SlideShare a Scribd company logo
1 of 6
Download to read offline
NOTE-06
Topic: OSI Model & CSMA
Course Code: CSE317
Course Title: Computer Networks
Submitted To
Pranab Bandhu Nath
Senior Lecturer, Department of CSE
City University
Submitted By
Md.Mejbah Uddin Rafi
BSc in CSE (Day)
Batch: 49th (B)
ID: 1834902584
OSI Model
The OSI Model (Open Systems Interconnection Model) is a
conceptual framework used to describe the functions of a networking
system. The OSI model characterizes computing functions into a
universal set of rules and requirements in order to support
interoperability between different products and software. In the OSI
reference model, the communications between a computing system
are split into seven different abstraction layers: Physical, Data Link,
Network, Transport, Session, Presentation, and Application.
Created at a time when network computing was in its infancy, the OSI
was published in 1984 by the International Organization for
Standardization (ISO). Though it does not always map directly to
specific systems, the OSI Model is still used today as a means to
describe Network Architecture.
The 7 Layers of the OSI Model
Physical Layer
The lowest layer of the OSI Model is concerned with electrically or
optically transmitting raw unstructured data bits across the network
from the physical layer of the sending device to the physical layer of
the receiving device. It can include specifications such as voltages,
pin layout, cabling, and radio frequencies. At the physical layer, one
might find “physical” resources such as network hubs, cabling,
repeaters, network adapters or modems.
Data Link Layer
At the data link layer, directly connected nodes are used to perform
node-to-node data transfer where data is packaged into frames. The
data link layer also corrects errors that may have occurred at the
physical layer.
The data link layer encompasses two sub-layers of its own. The first,
media access control (MAC), provides flow control and multiplexing
for device transmissions over a network. The second, the logical link
control (LLC), provides flow and error control over the physical
medium as well as identifies line protocols.
Network Layer
The network layer is responsible for receiving frames from the data
link layer, and delivering them to their intended destinations among
based on the addresses contained inside the frame. The network layer
finds the destination by using logical addresses, such as IP (internet
protocol). At this layer, routers are a crucial component used to quite
literally route information where it needs to go between networks.
Transport Layer
The transport layer manages the delivery and error checking of data
packets. It regulates the size, sequencing, and ultimately the transfer
of data between systems and hosts. One of the most common
examples of the transport layer is TCP or the Transmission Control
Protocol.
Session Layer
The session layer controls the conversations between different
computers. A session or connection between machines is set up,
managed, and termined at layer 5. Session layer services also include
authentication and reconnections.
Presentation Layer
The presentation layer formats or translates data for the application
layer based on the syntax or semantics that the application accepts.
Because of this, it at times also called the syntax layer. This layer can
also handle the encryption and decryption required by the application
layer.
Application Layer
At this layer, both the end user and the application layer interact
directly with the software application. This layer sees network
services provided to end-user applications such as a web browser or
Office 365. The application layer identifies communication partners,
resource availability, and synchronizes communication.
Carrier-sense multiple access (CSMA)
CSMA is a media access control (MAC) protocol in which a node
verifies the absence of other traffic before transmitting on a shared
transmission medium, such as an electrical bus or a band of the
electromagnetic spectrum.
It is divided into two part:
Collision Detection (CSMA/CD)
In this method, a station monitors the medium after it sends a frame
to see if the transmission was successful. If successful, the station is
finished, if not, the frame is sent again.
Advantages Disadvantages
It has low overhead.
Collisions degrade network
performance.
Utilizes all available bandwidth
when possible.
Priorities cannot be assigned to
certain nodes. Performance
degrades exponentially as
devices are added.
Collision Avoidance (CSMA/CA)
Carrier Sense Multiple Access with Collision Avoidance (CSMA/CA)
is a network protocol for carrier transmission that operates in the
Medium Access Control (MAC) layer. In contrast to CSMA/CD
(Carrier Sense Multiple Access/Collision Detection) that deals with
collisions after their occurrence, CSMA/CA prevents collisions prior
to their occurrence.
Advantages Disadvantages
Helps prevent data collisions Longer waiting times
Thanks to feedback, no data is
unnoticeably lost
Causes additional traffic
Avoids unnecessary data traffic
with the RTS/CTS extension
Solves the hidden station
problem only by using RTS/CTS
extension
Difference between CSMA/CA and CSMA/CD:-
CSMA/CD CSMA/CA
CSMA / CD is effective after a
collision.
Whereas CSMA / CA is effective
before a collision.
CSMA / CD is used in wired
networks.
Whereas CSMA / CA is
commonly used in wireless
networks.
It only reduces the recovery
time.
Whereas CSMA/ CA minimizes
the possibility of collision.
CSMA / CD is used in 802.3
standard.
While CSMA / CA is used in
802.11 standard.
It is more efficient than simple
CSMA(Carrier Sense Multiple
Access).
While it is similar to simple
CSMA(Carrier Sense Multiple
Access).
Reference:
1. https://www.forcepoint.com/cyber-edu/osi-model
2. https://www.geeksforgeeks.org/carrier-sense-multiple-access-csma/
3. https://en.wikipedia.org/wiki/Carrier-sense_multiple_access
4. https://www.google.com/search?q=advantage+%26+disadvantage+of+CSMA%2FCD
&rlz=1C1UEAD_enBD931BD931&oq=advantage+%26+disadvantage+of+CSMA%2FCD
&aqs=chrome..69i57j69i58.20422j0j7&sourceid=chrome&ie=UTF-8
5. https://www.tutorialspoint.com/csma-with-collision-avoidance-csma-ca
6. https://www.google.com/search?q=Advantage+%26+disadvantage+of+Collision+Avo
idance+(CSMA%2FCA)&rlz=1C1UEAD_enBD931BD931&oq=Advantage+%26+disadva
ntage+of+Collision+Avoidance+(CSMA%2FCA)&aqs=chrome..69i57.7528j0j7&sourcei
d=chrome&ie=UTF-8
7. https://www.geeksforgeeks.org/difference-between-csma-ca-and-csma-cd/?ref=rp

