SlideShare a Scribd company logo
1 of 36
Data Communication
Presented by: Jawad Akhtar
what are standards
 A standard is a document that provides requirements, specifications,
guidelines or characteristics that can be used consistently to ensure
that materials, products, processes and services are fit for their
purpose. - International Standards Organization, ISO.
STANDARDS IN NETWORKING
 Standards are necessary in networking to ensure interconnectivity and interoperability
between various networking hardware and software components.
 Without standards we would have proprietary products creating isolated islands of users
which cannot interconnect.
Concept of Standard:
 Standards provide guidelines to product manufacturers and vendors to ensure national
and international interconnectivity.
 Data communications standards are classified into two categories:
De facto Standard:
 These are the standards that have been traditionally used and mean by fact or by
convention
 These standards are not approved by any organized body but are adopted by
widespread use
De jure standard:
 It means by law or by regulation.
 These standards are legislated and approved by an body that is officially recognized
Examples of Standard Creation
Committees
1. International Organization for Standardization(ISO)
2. International Telecommunications Union-Telecommunications Standard (ITU-T)
3. American National Standards Institute (ANSI)
4. Institute of Electrical & Electronics Engineers (IEEE)
5. Electronic Industries Associates (EIA)
Protocol
PROTOCOL
 For successful communication to occur, the sender and receiver must agree upon certain
rules called protocol
 A Protocol is defined as a set of rules that governs data communications
 A protocol defines what is to be communicated, how it is to be communicated and when
it is to be communicated
Elements of a Protocol:
 Syntax(What)
It means the structure or format of the data.
It is the arrangement of data in a particular order
 Semantics(how)
It tells the meaning of each section of bits and indicates the interpretation of
each section.(how data)
It also tells what action/decision is to be taken based on the interpretation
 Timing(when)
It tells the sender about the readiness of the receiver to receive the data
It tells the sender at what rate the data should be sent to the receiver to avoid
overwhelming the receiver
Network Models
 Layered Task- International Standard Organization (ISO) Propose an
open system interconnection (OSI) model that allow two system to
communicate regardless to their architecture.
Network Models
 An Open system is a set of protocols that allows any two different
systems to communicate regardless of their underlying architecture.
 The purpose of the OSI model is to show how to facilitate
communication between different systems without requiring changes
to the logic of the underlying hardware and software.
Network Models
 The OSI model is not a protocol, it is model for understanding and
designing a network architecture that is flexible, robust and
interoperable.
 It consists of seven separate but related layers, each of which
defines a part of the process of moving information across a
network.
Directive Principles Constitution
Layered Architecture
 The OSI model is composed of seven ordered layers: Physical (Layer
1), data link(Layer 2),network(Layer 3),transport (Layer4),
session(Layer 5), presentation (Layer 6) and application(Layer 7).
 Within a single machine, each layer calls upon the services of the
layer below it. Layer 3,for example, uses the services provided by
layer 2 and provides services for layer 4.
 Between machines, layer x on one machine communicates with layer
x on the other machine.
 This communication is governed by an agreed upon series of rules
and conventions called protocols
 The process on each machine that communicate at a given layer are
called peer-to-peer process.
OSI Model
OSI Model
Peer-to-peer process
 At the physical layer, communication is direct: device A sends a
stream of bits to device B(through intermediate nodes).
 At the higher layers, communication must move down throgh the
layer on device A over to device B, and then back up through the
layers.
 Each layer in the sending device adds its own information to the
message it receives from the layer just above it and passes the
whole package to the layer just below it.
 At layer 1 the entire package is converted to a form that can be
transmitted to the receiving device.
 At the receiving machine, the message is unwrapped layer by layer,
with each process receiving and removing the data meant for it.
OSI model
Physical Layer
 The physical layer defines the characteristics of the interface
between the devices and the transmission medium.
 Data in computer is in binary , but the nature of the transmission
medium might be optical, electromagnetic waves , radio waves etc.
 So the interface between them and the responsibility of this
conversion is that of physical layer
Physical layer
 Representation of bits: physical layer data consists of a stream of
bits with no interpretation. To be transmitted, bits must be encoded
into signals-electrical or optical.
 Encoding is a method of converting a stream of bits into a predefined
code
 The method of representing the bits is called the signaling method.
Physical layer
Types of cables Transfer
Rates
Twisted Pair
• 10Base-T(Ethernet) 10Mbps
• 100Base-T(Fast Ethernet) 100Mbps
• 1000Base-T(Gigabit Ethernet) 1000Mbps
• Token ring 4-16Mbps
Coaxial Cable
• 10Base2(Thin-wire Ethernet) 10Mbps
• 10Base5(Thick-wire Ethernet) 10Mbps
Fiber Optics Cable
• 10Base-F (Ethernet) 10Mbps
• 100Base-Fx(Fast Ethernet) 100Mbps
• FDDI(Fiber Distributed Data
Interface)
100Mbps
