Osi Model
Osi Model
Osi Model
Protocols:
Protocols are the standard terms which computers use to understand each
other. Just like two people must speak a common language in order to
communicate, two computers must have one or more protocols common in
order to exchange the data. No matter what software the computers are
running and what kind of computers the network uses, they must have a
common protocol in order to understand each other.
Before 1980, developing these protocols was the responsibility of hardware
manufactures. They developed proprietary protocols to support their own
products. With proprietary protocols we were not able use mix equipment
from different manufactures on same network. To run a network we had to
buy all devices from the same company. This entire method makes
collaboration between different types of computers nightmare.
To sort out this issue, open standard protocols were developed. Open
standards are industry-wide protocol definitions that are not tied with a
specific manufacturer company. With open standard protocols, we can use
equipment from any vendor to build our network. As long as the equipment
implements the standard protocols, it should be able to coexist on the same
network. With open standard protocols, networks can consist of many
different computing platforms running entirely different software.
Protocols are implemented on a network in several ways. Some are
integrated into the operating system. Others are device drivers, such as the
driver for a particular network interface adapter supplied by its
manufacturer.
2.
3.
4.
5.
Presentation Layer:
Formats and prepares the data. Presentation layer prepares the data. It takes
data from application layer and marks it with formatting code such as .doc,
.jpg, .txt, .avi etc. These file extensions make it easy to realize that particular
file is formatted with particular type of application. With formatting
presentation layer also deals with compression and encapsulation. It
Session Layer:
Establishes and manage sessions. Session layer deals with connections. It
establishes, manages, and terminates sessions between two communicating
nodes. This layer provides its services to the presentation layer. Session layer
also synchronizes dialogue between the presentation layers of the two hosts
and manages their data exchange. For example, web servers may have
many users communicating with server at a given time. Therefore, keeping
track of which user communicates on which path is important and session
layer handle this responsibility accurately.
Transport Layer:
Breaks data into packets. Provides following services:
Segmentation:
Segmentation is the process of breaking large data file into smaller files that
can be accommodated by network. To understand this process thinks about a
700 MB movie that you want to download from internet. You have 2MBPS
UDP:
UDP is a connection less protocol. Connection-less transmission is said to be
unreliable. Now, don't get worried about the term "unreliable" this doesn't
mean that the data isn't going to get its destination; its only means that it
isn't guaranteed to get its destination. Think of your options when you are
sending a postcard, put it in the mailbox, and chances are good that it will
get where it's supposed to go but there is no guarantee. There is always a
chance of missing in the way. On the other hand, it's cheap.
TCP:
TCP is a connection oriented protocol. Connection-oriented transmission is
said to be reliable. Think TCP as registry AD facility available in Indian post
office. For this level of service, you have to buy extra ticket and put a bunch
of extra labels on it to track where it is going and where it has been. You get
a receipt when it is delivered. In this method you have a guaranteed delivery.
All of this costs you morebut it is reliable!
Reliability
Reliability means guaranteed data delivery. To insure delivery of each single
segment, connection oriented method is used. In this approach before
sending any segments three way handshake is done
1.
PC1 sends a SYN single to PC2 indicating that it wants to establish a
reliable session.
2.
P2 replies with ACK/SYN signal where ACK is the acknowledgment of
PC1s SYN signal and SYN indicates that PC2 is ready to establish a
reliable session
3.
PC1 replies with ACK signal indicating that is has received SYN signal
and session is now fully established
Flow control:
In this method sender sends data according to its buffer size. Receiver
receives data in its buffer. When receivers buffer get filled, it send a not
ready signal to sender, so sender can stop transmitting more segments.
Receivers send ready signal when it becomes ready to receive next
segments. This method has two problems.
First, the receiver may respond to the sender with a not ready signal
only when its buffer fills up. While this message is on its way to the sender,
the sender is still sending segments to the receiver, which the receiver will
have to drop because its buffer space is full.
The second problem with the uses of this method is that once the
receiver is ready to receive more segments, it must first send a ready signal
to the sender, which must be received before sender can send more
segments.
Windowing
In windowing a window size is defined between sender and receiver. Sender
host will wait for an acknowledgement signal after sending the segments
equal to the window size. If any packet lost in the way, receiver will respond
with acknowledgement for lost packet. Sender will send lost packet again.
Window size is automatically set during the three step handshake process. It
can be adjust anytime throughout the lifetime of connection.
Connection Multiplexing/Application Mapping
Descriptions
01023
1024
49151
49152
65535
UDP
FTP
20, 21
DNS
53
Telnet
23
DHCP
67,68
SMTP
25
TFTP
69
DNS
53
NTP
123
HTTP
80
SNMP
161
POP
110
NNTP
119
HTTPS
443
Network Layer
Network layer is responsible for providing logical address known as IP
address. Router works on this layer. Main functions of this layer are
following:
Define IP address
Find routes based on IP address to reach its destination
Connect different data link type together like as Token Ring, Serial,
FDDI, Ethernet etc.
IP address
IP address a 32 bit long software address which made from two components:
Network component: - Defines network segment of device.
IP packet
Network layer receive segment from transport layer and wrap it with IP
header that is known as datagram.
Datagram
Datagram is just another name of packet. Network layer use datagram to
transfer information between nodes.
Two types of packets are used at the Network layer: data and route updates.
Data packets
Data packets are used to transport the user data across the network.
Protocols used by data packets are known as routed protocol. For example IP
and IPv6
MAC Address
MAC address is a 48 bit long layer two address. It is also known as hardware
address. This address is burnt with device by manufacturing company.
The first six hexadecimal digits of a MAC address represent its manufacture
company.
MAC addresses only need to be unique in a broadcast domain.
You can have the same MAC address in different broadcast domains.
Frame
Data link layer receive packet from network layer and wrap it with layer two
Header that is known as frame. There are two specifications of Ethernet
frame.
1.
Ethernet II
2.
802
Key points to remember:Ethernet II does not have any sub layers, while IEEE 802.2/3 has two:
LLC and MAC.
Ethernet II has a type field instead of a length field (used in 802.3).
802.2 use a SAP or SNAP field to differentiate between encapsulated
layer-3 payloads.
With a SNAP frame, the SAP fields are set to 0xAA and the type field is
used to indicate the layer-3 protocol.
802.2 SAP frame is eight bits in length and only the first six bits are
used for identifying upper-layer protocols, which allows up to 64 protocols.
802.2 SNAP frame supports up to 65,536 protocols
Physical Layer
Physical layer deals with communication media. This layer receive frame
from data link layer and convert them in bits. It loads these bits on actual
communication media. Depending on media type these bit values are
converted in single. Some use audio tones, while others utilize state
transitionschanges in voltage from high to low and low to high
On sending computer
Sending application access the application layer.
Application provides data to the presentation layer.