between two links that falls in the whole path from source to destination. The responsibilities of data link layer are 1. Framing 2. Physical Addressing 3. Flow Control 4. Error Control 5. Access Control Physical Layer Q. What is the purpose of Physical Layer? Answer: Physical layer is the lower layer, and converts the message into bits; put the bits on to the medium. The number of bits that the physical layer can put on the medium or transmit through the medium is called as the transmission rate. Below is the figure the depicts the transformation done to the message at physical layer.
  • 8. The physical layer is concerned with the following 1. Physical characteristics of the interfaces and medium 2. Representation of bits 3. Data Rate or Transmission Rate 4. Link Configuration 5. Physical topology Summary of ISO/OSI Model