Data Rate: The number of bits sent each second is also defined by physical layer.
Physical Layer
 Line Configuration: The physical layer is concerned with the
connection of devices to media.
point-to-Multipoint
Physical Layer
 Physical topology: the physical topology defines how the devices are
connected to make a network.
Physical Layer
 Transmission mode: the physical layer also defines the direction of
transmission between two devices: simplex, half-duplex or full-
duplex
Data link layer
 Framing: The data link layer divides the stream of bits received from
the network layer into manageable data units called frames.
Data Link Layer
 Physical addressing: If frames are to be distributed to different
systems on the network, the data link layer adds a header to the
frame to define the sender and/or receiver of the frame.
Data link Layer
 Access control: When two or more devices are connected to the
same link, data link layer protocols are necessary to determine which
device has control over the link at any given time.
Data Link Layer
 Flow Control: if the rate at which the data are absorbed by the
receiver is less than the rate at which data are produced at the
sender, the data link layer imposes a flow control mechanism to
avoid overwhelming the receiver.
 Protocols include,stop and wair,sliding window, go back N ARQ etc
Data link Layer
 Error control: The data link layer adds reliability to the physical layer
by adding mechanisms to detect and retransmit damaged or lost
frames. It also uses a mechanism to recognize duplicate frames.
Error control is normally achieved through a trailer added to the end
of the frame.
Network Layer
 The network layer is responsible for the source-to-destination
delivery of a packet, possibly across multiple networks(Links).
Network Layer
 Logical addressing: If a packet passes the network boundary, we
need another addressing system to help distinguish the source and
destination systems. The network layer adds a header to the packet
coming from upper layer that among other things includes the logical
address of the sender and receiver.
Network Layer
 Routing: When independent networks or links are connected to
create internetworks(Network of networks) or a large network, the
connecting devices(called routers or switches) route or switch the
packets to their final destination. One of the functions of the network
layer is to provide this mechanism.
Transport Layer
 Service-point addresing: The transport layer header must include a
type of address called a service-point address (or port address). The
network layer gets each packet to the correct computer, the
transport layer gets the entire message to the correct process on
that computer. The transport layer is responsible for process-to-
process delivery of the entire message.
Transport layer
 Segmentation and reassembly: A message is divided into
transmittable segments, with each segment containing a sequence
number. These numbers enable the transport layer to reassemble
the message correctly upon arriving at the destination and to identify
and replace packets that were lost in transmission
Transport Layer
 Connection control: The transport layer can be either connectionless
or connection oriented. A connectionless transport layer treats each
segment as an independent packet and delivers it to the transport
layer at the destination machine. A connection oriented transport
layer makes a connection with the transport layer at the destination
machine first before delivering the packets. After all the data is
transferred, the connection is terminated
Transport Layer
 Flow control: Like the data link layer, the transport layer is
responsible for flow control. However, flow control at this layer is
performed end to end rather than across a single link.
Transport Layer
 Error control: Like the data link layer, transport layer is responsible
for error control. However, error control at this layer is performed
process-to-process rather than across a single link. The sending
transport layer makes sure that the entire message arrives at the
receiving transport layer without error(damage, loss, or duplication).
Error correction is usually achieved through retransmission.
Session Layer
 The session layer is the network dialog controller. It
establishes, maintain, and synchronizes the interaction among
communicating systems.
 The session layer is responsible for dialog control and
synchronization.
 Dialog control: The session layer allows two systems to enter
into a dialog. It allows the communication between two
processes to take place in either half duplex or full-duplex
mode.
 Synchronization: The session layer allows a process to add
checkpoints, or synchronization points to a stream of data.
 Authentication.
 Authorization.
Presentation Layer
 Translation: conversion into binary, interoperability between different
encoding methods.
 Encryption: To carry sensitive information, a system must be able to
ensure privacy. Encryption means that the sender transforms the
original information into unreadable form and sends the resulting
message out over the network.
 Decryption reverses the original process to transform the message
back to its original form.
 Compression: Data compression reduces the number of bits
contained in the information. Data compression becomes particularly
important in the transmission of multimedia such as text, audio and
video.
Application Layer
 Application layer enables the user, whether human or software, to
access the network.
 It provides user interface and support for services such as e-mail ,
remote file access and transfer, shared database management and
other types of distributed information services.
Services
 Network virtual terminal:
 File transfer, access and management:
 Mail services:

More Related Content

Similar to OSI Model.It was created in 1983 by osi.

Similar to OSI Model.It was created in 1983 by osi. (20)

OSI MODEL
OSI MODEL OSI MODEL
OSI MODEL
 
OSI &TCP/IP Model
OSI &TCP/IP ModelOSI &TCP/IP Model
OSI &TCP/IP Model
 
Osi
OsiOsi
Osi
 
OSI model layers 7 Types of OSI Model Edifyclue.pdf
OSI model layers  7 Types of OSI Model  Edifyclue.pdfOSI model layers  7 Types of OSI Model  Edifyclue.pdf
OSI model layers 7 Types of OSI Model Edifyclue.pdf
 
TCP/IP Protocols With All Layer Description
TCP/IP Protocols With All Layer DescriptionTCP/IP Protocols With All Layer Description
TCP/IP Protocols With All Layer Description
 
Pwani notes-Network Essentials.pp for Internet Protocoltx
Pwani notes-Network Essentials.pp  for Internet ProtocoltxPwani notes-Network Essentials.pp  for Internet Protocoltx
Pwani notes-Network Essentials.pp for Internet Protocoltx
 
OSI MODEL.pptx
OSI MODEL.pptxOSI MODEL.pptx
OSI MODEL.pptx
 
OSI Model
OSI ModelOSI Model
OSI Model
 
Osi model
Osi modelOsi model
Osi model
 
OSI MODELS.pptx
OSI  MODELS.pptxOSI  MODELS.pptx
OSI MODELS.pptx
 
3. osi model
3. osi model3. osi model
3. osi model
 
Layering and Architecture
Layering and ArchitectureLayering and Architecture
Layering and Architecture
 
OSI and TCP/IP Model
OSI and TCP/IP ModelOSI and TCP/IP Model
OSI and TCP/IP Model
 
Unit 1 introduction
Unit 1 introductionUnit 1 introduction
Unit 1 introduction
 
Osi model
Osi model Osi model
Osi model
 
OSI MODEL AND ITS LAYERS FUNCTION
OSI  MODEL AND ITS LAYERS FUNCTIONOSI  MODEL AND ITS LAYERS FUNCTION
OSI MODEL AND ITS LAYERS FUNCTION
 
Cn4,com net
Cn4,com netCn4,com net
Cn4,com net
 
computer network OSI layer
computer network OSI layercomputer network OSI layer
computer network OSI layer
 
Osi model
Osi modelOsi model
Osi model
 
PC 106 PPT-06
PC 106 PPT-06PC 106 PPT-06
PC 106 PPT-06
 

Recently uploaded

URLs and Routing in the Odoo 17 Website App
URLs and Routing in the Odoo 17 Website AppURLs and Routing in the Odoo 17 Website App
URLs and Routing in the Odoo 17 Website AppCeline George
 
The basics of sentences session 2pptx copy.pptx
The basics of sentences session 2pptx copy.pptxThe basics of sentences session 2pptx copy.pptx
The basics of sentences session 2pptx copy.pptxheathfieldcps1
 
Q4-W6-Restating Informational Text Grade 3
Q4-W6-Restating Informational Text Grade 3Q4-W6-Restating Informational Text Grade 3
Q4-W6-Restating Informational Text Grade 3JemimahLaneBuaron
 
How to Make a Pirate ship Primary Education.pptx
How to Make a Pirate ship Primary Education.pptxHow to Make a Pirate ship Primary Education.pptx
How to Make a Pirate ship Primary Education.pptxmanuelaromero2013
 
Industrial Policy - 1948, 1956, 1973, 1977, 1980, 1991
Industrial Policy - 1948, 1956, 1973, 1977, 1980, 1991Industrial Policy - 1948, 1956, 1973, 1977, 1980, 1991
Industrial Policy - 1948, 1956, 1973, 1977, 1980, 1991RKavithamani
 
