Open System Interconnection (OSI) model, OSI Model defines and is
used to understand how data is transferred from one computer to another in a
computer network . Two computers connected to each other with LAN Cable and Connectors (RJ-45), sharing data with help of
Network interface card(NIC) forms a computer network. But if one computer is
based on MSWindows and other Is MAC OS. Then how are they going to
communicate with each other? In order to
accomplish successful communication between the computers or network or
different architecture- 7 layered Open System Interconnection (OSI) Model was
introduced by ISO in1984. ISO is the organization dedicated to defining
global communication and standards.
This model is called Open
System Interconnection (OSI) because this model allows any two different
systems to communicate regardless of their underlying architecture. The model consists of seven functions, often referred
to as layers. Every layer Added its own header to the packet from previous
layer. The seven layers can be grouped into three groups - Network, Transport and Application.
• Layer 1, 2
and 3 i.e. physical, data link, and network are network support layers.
• Layer 4, Transport layer provides end to end reliable data transmission.
• Layer 5, 6 and 7 i.e. Session, Presentation, and Application layer are user support layers. Each Layer is a package of protocols.
• Layer 4, Transport layer provides end to end reliable data transmission.
• Layer 5, 6 and 7 i.e. Session, Presentation, and Application layer are user support layers. Each Layer is a package of protocols.
Layer 7 – Application
Layer
AL is used by Network Applications (Computer applications
that used internet) i.e. chrome, firefox, outlook , skype, etc. Web browser
, is a Network application running in
your PC, does not reside in Application
Layer. But it uses application layer protocols like HTTP,HTTPS to do web
surfing . All network applications depend on application layer protocols. HTTP,HTTPS,FTP,SMTP, these protocols
collectively called Application Layer. Application Layer provide services for
network applications with help of protocols to perform user activities. Application
Layer: Does not include firefox, chrome,etc. It includes Application layer protocols that
are needed to make these applications work correctly in a network called
internet .
Layer 6 – Presentation
Layer
Presentation Layer receives data from Application layer. The
data in the form of characters and numbers are converted to binary format:-
Translation. Before data is transmitted
PL reduces the number of bits to represent original data:-Data Compression. To
maintain integrity of data, the data is encrypted at sender side and decrypted
in receiver side. SSL (secure socket layer) protocol used in Presentation Layer for
encryption and decryption.
Layer 5 – Session Layer
Session Layer helps in setting up and managing Connections
and enabling sending data and receiving data followed by termination of
connection. Session layer has Application programming interfaces. (API’s ) eg: NETBIOS, which allows
application of different computers to communicate with each other. Before
a session or connection is established with a server. Server performs function
called Authentication. Authorization:
Determines if you have permission to access the files.
Session Management:
Webpage contain text, images. These files are stored separately
on the web server. When you request for a website in a web browser. Web browser opens a separate session to the web
server to Download text and image files separately. These files received as
data packets. Session Layer keeps a track of which data packet belong to
which file ie either text or image file and
tracks where the received data packet
goes. This is called Session Management .
Layer 4 –
Transport Layer
Transport layer (also called end-to-end layer) manages end to
end (source to destination) (process to process) message delivery in a network
and also provides the error checking and hence guarantees that no duplication
or errors are occurring in the data transfers across the network. It makes sure
that all the packets of a message arrive intact and in order.
Three main
Functions of Transport Layer:
Segmentation, Flow Control and Error Control
Segmentation:
Data is divided into small data units called segments.
·
Each data unit contain source and destination
port number and sequence number
·
Port number helps to direct each segment to the
correct application
·
Sequence number helps to reassemble the segments to form correct
message
Flow Control:
Transport layer makes sure that
the sender and receiver communicate at a rate they both can handle. Therefore
flow control prevents the source from sending data packets faster than the
destination can handle. Here, flow control is performed end-to-end rather than
across a link.
Error control: Transport layer also performs error control. Here error control
is performed end-to-end rather than across a single link. The sending transport
layer ensures that the entire message arrives at the receiving transport layer
without error (damage, loss or duplication). Error correction is achieved
through retransmission.
Protocols: These protocols work on
the transport layer TCP, SPX, NETBIOS, ATP and NWLINK.
Transport
layer provides two types of services:
Connection
Oriented Transmission(uses TCP Protocol)
(a) In this
type of transmission the receiving device sends an acknowledgment, back to the
source after a packet or group of packet is received.
(b) This type
of transmission is also known as reliable transport method.
(c) Because
connection oriented transmission requires more packets be sent across network,
it is considered a slower transmission method.
(d) If the data
that is sent has problems, the destination requests the source for
retransmission by acknowledging only packets that have been received and are
recognizable.