More Related Content

What's hot

MEDIUM ACCESS CONTROL
MEDIUM ACCESS CONTROLMEDIUM ACCESS CONTROL
MEDIUM ACCESS CONTROLjunnubabu
 
Asynchronous and synchronous
Asynchronous and synchronousAsynchronous and synchronous
Asynchronous and synchronousAkhil .B
 
Transport layer security (tls)
Transport layer security (tls)Transport layer security (tls)
Transport layer security (tls)Kalpesh Kalekar
 
Selective repeat protocol
Selective repeat protocolSelective repeat protocol
Selective repeat protocolManusha Dilan
 
data-link layer protocols
data-link layer protocols  data-link layer protocols
data-link layer protocols BE Smârt
 
Flow & Error Control
Flow & Error ControlFlow & Error Control
Flow & Error Controltameemyousaf
 
EC8551 COMMUNICATION NETWORKS
EC8551 COMMUNICATION NETWORKSEC8551 COMMUNICATION NETWORKS
EC8551 COMMUNICATION NETWORKSGOWTHAMMS6
 
Two-way Deterministic Finite Automata
Two-way Deterministic Finite AutomataTwo-way Deterministic Finite Automata
Two-way Deterministic Finite AutomataHafsa.Naseem
 
Cellular network
Cellular networkCellular network
Cellular networkshreb
 
Compiler Design
Compiler DesignCompiler Design
Compiler DesignMir Majid
 
Dataflow Analysis
Dataflow AnalysisDataflow Analysis
Dataflow AnalysisMiller Lee
 
Introduction to Data-Link Layer
Introduction to Data-Link LayerIntroduction to Data-Link Layer
Introduction to Data-Link LayerAbdullaziz Tagawy
 
