SlideShare a Scribd company logo
OSI MODEL AND DATA LINK
LAYER
2ND UNIT
COMPUTER NETWORK AND
SECURITY
Chapter…….
• Network Models
• Error Detection and Correction
• Flow and Error Control
Network Models
• Protocol
Set of rules that enable two device to
connect and transmit data to one another.

• Service
Set of opration that layer provides to
the layer above or below it.
Key Elements of Protocol
• Syntax

Structure or format of the data.
• Semantics
meaning of each Section of bit.
• Timing
When data should be sent and how
fast they can be sent.
Standards
• De facto

De facto standards are often
established originally by manufacturers who
request to define the functionality of a new
product or technology.
• De jure
Thos standards that have legislated
by an officially recognized body are de jure
standards.
OSI Model
• Developed by the International standard
Organization(ISO).
• The model is called ISO OSI(Open System
Interconnection)
• The OSI model has Seven layers.
• H- Header Information(Source & Destination
address)
• T- Trailer Information(Error control)
OSI Layers
1.
2.
3.
4.
5.
6.
7.

Application layer
Presentation Layer
Session Layer
Transport layer
Network Layer
Data link layer
Physical layer
OSI Reference model
Application

Sending Device

Application

AH Application data

Presentation

SH

Transport

Physical

TH
DH

Application

Data Unit

Presentation

Data Unit

Session

Data Unit

PH

Session

Network

Receiving Device

Data

Transport

Data Unit
Data Unit(Bits)

DT

Network
Physical
Physical Layer
• The physical layer is responsible for transmitting
individual bits from one node to the next.
Data Link Layer
• The data link layer is responsible for
transmitting frames from one node to the
next.
Functions of Data link layer
• Framing
Divides the data in to smaller unit.
• Physical addressing
Hardware address is added in Header.
• Flow control
Control the flow of data between sender and
receiver
• Error control
generally error control mechanisms are added in
Data link Trailer(DT)
Network Layer
The network layer is responsible for the delivery
of packets from the original source to the final
destination.
Functions of Network Layer
• Logical addressing
The physical addressing
implemented by the data link layer
handles the addressing problem locally.
• Routing
Finding the shortest path
between source and destination.
Transport Layer
• The transport layer is responsible for delivery of a
message from one process to another.
Functions of Transport Layer
• Service point addressing
Used to identify the process
• Segmentation and reassembly
A message is divided into transmittable
segments, each having a sequence number. These
numbers enable the transport layer to reassemble
the message correctly upon arrival at the
destination.
• Flow control.
• Error control.
Session Layer
• Allow a user to log into a remote system or to
transfer a file between two machines.
Functions of Session Layer:
• Dialogue control
Control the conversation between two
system
• Synchronization
Coortinate the interaction among
communication system.
Presentation Layer
• It concerned with the syntax and semantics of the
information transmitted.
Functions of Session Layer:
• Translation
Own format information is exchange between two
different system
• Encryption
Original message into secret form
• Compression
Reduce the number of bit s contained in the
information
Application layer
• The application layer is responsible for providing
services to the user.
Functions of Application Layer
• Network Virtual Terminal
It allow a user to log on to the remote
computer.
• File Transfer, Access and Management
Allow user to access file from remote
computer.
• Mail Service
It provide the basic for E-Mail forwarding
and Storage.
Error detection and Correction
• Error:
unpredictable changes of bits from
1->0 or 0->1

• Types:
Single bit error
– Burst error(Multiple)
–
Single bit error
• A 0 is changed to 1 or a 1 is changed to 0

Received

Sent

10011100101

1 0 0 1 0 1 0 0 1 0 1
Error
Burst Error(Multiple)
• 2 or more bits in the data unit have changed from 1
to 0 or from 0 to 1
Length of burst error (8 bits)

0 1 0 0 0 1 0 0 0 1 0 0 0 0 1 1
Corrupted Bits

0 1 0 1 1 1 0 0 1 1 1 1 0 0 1 1
CRC
• Cyclic codes are special block codes with one extra
property.
• A codeword is cyclically shifted (rotated) the result is
another codeword.
MSB
1

0

LSB
1

1

0

0

0

MSB
0 1

1

LSB
0

0

0

1
CRC Encoder & Decoder
Data word - 1001(data to be sent)
Divisor - 1011(predetermined constant)
Code word- Data word + Remainder
1 0

0

1 0

0

1 0

1 0

1011

1

1

1

0
0

Quotient
0

0 0
0 0

1

Code word-100110

1
0

0 0 0

1

0 1

0

1

0 1 1 0
0 0 0 0
1 1 0

Remainder
CRC Encoder & Decoder
Data word - 1001(data to be sent)
Divisor - 1011(predetermined constant)
Code word- Data word + Remainder-1001110
1 0