(e) Once the
destination computer receives all of the data necessary to reassemble the
packet, the transport layer assembles the data in the correct sequence and then
passes it up, to the session layer.
Connectionless
Transmission (uses UDP protocol)
(a) In this
type of transmission the receiver does not acknowledge receipt of a packet.
(b) Sending
device assumes that packet arrive just fine.
(c) This
approach allows for much faster communication between devices.
(d) The
trade-off is that connectionless transmission is less reliable than connection
oriented.
Layer 3 –
Network Layer
Transport layer passes the data segments to network layer. Network layer works for the transmission of received data segment from one network to another network.Data units in Network layer are called packets .It is a layer where router resides. The function of Network Layer : Logical Addressing, Routing, Path Determination
Logical Addressing: IP addressing is done in Network Layer called logical addressing
Every computer in a network has unique IP address. Network Layer assigns sender and receiver IP address to each segment to form a IP Packet
Routing: is method to route data packet from source to destination. It is based on logical address [IP + Mask].
Eg: Computer A is connected to network:1 and Computer B is connected to network:2 and from computer B there is a request to access facebook. Now face book server replies to computer B in a form of packet. This packet is to be delivered to computer B only. Since in a network each device has unique IP address. Network layer of Facebook server will add the source and destination IP address in the data packet. Suppose mask used is 255.255.255.0. This mask tells first three combinations represent the network and last one represent the host computer B. Based on the IP address and Mask , routing decisions are made in computer network.
Path Determination: Computer can be connected to internet server or other computer in number of ways. Choosing the best possible path for data delivery from source to destination is called path determination
OSPF-Open shortest path first
BGP- Border Gateway protocol
ISIS- Intermediate system to Intermediate system
These protocols determine best possible path for data packet delivery
Layer 2 -
Data Link layer
It is
responsible for reliable node-to-node delivery of data. It receives the data
from network layer and creates frames, add physical address to these frames and
pass them to physical layer.
There are two types of addressing: 1.Logical Addressing (Done by Network Addressing) 2.Physical Addressing (Done by Data Link layer). MAC Address is a 12 digit alphanumeric number embedded in a network interface card (NIC)of your computer. Data link layer is embedded as a software in NIC
Data link layer adds the header( i.e. Source and Destination physical address(MACAddress) and tail (Error control information) to the data packet to form a frame
Functions
of Data Link Layer:
Link
Establishment and Termination: Establishes and terminates the logical link
between two nodes.
Physical
addressing: After creating frames, Data link layer adds physical addresses
(MAC address) of sender and/or receiver in the header of each frame.
Frame
Traffic Control: Tells the transmitting node to "back-off algorithm" when no frame
buffers are available.
Frame
Sequencing: Transmits/receives frames sequentially.
Frame
Acknowledgment: Provides/expects frame acknowledgments. Detects and recovers from
errors that occur in the physical layer by retransmitting
non-acknowledged frames and handling duplicate frame receipt.
Frame
Delimiting: Creates and recognizes frame boundaries.
Frame Error
Checking: Checks received frames for integrity.
Media
Access Management: determines when the node "has the right" to use the
physical medium.
Flow
control: It is the traffic regulatory mechanism implemented by Data Link
layer that prevents the fast sender from drowning the slow receiver. If the
rate at which data is absorbed by receiver is less that the rate produced in
the sender, the data link layer imposes this flow control mechanism.
Error
control: Data link layer provides the mechanism of error control in which
it detects and retransmits damaged· or lost frames. It also deals with the
problem of duplicate frame, thus providing reliability to physical layer.
Access
control: When a single communication channel is shared by multiple
devices, MAC sub-layer of data link layer helps to determine which device has
control over the channel at a given time.
Feedback: After transmitting the
frames, the system waits for the feedback. The receiving device then sends the
acknowledgement frames back to the source providing the receipt of the frames.
Layer 1 –
Physical Layer
The physical
layer, the lowest layer of the OSI model, is concerned with the transmission
and reception of the unstructured raw bit stream over a physical medium. It describes the electrical/optical,
mechanical, and functional interfaces to the physical medium, and carries the
signals for all of the higher layers. Physical layer defines the
cables, network cards and physical aspects.
It is
responsible for the actual physical connection between the devices. Such
physical connection may be made by using twisted pair cable, fiber-optic,
coaxial cable or wireless communication media. This layer gets the frames
sent by the Data Link layer and converts them into signals compatible with the
transmission media. If a metallic cable is used, then it will convert data into
electrical
signals; if a fiber optical cable is used, then it will convert data into luminous
signals; if a wireless network is used, then it will convert data into electromagnetic
signals; and so on.
No comments:
Post a Comment