CSMA /CD PPT ON SLIDESHARE
CSMA /CD PPT ON SLIDESHARECSMA /CD PPT ON SLIDESHARE
CSMA /CD PPT ON SLIDESHAREKhushboo Pal
 
8. mutual exclusion in Distributed Operating Systems
8. mutual exclusion in Distributed Operating Systems8. mutual exclusion in Distributed Operating Systems
8. mutual exclusion in Distributed Operating SystemsDr Sandeep Kumar Poonia
 
Optimization Techniques
Optimization TechniquesOptimization Techniques
Optimization TechniquesJoud Khattab
 

What's hot (20)

Recognition-of-tokens
Recognition-of-tokensRecognition-of-tokens
Recognition-of-tokens
 
MEDIUM ACCESS CONTROL
MEDIUM ACCESS CONTROLMEDIUM ACCESS CONTROL
MEDIUM ACCESS CONTROL
 
The medium access sublayer
 The medium  access sublayer The medium  access sublayer
The medium access sublayer
 
Asynchronous and synchronous
Asynchronous and synchronousAsynchronous and synchronous
Asynchronous and synchronous
 
aloha
alohaaloha
aloha
 
Transport layer security (tls)
Transport layer security (tls)Transport layer security (tls)
Transport layer security (tls)
 
Selective repeat protocol
Selective repeat protocolSelective repeat protocol
Selective repeat protocol
 
Token bus
Token busToken bus
Token bus
 
data-link layer protocols
data-link layer protocols  data-link layer protocols
data-link layer protocols
 
Flow & Error Control
Flow & Error ControlFlow & Error Control
Flow & Error Control
 
EC8551 COMMUNICATION NETWORKS
EC8551 COMMUNICATION NETWORKSEC8551 COMMUNICATION NETWORKS
EC8551 COMMUNICATION NETWORKS
 
Data Link Control
Data Link ControlData Link Control
Data Link Control
 
Two-way Deterministic Finite Automata
Two-way Deterministic Finite AutomataTwo-way Deterministic Finite Automata
Two-way Deterministic Finite Automata
 
Cellular network
Cellular networkCellular network
Cellular network
 
Compiler Design
Compiler DesignCompiler Design
Compiler Design
 
Dataflow Analysis
Dataflow AnalysisDataflow Analysis
Dataflow Analysis
 
Introduction to Data-Link Layer
Introduction to Data-Link LayerIntroduction to Data-Link Layer
Introduction to Data-Link Layer
 
CSMA /CD PPT ON SLIDESHARE
CSMA /CD PPT ON SLIDESHARECSMA /CD PPT ON SLIDESHARE
CSMA /CD PPT ON SLIDESHARE
 
8. mutual exclusion in Distributed Operating Systems
8. mutual exclusion in Distributed Operating Systems8. mutual exclusion in Distributed Operating Systems
8. mutual exclusion in Distributed Operating Systems
 
Optimization Techniques
Optimization TechniquesOptimization Techniques
Optimization Techniques
 

Similar to Note 6 (20)

Osi model in networking
Osi model in networkingOsi model in networking
Osi model in networking
 
OSI Model
OSI ModelOSI Model
OSI Model
 
Network Advantages And Disadvantages
Network Advantages And DisadvantagesNetwork Advantages And Disadvantages
Network Advantages And Disadvantages
 
Osi model and tcpip model.
Osi model and tcpip model.Osi model and tcpip model.
Osi model and tcpip model.
 
Assignment3
Assignment3Assignment3
Assignment3
 
OSI Model and TCP/IP Model.
OSI Model and TCP/IP Model.OSI Model and TCP/IP Model.
OSI Model and TCP/IP Model.
 