Arihant handbook biology for class 11 .pdf
Arihant handbook biology for class 11 .pdfArihant handbook biology for class 11 .pdf
Arihant handbook biology for class 11 .pdfchloefrazer622
 
Web & Social Media Analytics Previous Year Question Paper.pdf
Web & Social Media Analytics Previous Year Question Paper.pdfWeb & Social Media Analytics Previous Year Question Paper.pdf
Web & Social Media Analytics Previous Year Question Paper.pdfJayanti Pande
 
Interactive Powerpoint_How to Master effective communication
Interactive Powerpoint_How to Master effective communicationInteractive Powerpoint_How to Master effective communication
Interactive Powerpoint_How to Master effective communicationnomboosow
 
Hybridoma Technology ( Production , Purification , and Application )
Hybridoma Technology  ( Production , Purification , and Application  ) Hybridoma Technology  ( Production , Purification , and Application  )
Hybridoma Technology ( Production , Purification , and Application ) Sakshi Ghasle
 
Call Girls in Dwarka Mor Delhi Contact Us 9654467111
Call Girls in Dwarka Mor Delhi Contact Us 9654467111Call Girls in Dwarka Mor Delhi Contact Us 9654467111
Call Girls in Dwarka Mor Delhi Contact Us 9654467111Sapana Sha
 
Introduction to AI in Higher Education_draft.pptx
Introduction to AI in Higher Education_draft.pptxIntroduction to AI in Higher Education_draft.pptx
Introduction to AI in Higher Education_draft.pptxpboyjonauth
 
POINT- BIOCHEMISTRY SEM 2 ENZYMES UNIT 5.pptx
POINT- BIOCHEMISTRY SEM 2 ENZYMES UNIT 5.pptxPOINT- BIOCHEMISTRY SEM 2 ENZYMES UNIT 5.pptx
POINT- BIOCHEMISTRY SEM 2 ENZYMES UNIT 5.pptxSayali Powar
 
1029-Danh muc Sach Giao Khoa khoi 6.pdf
1029-Danh muc Sach Giao Khoa khoi  6.pdf1029-Danh muc Sach Giao Khoa khoi  6.pdf
1029-Danh muc Sach Giao Khoa khoi 6.pdfQucHHunhnh
 
microwave assisted reaction. General introduction
microwave assisted reaction. General introductionmicrowave assisted reaction. General introduction
microwave assisted reaction. General introductionMaksud Ahmed
 
Privatization and Disinvestment - Meaning, Objectives, Advantages and Disadva...
Privatization and Disinvestment - Meaning, Objectives, Advantages and Disadva...Privatization and Disinvestment - Meaning, Objectives, Advantages and Disadva...
Privatization and Disinvestment - Meaning, Objectives, Advantages and Disadva...RKavithamani
 
Accessible design: Minimum effort, maximum impact
Accessible design: Minimum effort, maximum impactAccessible design: Minimum effort, maximum impact
Accessible design: Minimum effort, maximum impactdawncurless
 
SOCIAL AND HISTORICAL CONTEXT - LFTVD.pptx
SOCIAL AND HISTORICAL CONTEXT - LFTVD.pptxSOCIAL AND HISTORICAL CONTEXT - LFTVD.pptx
SOCIAL AND HISTORICAL CONTEXT - LFTVD.pptxiammrhaywood
 

Recently uploaded (20)

Código Creativo y Arte de Software | Unidad 1
Código Creativo y Arte de Software | Unidad 1Código Creativo y Arte de Software | Unidad 1
Código Creativo y Arte de Software | Unidad 1
 
URLs and Routing in the Odoo 17 Website App
URLs and Routing in the Odoo 17 Website AppURLs and Routing in the Odoo 17 Website App
URLs and Routing in the Odoo 17 Website App
 
The basics of sentences session 2pptx copy.pptx
The basics of sentences session 2pptx copy.pptxThe basics of sentences session 2pptx copy.pptx
The basics of sentences session 2pptx copy.pptx
 
Q4-W6-Restating Informational Text Grade 3
Q4-W6-Restating Informational Text Grade 3Q4-W6-Restating Informational Text Grade 3
Q4-W6-Restating Informational Text Grade 3
 
Staff of Color (SOC) Retention Efforts DDSD
Staff of Color (SOC) Retention Efforts DDSDStaff of Color (SOC) Retention Efforts DDSD
Staff of Color (SOC) Retention Efforts DDSD
 