0

1 0

0

1 1

1 0

1011

1

1

1

0
0

Quotient
1

0 0
0 0

1

Code word-100110

1
0

0 0 0

1

0 1

0

1

0 0 0 0
0 0 0 0
0 0 0

Remainder
Parity Check
• Parity is a system in which each transmitted
character contain one additional bit.
• Two system of parity are normally used:
odd parity
even parity
• Odd parity means the total number of binary 1’s is in
the character,including the parity bit is odd.
• Even parity means that the number of binary 1’s bit
in the character,including the parity bit is even.
• This technique only detects the single bit error.
Checksum
• Several protocols still use the checksum for error
detection.
• For example, if the set of number
is(7,10,3,11,5),we send(7,10,3,11,5,36),where 36
is the sum of (7+10+3+11+5) the original number.
• The receiver adds the five numbers and compares
the result with the sum.
• If the two are the same,the receiver assumes no
error,accepts the five numbers and omits the sum.
Check sum
• There is an error somewhere and the data are not
accepted
• The traditional checksum uses a small number of
bits(16) to detect error in a massage of any size.
• It is not strong as CRC in error checking capability.
• For example,If the value of one word is increamented
and the value of another word is decreamented by
the same amount,the two error cannot be detected
because the sum remains the same.
Flow control
• Flow control
The management of data flow
between computers or device or between
nodes in a network so that the data can be
handled at an efficient pace
• Types of flow control
Stop – and – wait flow control
Sliding window flow control
Stop and Wait Flow control
• Sender sends a frame and wait for acknowledgement
from the receiver.
• After receiving the acknowledgement from the
receiver,sender sends next frame.
Stop and wait flow control
• Advantage

Gurantee for the delivery of
every frame.Because sender sends the
next frame only after receiving the
acknowledgement of previous frame.
• Disadvantage
It is time consuming.
Sliding window flow control
• The flow control technique that allows multiple
frames to be in transit on the line at one time is
called sliding window .
Error control
• Error control is a method that can be
used to recover the corrupted data
whenever possible.
• Types of error control
backward error control
forward error control
Damaged frame
• A recognizable frame does arrive,but some of
the bit are in error.
Lost frame
• A frame fail to arrive at the other side.
Lost acknowledgement
• An acknowledgement fails at the source.the sender is
not aware that acknowledgement has been
transmitted from the receiver.
ARQ
• Full form --Automatic Repeat Request
• The purpose of ARQ is to change an
unreliable data link into a reliable one.
• Version of ARQ
Stop-and –wait ARQ
Go-Back-N ARQ
Selective-repeat ARQ
Stop-and-wait ARQ
• Sender transmits a single frame and then
twaits for acknowledgement(ACK).
Go back N ARQ
• A station may send a series of frames sequentially
numbered with some maximum value.
• It give a NACK from the receiver.
Selective Repeat ARQ
Osi model

More Related Content

What's hot

Jaimin chp-3 - data-link layer- 2011 batch
Jaimin   chp-3 - data-link layer- 2011 batchJaimin   chp-3 - data-link layer- 2011 batch
Jaimin chp-3 - data-link layer- 2011 batch
Jaimin Jani
 
Different protocols for data communication networks
Different protocols for data communication networks Different protocols for data communication networks
Different protocols for data communication networks
Nt Arvind
 
Flow control and error control techniques in the data link layer protocol
Flow control and error control techniques in the data link layer protocolFlow control and error control techniques in the data link layer protocol
Flow control and error control techniques in the data link layer protocol
mdmuaj
 
Error control
Error controlError control
Error control
selvakumar_b1985
 
6 data linkcontrol
6  data linkcontrol6  data linkcontrol
6 data linkcontrol
Hattori Sidek
 
Data Link Control Protocols
Data Link Control ProtocolsData Link Control Protocols
Data Link Control Protocols
TechiNerd
 
data-link layer protocols
data-link layer protocols  data-link layer protocols
data-link layer protocols
BE Smârt
 
Presentation of computer network on data link layer
Presentation of computer network on data link layerPresentation of computer network on data link layer
Presentation of computer network on data link layer
sumit gyawali
 
Error Control In Network Layer
Error Control In Network LayerError Control In Network Layer
Error Control In Network Layer
Ahtesham Ullah khan
 
14 data link control
14 data link control14 data link control
14 data link control
arvindsarja
 
Data Link Layer Numericals
Data Link Layer NumericalsData Link Layer Numericals
Data Link Layer Numericals
Manisha Keim
 
Framming data link layer
Framming data link layerFramming data link layer
Framming data link layer
PREMAL GAJJAR
 
Unit 4 data link layer
Unit 4 data link layerUnit 4 data link layer
Unit 4 data link layer
mekind
 
Chapter3
Chapter3Chapter3
Chapter3
Nagarajan
 
Chapter 7 - Data Link Control Protocols 9e
Chapter 7 - Data Link Control Protocols 9eChapter 7 - Data Link Control Protocols 9e
Chapter 7 - Data Link Control Protocols 9e
adpeer
 
Errors, Error Detection, and Error Control
Errors, Error Detection, and Error ControlErrors, Error Detection, and Error Control
Errors, Error Detection, and Error Control
Angel G Diaz
 
Data link layer elementry protocols
Data link layer elementry protocolsData link layer elementry protocols
Data link layer elementry protocols
sabitha sairam
 
Error control
Error controlError control
Error control
Bhupendra sahu
 
Concept of OSI Model_KSMS_BCA_4th_6th_Sem_Priyanka Bhattacharya_20th March 2020
Concept of OSI Model_KSMS_BCA_4th_6th_Sem_Priyanka Bhattacharya_20th March  2020Concept of OSI Model_KSMS_BCA_4th_6th_Sem_Priyanka Bhattacharya_20th March  2020
Concept of OSI Model_KSMS_BCA_4th_6th_Sem_Priyanka Bhattacharya_20th March 2020
PriyankaBhattacharya28
 
New framing-protocols
New framing-protocolsNew framing-protocols
New framing-protocols
Nitesh Singh
 

What's hot (20)

