Location via proxy:   [ UP ]  
[Report a bug]   [Manage cookies]                
0% found this document useful (0 votes)
44 views

Computer Networks Report Writing Makaut

CA2 Report for Computer Networks

Uploaded by

Bittu Kumar
Copyright
© © All Rights Reserved
Available Formats
Download as PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
44 views

Computer Networks Report Writing Makaut

CA2 Report for Computer Networks

Uploaded by

Bittu Kumar
Copyright
© © All Rights Reserved
Available Formats
Download as PDF, TXT or read online on Scribd
You are on page 1/ 12

PAPER

6th Sem
Presented By~
Name Roll Stream Section
Swarup Saw 12100121131 CSE B

Topic: Layers of OSI Model


The OSI Model, or Open Systems Interconnection Model,
is a conceptual framework that standardizes the
functions of a telecommunication or computing system.
It divides the complex process of network
communication into seven layers, each with specific
responsibilities.
It was developed by ISO( International Standard
Organization) in 1984.
Layered: The OSI Model consists of seven layers, namely
Physical, Data Link, Network, Transport, Session,
Presentation, and Application. These layers work
together in a hierarchical fashion to ensure seamless
communication in networked systems.
Hierarchical Structure: This hierarchy is crucial for
understanding how data moves through the network.
Each layer builds upon the services provided by the layer
beneath it, contributing to the efficiency and reliability of
the overall communication process.
This layer is concerned with
transmitting raw data bits across
the network. For transmitting data it
converts the digital bits into
electrical, radio or optical signal. It
can include specifications such as
voltages, pin layout, cabling, and radio
frequencies.

Fast Ethernet, RS232, and ATM are


protocols with physical layer
components. Layer 1 Physical examples
include Ethernet, FDDI, B8ZS, V.35,
V.24, RJ45, etc.
The Data Link Layer ensures reliable
node-to-node communication, handling
error detection, flow control,
access control and correction .
It comprises two sublayers: Logical
Link Control (LLC) and Media Access
Control (MAC).
Common examples include Ethernet
frames and MAC addresses.
Network layer transmits data in from one device/host to
another device/host which located at different network. Data
unit in this layer is called packet.

Network layer performs

Logical Addressing: In order to identify each device on


internetwork uniquely which is also known as ip addressing.

Determine best path for data transmission from source to


destination, and transmits the data through the path known
as routing.

Router operates in this layer.


The Transport Layer ensures end -to-end
communication, segmenting and reassembling
data.

Protocols such as TCP (Transmission Control


Protocol) and UDP (User Datagram Protocol)
operate here.

Examples: Ports and sockets are integral to


the transport layer.
The Session Layer establishes, maintains, and
terminates sessions between applications. It
manages dialog control and synchronization.

API calls and session management are


common session layer functions.

*Another session layer service is synchronization. Consider the problems that occur when
transferring a file between two machines and the system crashed and not being able to complete
the transfer. This process must be restarted from the beginning. To avoid this problem, the
session layer provides a way to insert checkpoints into the data stream, so that after a crash,
only the data after the last checkpoint has to be repeated.
It receives data from the application layer in the form of character and
number and translate the data into machine readable format to transmit over
the network.

The functions of the presentation layer are :

Translation : For example, ASCII to EBCDIC.

Encryption/ Decryption : Data encryption translates the data into another


form or code. The encrypted data is known as the cipher text and the
decrypted data is known as plain text. A key value is used for encrypting as
well as decrypting data.
Compression: Reduces the number of bits
that need to be transmitted on the
network which speed up the data
transmission.
This is the only layer that directly interacts with
data from the user. Software applications like
web browsers and email clients rely on the
application layer to initiate communications. But
it should be made clear that client software
applications are not part of the application layer,
rather the application layer is responsible for the
protocols and data manipulation that the software
relies on to present meaningful data to the user.

Application layer protocols include HTTP as well


as SMTP (Simple Mail Transfer Protocol is one of
the protocols that enables email communications).
Although the modern Internet does not strictly follow the OSI Model (it more
closely follows the simpler Internet protocol suite), the OSI Model is still very
useful for troubleshooting network problems. Whether it’s one person who
c a n ’ t g e t t h e i r l a p t op o n t h e I n t e r n e t , o r a w e b s i t e b e i n g d o w n f o r t h o u s a n d s o f
users, the OSI Model can help to break down the problem and isolate the source
of the trouble. If the problem can be narrowed down to one specific layer of
the model, a lot of unnecessary work can be avoided.

References
https://anamul-haque.medium.com/what-is-the-osi-model-66758c44c896
https://www.cloudflare.com/en-gb/learning/ddos/glossary/open-systems-interconnection-model-osi/
Thank
Youuu

You might also like