How to Make a Pirate ship Primary Education.pptx
How to Make a Pirate ship Primary Education.pptxHow to Make a Pirate ship Primary Education.pptx
How to Make a Pirate ship Primary Education.pptx
 
Industrial Policy - 1948, 1956, 1973, 1977, 1980, 1991
Industrial Policy - 1948, 1956, 1973, 1977, 1980, 1991Industrial Policy - 1948, 1956, 1973, 1977, 1980, 1991
Industrial Policy - 1948, 1956, 1973, 1977, 1980, 1991
 
Arihant handbook biology for class 11 .pdf
Arihant handbook biology for class 11 .pdfArihant handbook biology for class 11 .pdf
Arihant handbook biology for class 11 .pdf
 
Web & Social Media Analytics Previous Year Question Paper.pdf
Web & Social Media Analytics Previous Year Question Paper.pdfWeb & Social Media Analytics Previous Year Question Paper.pdf
Web & Social Media Analytics Previous Year Question Paper.pdf
 
Interactive Powerpoint_How to Master effective communication
Interactive Powerpoint_How to Master effective communicationInteractive Powerpoint_How to Master effective communication
Interactive Powerpoint_How to Master effective communication
 
Hybridoma Technology ( Production , Purification , and Application )
Hybridoma Technology  ( Production , Purification , and Application  ) Hybridoma Technology  ( Production , Purification , and Application  )
Hybridoma Technology ( Production , Purification , and Application )
 
Call Girls in Dwarka Mor Delhi Contact Us 9654467111
Call Girls in Dwarka Mor Delhi Contact Us 9654467111Call Girls in Dwarka Mor Delhi Contact Us 9654467111
Call Girls in Dwarka Mor Delhi Contact Us 9654467111
 
Introduction to AI in Higher Education_draft.pptx
Introduction to AI in Higher Education_draft.pptxIntroduction to AI in Higher Education_draft.pptx
Introduction to AI in Higher Education_draft.pptx
 
INDIA QUIZ 2024 RLAC DELHI UNIVERSITY.pptx
INDIA QUIZ 2024 RLAC DELHI UNIVERSITY.pptxINDIA QUIZ 2024 RLAC DELHI UNIVERSITY.pptx
INDIA QUIZ 2024 RLAC DELHI UNIVERSITY.pptx
 
POINT- BIOCHEMISTRY SEM 2 ENZYMES UNIT 5.pptx
POINT- BIOCHEMISTRY SEM 2 ENZYMES UNIT 5.pptxPOINT- BIOCHEMISTRY SEM 2 ENZYMES UNIT 5.pptx
POINT- BIOCHEMISTRY SEM 2 ENZYMES UNIT 5.pptx
 
1029-Danh muc Sach Giao Khoa khoi 6.pdf
1029-Danh muc Sach Giao Khoa khoi  6.pdf1029-Danh muc Sach Giao Khoa khoi  6.pdf
1029-Danh muc Sach Giao Khoa khoi 6.pdf
 
microwave assisted reaction. General introduction
microwave assisted reaction. General introductionmicrowave assisted reaction. General introduction
microwave assisted reaction. General introduction
 
Privatization and Disinvestment - Meaning, Objectives, Advantages and Disadva...
Privatization and Disinvestment - Meaning, Objectives, Advantages and Disadva...Privatization and Disinvestment - Meaning, Objectives, Advantages and Disadva...
Privatization and Disinvestment - Meaning, Objectives, Advantages and Disadva...
 
Accessible design: Minimum effort, maximum impact
Accessible design: Minimum effort, maximum impactAccessible design: Minimum effort, maximum impact
Accessible design: Minimum effort, maximum impact
 
SOCIAL AND HISTORICAL CONTEXT - LFTVD.pptx
SOCIAL AND HISTORICAL CONTEXT - LFTVD.pptxSOCIAL AND HISTORICAL CONTEXT - LFTVD.pptx
SOCIAL AND HISTORICAL CONTEXT - LFTVD.pptx
 

OSI Model.It was created in 1983 by osi.