Jaimin chp-3 - data-link layer- 2011 batch
Jaimin   chp-3 - data-link layer- 2011 batchJaimin   chp-3 - data-link layer- 2011 batch
Jaimin chp-3 - data-link layer- 2011 batch
 
Different protocols for data communication networks
Different protocols for data communication networks Different protocols for data communication networks
Different protocols for data communication networks
 
Flow control and error control techniques in the data link layer protocol
Flow control and error control techniques in the data link layer protocolFlow control and error control techniques in the data link layer protocol
Flow control and error control techniques in the data link layer protocol
 
Error control
Error controlError control
Error control
 
6 data linkcontrol
6  data linkcontrol6  data linkcontrol
6 data linkcontrol
 
Data Link Control Protocols
Data Link Control ProtocolsData Link Control Protocols
Data Link Control Protocols
 
data-link layer protocols
data-link layer protocols  data-link layer protocols
data-link layer protocols
 
Presentation of computer network on data link layer
Presentation of computer network on data link layerPresentation of computer network on data link layer
Presentation of computer network on data link layer
 
Error Control In Network Layer
Error Control In Network LayerError Control In Network Layer
Error Control In Network Layer
 
14 data link control
14 data link control14 data link control
14 data link control
 
Data Link Layer Numericals
Data Link Layer NumericalsData Link Layer Numericals
Data Link Layer Numericals
 
Framming data link layer
Framming data link layerFramming data link layer
Framming data link layer
 
Unit 4 data link layer
Unit 4 data link layerUnit 4 data link layer
Unit 4 data link layer
 
Chapter3
Chapter3Chapter3
Chapter3
 
Chapter 7 - Data Link Control Protocols 9e
Chapter 7 - Data Link Control Protocols 9eChapter 7 - Data Link Control Protocols 9e
Chapter 7 - Data Link Control Protocols 9e
 
Errors, Error Detection, and Error Control
Errors, Error Detection, and Error ControlErrors, Error Detection, and Error Control
Errors, Error Detection, and Error Control
 
Data link layer elementry protocols
Data link layer elementry protocolsData link layer elementry protocols
Data link layer elementry protocols
 
Error control
Error controlError control
Error control
 
Concept of OSI Model_KSMS_BCA_4th_6th_Sem_Priyanka Bhattacharya_20th March 2020
Concept of OSI Model_KSMS_BCA_4th_6th_Sem_Priyanka Bhattacharya_20th March  2020Concept of OSI Model_KSMS_BCA_4th_6th_Sem_Priyanka Bhattacharya_20th March  2020
Concept of OSI Model_KSMS_BCA_4th_6th_Sem_Priyanka Bhattacharya_20th March 2020
 
New framing-protocols
New framing-protocolsNew framing-protocols
New framing-protocols
 

Viewers also liked

OSI Model
OSI ModelOSI Model
OSI Model
Rahul Bandhe
 
Internet Protocol
Internet ProtocolInternet Protocol
Internet Protocol
Ghaffar Khan
 
Osi
OsiOsi
Computer Networks- Introduction and Data Link Layer
Computer Networks- Introduction and Data Link LayerComputer Networks- Introduction and Data Link Layer
Computer Networks- Introduction and Data Link Layer
Deepak John
 
OSI REFERENCE LAYERS
OSI REFERENCE LAYERSOSI REFERENCE LAYERS
OSI REFERENCE LAYERS
Ashok Virath
 
The OSI Model of Networking
The OSI Model of NetworkingThe OSI Model of Networking
The OSI Model of Networking
Kashif Sohail
 
Physical layer ppt
Physical layer pptPhysical layer ppt
Physical layer ppt
Najam Khattak
 
Osi reference model in Networking
Osi reference model in NetworkingOsi reference model in Networking
Osi reference model in Networking
Satya P. Joshi
 
Osi model in networking
Osi model in networkingOsi model in networking
Osi model in networking
Future Programming
 
Data Link Layer
Data Link LayerData Link Layer
Data Link Layer
Rutwik Jadhav
 
Error Detection and Correction - Data link Layer
Error Detection and Correction - Data link LayerError Detection and Correction - Data link Layer
Error Detection and Correction - Data link Layer
Abdullaziz Tagawy
 
Chapter 3 final
Chapter 3 finalChapter 3 final
Chapter 3 final
ushabarad142
 
Physical Layer
Physical LayerPhysical Layer
Physical Layer
Are-Da Shalan
 
Computer Network - Network Layer
Computer Network - Network LayerComputer Network - Network Layer
Computer Network - Network Layer
Manoj Kumar
 
Physical layer OSI Model & Transmission Media
Physical layer OSI Model & Transmission MediaPhysical layer OSI Model & Transmission Media
Physical layer OSI Model & Transmission Media
Mukesh Chinta
 
MS-06 Jan June 2017
MS-06 Jan June 2017MS-06 Jan June 2017
MS-06 Jan June 2017
Dharmendra Kumar Singh
 
Chapter02 -- networking standards and the osi model
Chapter02  -- networking standards and the osi modelChapter02  -- networking standards and the osi model
Chapter02 -- networking standards and the osi model
Raja Waseem Akhtar
 
Network Layer
Network LayerNetwork Layer
Network Layer
Ghaffar Khan
 
OSI Model - Every Detail Explained
OSI Model - Every Detail ExplainedOSI Model - Every Detail Explained
OSI Model - Every Detail Explained
Ashish Malik
 

Viewers also liked (20)

