CIR 209 (Lecture 4d) - OSI and TCP-IP Model
CIR 209 (Lecture 4d) - OSI and TCP-IP Model
1 OSI Model
Page 1 of 22 MUHAMBE
OSI REFERENCE MODEL
By 1972, ARPAnet had grown to approximately 15 nodes, and was given its first public
demonstration by Robert Kahn at the 1972 International Conference on Computer
Communications. The first host-to-host protocol between ARPAnet end systems known as the
Network Control Protocol (NCP) was completed. With an end-to-end protocol available,
applications could now be written. The first e-mail program was written by Ray Tomlinson at BBN
in 1972.
In addition to the DARPA Internet-related research, many other important networking activities
were underway. In Hawaii, Norman Abramson was developing ALOHAnet, a packet-based radio
network that allowed multiple remote sites on the Hawaiian islands to communicate with each
Page 2 of 22 MUHAMBE
OSI REFERENCE MODEL
other. The ALOHA protocol was the first so-called multiple access protocol, allowing geographically
distributed users to share a single broadcast communication medium (a radio frequency).
Abramson's work on multiple access protocols was built upon by Robert Metcalfe in the
development of the Ethernet protocol for wire-based shared broadcast networks. Interestingly,
Metcalfe's Ethernet protocol was motivated by the need to connect multiple PCs, printers, and
shared disks together.
In addition to the DARPA internetworking efforts and the Aloha/Ethernet multiple access networks,
a number of companies were developing their own proprietary network architectures. Digital
Equipment Corporation (Digital) released the first version of the DECnet in 1975, allowing two
PDP-11 minicomputers to communicate with each other. DECnet has continued to evolve since
then, with significant portions of the OSI protocol suite being based on ideas pioneered in DECnet.
Other important players during the 1970's were Xerox (with the XNS architecture) and IBM (with
the SNA architecture). Each of these early networking efforts would contribute to the knowledge
base that would drive networking in the 80's and 90's.
It is also worth noting here that in the 1980's (and even before), researchers were also developing
a "competitor" technology to the Internet architecture. These efforts have contributed to the
development of the ATM (Asynchronous Transfer Mode) architecture, a connection-oriented
approach based on the use of fixed size packets, known as cells.
Page 3 of 22 MUHAMBE
OSI REFERENCE MODEL
Paralleling this development of the ARPAnet (which was for the most part a US effort), in the early
1980s the French launched the Minitel project, an ambitious plan to bring data networking into
everyone's home. Sponsored by the French government, the Minitel system consisted of a public
packet-switched network (based on the X.25 protocol suite, which uses virtual circuits), Minitel
servers, and inexpensive terminals with built-in low speed modems. The Minitel became a huge
success in 1984 when the French government gave away a free Minitel terminal to each French
household that wanted one.
Page 4 of 22 MUHAMBE
OSI REFERENCE MODEL
• All entities in a network must agree on how information will be represented and communicated. The
Communication agreements involve many details that include;
how electrical signals are used to represent data
Procedures used to initiate, conduct and terminate communication,
The formatting and packaging of messages
Control of the data flow and errors
• One of the key issues in network and data communication is interoperability between network devices,
which refers to the ability of two entities from two different product manufacturers/implementers to
communicate or successfully exchange data.
• All communicating parties must agree on communication details, which must be governed by the same
set of rules and specifications. These rules and specifications are called communication protocols,
network protocol, or simply protocols.
• A protocol has a defined purpose and it specifies the details for one aspect of communication, which
may include but not limited to actions to be taken when errors or unexpected situations arise.
• To ensure that the resulting communication system is complete and efficient, it is demanded that each
protocol should handle a part of communication not handled by other protocols.
• To achieve this, protocols are not created in isolation, protocols are designed in complete, cooperative
sets called suites, families or stack, where each protocol in a suite handles one aspect of networking
and together they cover all aspects of communication.
• The fundamental abstraction used to collect protocols into a unified whole is known as a layering
model. Using the layering model, all aspects of a communication problem can be partitioned into pieces
that work together. These pieces are called layers.