  • 2. what are standards  A standard is a document that provides requirements, specifications, guidelines or characteristics that can be used consistently to ensure that materials, products, processes and services are fit for their purpose. - International Standards Organization, ISO.
  • 3. STANDARDS IN NETWORKING  Standards are necessary in networking to ensure interconnectivity and interoperability between various networking hardware and software components.  Without standards we would have proprietary products creating isolated islands of users which cannot interconnect. Concept of Standard:  Standards provide guidelines to product manufacturers and vendors to ensure national and international interconnectivity.  Data communications standards are classified into two categories: De facto Standard:  These are the standards that have been traditionally used and mean by fact or by convention  These standards are not approved by any organized body but are adopted by widespread use De jure standard:  It means by law or by regulation.  These standards are legislated and approved by an body that is officially recognized
  • 4. Examples of Standard Creation Committees 1. International Organization for Standardization(ISO) 2. International Telecommunications Union-Telecommunications Standard (ITU-T) 3. American National Standards Institute (ANSI) 4. Institute of Electrical & Electronics Engineers (IEEE) 5. Electronic Industries Associates (EIA)
  • 6. PROTOCOL  For successful communication to occur, the sender and receiver must agree upon certain rules called protocol  A Protocol is defined as a set of rules that governs data communications  A protocol defines what is to be communicated, how it is to be communicated and when it is to be communicated Elements of a Protocol:  Syntax(What) It means the structure or format of the data. It is the arrangement of data in a particular order  Semantics(how) It tells the meaning of each section of bits and indicates the interpretation of each section.(how data) It also tells what action/decision is to be taken based on the interpretation  Timing(when) It tells the sender about the readiness of the receiver to receive the data It tells the sender at what rate the data should be sent to the receiver to avoid overwhelming the receiver
  • 7. Network Models  Layered Task- International Standard Organization (ISO) Propose an open system interconnection (OSI) model that allow two system to communicate regardless to their architecture.
  • 8. Network Models  An Open system is a set of protocols that allows any two different systems to communicate regardless of their underlying architecture.  The purpose of the OSI model is to show how to facilitate communication between different systems without requiring changes to the logic of the underlying hardware and software.
  • 9. Network Models  The OSI model is not a protocol, it is model for understanding and designing a network architecture that is flexible, robust and interoperable.  It consists of seven separate but related layers, each of which defines a part of the process of moving information across a network. Directive Principles Constitution
  • 10. Layered Architecture  The OSI model is composed of seven ordered layers: Physical (Layer 1), data link(Layer 2),network(Layer 3),transport (Layer4), session(Layer 5), presentation (Layer 6) and application(Layer 7).  Within a single machine, each layer calls upon the services of the layer below it. Layer 3,for example, uses the services provided by layer 2 and provides services for layer 4.  Between machines, layer x on one machine communicates with layer x on the other machine.  This communication is governed by an agreed upon series of rules and conventions called protocols  The process on each machine that communicate at a given layer are called peer-to-peer process.
  • 13. Peer-to-peer process  At the physical layer, communication is direct: device A sends a stream of bits to device B(through intermediate nodes).  At the higher layers, communication must move down throgh the layer on device A over to device B, and then back up through the layers.  Each layer in the sending device adds its own information to the message it receives from the layer just above it and passes the whole package to the layer just below it.  At layer 1 the entire package is converted to a form that can be transmitted to the receiving device.  At the receiving machine, the message is unwrapped layer by layer, with each process receiving and removing the data meant for it.
  • 15. Physical Layer  The physical layer defines the characteristics of the interface between the devices and the transmission medium.  Data in computer is in binary , but the nature of the transmission medium might be optical, electromagnetic waves , radio waves etc.  So the interface between them and the responsibility of this conversion is that of physical layer
  • 16. Physical layer  Representation of bits: physical layer data consists of a stream of bits with no interpretation. To be transmitted, bits must be encoded into signals-electrical or optical.  Encoding is a method of converting a stream of bits into a predefined code  The method of representing the bits is called the signaling method.
  • 17. Physical layer Types of cables Transfer Rates Twisted Pair • 10Base-T(Ethernet) 10Mbps • 100Base-T(Fast Ethernet) 100Mbps • 1000Base-T(Gigabit Ethernet) 1000Mbps • Token ring 4-16Mbps Coaxial Cable • 10Base2(Thin-wire Ethernet) 10Mbps • 10Base5(Thick-wire Ethernet) 10Mbps Fiber Optics Cable • 10Base-F (Ethernet) 10Mbps • 100Base-Fx(Fast Ethernet) 100Mbps • FDDI(Fiber Distributed Data Interface) 100Mbps Data Rate: The number of bits sent each second is also defined by physical layer.