OSI Model
OSI ModelOSI Model
OSI Model
 
Internet Protocol
Internet ProtocolInternet Protocol
Internet Protocol
 
Websitebasic
WebsitebasicWebsitebasic
Websitebasic
 
Osi
OsiOsi
Osi
 
Computer Networks- Introduction and Data Link Layer
Computer Networks- Introduction and Data Link LayerComputer Networks- Introduction and Data Link Layer
Computer Networks- Introduction and Data Link Layer
 
OSI REFERENCE LAYERS
OSI REFERENCE LAYERSOSI REFERENCE LAYERS
OSI REFERENCE LAYERS
 
The OSI Model of Networking
The OSI Model of NetworkingThe OSI Model of Networking
The OSI Model of Networking
 
Physical layer ppt
Physical layer pptPhysical layer ppt
Physical layer ppt
 
Osi reference model in Networking
Osi reference model in NetworkingOsi reference model in Networking
Osi reference model in Networking
 
Osi model in networking
Osi model in networkingOsi model in networking
Osi model in networking
 
Data Link Layer
Data Link LayerData Link Layer
Data Link Layer
 
Error Detection and Correction - Data link Layer
Error Detection and Correction - Data link LayerError Detection and Correction - Data link Layer
Error Detection and Correction - Data link Layer
 
Chapter 3 final
Chapter 3 finalChapter 3 final
Chapter 3 final
 
Physical Layer
Physical LayerPhysical Layer
Physical Layer
 
Computer Network - Network Layer
Computer Network - Network LayerComputer Network - Network Layer
Computer Network - Network Layer
 
Physical layer OSI Model & Transmission Media
Physical layer OSI Model & Transmission MediaPhysical layer OSI Model & Transmission Media
Physical layer OSI Model & Transmission Media
 
MS-06 Jan June 2017
MS-06 Jan June 2017MS-06 Jan June 2017
MS-06 Jan June 2017
 
Chapter02 -- networking standards and the osi model
Chapter02  -- networking standards and the osi modelChapter02  -- networking standards and the osi model
Chapter02 -- networking standards and the osi model
 
Network Layer
Network LayerNetwork Layer
Network Layer
 
OSI Model - Every Detail Explained
OSI Model - Every Detail ExplainedOSI Model - Every Detail Explained
OSI Model - Every Detail Explained
 

Similar to Osi model

computer network-unit 2
computer network-unit 2computer network-unit 2
computer network-unit 2
sharmilas38
 
Dcn ppt by roma
Dcn ppt by romaDcn ppt by roma
Dcn ppt by roma
boraroma
 
COMPUTER NETWORKS UNIT 2
COMPUTER NETWORKS UNIT 2COMPUTER NETWORKS UNIT 2
COMPUTER NETWORKS UNIT 2
BON SECOURS COLLEGE FOR WOMEN
 
Computer network coe351- part4- final
Computer network coe351- part4- finalComputer network coe351- part4- final
Computer network coe351- part4- final
Taymoor Nazmy
 
Datalink_func.pptx
Datalink_func.pptxDatalink_func.pptx
Datalink_func.pptx
ThangamaniR3
 
B21DA0201_02.ppt
B21DA0201_02.pptB21DA0201_02.ppt
B21DA0201_02.ppt
DrPreethiD1
 
UNIT II.ppt Computer networks protocol explanation
UNIT II.ppt Computer networks protocol explanationUNIT II.ppt Computer networks protocol explanation
UNIT II.ppt Computer networks protocol explanation
ssuseree2f04
 
COmputer Networks Andrew tanenbaum CHAPTER 3
COmputer Networks Andrew tanenbaum CHAPTER 3COmputer Networks Andrew tanenbaum CHAPTER 3
COmputer Networks Andrew tanenbaum CHAPTER 3
MrMRajaCSESTAFF
 
Data link layer
Data link layerData link layer
Data link layer
dhanashrisabale1
 
DATA LINK LAYER.pdf
DATA LINK LAYER.pdfDATA LINK LAYER.pdf
DATA LINK LAYER.pdf
electricalengineerin42
 
Computer networks unit iv
Computer networks    unit ivComputer networks    unit iv
Computer networks unit iv
JAIGANESH SEKAR
 
Frame Relay
Frame RelayFrame Relay
Frame Relay
trendy updates
 
Ntdd
NtddNtdd
Ntdd
NtddNtdd
Chapter 2.1.1.pptx
Chapter 2.1.1.pptxChapter 2.1.1.pptx
Chapter 2.1.1.pptx
botAlert
 
Sak
SakSak
Introduction to data link layer
Introduction to data link layerIntroduction to data link layer
Introduction to data link layer
Shashank HP
 
Data communication network ppt_Unit_4.pptx
Data communication network ppt_Unit_4.pptxData communication network ppt_Unit_4.pptx
Data communication network ppt_Unit_4.pptx
BHAVYPATEL34
 
Unit 2 ppt 3.ppt
Unit 2 ppt 3.pptUnit 2 ppt 3.ppt
Unit 2 ppt 3.ppt
Selvakanmani S
 
CS553_ST7_Ch06-DigitalDataComm.ppt
CS553_ST7_Ch06-DigitalDataComm.pptCS553_ST7_Ch06-DigitalDataComm.ppt
CS553_ST7_Ch06-DigitalDataComm.ppt
AnandaSaikia1
 

Similar to Osi model (20)

computer network-unit 2
computer network-unit 2computer network-unit 2
computer network-unit 2
 