Osi model
Osi modelOsi model
Osi model
 
OSI Layer
OSI LayerOSI Layer
OSI Layer
 
Class work4
Class work4Class work4
Class work4
 
THE OSI MODEL
THE OSI MODELTHE OSI MODEL
THE OSI MODEL
 
OSI MODEL
OSI MODELOSI MODEL
OSI MODEL
 
Module 2 lan,data link layer
Module 2 lan,data link layerModule 2 lan,data link layer
Module 2 lan,data link layer
 
OSI Reference Model
OSI Reference ModelOSI Reference Model
OSI Reference Model
 
Presentation on osi layer
Presentation on osi layerPresentation on osi layer
Presentation on osi layer
 
BAPANKAR15800121011 SOFT.pptx
BAPANKAR15800121011 SOFT.pptxBAPANKAR15800121011 SOFT.pptx
BAPANKAR15800121011 SOFT.pptx
 
COMPUTER NETWORK_OSI & TCP/IP
COMPUTER NETWORK_OSI & TCP/IPCOMPUTER NETWORK_OSI & TCP/IP
COMPUTER NETWORK_OSI & TCP/IP
 
006 Osi Model
006 Osi Model006 Osi Model
006 Osi Model
 
Osi model
Osi modelOsi model
Osi model
 
Osi model
Osi model Osi model
Osi model
 
The osi model layers
The osi model layersThe osi model layers
The osi model layers
 

More from MejbahUddinRafi (6)

Note 5
Note 5Note 5
Note 5
 
Note 04
Note 04Note 04
Note 04
 
Note 03
Note 03Note 03
Note 03
 
Note 01
Note 01Note 01
Note 01
 
Note -02
Note -02Note -02
Note -02
 
Assignment 01
Assignment 01Assignment 01
Assignment 01
 

Recently uploaded

Sheet Pile Wall Design and Construction: A Practical Guide for Civil Engineer...
Sheet Pile Wall Design and Construction: A Practical Guide for Civil Engineer...Sheet Pile Wall Design and Construction: A Practical Guide for Civil Engineer...
Sheet Pile Wall Design and Construction: A Practical Guide for Civil Engineer...Dr.Costas Sachpazis
 
Software Development Life Cycle By Team Orange (Dept. of Pharmacy)
Software Development Life Cycle By  Team Orange (Dept. of Pharmacy)Software Development Life Cycle By  Team Orange (Dept. of Pharmacy)
Software Development Life Cycle By Team Orange (Dept. of Pharmacy)Suman Mia
 
(ANJALI) Dange Chowk Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...
(ANJALI) Dange Chowk Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...(ANJALI) Dange Chowk Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...
(ANJALI) Dange Chowk Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...ranjana rawat
 
Introduction to Multiple Access Protocol.pptx
Introduction to Multiple Access Protocol.pptxIntroduction to Multiple Access Protocol.pptx
Introduction to Multiple Access Protocol.pptxupamatechverse
 
Processing & Properties of Floor and Wall Tiles.pptx
Processing & Properties of Floor and Wall Tiles.pptxProcessing & Properties of Floor and Wall Tiles.pptx
Processing & Properties of Floor and Wall Tiles.pptxpranjaldaimarysona
 
APPLICATIONS-AC/DC DRIVES-OPERATING CHARACTERISTICS
APPLICATIONS-AC/DC DRIVES-OPERATING CHARACTERISTICSAPPLICATIONS-AC/DC DRIVES-OPERATING CHARACTERISTICS
APPLICATIONS-AC/DC DRIVES-OPERATING CHARACTERISTICSKurinjimalarL3
 
OSVC_Meta-Data based Simulation Automation to overcome Verification Challenge...
OSVC_Meta-Data based Simulation Automation to overcome Verification Challenge...OSVC_Meta-Data based Simulation Automation to overcome Verification Challenge...
OSVC_Meta-Data based Simulation Automation to overcome Verification Challenge...Soham Mondal
 
The Most Attractive Pune Call Girls Budhwar Peth 8250192130 Will You Miss Thi...
The Most Attractive Pune Call Girls Budhwar Peth 8250192130 Will You Miss Thi...The Most Attractive Pune Call Girls Budhwar Peth 8250192130 Will You Miss Thi...
The Most Attractive Pune Call Girls Budhwar Peth 8250192130 Will You Miss Thi...ranjana rawat
 
main PPT.pptx of girls hostel security using rfid
main PPT.pptx of girls hostel security using rfidmain PPT.pptx of girls hostel security using rfid
main PPT.pptx of girls hostel security using rfidNikhilNagaraju
 
