Credit Hours: 4(3-1) Topic: (Network system Architectures (OSI and TCP/IP models) Level: BS Lecture # 4 Department of Information Technology , Government College Women University Faisalabad The OSI Model • International Standards Organization (ISO) has defined a model for describing communications across a network, called the OSI model, for Open Systems Interconnect (reference model). • This model is a generalized abstraction of how network communication can be and is implemented. • The model does not fit every network technology perfectly, but it is widely used to discuss and refer to the layers of technology involved in networking The OSI Model 1. Physical (Bits) 2.Data Link (Frames) 3. Network (Packets) 4. Transport (Segment) 5. Session (Dialog units) 6. Presentation (Raw Data) 7. Application (Text, Numbers) Physical (Layer 1) • OSI Model, Layer 1 conveys the bit stream - electrical impulse, light or radio signal — through the network at the electrical and mechanical level. It provides the hardware means of sending and receiving data on a carrier, including defining cables, cards and physical aspects. Fast Ethernet, RS232, and ATM are protocols with physical layer components. o Data Rate / Transmission Rate Date Rate ( Bits per second) also decided by the Physical Layer So , Physical layer defines the Duration of a Bit Means how long will a bit last o Synchronization of Bits Sender and Receiver must be synchronized at the bit level Sender and Receiver clocks must be synchronized It is done by Physical layer o Line Configuration Physical Layer is also concerned with Line Configuration Line Configuration represents the connection of device with the Medium Point-To-Point or Multipoint Data Link (Layer 2) • At OSI Model, Layer 2, data packets are encoded and decoded into bits. It furnishes transmission protocol knowledge and management and handles errors in the physical layer, flow control and frame synchronization. The data link layer is divided into two sub layers: The Media Access Control (MAC) layer and the Logical Link Control (LLC) layer. The MAC sub layer controls how a computer on the network gains access to the data and permission to transmit it. The LLC layer controls frame synchronization, flow control and error checking • Responsible for Node to Node Delivery • Makes physical layer look error free to the upper layer • Framing The data link divides the stream of bits from Network layer into manageable data units called “FRAMES”. This process is known as Framing. • Network (Layer 3)
• Responsible for Source-to-Destination delivery
• DL Layer oversees the delivery of data between 2 systems on the same network • Network Layer ensures that each packet gets from its point of origin to its final destination • Layer 3 provides switching and routing technologies, creating logical paths, known as virtual circuits, for transmitting data from node to node. Routing and forwarding are functions of this layer, as well as addressing, internetworking, error handling, congestion control and packet sequencing. Transport (Layer 4)
• OSI Model, Layer 4, Responsible for
Source-to-Destination delivery of Entire Message • It provides transparent transfer of data between end systems, or hosts, and is responsible for end-to-end error recovery and flow control. It ensures complete data transfer. • Session (Layer 5) • This layer establishes, manages and terminates connections between applications. The session layer sets up, coordinates, and terminates conversations, exchanges, and dialogues between the applications at each end. It deals with session and connection coordination. • Presentation (Layer 6) • This layer provides independence from differences in data representation (e.g., encryption) by translating from application to network format, and vice versa. The presentation layer works to transform data into the form that the application layer can accept. This layer formats and encrypts data to be sent across a network, providing freedom from compatibility problems. It is sometimes called the syntax layer. • Application (Layer 7) • OSI Model, Layer 7, supports application and end-user processes. Communication partners are identified, quality of service is identified, user authentication and privacy are considered, and any constraints on data syntax are identified. Everything at this layer is application-specific. This layer provides application services for file transfers, e-mail, and other network software services. Telnet and FTP are applications that exist entirely in the application level. Tiered application architectures are part of this layer. TCP/IP PROTOCOL TCP/IP • TCP/IP, or the Transmission Control Protocol/Internet Protocol, is a suite of communication protocols used to interconnect network devices on the internet. TCP/IP can also be used as a communications protocol in a private network (an intranet or an extranet). • The entire internet protocol suite a set of rules and procedures is commonly referred to as TCP/IP, though others are included in the suite. • TCP/IP specifies how data is exchanged over the internet by providing end-to-end communications that identify how it should be broken into packets, addressed, transmitted, routed and received at the destination. TCP/IP requires little central management, and it is designed to make networks reliable, with the ability to recover automatically from the failure of any device on the network. • The two main protocols in the internet protocol suite serve specific functions. TCP defines how applications can create channels of communication across a network. It also manages how a message is assembled into smaller packets before they are then transmitted over the internet and reassembled in the right order at the destination address. • IP defines how to address and route each packet to make sure it reaches the right destination. Each gateway computer on the network checks this IP address to determine where to forward the message How TCP/IP works
• TCP/IP uses the client/server model of communication in
which a user or machine (a client) is provided a service (like sending a webpage) by another computer (a server) in the network. • Collectively, the TCP/IP suite of protocols is classified as stateless, which means each client request is considered new because it is unrelated to previous requests. Being stateless frees up network paths so they can be used continuously. • The transport layer itself, however, is stateful. It transmits a single message, and its connection remains in place until all the packets in a message have been received and reassembled at the destination. TCP/IP model layers
• TCP/IP functionality is divided into four layers,
each of which include specific protocols. • The application layer provides applications with standardized data exchange. Its protocols include the Hypertext Transfer Protocol (HTTP), File Transfer Protocol (FTP), Post Office Protocol 3 (POP3), Simple Mail Transfer Protocol (SMTP) and Simple Network Management Protocol (SNMP). • The transport layer is responsible for maintaining end-to-end communications across the network. TCP handles communications between hosts and provides flow control, multiplexing and reliability. • The network layer, also called the internet layer, deals with packets and connects independent networks to transport the packets across network boundaries. The network layer protocols are the IP and the Internet Control Message Protocol (ICMP), which is used for error reporting. • The physical layer consists of protocols that operate only on a link -- the network component that interconnects nodes or hosts in the network. The protocols in this layer include Ethernet for local area Advantages of TCP/IP
• TCP/IP is nonproprietary and, as a result, is
not controlled by any single company. Therefore, the internet protocol suite can be modified easily. It is compatible with all operating systems, so it can communicate with any other system. The internet protocol suite is also compatible with all types of computer hardware and networks.