• The division of protocols into layers helps both protocol designers and implementers manage the
complexity of communication process and hence concentrate on one aspect of communication at a
given time
Page 5 of 22 MUHAMBE
OSI REFERENCE MODEL
Page 6 of 22 MUHAMBE
OSI REFERENCE MODEL
Page 7 of 22 MUHAMBE
OSI REFERENCE MODEL
Advantages of using the layered model include, but are not limited to, the following:
It divides the network communication process into smaller and simpler components, thus aiding
component development, design and troubleshooting.
It encourages Industry standardization by defining what functions occur at each layer of the model.
It prevents changes in one layer from affecting other layers, so it does not hamper development.
• The application layer enables the user, whether human or software, to access the network.
• The applications operating on this layer are the network “aware” applications – email applications,
remote access applications (Telnet), Web applications etc.
• It provides user interfaces and support for services such as electronic mail, remote file access and
transfer, shared database management, and other types of distributed information services.
• Concerned with the semantics of data, i.e., what the data means to applications. It provides standards
for supporting a variety of application-independent services e.g. email services that make it possible to
send a message from one platform to another.
The Application layer provides a variety of functions:
Page 8 of 22 MUHAMBE
OSI REFERENCE MODEL
• The presentation layer is concerned with the syntax and semantics of the information exchanged
between two systems.
Functions
1) Translation:
• The processes (running programs) in two systems are usually exchanging information in
the form of character strings, numbers, and so on. The information must be changed to bit
streams before being transmitted.
• Because different computers use different encoding systems, the presentation layer is
responsible for interoperability between these different encoding methods.
• The presentation layer at the sender changes the information from its sender-dependent
format into a common format.
• The presentation layer at the receiving machine changes the common format into its
receiver-dependent format.
2) Encryption:
• To carry sensitive information, a system must be able to ensure privacy.
• Encryption means that the sender transforms the original information to another form
(cipher text) and sends the resulting message out over the network.
• Decryption reverses the original process to transform the message back to its original
form.
Page 9 of 22 MUHAMBE
OSI REFERENCE MODEL
3) Compression:
• Data compression reduces the number of bits contained in the information.
• Data compression becomes particularly important in the transmission of multimedia such
as text, audio, and video.
• Data compression on this layer saves on the overall bandwidth used during transmission
over the media.
Example protocols:
SSL(Secure Sockets Layer)
MIME(Multipurpose Internet Mail Extensions)
Examples of Presentation layer formats include:
Text - RTF, ASCII, EBCDIC
Images - GIF, JPG, TIF
Audio - MIDI, MP3, WAV
Movies - MPEG, AVI, MOV
Functions
1) Dialog control:
• The session layer allows two systems to enter into a dialog.
• It allows the communication between two processes (programs or applications) to take
place in either half-duplex (one way at a time) or full-duplex (two ways at a time) mode.
2) Synchronization:
• The session layer allows a process to add checkpoints, or synchronization points, to a
stream of data.
Page 10 of 22 MUHAMBE
OSI REFERENCE MODEL
• The transport layer is responsible for process-to-process delivery of the entire message. It ensures
that even though the original message may be sub-divided and transmitted as different units, on
the receiving end the message must be re-constructed back into the original form. Ensures that the
whole message arrives intact and in order, overseeing both error control and flow control at the
source-to-destination level. A process is an application program running on a host.
Activities on this layer:
• The message that comes from the session layer is sub-divided into small chucks called segment,
in a process called segmentation. A message is divided into transmittable segments (to conform
to frame requirements by different network standards e.g. Ethernet). Each segment is assigned a
sequence and an appropriate acknowledgement number. The sequence and acknowledgement
numbers enable the transport layer to reassemble the message correctly upon arriving at the
destination and to identify and replace packets that were lost in transmission through request for
retransmission from the source application.
• Whereas the network layer oversees source-to-destination delivery of individual packets, it does
not recognize any relationship between those packets. It treats each one independently, as though
each piece belonged to a separate message, whether or not it does. The transport layer, on the
other hand, ensures that the whole message arrives intact and in order, overseeing both error
control and flow control at the source-to-destination level.
Page 11 of 22 MUHAMBE
OSI REFERENCE MODEL
Functions
1) Message delivery: the transport layer is responsible for the delivery of a message from one
process to another.
2) Service-point addressing: - Computers often run several programs at the same time. For this
reason, source-to-destination delivery means delivery not only from one computer to the next but
also from a specific process (running program) on one computer to a specific process (running
program) on the other. The transport layer header must therefore include a type of address called a
service-point address (or port address). The network layer gets each packet to the correct
computer; the transport layer gets the entire message to the correct process on that computer.