Gfe Mayur Vihar Call Girls Service WhatsApp -> 9999965857 Available 24x7 ^ De...
Gfe Mayur Vihar Call Girls Service WhatsApp -> 9999965857 Available 24x7 ^ De...Gfe Mayur Vihar Call Girls Service WhatsApp -> 9999965857 Available 24x7 ^ De...
Gfe Mayur Vihar Call Girls Service WhatsApp -> 9999965857 Available 24x7 ^ De...srsj9000
 
Introduction to IEEE STANDARDS and its different types.pptx
Introduction to IEEE STANDARDS and its different types.pptxIntroduction to IEEE STANDARDS and its different types.pptx
Introduction to IEEE STANDARDS and its different types.pptxupamatechverse
 
Call Girls Delhi {Jodhpur} 9711199012 high profile service
Call Girls Delhi {Jodhpur} 9711199012 high profile serviceCall Girls Delhi {Jodhpur} 9711199012 high profile service
Call Girls Delhi {Jodhpur} 9711199012 high profile servicerehmti665
 
Call Girls in Nagpur Suman Call 7001035870 Meet With Nagpur Escorts
Call Girls in Nagpur Suman Call 7001035870 Meet With Nagpur EscortsCall Girls in Nagpur Suman Call 7001035870 Meet With Nagpur Escorts
Call Girls in Nagpur Suman Call 7001035870 Meet With Nagpur EscortsCall Girls in Nagpur High Profile
 
MANUFACTURING PROCESS-II UNIT-5 NC MACHINE TOOLS
MANUFACTURING PROCESS-II UNIT-5 NC MACHINE TOOLSMANUFACTURING PROCESS-II UNIT-5 NC MACHINE TOOLS
MANUFACTURING PROCESS-II UNIT-5 NC MACHINE TOOLSSIVASHANKAR N
 
High Profile Call Girls Nagpur Meera Call 7001035870 Meet With Nagpur Escorts
High Profile Call Girls Nagpur Meera Call 7001035870 Meet With Nagpur EscortsHigh Profile Call Girls Nagpur Meera Call 7001035870 Meet With Nagpur Escorts
High Profile Call Girls Nagpur Meera Call 7001035870 Meet With Nagpur EscortsCall Girls in Nagpur High Profile
 
HARDNESS, FRACTURE TOUGHNESS AND STRENGTH OF CERAMICS
HARDNESS, FRACTURE TOUGHNESS AND STRENGTH OF CERAMICSHARDNESS, FRACTURE TOUGHNESS AND STRENGTH OF CERAMICS
HARDNESS, FRACTURE TOUGHNESS AND STRENGTH OF CERAMICSRajkumarAkumalla
 
SPICE PARK APR2024 ( 6,793 SPICE Models )
SPICE PARK APR2024 ( 6,793 SPICE Models )SPICE PARK APR2024 ( 6,793 SPICE Models )
SPICE PARK APR2024 ( 6,793 SPICE Models )Tsuyoshi Horigome
 
(ANVI) Koregaon Park Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...
(ANVI) Koregaon Park Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...(ANVI) Koregaon Park Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...
(ANVI) Koregaon Park Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...ranjana rawat
 
Porous Ceramics seminar and technical writing
Porous Ceramics seminar and technical writingPorous Ceramics seminar and technical writing
Porous Ceramics seminar and technical writingrakeshbaidya232001
 
HARMONY IN THE NATURE AND EXISTENCE - Unit-IV
HARMONY IN THE NATURE AND EXISTENCE - Unit-IVHARMONY IN THE NATURE AND EXISTENCE - Unit-IV
HARMONY IN THE NATURE AND EXISTENCE - Unit-IVRajaP95
 

Recently uploaded (20)

Sheet Pile Wall Design and Construction: A Practical Guide for Civil Engineer...
Sheet Pile Wall Design and Construction: A Practical Guide for Civil Engineer...Sheet Pile Wall Design and Construction: A Practical Guide for Civil Engineer...
Sheet Pile Wall Design and Construction: A Practical Guide for Civil Engineer...
 