Dcn ppt by roma
Dcn ppt by romaDcn ppt by roma
Dcn ppt by roma
 
COMPUTER NETWORKS UNIT 2
COMPUTER NETWORKS UNIT 2COMPUTER NETWORKS UNIT 2
COMPUTER NETWORKS UNIT 2
 
Computer network coe351- part4- final
Computer network coe351- part4- finalComputer network coe351- part4- final
Computer network coe351- part4- final
 
Datalink_func.pptx
Datalink_func.pptxDatalink_func.pptx
Datalink_func.pptx
 
B21DA0201_02.ppt
B21DA0201_02.pptB21DA0201_02.ppt
B21DA0201_02.ppt
 
UNIT II.ppt Computer networks protocol explanation
UNIT II.ppt Computer networks protocol explanationUNIT II.ppt Computer networks protocol explanation
UNIT II.ppt Computer networks protocol explanation
 
COmputer Networks Andrew tanenbaum CHAPTER 3
COmputer Networks Andrew tanenbaum CHAPTER 3COmputer Networks Andrew tanenbaum CHAPTER 3
COmputer Networks Andrew tanenbaum CHAPTER 3
 
Data link layer
Data link layerData link layer
Data link layer
 
DATA LINK LAYER.pdf
DATA LINK LAYER.pdfDATA LINK LAYER.pdf
DATA LINK LAYER.pdf
 
Computer networks unit iv
Computer networks    unit ivComputer networks    unit iv
Computer networks unit iv
 
Frame Relay
Frame RelayFrame Relay
Frame Relay
 
Ntdd
NtddNtdd
Ntdd
 
Ntdd
NtddNtdd
Ntdd
 
Chapter 2.1.1.pptx
Chapter 2.1.1.pptxChapter 2.1.1.pptx
Chapter 2.1.1.pptx
 
Sak
SakSak
Sak
 
Introduction to data link layer
Introduction to data link layerIntroduction to data link layer
Introduction to data link layer
 
Data communication network ppt_Unit_4.pptx
Data communication network ppt_Unit_4.pptxData communication network ppt_Unit_4.pptx
Data communication network ppt_Unit_4.pptx
 
Unit 2 ppt 3.ppt
Unit 2 ppt 3.pptUnit 2 ppt 3.ppt
Unit 2 ppt 3.ppt
 
CS553_ST7_Ch06-DigitalDataComm.ppt
CS553_ST7_Ch06-DigitalDataComm.pptCS553_ST7_Ch06-DigitalDataComm.ppt
CS553_ST7_Ch06-DigitalDataComm.ppt
 

Recently uploaded

Digital Artifact 1 - 10VCD Environments Unit
Digital Artifact 1 - 10VCD Environments UnitDigital Artifact 1 - 10VCD Environments Unit
Digital Artifact 1 - 10VCD Environments Unit
chanes7
 
Lapbook sobre os Regimes Totalitários.pdf
Lapbook sobre os Regimes Totalitários.pdfLapbook sobre os Regimes Totalitários.pdf
Lapbook sobre os Regimes Totalitários.pdf
Jean Carlos Nunes Paixão
 
Top five deadliest dog breeds in America
Top five deadliest dog breeds in AmericaTop five deadliest dog breeds in America
Top five deadliest dog breeds in America
Bisnar Chase Personal Injury Attorneys
 
Exploiting Artificial Intelligence for Empowering Researchers and Faculty, In...
Exploiting Artificial Intelligence for Empowering Researchers and Faculty, In...Exploiting Artificial Intelligence for Empowering Researchers and Faculty, In...
Exploiting Artificial Intelligence for Empowering Researchers and Faculty, In...
Dr. Vinod Kumar Kanvaria
 
Chapter 4 - Islamic Financial Institutions in Malaysia.pptx
Chapter 4 - Islamic Financial Institutions in Malaysia.pptxChapter 4 - Islamic Financial Institutions in Malaysia.pptx
Chapter 4 - Islamic Financial Institutions in Malaysia.pptx
Mohd Adib Abd Muin, Senior Lecturer at Universiti Utara Malaysia
 
CACJapan - GROUP Presentation 1- Wk 4.pdf
CACJapan - GROUP Presentation 1- Wk 4.pdfCACJapan - GROUP Presentation 1- Wk 4.pdf
CACJapan - GROUP Presentation 1- Wk 4.pdf
camakaiclarkmusic
 
Natural birth techniques - Mrs.Akanksha Trivedi Rama University
Natural birth techniques - Mrs.Akanksha Trivedi Rama UniversityNatural birth techniques - Mrs.Akanksha Trivedi Rama University
Natural birth techniques - Mrs.Akanksha Trivedi Rama University
Akanksha trivedi rama nursing college kanpur.
 
S1-Introduction-Biopesticides in ICM.pptx
S1-Introduction-Biopesticides in ICM.pptxS1-Introduction-Biopesticides in ICM.pptx
S1-Introduction-Biopesticides in ICM.pptx
tarandeep35
 
Liberal Approach to the Study of Indian Politics.pdf
Liberal Approach to the Study of Indian Politics.pdfLiberal Approach to the Study of Indian Politics.pdf
Liberal Approach to the Study of Indian Politics.pdf
WaniBasim
 