3) Segmentation and reassembly: - A message is divided into transmittable segments, with each
segment containing a sequence number. These numbers enable the transport layer to reassemble
the message correctly upon arriving at the destination and to identify and replace packets that were
lost in transmission.
4) Connection control: - The transport layer connections can either be connectionless or
connection-oriented. A connectionless transport layer treats each segment as an independent
packet and delivers it to the transport layer at the destination machine. A connection-oriented
transport layer makes a connection with the transport layer at the destination machine first before
delivering the packets. After all the data are transferred, the connection is terminated.
5) Flow control: - Like the data link layer, the transport layer is responsible for flow control. However,
flow control at this layer is performed end to end rather than across a single link.
6) Error control: - Like the data link layer, the transport layer is responsible for error control.
However, error control at this layer is performed process-to-process rather than across a single
link. The sending transport layer makes sure that the entire message arrives at the receiving
transport layer without error (damage, loss, or duplication). Error correction is usually achieved
through retransmission.
Page 12 of 22 MUHAMBE
OSI REFERENCE MODEL
Reports on transmission status of the data and give reports like; “download complete”,
“network pass cannot be found”, “page cannot display” etc.
Suitable for non-time-sensitive data e.g. web content retrieval or email communication
UDP (User Datagram Protocol)
Unreliable – does not use acknowledgement numbers or sequence numbers
Connectionless oriented – does not establish connection between communicating devices
before transmission i.e. uses best effort
Does not give transmission status of the data.
Suitable for time sensitive data like voice or video related communications – a few frames
may be lost but it does not lead to corruption of the entire message.
• The network layer is responsible for the source-to-destination (devices) delivery of a packet,
possibly across multiple networks (links).
Functions
i. Packet Delivery: the network layer is responsible for the delivery of individual packets from the
source host to the destination host.
ii. Logical addressing: - The physical addressing implemented by the data link layer handles the
addressing problem locally. If a packet passes the network boundary, we need another addressing
system to help distinguish the source and destination systems and the source and destination
networks. The network layer adds a header to the packet coming from the upper layer that, among
other things, includes the logical addresses of the sender and receiver.
iii. Routing: - When independent networks or links are connected to create intemetwork (network of
networks) or a large network, the connecting devices (called routers or Layer switches) route or
switch the packets to their final destination. One of the key functions of the network layer is to
provide this mechanism.
The most common Network layer protocols are:
Internet Protocol (IP)
Internetwork Packet Exchange (IPX)
AppleTalk
Page 13 of 22 MUHAMBE
OSI REFERENCE MODEL
• The data link layer transforms the physical layer, a raw transmission facility, to a reliable link. It
makes the physical layer appear error-free to the upper layer (network layer).
• The physical layer coordinates the functions required to carry a bit stream over a physical medium.
• It deals with the mechanical and electrical specifications of the interface and transmission medium.
• It also defines the procedures and functions that physical devices and interfaces have to perform
for transmission to Occur.
Page 14 of 22 MUHAMBE
OSI REFERENCE MODEL
1) Bit movement; the physical layer is responsible converting the frames received from the data
Link layer to bits and for movements of individual bits from one hop (node) to the next. It also
converts the bits into appropriate signal depending on the transmission media in use (Light
pulses for optical fiber, electrical pulses for electrical cables and suitable form of
electromagnetic energy for the wireless)
2) Physical characteristics of interfaces and medium: - The physical layer defines the
characteristics of the interface (configurations and physical dimensions) between the devices
and the transmission medium. It also defines the type of transmission medium.
3) Representation of bits: - The physical layer data consists of a stream of bits (sequence of 0s
or 1s) with no interpretation. To be transmitted, bits must be encoded into signals--electrical or
optical. The physical layer defines the type of encoding (how 0s and I s are changed to
signals).
4) Data rate: - The transmission rate-the number of bits sent each second-is also defined by the
physical layer. In other words, the physical layer defines the duration of a bit, which is how long
it lasts.
5) Synchronization of bits: - The sender and receiver not only must use the same bit rate but
also must be synchronized at the bit level. In other words, the sender and the receiver clocks
must be synchronized.