Software Development Life Cycle By Team Orange (Dept. of Pharmacy)
Software Development Life Cycle By  Team Orange (Dept. of Pharmacy)Software Development Life Cycle By  Team Orange (Dept. of Pharmacy)
Software Development Life Cycle By Team Orange (Dept. of Pharmacy)
 
(ANJALI) Dange Chowk Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...
(ANJALI) Dange Chowk Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...(ANJALI) Dange Chowk Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...
(ANJALI) Dange Chowk Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...
 
Introduction to Multiple Access Protocol.pptx
Introduction to Multiple Access Protocol.pptxIntroduction to Multiple Access Protocol.pptx
Introduction to Multiple Access Protocol.pptx
 
Processing & Properties of Floor and Wall Tiles.pptx
Processing & Properties of Floor and Wall Tiles.pptxProcessing & Properties of Floor and Wall Tiles.pptx
Processing & Properties of Floor and Wall Tiles.pptx
 
APPLICATIONS-AC/DC DRIVES-OPERATING CHARACTERISTICS
APPLICATIONS-AC/DC DRIVES-OPERATING CHARACTERISTICSAPPLICATIONS-AC/DC DRIVES-OPERATING CHARACTERISTICS
APPLICATIONS-AC/DC DRIVES-OPERATING CHARACTERISTICS
 
OSVC_Meta-Data based Simulation Automation to overcome Verification Challenge...
OSVC_Meta-Data based Simulation Automation to overcome Verification Challenge...OSVC_Meta-Data based Simulation Automation to overcome Verification Challenge...
OSVC_Meta-Data based Simulation Automation to overcome Verification Challenge...
 
The Most Attractive Pune Call Girls Budhwar Peth 8250192130 Will You Miss Thi...
The Most Attractive Pune Call Girls Budhwar Peth 8250192130 Will You Miss Thi...The Most Attractive Pune Call Girls Budhwar Peth 8250192130 Will You Miss Thi...
The Most Attractive Pune Call Girls Budhwar Peth 8250192130 Will You Miss Thi...
 
main PPT.pptx of girls hostel security using rfid
main PPT.pptx of girls hostel security using rfidmain PPT.pptx of girls hostel security using rfid
main PPT.pptx of girls hostel security using rfid
 
Gfe Mayur Vihar Call Girls Service WhatsApp -> 9999965857 Available 24x7 ^ De...
Gfe Mayur Vihar Call Girls Service WhatsApp -> 9999965857 Available 24x7 ^ De...Gfe Mayur Vihar Call Girls Service WhatsApp -> 9999965857 Available 24x7 ^ De...
Gfe Mayur Vihar Call Girls Service WhatsApp -> 9999965857 Available 24x7 ^ De...
 
Introduction to IEEE STANDARDS and its different types.pptx
Introduction to IEEE STANDARDS and its different types.pptxIntroduction to IEEE STANDARDS and its different types.pptx
Introduction to IEEE STANDARDS and its different types.pptx
 
Call Girls Delhi {Jodhpur} 9711199012 high profile service
Call Girls Delhi {Jodhpur} 9711199012 high profile serviceCall Girls Delhi {Jodhpur} 9711199012 high profile service
Call Girls Delhi {Jodhpur} 9711199012 high profile service
 
Call Girls in Nagpur Suman Call 7001035870 Meet With Nagpur Escorts
Call Girls in Nagpur Suman Call 7001035870 Meet With Nagpur EscortsCall Girls in Nagpur Suman Call 7001035870 Meet With Nagpur Escorts
Call Girls in Nagpur Suman Call 7001035870 Meet With Nagpur Escorts
 