BÀI TẬP BỔ TRỢ TIẾNG ANH 8 CẢ NĂM - GLOBAL SUCCESS - NĂM HỌC 2023-2024 (CÓ FI...
BÀI TẬP BỔ TRỢ TIẾNG ANH 8 CẢ NĂM - GLOBAL SUCCESS - NĂM HỌC 2023-2024 (CÓ FI...BÀI TẬP BỔ TRỢ TIẾNG ANH 8 CẢ NĂM - GLOBAL SUCCESS - NĂM HỌC 2023-2024 (CÓ FI...
BÀI TẬP BỔ TRỢ TIẾNG ANH 8 CẢ NĂM - GLOBAL SUCCESS - NĂM HỌC 2023-2024 (CÓ FI...
Nguyen Thanh Tu Collection
 
How to Build a Module in Odoo 17 Using the Scaffold Method
How to Build a Module in Odoo 17 Using the Scaffold MethodHow to Build a Module in Odoo 17 Using the Scaffold Method
How to Build a Module in Odoo 17 Using the Scaffold Method
Celine George
 
Main Java[All of the Base Concepts}.docx
Main Java[All of the Base Concepts}.docxMain Java[All of the Base Concepts}.docx
Main Java[All of the Base Concepts}.docx
adhitya5119
 
How to Fix the Import Error in the Odoo 17
How to Fix the Import Error in the Odoo 17How to Fix the Import Error in the Odoo 17
How to Fix the Import Error in the Odoo 17
Celine George
 
Executive Directors Chat Leveraging AI for Diversity, Equity, and Inclusion
Executive Directors Chat  Leveraging AI for Diversity, Equity, and InclusionExecutive Directors Chat  Leveraging AI for Diversity, Equity, and Inclusion
Executive Directors Chat Leveraging AI for Diversity, Equity, and Inclusion
TechSoup
 
Your Skill Boost Masterclass: Strategies for Effective Upskilling
Your Skill Boost Masterclass: Strategies for Effective UpskillingYour Skill Boost Masterclass: Strategies for Effective Upskilling
Your Skill Boost Masterclass: Strategies for Effective Upskilling
Excellence Foundation for South Sudan
 
ISO/IEC 27001, ISO/IEC 42001, and GDPR: Best Practices for Implementation and...
ISO/IEC 27001, ISO/IEC 42001, and GDPR: Best Practices for Implementation and...ISO/IEC 27001, ISO/IEC 42001, and GDPR: Best Practices for Implementation and...
ISO/IEC 27001, ISO/IEC 42001, and GDPR: Best Practices for Implementation and...
PECB
 
Film vocab for eal 3 students: Australia the movie
Film vocab for eal 3 students: Australia the movieFilm vocab for eal 3 students: Australia the movie
Film vocab for eal 3 students: Australia the movie
Nicholas Montgomery
 
Azure Interview Questions and Answers PDF By ScholarHat
Azure Interview Questions and Answers PDF By ScholarHatAzure Interview Questions and Answers PDF By ScholarHat
Azure Interview Questions and Answers PDF By ScholarHat
Scholarhat
 
World environment day ppt For 5 June 2024
World environment day ppt For 5 June 2024World environment day ppt For 5 June 2024
World environment day ppt For 5 June 2024
ak6969907
 
South African Journal of Science: Writing with integrity workshop (2024)
South African Journal of Science: Writing with integrity workshop (2024)South African Journal of Science: Writing with integrity workshop (2024)
South African Journal of Science: Writing with integrity workshop (2024)
Academy of Science of South Africa
 

Recently uploaded (20)

Digital Artifact 1 - 10VCD Environments Unit
Digital Artifact 1 - 10VCD Environments UnitDigital Artifact 1 - 10VCD Environments Unit
Digital Artifact 1 - 10VCD Environments Unit
 
Lapbook sobre os Regimes Totalitários.pdf
Lapbook sobre os Regimes Totalitários.pdfLapbook sobre os Regimes Totalitários.pdf
Lapbook sobre os Regimes Totalitários.pdf
 
Top five deadliest dog breeds in America
Top five deadliest dog breeds in AmericaTop five deadliest dog breeds in America
Top five deadliest dog breeds in America
 
Exploiting Artificial Intelligence for Empowering Researchers and Faculty, In...
Exploiting Artificial Intelligence for Empowering Researchers and Faculty, In...Exploiting Artificial Intelligence for Empowering Researchers and Faculty, In...
Exploiting Artificial Intelligence for Empowering Researchers and Faculty, In...
 
Chapter 4 - Islamic Financial Institutions in Malaysia.pptx
Chapter 4 - Islamic Financial Institutions in Malaysia.pptxChapter 4 - Islamic Financial Institutions in Malaysia.pptx
Chapter 4 - Islamic Financial Institutions in Malaysia.pptx
 
CACJapan - GROUP Presentation 1- Wk 4.pdf
CACJapan - GROUP Presentation 1- Wk 4.pdfCACJapan - GROUP Presentation 1- Wk 4.pdf
CACJapan - GROUP Presentation 1- Wk 4.pdf
 
Natural birth techniques - Mrs.Akanksha Trivedi Rama University
Natural birth techniques - Mrs.Akanksha Trivedi Rama UniversityNatural birth techniques - Mrs.Akanksha Trivedi Rama University
Natural birth techniques - Mrs.Akanksha Trivedi Rama University
 
S1-Introduction-Biopesticides in ICM.pptx
S1-Introduction-Biopesticides in ICM.pptxS1-Introduction-Biopesticides in ICM.pptx
S1-Introduction-Biopesticides in ICM.pptx
 
Liberal Approach to the Study of Indian Politics.pdf
Liberal Approach to the Study of Indian Politics.pdfLiberal Approach to the Study of Indian Politics.pdf
Liberal Approach to the Study of Indian Politics.pdf
 
BÀI TẬP BỔ TRỢ TIẾNG ANH 8 CẢ NĂM - GLOBAL SUCCESS - NĂM HỌC 2023-2024 (CÓ FI...
BÀI TẬP BỔ TRỢ TIẾNG ANH 8 CẢ NĂM - GLOBAL SUCCESS - NĂM HỌC 2023-2024 (CÓ FI...BÀI TẬP BỔ TRỢ TIẾNG ANH 8 CẢ NĂM - GLOBAL SUCCESS - NĂM HỌC 2023-2024 (CÓ FI...
BÀI TẬP BỔ TRỢ TIẾNG ANH 8 CẢ NĂM - GLOBAL SUCCESS - NĂM HỌC 2023-2024 (CÓ FI...
 