6) Line configuration: - The physical layer is concerned with the connection of devices to the
media. In a point-to-point configuration, two devices are connected through a dedicated link. In
a multipoint configuration, a link is shared among several devices.
7) Physical topology: - The physical topology defines how devices are connected to make a
network.
8) Transmission mode: - The physical layer also defines the direction of transmission between
two devices: simplex, half-duplex, or full-duplex. In simplex mode, only one device can send;
the other can only receive. The simplex mode is a one-way communication. In the half-duplex
mode, two devices can send and receive, but not at the same time. In a full-duplex (or simply
duplex) mode, two devices can send and receive at the same time.
Page 15 of 22 MUHAMBE
OSI REFERENCE MODEL
Note:
• Although actual communication takes place only at the physical layer, it is often useful to think of
virtual communication between corresponding layers.
• This means therefore that each layer on host A communicates virtually with corresponding layer on
host B. The corresponding layers in host B, reverses the actions performed on the data by
corresponding layer on host A.
Page 16 of 22 MUHAMBE
OSI REFERENCE MODEL
• Each of the seven layers of the OSI model hides the implementation details of the lower layers
from the upper layers.
• The passing of the data and network information down through the layers of the sending device
and back up through the layers of the receiving device is made possible by an interface between
each pair of adjacent layers
• Well-defined protocols and interfaces for each of the layers make it possible for the layer to be
designed and implemented in isolation from the other layers
• The Application, Presentation, Session and Transport layers are called upper layers and they
entirely implemented in software. The Network, Data-Link and Physical layers are called the lower
layers. The network and Data-Link are implemented partly in software and partly in hardware, while
the physical on the other hand is implemented entirely in hardware.
• As data moves from the application to the physical layer, on the transmitting host, each layer on
the host adds an additional piece of information (header) to the message it is transmitting. The
corresponding layer on the recipient removes the additional piece of information. The additional
information appears in form of a header (e.g., TH = Transport Header). The data link layer adds a
header as well as a trailer to its data.
Page 17 of 22 MUHAMBE
OSI REFERENCE MODEL
• Data encapsulation; Data (header and data) at level 7 is encapsulated in a data at level 6. The
whole data at level 6 is encapsulated in a data at level 5, and so on. This enables the respective
receiving layers on the destination device to handle only the part of the data that applies to it.
The protocol data unit i.e. the pieces of data when at different layers are referred to using different
terminologies:
• Data: Application, Presentation and Session
• Segment: Transport Layer
• Packet: Network Layer
• Frame: Data-Link layer
• Bits: Physical Layer
Page 18 of 22 MUHAMBE
OSI REFERENCE MODEL
When compared, the OSI and TCP/IP, they roughly carry out the same functions. The Network Access
layer in TCP/IP is equivalent to the combination of the physical and data link layers in the OSI model. The
internet layer is equivalent to the network layer, and the application layer is roughly equivalent to the
session, presentation, and application layers. The transport layer of the TCP/IP model is equivalent to
transport layer in OSI model.
1. Application Layer
The application layer in TCP/IP is equivalent to the combined session, presentation, and
application layers in the OSI model
Functions
Provides an interface through which the user or software can interact with underlying
network infrastructure and hosts the network aware applications that make the interaction
with the underlying network possible (email applications, web applications etc)
Carries out data compression, translation (character conversion) and generic encryption
Page 19 of 22 MUHAMBE
OSI REFERENCE MODEL
2. Transport Layer
• Traditionally the transport layer defines three protocols TCP and UDP and SCTP. Whereas IP is a
host-to-host protocol, meaning that it can deliver a packet from one physical device to another.
• UDP, SCTP and TCP are transport level protocols responsible for delivery of a message from a
process (running program) to another process.
• SCTP is a new protocol that has been devised to meet the needs of some newer applications.
3. Internet Layer
• The internet layer or otherwise called the internetwork layer in TCP/IP model supports the
internetworking protocols (IP).
• It defines additional four supporting protocols: ARP, RARP, ICMP, and IGMP, each with a specific
function.
Page 20 of 22 MUHAMBE
OSI REFERENCE MODEL
Page 21 of 22 MUHAMBE
OSI REFERENCE MODEL
Page 22 of 22 MUHAMBE