MANUFACTURING PROCESS-II UNIT-5 NC MACHINE TOOLS
MANUFACTURING PROCESS-II UNIT-5 NC MACHINE TOOLSMANUFACTURING PROCESS-II UNIT-5 NC MACHINE TOOLS
MANUFACTURING PROCESS-II UNIT-5 NC MACHINE TOOLS
 
High Profile Call Girls Nagpur Meera Call 7001035870 Meet With Nagpur Escorts
High Profile Call Girls Nagpur Meera Call 7001035870 Meet With Nagpur EscortsHigh Profile Call Girls Nagpur Meera Call 7001035870 Meet With Nagpur Escorts
High Profile Call Girls Nagpur Meera Call 7001035870 Meet With Nagpur Escorts
 
HARDNESS, FRACTURE TOUGHNESS AND STRENGTH OF CERAMICS
HARDNESS, FRACTURE TOUGHNESS AND STRENGTH OF CERAMICSHARDNESS, FRACTURE TOUGHNESS AND STRENGTH OF CERAMICS
HARDNESS, FRACTURE TOUGHNESS AND STRENGTH OF CERAMICS
 
SPICE PARK APR2024 ( 6,793 SPICE Models )
SPICE PARK APR2024 ( 6,793 SPICE Models )SPICE PARK APR2024 ( 6,793 SPICE Models )
SPICE PARK APR2024 ( 6,793 SPICE Models )
 
(ANVI) Koregaon Park Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...
(ANVI) Koregaon Park Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...(ANVI) Koregaon Park Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...
(ANVI) Koregaon Park Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...
 
Porous Ceramics seminar and technical writing
Porous Ceramics seminar and technical writingPorous Ceramics seminar and technical writing
Porous Ceramics seminar and technical writing
 
HARMONY IN THE NATURE AND EXISTENCE - Unit-IV
HARMONY IN THE NATURE AND EXISTENCE - Unit-IVHARMONY IN THE NATURE AND EXISTENCE - Unit-IV
HARMONY IN THE NATURE AND EXISTENCE - Unit-IV
 