How to Build a Module in Odoo 17 Using the Scaffold Method
How to Build a Module in Odoo 17 Using the Scaffold MethodHow to Build a Module in Odoo 17 Using the Scaffold Method
How to Build a Module in Odoo 17 Using the Scaffold Method
 
Main Java[All of the Base Concepts}.docx
Main Java[All of the Base Concepts}.docxMain Java[All of the Base Concepts}.docx
Main Java[All of the Base Concepts}.docx
 
How to Fix the Import Error in the Odoo 17
How to Fix the Import Error in the Odoo 17How to Fix the Import Error in the Odoo 17
How to Fix the Import Error in the Odoo 17
 
Executive Directors Chat Leveraging AI for Diversity, Equity, and Inclusion
Executive Directors Chat  Leveraging AI for Diversity, Equity, and InclusionExecutive Directors Chat  Leveraging AI for Diversity, Equity, and Inclusion
Executive Directors Chat Leveraging AI for Diversity, Equity, and Inclusion
 
Your Skill Boost Masterclass: Strategies for Effective Upskilling
Your Skill Boost Masterclass: Strategies for Effective UpskillingYour Skill Boost Masterclass: Strategies for Effective Upskilling
Your Skill Boost Masterclass: Strategies for Effective Upskilling
 
ISO/IEC 27001, ISO/IEC 42001, and GDPR: Best Practices for Implementation and...
ISO/IEC 27001, ISO/IEC 42001, and GDPR: Best Practices for Implementation and...ISO/IEC 27001, ISO/IEC 42001, and GDPR: Best Practices for Implementation and...
ISO/IEC 27001, ISO/IEC 42001, and GDPR: Best Practices for Implementation and...
 
Film vocab for eal 3 students: Australia the movie
Film vocab for eal 3 students: Australia the movieFilm vocab for eal 3 students: Australia the movie
Film vocab for eal 3 students: Australia the movie
 
Azure Interview Questions and Answers PDF By ScholarHat
Azure Interview Questions and Answers PDF By ScholarHatAzure Interview Questions and Answers PDF By ScholarHat
Azure Interview Questions and Answers PDF By ScholarHat
 
World environment day ppt For 5 June 2024
World environment day ppt For 5 June 2024World environment day ppt For 5 June 2024
World environment day ppt For 5 June 2024
 
South African Journal of Science: Writing with integrity workshop (2024)
South African Journal of Science: Writing with integrity workshop (2024)South African Journal of Science: Writing with integrity workshop (2024)
South African Journal of Science: Writing with integrity workshop (2024)
 

