Location via proxy:   [ UP ]  
[Report a bug]   [Manage cookies]                

Osi Model

Download as pdf or txt
Download as pdf or txt
You are on page 1of 20

Course Name: Computer Networks

Course Code: ICT-402


Credit Hours: 4(3-1)
Topic: (Network system Architectures (OSI
and TCP/IP models)
Level: BS
Lecture # 4
Department of Information Technology , Government College Women University Faisalabad
The OSI Model
• International Standards Organization (ISO) has
defined a model for describing communications
across a network, called the OSI model, for Open
Systems Interconnect (reference model).
• This model is a generalized abstraction of how
network communication can be and is
implemented.
• The model does not fit every network technology
perfectly, but it is widely used to discuss and refer
to the layers of technology involved in networking
The OSI Model
1. Physical (Bits)
2.Data Link (Frames)
3. Network (Packets)
4. Transport (Segment)
5. Session (Dialog units)
6. Presentation (Raw Data)
7. Application (Text, Numbers)
Physical (Layer 1)
• OSI Model, Layer 1 conveys the bit stream -
electrical impulse, light or radio signal —
through the network at the electrical and
mechanical level. It provides the hardware
means of sending and receiving data on a
carrier, including defining cables, cards and
physical aspects. Fast Ethernet, RS232, and
ATM are protocols with physical layer
components.
o Data Rate / Transmission Rate
Date Rate ( Bits per second) also decided by the Physical
Layer
So , Physical layer defines the Duration of a Bit
Means how long will a bit last
o Synchronization of Bits
Sender and Receiver must be synchronized at the bit level
Sender and Receiver clocks must be synchronized
It is done by Physical layer
o Line Configuration
Physical Layer is also concerned with Line Configuration
Line Configuration represents the connection of device with
the Medium
Point-To-Point or Multipoint
Data Link (Layer 2)
• At OSI Model, Layer 2, data packets are encoded
and decoded into bits. It furnishes transmission
protocol knowledge and management and
handles errors in the physical layer, flow control
and frame synchronization. The data link layer is
divided into two sub layers: The Media Access
Control (MAC) layer and the Logical Link Control
(LLC) layer. The MAC sub layer controls how a
computer on the network gains access to the data
and permission to transmit it. The LLC layer
controls frame synchronization, flow control and
error checking
• Responsible for Node to Node Delivery
• Makes physical layer look error free to
the upper layer
• Framing
The data link divides the stream of bits
from Network layer into manageable data
units called “FRAMES”. This process is
known as Framing.
• Network (Layer 3)

• Responsible for Source-to-Destination delivery


• DL Layer oversees the delivery of data between 2
systems on the same network
• Network Layer ensures that each packet gets
from its point of origin to its final destination
• Layer 3 provides switching and routing
technologies, creating logical paths, known as
virtual circuits, for transmitting data from node to
node. Routing and forwarding are functions of this
layer, as well as addressing, internetworking, error
handling, congestion control and packet
sequencing.
Transport (Layer 4)

• OSI Model, Layer 4, Responsible for


Source-to-Destination delivery of Entire
Message
• It provides transparent transfer of data
between end systems, or hosts, and is
responsible for end-to-end error recovery and
flow control. It ensures complete data
transfer.
• Session (Layer 5)
• This layer establishes, manages and terminates
connections between applications. The session layer
sets up, coordinates, and terminates conversations,
exchanges, and dialogues between the applications at
each end. It deals with session and connection
coordination.
• Presentation (Layer 6)
• This layer provides independence from differences in
data representation (e.g., encryption) by translating
from application to network format, and vice versa.
The presentation layer works to transform data into
the form that the application layer can accept. This
layer formats and encrypts data to be sent across a
network, providing freedom from compatibility
problems. It is sometimes called the syntax layer.
• Application (Layer 7)
• OSI Model, Layer 7, supports application and
end-user processes. Communication partners are
identified, quality of service is identified, user
authentication and privacy are considered, and
any constraints on data syntax are identified.
Everything at this layer is application-specific. This
layer provides application services for file
transfers, e-mail, and other network software
services. Telnet and FTP are applications that exist
entirely in the application level. Tiered application
architectures are part of this layer.
TCP/IP PROTOCOL
TCP/IP
• TCP/IP, or the Transmission Control
Protocol/Internet Protocol, is a suite of
communication protocols used to
interconnect network devices on the internet.
TCP/IP can also be used as a communications
protocol in a private network (an intranet or
an extranet).
• The entire internet protocol suite a set of rules
and procedures is commonly referred to as
TCP/IP, though others are included in the suite.
• TCP/IP specifies how data is exchanged
over the internet by providing end-to-end
communications that identify how it
should be broken into packets,
addressed, transmitted, routed and
received at the destination. TCP/IP
requires little central management, and it
is designed to make networks reliable,
with the ability to recover automatically
from the failure of any device on the
network.
• The two main protocols in the internet
protocol suite serve specific
functions. TCP defines how applications can
create channels of communication across a
network. It also manages how a message is
assembled into smaller packets before they
are then transmitted over the internet and
reassembled in the right order at the
destination address.
• IP defines how to address and route each
packet to make sure it reaches the right
destination. Each gateway computer on the
network checks this IP address to determine
where to forward the message
How TCP/IP works

• TCP/IP uses the client/server model of communication in


which a user or machine (a client) is provided a service (like
sending a webpage) by another computer (a server) in the
network.
• Collectively, the TCP/IP suite of protocols is classified
as stateless, which means each client request is considered
new because it is unrelated to previous requests. Being
stateless frees up network paths so they can be used
continuously.
• The transport layer itself, however, is stateful. It transmits a
single message, and its connection remains in place until all
the packets in a message have been received and
reassembled at the destination.
TCP/IP model layers

• TCP/IP functionality is divided into four layers,


each of which include specific protocols.
• The application layer provides applications with
standardized data exchange. Its protocols include
the Hypertext Transfer Protocol (HTTP), File
Transfer Protocol (FTP), Post Office Protocol 3
(POP3), Simple Mail Transfer Protocol (SMTP) and
Simple Network Management Protocol (SNMP).
• The transport layer is responsible for maintaining
end-to-end communications across the network.
TCP handles communications between hosts and
provides flow control, multiplexing and reliability.
• The network layer, also called the internet
layer, deals with packets and connects
independent networks to transport the
packets across network boundaries. The
network layer protocols are the IP and
the Internet Control Message Protocol
(ICMP), which is used for error reporting.
• The physical layer consists of protocols
that operate only on a link -- the network
component that interconnects nodes or
hosts in the network. The protocols in this
layer include Ethernet for local area
Advantages of TCP/IP

• TCP/IP is nonproprietary and, as a result, is


not controlled by any single company.
Therefore, the internet protocol suite can be
modified easily. It is compatible with all
operating systems, so it can communicate
with any other system. The internet protocol
suite is also compatible with all types of
computer hardware and networks.

You might also like