Note 6

  • 1. NOTE-06 Topic: OSI Model & CSMA Course Code: CSE317 Course Title: Computer Networks Submitted To Pranab Bandhu Nath Senior Lecturer, Department of CSE City University Submitted By Md.Mejbah Uddin Rafi BSc in CSE (Day) Batch: 49th (B) ID: 1834902584
  • 2. OSI Model The OSI Model (Open Systems Interconnection Model) is a conceptual framework used to describe the functions of a networking system. The OSI model characterizes computing functions into a universal set of rules and requirements in order to support interoperability between different products and software. In the OSI reference model, the communications between a computing system are split into seven different abstraction layers: Physical, Data Link, Network, Transport, Session, Presentation, and Application. Created at a time when network computing was in its infancy, the OSI was published in 1984 by the International Organization for Standardization (ISO). Though it does not always map directly to specific systems, the OSI Model is still used today as a means to describe Network Architecture. The 7 Layers of the OSI Model Physical Layer The lowest layer of the OSI Model is concerned with electrically or optically transmitting raw unstructured data bits across the network from the physical layer of the sending device to the physical layer of the receiving device. It can include specifications such as voltages, pin layout, cabling, and radio frequencies. At the physical layer, one might find “physical” resources such as network hubs, cabling, repeaters, network adapters or modems.
  • 3. Data Link Layer At the data link layer, directly connected nodes are used to perform node-to-node data transfer where data is packaged into frames. The data link layer also corrects errors that may have occurred at the physical layer. The data link layer encompasses two sub-layers of its own. The first, media access control (MAC), provides flow control and multiplexing for device transmissions over a network. The second, the logical link control (LLC), provides flow and error control over the physical medium as well as identifies line protocols. Network Layer The network layer is responsible for receiving frames from the data link layer, and delivering them to their intended destinations among based on the addresses contained inside the frame. The network layer finds the destination by using logical addresses, such as IP (internet protocol). At this layer, routers are a crucial component used to quite literally route information where it needs to go between networks. Transport Layer The transport layer manages the delivery and error checking of data packets. It regulates the size, sequencing, and ultimately the transfer of data between systems and hosts. One of the most common examples of the transport layer is TCP or the Transmission Control Protocol. Session Layer
  • 4. The session layer controls the conversations between different computers. A session or connection between machines is set up, managed, and termined at layer 5. Session layer services also include authentication and reconnections. Presentation Layer The presentation layer formats or translates data for the application layer based on the syntax or semantics that the application accepts. Because of this, it at times also called the syntax layer. This layer can also handle the encryption and decryption required by the application layer. Application Layer At this layer, both the end user and the application layer interact directly with the software application. This layer sees network services provided to end-user applications such as a web browser or Office 365. The application layer identifies communication partners, resource availability, and synchronizes communication. Carrier-sense multiple access (CSMA) CSMA is a media access control (MAC) protocol in which a node verifies the absence of other traffic before transmitting on a shared transmission medium, such as an electrical bus or a band of the electromagnetic spectrum. It is divided into two part: Collision Detection (CSMA/CD)
  • 5. In this method, a station monitors the medium after it sends a frame to see if the transmission was successful. If successful, the station is finished, if not, the frame is sent again. Advantages Disadvantages It has low overhead. Collisions degrade network performance. Utilizes all available bandwidth when possible. Priorities cannot be assigned to certain nodes. Performance degrades exponentially as devices are added. Collision Avoidance (CSMA/CA) Carrier Sense Multiple Access with Collision Avoidance (CSMA/CA) is a network protocol for carrier transmission that operates in the Medium Access Control (MAC) layer. In contrast to CSMA/CD (Carrier Sense Multiple Access/Collision Detection) that deals with collisions after their occurrence, CSMA/CA prevents collisions prior to their occurrence. Advantages Disadvantages Helps prevent data collisions Longer waiting times Thanks to feedback, no data is unnoticeably lost Causes additional traffic Avoids unnecessary data traffic with the RTS/CTS extension Solves the hidden station problem only by using RTS/CTS extension
  • 6. Difference between CSMA/CA and CSMA/CD:- CSMA/CD CSMA/CA CSMA / CD is effective after a collision. Whereas CSMA / CA is effective before a collision. CSMA / CD is used in wired networks. Whereas CSMA / CA is commonly used in wireless networks. It only reduces the recovery time. Whereas CSMA/ CA minimizes the possibility of collision. CSMA / CD is used in 802.3 standard. While CSMA / CA is used in 802.11 standard. It is more efficient than simple CSMA(Carrier Sense Multiple Access). While it is similar to simple CSMA(Carrier Sense Multiple Access). Reference: 1. https://www.forcepoint.com/cyber-edu/osi-model 2. https://www.geeksforgeeks.org/carrier-sense-multiple-access-csma/ 3. https://en.wikipedia.org/wiki/Carrier-sense_multiple_access 4. https://www.google.com/search?q=advantage+%26+disadvantage+of+CSMA%2FCD &rlz=1C1UEAD_enBD931BD931&oq=advantage+%26+disadvantage+of+CSMA%2FCD &aqs=chrome..69i57j69i58.20422j0j7&sourceid=chrome&ie=UTF-8 5. https://www.tutorialspoint.com/csma-with-collision-avoidance-csma-ca 6. https://www.google.com/search?q=Advantage+%26+disadvantage+of+Collision+Avo idance+(CSMA%2FCA)&rlz=1C1UEAD_enBD931BD931&oq=Advantage+%26+disadva ntage+of+Collision+Avoidance+(CSMA%2FCA)&aqs=chrome..69i57.7528j0j7&sourcei d=chrome&ie=UTF-8 7. https://www.geeksforgeeks.org/difference-between-csma-ca-and-csma-cd/?ref=rp