Osi model

  • 1. OSI MODEL AND DATA LINK LAYER 2ND UNIT COMPUTER NETWORK AND SECURITY
  • 2. Chapter……. • Network Models • Error Detection and Correction • Flow and Error Control
  • 3. Network Models • Protocol Set of rules that enable two device to connect and transmit data to one another. • Service Set of opration that layer provides to the layer above or below it.
  • 4. Key Elements of Protocol • Syntax Structure or format of the data. • Semantics meaning of each Section of bit. • Timing When data should be sent and how fast they can be sent.
  • 5. Standards • De facto De facto standards are often established originally by manufacturers who request to define the functionality of a new product or technology. • De jure Thos standards that have legislated by an officially recognized body are de jure standards.
  • 6. OSI Model • Developed by the International standard Organization(ISO). • The model is called ISO OSI(Open System Interconnection) • The OSI model has Seven layers. • H- Header Information(Source & Destination address) • T- Trailer Information(Error control)
  • 7. OSI Layers 1. 2. 3. 4. 5. 6. 7. Application layer Presentation Layer Session Layer Transport layer Network Layer Data link layer Physical layer
  • 8.
  • 9. OSI Reference model Application Sending Device Application AH Application data Presentation SH Transport Physical TH DH Application Data Unit Presentation Data Unit Session Data Unit PH Session Network Receiving Device Data Transport Data Unit Data Unit(Bits) DT Network Physical
  • 10. Physical Layer • The physical layer is responsible for transmitting individual bits from one node to the next.
  • 11. Data Link Layer • The data link layer is responsible for transmitting frames from one node to the next.
  • 12. Functions of Data link layer • Framing Divides the data in to smaller unit. • Physical addressing Hardware address is added in Header. • Flow control Control the flow of data between sender and receiver • Error control generally error control mechanisms are added in Data link Trailer(DT)
  • 13. Network Layer The network layer is responsible for the delivery of packets from the original source to the final destination.
  • 14. Functions of Network Layer • Logical addressing The physical addressing implemented by the data link layer handles the addressing problem locally. • Routing Finding the shortest path between source and destination.
  • 15. Transport Layer • The transport layer is responsible for delivery of a message from one process to another.
  • 16. Functions of Transport Layer • Service point addressing Used to identify the process • Segmentation and reassembly A message is divided into transmittable segments, each having a sequence number. These numbers enable the transport layer to reassemble the message correctly upon arrival at the destination. • Flow control. • Error control.
  • 17. Session Layer • Allow a user to log into a remote system or to transfer a file between two machines. Functions of Session Layer: • Dialogue control Control the conversation between two system • Synchronization Coortinate the interaction among communication system.
  • 18. Presentation Layer • It concerned with the syntax and semantics of the information transmitted. Functions of Session Layer: • Translation Own format information is exchange between two different system • Encryption Original message into secret form • Compression Reduce the number of bit s contained in the information
  • 19. Application layer • The application layer is responsible for providing services to the user.
  • 20. Functions of Application Layer • Network Virtual Terminal It allow a user to log on to the remote computer. • File Transfer, Access and Management Allow user to access file from remote computer. • Mail Service It provide the basic for E-Mail forwarding and Storage.
  • 21. Error detection and Correction • Error: unpredictable changes of bits from 1->0 or 0->1 • Types: Single bit error – Burst error(Multiple) –
  • 22. Single bit error • A 0 is changed to 1 or a 1 is changed to 0 Received Sent 10011100101 1 0 0 1 0 1 0 0 1 0 1 Error
  • 23. Burst Error(Multiple) • 2 or more bits in the data unit have changed from 1 to 0 or from 0 to 1 Length of burst error (8 bits) 0 1 0 0 0 1 0 0 0 1 0 0 0 0 1 1 Corrupted Bits 0 1 0 1 1 1 0 0 1 1 1 1 0 0 1 1
  • 24. CRC • Cyclic codes are special block codes with one extra property. • A codeword is cyclically shifted (rotated) the result is another codeword. MSB 1 0 LSB 1 1 0 0 0 MSB 0 1 1 LSB 0 0 0 1
  • 25. CRC Encoder & Decoder Data word - 1001(data to be sent) Divisor - 1011(predetermined constant) Code word- Data word + Remainder 1 0 0 1 0 0 1 0 1 0 1011 1 1 1 0 0 Quotient 0 0 0 0 0 1 Code word-100110 1 0 0 0 0 1 0 1 0 1 0 1 1 0 0 0 0 0 1 1 0 Remainder
  • 26. CRC Encoder & Decoder Data word - 1001(data to be sent) Divisor - 1011(predetermined constant) Code word- Data word + Remainder-1001110 1 0 0 1 0 0 1 1 1 0 1011 1 1 1 0 0 Quotient 1 0 0 0 0 1 Code word-100110 1 0 0 0 0 1 0 1 0 1 0 0 0 0 0 0 0 0 0 0 0 Remainder
  • 27. Parity Check • Parity is a system in which each transmitted character contain one additional bit. • Two system of parity are normally used: odd parity even parity • Odd parity means the total number of binary 1’s is in the character,including the parity bit is odd. • Even parity means that the number of binary 1’s bit in the character,including the parity bit is even. • This technique only detects the single bit error.
  • 28. Checksum • Several protocols still use the checksum for error detection. • For example, if the set of number is(7,10,3,11,5),we send(7,10,3,11,5,36),where 36 is the sum of (7+10+3+11+5) the original number. • The receiver adds the five numbers and compares the result with the sum. • If the two are the same,the receiver assumes no error,accepts the five numbers and omits the sum.
  • 29. Check sum • There is an error somewhere and the data are not accepted • The traditional checksum uses a small number of bits(16) to detect error in a massage of any size. • It is not strong as CRC in error checking capability. • For example,If the value of one word is increamented and the value of another word is decreamented by the same amount,the two error cannot be detected because the sum remains the same.
  • 30. Flow control • Flow control The management of data flow between computers or device or between nodes in a network so that the data can be handled at an efficient pace • Types of flow control Stop – and – wait flow control Sliding window flow control
  • 31. Stop and Wait Flow control • Sender sends a frame and wait for acknowledgement from the receiver. • After receiving the acknowledgement from the receiver,sender sends next frame.
  • 32. Stop and wait flow control • Advantage Gurantee for the delivery of every frame.Because sender sends the next frame only after receiving the acknowledgement of previous frame. • Disadvantage It is time consuming.
  • 33. Sliding window flow control • The flow control technique that allows multiple frames to be in transit on the line at one time is called sliding window .
  • 34. Error control • Error control is a method that can be used to recover the corrupted data whenever possible. • Types of error control backward error control forward error control
  • 35. Damaged frame • A recognizable frame does arrive,but some of the bit are in error.
  • 36. Lost frame • A frame fail to arrive at the other side.
  • 37. Lost acknowledgement • An acknowledgement fails at the source.the sender is not aware that acknowledgement has been transmitted from the receiver.
  • 38. ARQ • Full form --Automatic Repeat Request • The purpose of ARQ is to change an unreliable data link into a reliable one. • Version of ARQ Stop-and –wait ARQ Go-Back-N ARQ Selective-repeat ARQ
  • 39. Stop-and-wait ARQ • Sender transmits a single frame and then twaits for acknowledgement(ACK).
  • 40. Go back N ARQ • A station may send a series of frames sequentially numbered with some maximum value. • It give a NACK from the receiver.

Editor's Notes

  1. The data link layer transforms the physical layer, a raw transmission facility, to a reliable link and is responsible for node-to-node delivery. It makes the physical layer appear error free to the upper layer (network layer).