  • 18. Physical Layer  Line Configuration: The physical layer is concerned with the connection of devices to media. point-to-Multipoint
  • 19. Physical Layer  Physical topology: the physical topology defines how the devices are connected to make a network.
  • 20. Physical Layer  Transmission mode: the physical layer also defines the direction of transmission between two devices: simplex, half-duplex or full- duplex
  • 21. Data link layer  Framing: The data link layer divides the stream of bits received from the network layer into manageable data units called frames.
  • 22. Data Link Layer  Physical addressing: If frames are to be distributed to different systems on the network, the data link layer adds a header to the frame to define the sender and/or receiver of the frame.
  • 23. Data link Layer  Access control: When two or more devices are connected to the same link, data link layer protocols are necessary to determine which device has control over the link at any given time.
  • 24. Data Link Layer  Flow Control: if the rate at which the data are absorbed by the receiver is less than the rate at which data are produced at the sender, the data link layer imposes a flow control mechanism to avoid overwhelming the receiver.  Protocols include,stop and wair,sliding window, go back N ARQ etc
  • 25. Data link Layer  Error control: The data link layer adds reliability to the physical layer by adding mechanisms to detect and retransmit damaged or lost frames. It also uses a mechanism to recognize duplicate frames. Error control is normally achieved through a trailer added to the end of the frame.
  • 26. Network Layer  The network layer is responsible for the source-to-destination delivery of a packet, possibly across multiple networks(Links).
  • 27. Network Layer  Logical addressing: If a packet passes the network boundary, we need another addressing system to help distinguish the source and destination systems. The network layer adds a header to the packet coming from upper layer that among other things includes the logical address of the sender and receiver.
  • 28. Network Layer  Routing: When independent networks or links are connected to create internetworks(Network of networks) or a large network, the connecting devices(called routers or switches) route or switch the packets to their final destination. One of the functions of the network layer is to provide this mechanism.
  • 29. Transport Layer  Service-point addresing: The transport layer header must include a type of address called a service-point address (or port address). The network layer gets each packet to the correct computer, the transport layer gets the entire message to the correct process on that computer. The transport layer is responsible for process-to- process delivery of the entire message.
  • 30. Transport layer  Segmentation and reassembly: A message is divided into transmittable segments, with each segment containing a sequence number. These numbers enable the transport layer to reassemble the message correctly upon arriving at the destination and to identify and replace packets that were lost in transmission
  • 31. Transport Layer  Connection control: The transport layer can be either connectionless or connection oriented. A connectionless transport layer treats each segment as an independent packet and delivers it to the transport layer at the destination machine. A connection oriented transport layer makes a connection with the transport layer at the destination machine first before delivering the packets. After all the data is transferred, the connection is terminated
  • 32. Transport Layer  Flow control: Like the data link layer, the transport layer is responsible for flow control. However, flow control at this layer is performed end to end rather than across a single link.
  • 33. Transport Layer  Error control: Like the data link layer, transport layer is responsible for error control. However, error control at this layer is performed process-to-process rather than across a single link. The sending transport layer makes sure that the entire message arrives at the receiving transport layer without error(damage, loss, or duplication). Error correction is usually achieved through retransmission.
  • 34. Session Layer  The session layer is the network dialog controller. It establishes, maintain, and synchronizes the interaction among communicating systems.  The session layer is responsible for dialog control and synchronization.  Dialog control: The session layer allows two systems to enter into a dialog. It allows the communication between two processes to take place in either half duplex or full-duplex mode.  Synchronization: The session layer allows a process to add checkpoints, or synchronization points to a stream of data.  Authentication.  Authorization.
  • 35. Presentation Layer  Translation: conversion into binary, interoperability between different encoding methods.  Encryption: To carry sensitive information, a system must be able to ensure privacy. Encryption means that the sender transforms the original information into unreadable form and sends the resulting message out over the network.  Decryption reverses the original process to transform the message back to its original form.  Compression: Data compression reduces the number of bits contained in the information. Data compression becomes particularly important in the transmission of multimedia such as text, audio and video.
  • 36. Application Layer  Application layer enables the user, whether human or software, to access the network.  It provides user interface and support for services such as e-mail , remote file access and transfer, shared database management and other types of distributed information services. Services  Network virtual terminal:  File transfer, access and management:  Mail services: