SlideShare ist ein Scribd-Unternehmen logo
1 von 33
OSI Reference ModelOSI Reference Model
Sayyed sabir shahSayyed sabir shah
Department of technologyDepartment of technology
Sarhad university of information technologySarhad university of information technology
PeshawarPeshawar
The Need For Standards.The Need For Standards.
• Over the past couple of decades many of the networks that
were built used different hardware and software
implementations, as a result:
– They were incompatible and it became difficult for networks using
different specifications to communicate with each other.
• The companies involved in networks development realized
that they needed to move from proprietary networking
system into open system.
• Proprietary systems are privately developed, owned and
controlled.
– Disadvantages are:
• Leads to monopolistic environment.
• Slows down the development of networking products.
• Open system is the opposite of proprietary systems.
– Advantages are:
• Leads to competitive environment.
• Accelerates the development of networking products.
The Need for Standards.The Need for Standards.
• To address the problem of networks being
incompatible and unable to communicate with each
other, the International Organisation for
Standardisation (ISO) created a NETWORK
MODEL.
• This NETWORK MODEL would help the vendor to
create interoperable network implementations.
• This NETWORK MODEL is called OSI Reference
Model.
Layered Tasks.Layered Tasks.
• We use the concept of layerslayers in our daily life.
• As an example, let us consider two friends who
communicate through postal mail.
• The process of sending a letter to a friend would be
complex if there were no services available from the post
office.
• This process of sending mail can be divided into several
phases/activities and each phase/activities is called layer.
Figure.Figure. Tasks involved in sending a letterTasks involved in sending a letter
Hierarchy.Hierarchy.
• In the previous mail communication example, we saw that
three activities were performed at the sender side and
another three activities were preformed at the receiver side.
• The task of transporting the mail between the sender and
receiver is done by the carrier.
• On important thing is that tasks must be done in the order
given in the hierarchy.
– At the sender side, the letter must be written and dropped into the
mailbox before being picked up by the mail carrier and delivered to
the post office.
– At the receiver side, the letter must be dropped in the recipient
mailbox before being picked up and read by the recipient.
The OSI Reference Model.The OSI Reference Model.
• The model was developed by the International Organisation
for Standardisation (ISO) in 1984. It is now considered the
primary architectural model for inter-computer
communications.
• The Open Systems Interconnection (OSI) reference model is
a descriptive network scheme. It ensures greater
compatibility and interoperability between various types of
network technologies.
• The OSI model describes how information or data makes its
way from application programmes (such as spreadsheets)
through a network medium (such as wire) to another
application programme located on another network.
• The OSI reference model divides the problem of moving
information between computers over a network medium into
SEVEN smaller and more manageable problems .
• This separation into smaller more manageable functions is
known as layering.
A Layered Network Model.A Layered Network Model.
• The OSI Reference Model is composed of seven
layers, each specifying particular network functions.
– The process of breaking up the functions or tasks of
networking into layers reduces complexity and makes
learning easier to understand.
– It breaks the network communication into smaller,
simpler parts that are easier to develop.
– It allows different types of hardware and software to
communicate with each other.
– It prevents changes in one layer from affecting the other
layers.
Layers of OSI Reference Model.Layers of OSI Reference Model.
Encapsulation.Encapsulation.
• As the data flows down through the layers in the hierarchy,
each layer adds some extra information to the data in the
form of headers or tailors.
• This process of wrapping data with headers and tailors is
called encapsulation.
• These extra information are added for:
– To enable the opposite corresponding layer to take the right
operation on the data (to facilitate his work).
– To enable the network to transfer the data accurately from the
source to the destination.
• Through these information each layer actually
communicates with the opposite corresponding layer and
this is called peer-to-peer communication.
• At the receiver side De-Encapsulation take place.
Encapsulation.Encapsulation.
Physical Layer.Physical Layer.
• The physical layer performs the functions required to transmit a bit stream
over a physical medium.
• It deals with the mechanical and electrical specification of the transmission
media.
• The major duties performed by physical layer are:
– Physical characteristics of interface and media.
• Defines the characteristics of the interface between the devices and the
transmission media.
• It also defines the type of transmission medium.
– Representation of bits:
• Physical layer receives a steam of bits (sequence of 0s and 1s) without any
interruption.
• To be transmitted, bits must be encoded into a signals – electrical or optical.
• The physical layer defined the type of representation ( how 0s and 1s are changed
into signals).
– Data rate:
• The transmission rate – the number of bit per second- is also defined by the
physical layer.
• Repeater is a device of the physical layer.
• Physical layer protocols are encoding techniques (RZ, NRZ, Manchester etc).
Physical Layer.
Data Link Layer.Data Link Layer.
• The data link layer is responsible for moving frames from
one hop (node) to the next.
• The major duties of the data link layer are:
– Framing:
• The data link layer divides the stream of bits steam from the network
layer into manageable data units called frames.
– Physical addressing:
• If frame is to be distributed to different systems on the network, the
data link layer adds a header to the frame to define the sender and
receiver of the frame.
• Physical address is the MAC address, which is hard coded into NIC
and is of 48-bit represented by Hexadecimal format.
– Flow control:
• If the rate at which the data are absorbed by the receiver is less than the
rate produced in the sender, the data link layer imposes a flow control
mechanism to prevent overwhelming the receiver.
Data Link Layer.Data Link Layer.
– Error control:
• The data link layer adds reliability to the physical layer by adding
mechanism to detect and retransmit damaged or lost frames.
• It also uses a mechanism to prevent duplication of frames.
• Error control is normally achieved through a trailer added to the end of
the frame.
– Access control:
• The data link layer protocol has to determine that how to get access to
the link in case when two or more devices are connected to the same
link.
• The PDU of the data link layer is called frame.
• Data Link layer protocols are CSMA/CD, CSMA/CA,
Token Passing etc.
Node-to-Node Delivery.
Data Link Layer.
Network Layer.Network Layer.
• The network layer is responsible for the source -to-
destination delivery of a packet possibly across
multiple networks.
– It two systems are connected to the same link, there is
usually no need for a network layer.
– However, if the two systems are attached to different
networks with connecting devices between the networks,
there is need for the network layer to accomplish the
delivery.
• The major duties performed by the network layer
are:
Network Layer.Network Layer.
– Logical addressing:
• The physical addressing implemented by the data link layer handles the
addressing problem locally.
• If a packet passes the network boundary, we need another addressing
system to perform the source and destination delivery.
• The network layer adds a header to the segment received from the
transport layer containing the logical addresses of the sender and
receiver.
• Logical address is also called IP address which is of 32-bits and
represented in decimal format.
– Routing:
• To route the packets from the source to destination in an internetwork,
the router uses network layer information.
• The PDU of network layer is called packet.
• Network layer protocols are IP, IPX, AppleTalk.
Network Layer.Network Layer.
Source-to-Destination Delivery.Source-to-Destination Delivery.
Transport Layer.Transport Layer.
• The transport layer is responsible for process-to-process
delivery of the entire message.
• The major duties performed by the transport layer are:
– Port address:
• Computers often running several processes (running programs) at the
same time:
• Each running process open a logical port on the computer.
• The transport layer header must therefore include a type of address
called port address.
• The network layer gets each packet to the correct computer, the
transport layer get the entire message to the correct process on that
computer.
– Segmentation and reassembly:
• A message received form the upper layers is divided into transmittable
segments, each segment contains a sequence number.
• These number enables the transport layer to reassemble the message
correctly upon arrival at the destination and to identify and replace
packets that were lost in the transmission.
Transport Layer.Transport Layer.
– Connection Control:
• The transport layer can be either connectionless or connection
oriented.
• A connection oriented transport layer makes a logical connection with
the transport layer at the destination machine first before delivering the
packets.
• After all the data are transferred, the connection is terminated.
– Flow control:
• Like data link layer, the transport layer is resposnsible for flow control.
• However, flow control at this layer is performed end to end rather than
across a single link (Hop-to-Hop).
– Error control:
• Like data link layer, the transport layer is responsible for error control.
• However, error control at this layer is performed end to end rather than
across a single link (Hop-to-Hop).
• Transport layer 4 protocols include TCP (Transmission
Control Protocol) and UDP (User Datagram Protocol).
Transport Layer.Transport Layer.
Reliable Process-to-Process Delivery.Reliable Process-to-Process Delivery.
Session Layer.Session Layer.
• The session layer defines how to establish, maintaining and
terminates session between two communication hosts.
• The major duties of the session layer are:
– Synchronization:
• For lengthy transaction (file transfer), the user may choose to establish
synchronization points associated with the transfer. If a fault develops
during a transaction, the dialog may be restarted at an agreed
synchronization point.
– Dialog control:
• Session layer determines that which role is to be played at any given
time by a host.
– Duplex: Two-way simultaneous.
– Half-Duplex: Two-way alternate.
– Simplex: One-way.
• Session layer protocols are SQL, ASP(AppleTalk Session
Protocol), Remote Procedure Call (RPC), X Window
System.
Session Layer.Session Layer.
Presentation Layer.Presentation Layer.
• The presentation layer ensures that the information that the
application layer of one system sends out is readable by the
application layer of another system.
• The major duties of the presentation layer are:
– Format conversion:
• Convert message from one format into another format .i.e. for ASCII
to EBCEDIC or vice versa.
– Compression.
• Compress the message to take less bandwidth on the transmission
media and less time for transmission.
– Encryption:
• Convert the message into a form that will not be readable by others.
• Provides security to the message.
• Protocols of the presentation layer are JPEG, MPEG, ASCII,
EBCDIC etc.
Presentation Layer.Presentation Layer.
Application Layer.Application Layer.
• The application layer is the OSI layer that is closest to the
user.
• It provides network services to the user’s applications (.i.e.
spreadsheet etc).
• The major duties are:
– Mail service:
• It provides network services for the email application.
– File transfer and Access:
• It provides network services for a user to access files on a remote
computer, to retrieve files from a remote computer for use in the local
computer and to manage or control files in a remote computer locally.
– World Wide Web:
• It provides network services to access the World Wide Web.
Application Layer.Application Layer.
Summary.Summary.
• There was no standard for networks in the early days and as a result it was
difficult for networks to communicate with each other.
• The International Organisation for Standardisation (ISO) recognised this.
and researched various network schemes, and in 1984 introduced the Open
Systems Interconnection (OSI) reference model.
• The OSI reference model has standards which ensure vendors greater
compatibility and interoperability between various types of network
technologies.
• The OSI reference model organizes network functions into seven
numbered layers.
• Each layer provides a service to the layer above it in the protocol
specification and communicates with the same layer’s software or
hardware on other computers.
Summary of the Layers.Summary of the Layers.

Weitere ähnliche Inhalte

Was ist angesagt?

Osi model vs TCP/IP
Osi model vs TCP/IPOsi model vs TCP/IP
Osi model vs TCP/IP
Mannu Khani
 
Introduction of tcp, ip & udp
Introduction of tcp, ip & udpIntroduction of tcp, ip & udp
Introduction of tcp, ip & udp
rahul kundu
 

Was ist angesagt? (20)

Circuit Switching, Packet Switching, Virtual Circuit Networks and Datagram Ne...
Circuit Switching, Packet Switching, Virtual Circuit Networks and Datagram Ne...Circuit Switching, Packet Switching, Virtual Circuit Networks and Datagram Ne...
Circuit Switching, Packet Switching, Virtual Circuit Networks and Datagram Ne...
 
OSI Model of Networking
OSI Model of NetworkingOSI Model of Networking
OSI Model of Networking
 
Computer Networks- Introduction and Data Link Layer
Computer Networks- Introduction and Data Link LayerComputer Networks- Introduction and Data Link Layer
Computer Networks- Introduction and Data Link Layer
 
Dhcp presentation
Dhcp presentationDhcp presentation
Dhcp presentation
 
Data link layer
Data link layer Data link layer
Data link layer
 
TCP and UDP
TCP and UDP TCP and UDP
TCP and UDP
 
Osi reference model
Osi reference modelOsi reference model
Osi reference model
 
Tcp/ip model
Tcp/ip  modelTcp/ip  model
Tcp/ip model
 
message passing
 message passing message passing
message passing
 
Osi model
Osi modelOsi model
Osi model
 
OSI Model
OSI ModelOSI Model
OSI Model
 
Switching concepts Data communication and networks
Switching concepts Data communication and networksSwitching concepts Data communication and networks
Switching concepts Data communication and networks
 
Transport Layer
Transport LayerTransport Layer
Transport Layer
 
Presentation on TCP/IP Model
Presentation on TCP/IP ModelPresentation on TCP/IP Model
Presentation on TCP/IP Model
 
Transport Layer In Computer Network
Transport Layer In Computer NetworkTransport Layer In Computer Network
Transport Layer In Computer Network
 
network hardware
network hardwarenetwork hardware
network hardware
 
Osi model vs TCP/IP
Osi model vs TCP/IPOsi model vs TCP/IP
Osi model vs TCP/IP
 
Basics of Networks ,Advantages and Disadvantages
Basics of  Networks ,Advantages and DisadvantagesBasics of  Networks ,Advantages and Disadvantages
Basics of Networks ,Advantages and Disadvantages
 
Bit torrent ppt
Bit torrent pptBit torrent ppt
Bit torrent ppt
 
Introduction of tcp, ip & udp
Introduction of tcp, ip & udpIntroduction of tcp, ip & udp
Introduction of tcp, ip & udp
 

Ähnlich wie Osi model

Skr+3200+chapter+2+(kweh)
Skr+3200+chapter+2+(kweh)Skr+3200+chapter+2+(kweh)
Skr+3200+chapter+2+(kweh)
Ammar Shafiq
 
tcpiposi.pptx
tcpiposi.pptxtcpiposi.pptx
tcpiposi.pptx
JustinMathew73
 

Ähnlich wie Osi model (20)

06 - OSI Model.ppt
06 - OSI Model.ppt06 - OSI Model.ppt
06 - OSI Model.ppt
 
06 - OSI Model.ppt
06 - OSI Model.ppt06 - OSI Model.ppt
06 - OSI Model.ppt
 
PC 106 PPT-06
PC 106 PPT-06PC 106 PPT-06
PC 106 PPT-06
 
Dc2 t1
Dc2 t1Dc2 t1
Dc2 t1
 
Osi layer and network protocol
Osi layer and network protocolOsi layer and network protocol
Osi layer and network protocol
 
unit1 network model osi and tcpip.pptx
unit1  network model osi and tcpip.pptxunit1  network model osi and tcpip.pptx
unit1 network model osi and tcpip.pptx
 
OSI Model.pdf
OSI Model.pdfOSI Model.pdf
OSI Model.pdf
 
Pwani notes-Network Essentials.pp for Internet Protocoltx
Pwani notes-Network Essentials.pp  for Internet ProtocoltxPwani notes-Network Essentials.pp  for Internet Protocoltx
Pwani notes-Network Essentials.pp for Internet Protocoltx
 
Skr+3200+chapter+2+(kweh)
Skr+3200+chapter+2+(kweh)Skr+3200+chapter+2+(kweh)
Skr+3200+chapter+2+(kweh)
 
Network architecure (3).pptx
Network architecure (3).pptxNetwork architecure (3).pptx
Network architecure (3).pptx
 
Chap 2 network models
Chap 2 network modelsChap 2 network models
Chap 2 network models
 
Client Server Network and Peer to Peer.pptx
Client Server Network and Peer to Peer.pptxClient Server Network and Peer to Peer.pptx
Client Server Network and Peer to Peer.pptx
 
Basics of Ethernet
Basics of Ethernet Basics of Ethernet
Basics of Ethernet
 
OSI Model.ppt
OSI Model.pptOSI Model.ppt
OSI Model.ppt
 
Sept 2017 network standards and models
Sept 2017   network standards and modelsSept 2017   network standards and models
Sept 2017 network standards and models
 
ET3003-2 OSI-TCPIP (Semester II 2013-2014)
ET3003-2 OSI-TCPIP (Semester II 2013-2014)ET3003-2 OSI-TCPIP (Semester II 2013-2014)
ET3003-2 OSI-TCPIP (Semester II 2013-2014)
 
ch5-osi.pdf
ch5-osi.pdfch5-osi.pdf
ch5-osi.pdf
 
Networking basics
Networking basicsNetworking basics
Networking basics
 
tcpiposi.pptx
tcpiposi.pptxtcpiposi.pptx
tcpiposi.pptx
 
Protocol layer,OSI model & POP3
Protocol layer,OSI model & POP3Protocol layer,OSI model & POP3
Protocol layer,OSI model & POP3
 

Mehr von sayyed sabir

Mehr von sayyed sabir (20)

Workbreakdownstructureppt 130410021152-phpapp02
Workbreakdownstructureppt 130410021152-phpapp02Workbreakdownstructureppt 130410021152-phpapp02
Workbreakdownstructureppt 130410021152-phpapp02
 
Automatic door using arduino
Automatic door using arduinoAutomatic door using arduino
Automatic door using arduino
 
Importance of coal water slurry
Importance of coal water slurryImportance of coal water slurry
Importance of coal water slurry
 
(Week 15)
(Week 15)(Week 15)
(Week 15)
 
(Week 14)
(Week 14)(Week 14)
(Week 14)
 
(Week 13)
(Week 13)(Week 13)
(Week 13)
 
(Week 12)
(Week 12)(Week 12)
(Week 12)
 
(Week 11)
(Week 11)(Week 11)
(Week 11)
 
(Week 10)
(Week 10)(Week 10)
(Week 10)
 
(Week 9)
(Week 9)(Week 9)
(Week 9)
 
(Week 8)
(Week 8)(Week 8)
(Week 8)
 
(Week 7)
(Week 7)(Week 7)
(Week 7)
 
(Week 6)
(Week 6)(Week 6)
(Week 6)
 
(Week 5)
(Week 5)(Week 5)
(Week 5)
 
(Week 4)
(Week 4)(Week 4)
(Week 4)
 
(Week 3)
(Week 3)(Week 3)
(Week 3)
 
(Week 2)
(Week 2)(Week 2)
(Week 2)
 
(Week 1)
(Week 1)(Week 1)
(Week 1)
 
Transmission modes
Transmission modesTransmission modes
Transmission modes
 
Ch3 4 v1
Ch3 4 v1Ch3 4 v1
Ch3 4 v1
 

Kürzlich hochgeladen

Cloud Frontiers: A Deep Dive into Serverless Spatial Data and FME
Cloud Frontiers:  A Deep Dive into Serverless Spatial Data and FMECloud Frontiers:  A Deep Dive into Serverless Spatial Data and FME
Cloud Frontiers: A Deep Dive into Serverless Spatial Data and FME
Safe Software
 
Architecting Cloud Native Applications
Architecting Cloud Native ApplicationsArchitecting Cloud Native Applications
Architecting Cloud Native Applications
WSO2
 

Kürzlich hochgeladen (20)

Navigating the Deluge_ Dubai Floods and the Resilience of Dubai International...
Navigating the Deluge_ Dubai Floods and the Resilience of Dubai International...Navigating the Deluge_ Dubai Floods and the Resilience of Dubai International...
Navigating the Deluge_ Dubai Floods and the Resilience of Dubai International...
 
Polkadot JAM Slides - Token2049 - By Dr. Gavin Wood
Polkadot JAM Slides - Token2049 - By Dr. Gavin WoodPolkadot JAM Slides - Token2049 - By Dr. Gavin Wood
Polkadot JAM Slides - Token2049 - By Dr. Gavin Wood
 
WSO2's API Vision: Unifying Control, Empowering Developers
WSO2's API Vision: Unifying Control, Empowering DevelopersWSO2's API Vision: Unifying Control, Empowering Developers
WSO2's API Vision: Unifying Control, Empowering Developers
 
Strategies for Landing an Oracle DBA Job as a Fresher
Strategies for Landing an Oracle DBA Job as a FresherStrategies for Landing an Oracle DBA Job as a Fresher
Strategies for Landing an Oracle DBA Job as a Fresher
 
Biography Of Angeliki Cooney | Senior Vice President Life Sciences | Albany, ...
Biography Of Angeliki Cooney | Senior Vice President Life Sciences | Albany, ...Biography Of Angeliki Cooney | Senior Vice President Life Sciences | Albany, ...
Biography Of Angeliki Cooney | Senior Vice President Life Sciences | Albany, ...
 
Boost Fertility New Invention Ups Success Rates.pdf
Boost Fertility New Invention Ups Success Rates.pdfBoost Fertility New Invention Ups Success Rates.pdf
Boost Fertility New Invention Ups Success Rates.pdf
 
Connector Corner: Accelerate revenue generation using UiPath API-centric busi...
Connector Corner: Accelerate revenue generation using UiPath API-centric busi...Connector Corner: Accelerate revenue generation using UiPath API-centric busi...
Connector Corner: Accelerate revenue generation using UiPath API-centric busi...
 
Apidays New York 2024 - APIs in 2030: The Risk of Technological Sleepwalk by ...
Apidays New York 2024 - APIs in 2030: The Risk of Technological Sleepwalk by ...Apidays New York 2024 - APIs in 2030: The Risk of Technological Sleepwalk by ...
Apidays New York 2024 - APIs in 2030: The Risk of Technological Sleepwalk by ...
 
Vector Search -An Introduction in Oracle Database 23ai.pptx
Vector Search -An Introduction in Oracle Database 23ai.pptxVector Search -An Introduction in Oracle Database 23ai.pptx
Vector Search -An Introduction in Oracle Database 23ai.pptx
 
FWD Group - Insurer Innovation Award 2024
FWD Group - Insurer Innovation Award 2024FWD Group - Insurer Innovation Award 2024
FWD Group - Insurer Innovation Award 2024
 
Cloud Frontiers: A Deep Dive into Serverless Spatial Data and FME
Cloud Frontiers:  A Deep Dive into Serverless Spatial Data and FMECloud Frontiers:  A Deep Dive into Serverless Spatial Data and FME
Cloud Frontiers: A Deep Dive into Serverless Spatial Data and FME
 
Apidays New York 2024 - The value of a flexible API Management solution for O...
Apidays New York 2024 - The value of a flexible API Management solution for O...Apidays New York 2024 - The value of a flexible API Management solution for O...
Apidays New York 2024 - The value of a flexible API Management solution for O...
 
Architecting Cloud Native Applications
Architecting Cloud Native ApplicationsArchitecting Cloud Native Applications
Architecting Cloud Native Applications
 
Apidays New York 2024 - The Good, the Bad and the Governed by David O'Neill, ...
Apidays New York 2024 - The Good, the Bad and the Governed by David O'Neill, ...Apidays New York 2024 - The Good, the Bad and the Governed by David O'Neill, ...
Apidays New York 2024 - The Good, the Bad and the Governed by David O'Neill, ...
 
Elevate Developer Efficiency & build GenAI Application with Amazon Q​
Elevate Developer Efficiency & build GenAI Application with Amazon Q​Elevate Developer Efficiency & build GenAI Application with Amazon Q​
Elevate Developer Efficiency & build GenAI Application with Amazon Q​
 
Understanding the FAA Part 107 License ..
Understanding the FAA Part 107 License ..Understanding the FAA Part 107 License ..
Understanding the FAA Part 107 License ..
 
Apidays New York 2024 - Scaling API-first by Ian Reasor and Radu Cotescu, Adobe
Apidays New York 2024 - Scaling API-first by Ian Reasor and Radu Cotescu, AdobeApidays New York 2024 - Scaling API-first by Ian Reasor and Radu Cotescu, Adobe
Apidays New York 2024 - Scaling API-first by Ian Reasor and Radu Cotescu, Adobe
 
Platformless Horizons for Digital Adaptability
Platformless Horizons for Digital AdaptabilityPlatformless Horizons for Digital Adaptability
Platformless Horizons for Digital Adaptability
 
Web Form Automation for Bonterra Impact Management (fka Social Solutions Apri...
Web Form Automation for Bonterra Impact Management (fka Social Solutions Apri...Web Form Automation for Bonterra Impact Management (fka Social Solutions Apri...
Web Form Automation for Bonterra Impact Management (fka Social Solutions Apri...
 
Introduction to Multilingual Retrieval Augmented Generation (RAG)
Introduction to Multilingual Retrieval Augmented Generation (RAG)Introduction to Multilingual Retrieval Augmented Generation (RAG)
Introduction to Multilingual Retrieval Augmented Generation (RAG)
 

Osi model

  • 1. OSI Reference ModelOSI Reference Model Sayyed sabir shahSayyed sabir shah Department of technologyDepartment of technology Sarhad university of information technologySarhad university of information technology PeshawarPeshawar
  • 2. The Need For Standards.The Need For Standards. • Over the past couple of decades many of the networks that were built used different hardware and software implementations, as a result: – They were incompatible and it became difficult for networks using different specifications to communicate with each other. • The companies involved in networks development realized that they needed to move from proprietary networking system into open system. • Proprietary systems are privately developed, owned and controlled. – Disadvantages are: • Leads to monopolistic environment. • Slows down the development of networking products. • Open system is the opposite of proprietary systems. – Advantages are: • Leads to competitive environment. • Accelerates the development of networking products.
  • 3. The Need for Standards.The Need for Standards. • To address the problem of networks being incompatible and unable to communicate with each other, the International Organisation for Standardisation (ISO) created a NETWORK MODEL. • This NETWORK MODEL would help the vendor to create interoperable network implementations. • This NETWORK MODEL is called OSI Reference Model.
  • 4. Layered Tasks.Layered Tasks. • We use the concept of layerslayers in our daily life. • As an example, let us consider two friends who communicate through postal mail. • The process of sending a letter to a friend would be complex if there were no services available from the post office. • This process of sending mail can be divided into several phases/activities and each phase/activities is called layer.
  • 5. Figure.Figure. Tasks involved in sending a letterTasks involved in sending a letter
  • 6. Hierarchy.Hierarchy. • In the previous mail communication example, we saw that three activities were performed at the sender side and another three activities were preformed at the receiver side. • The task of transporting the mail between the sender and receiver is done by the carrier. • On important thing is that tasks must be done in the order given in the hierarchy. – At the sender side, the letter must be written and dropped into the mailbox before being picked up by the mail carrier and delivered to the post office. – At the receiver side, the letter must be dropped in the recipient mailbox before being picked up and read by the recipient.
  • 7. The OSI Reference Model.The OSI Reference Model. • The model was developed by the International Organisation for Standardisation (ISO) in 1984. It is now considered the primary architectural model for inter-computer communications. • The Open Systems Interconnection (OSI) reference model is a descriptive network scheme. It ensures greater compatibility and interoperability between various types of network technologies. • The OSI model describes how information or data makes its way from application programmes (such as spreadsheets) through a network medium (such as wire) to another application programme located on another network. • The OSI reference model divides the problem of moving information between computers over a network medium into SEVEN smaller and more manageable problems . • This separation into smaller more manageable functions is known as layering.
  • 8. A Layered Network Model.A Layered Network Model. • The OSI Reference Model is composed of seven layers, each specifying particular network functions. – The process of breaking up the functions or tasks of networking into layers reduces complexity and makes learning easier to understand. – It breaks the network communication into smaller, simpler parts that are easier to develop. – It allows different types of hardware and software to communicate with each other. – It prevents changes in one layer from affecting the other layers.
  • 9. Layers of OSI Reference Model.Layers of OSI Reference Model.
  • 10. Encapsulation.Encapsulation. • As the data flows down through the layers in the hierarchy, each layer adds some extra information to the data in the form of headers or tailors. • This process of wrapping data with headers and tailors is called encapsulation. • These extra information are added for: – To enable the opposite corresponding layer to take the right operation on the data (to facilitate his work). – To enable the network to transfer the data accurately from the source to the destination. • Through these information each layer actually communicates with the opposite corresponding layer and this is called peer-to-peer communication. • At the receiver side De-Encapsulation take place.
  • 12. Physical Layer.Physical Layer. • The physical layer performs the functions required to transmit a bit stream over a physical medium. • It deals with the mechanical and electrical specification of the transmission media. • The major duties performed by physical layer are: – Physical characteristics of interface and media. • Defines the characteristics of the interface between the devices and the transmission media. • It also defines the type of transmission medium. – Representation of bits: • Physical layer receives a steam of bits (sequence of 0s and 1s) without any interruption. • To be transmitted, bits must be encoded into a signals – electrical or optical. • The physical layer defined the type of representation ( how 0s and 1s are changed into signals). – Data rate: • The transmission rate – the number of bit per second- is also defined by the physical layer. • Repeater is a device of the physical layer. • Physical layer protocols are encoding techniques (RZ, NRZ, Manchester etc).
  • 14. Data Link Layer.Data Link Layer. • The data link layer is responsible for moving frames from one hop (node) to the next. • The major duties of the data link layer are: – Framing: • The data link layer divides the stream of bits steam from the network layer into manageable data units called frames. – Physical addressing: • If frame is to be distributed to different systems on the network, the data link layer adds a header to the frame to define the sender and receiver of the frame. • Physical address is the MAC address, which is hard coded into NIC and is of 48-bit represented by Hexadecimal format. – Flow control: • If the rate at which the data are absorbed by the receiver is less than the rate produced in the sender, the data link layer imposes a flow control mechanism to prevent overwhelming the receiver.
  • 15. Data Link Layer.Data Link Layer. – Error control: • The data link layer adds reliability to the physical layer by adding mechanism to detect and retransmit damaged or lost frames. • It also uses a mechanism to prevent duplication of frames. • Error control is normally achieved through a trailer added to the end of the frame. – Access control: • The data link layer protocol has to determine that how to get access to the link in case when two or more devices are connected to the same link. • The PDU of the data link layer is called frame. • Data Link layer protocols are CSMA/CD, CSMA/CA, Token Passing etc.
  • 18. Network Layer.Network Layer. • The network layer is responsible for the source -to- destination delivery of a packet possibly across multiple networks. – It two systems are connected to the same link, there is usually no need for a network layer. – However, if the two systems are attached to different networks with connecting devices between the networks, there is need for the network layer to accomplish the delivery. • The major duties performed by the network layer are:
  • 19. Network Layer.Network Layer. – Logical addressing: • The physical addressing implemented by the data link layer handles the addressing problem locally. • If a packet passes the network boundary, we need another addressing system to perform the source and destination delivery. • The network layer adds a header to the segment received from the transport layer containing the logical addresses of the sender and receiver. • Logical address is also called IP address which is of 32-bits and represented in decimal format. – Routing: • To route the packets from the source to destination in an internetwork, the router uses network layer information. • The PDU of network layer is called packet. • Network layer protocols are IP, IPX, AppleTalk.
  • 22. Transport Layer.Transport Layer. • The transport layer is responsible for process-to-process delivery of the entire message. • The major duties performed by the transport layer are: – Port address: • Computers often running several processes (running programs) at the same time: • Each running process open a logical port on the computer. • The transport layer header must therefore include a type of address called port address. • The network layer gets each packet to the correct computer, the transport layer get the entire message to the correct process on that computer. – Segmentation and reassembly: • A message received form the upper layers is divided into transmittable segments, each segment contains a sequence number. • These number enables the transport layer to reassemble the message correctly upon arrival at the destination and to identify and replace packets that were lost in the transmission.
  • 23. Transport Layer.Transport Layer. – Connection Control: • The transport layer can be either connectionless or connection oriented. • A connection oriented transport layer makes a logical connection with the transport layer at the destination machine first before delivering the packets. • After all the data are transferred, the connection is terminated. – Flow control: • Like data link layer, the transport layer is resposnsible for flow control. • However, flow control at this layer is performed end to end rather than across a single link (Hop-to-Hop). – Error control: • Like data link layer, the transport layer is responsible for error control. • However, error control at this layer is performed end to end rather than across a single link (Hop-to-Hop). • Transport layer 4 protocols include TCP (Transmission Control Protocol) and UDP (User Datagram Protocol).
  • 25. Reliable Process-to-Process Delivery.Reliable Process-to-Process Delivery.
  • 26. Session Layer.Session Layer. • The session layer defines how to establish, maintaining and terminates session between two communication hosts. • The major duties of the session layer are: – Synchronization: • For lengthy transaction (file transfer), the user may choose to establish synchronization points associated with the transfer. If a fault develops during a transaction, the dialog may be restarted at an agreed synchronization point. – Dialog control: • Session layer determines that which role is to be played at any given time by a host. – Duplex: Two-way simultaneous. – Half-Duplex: Two-way alternate. – Simplex: One-way. • Session layer protocols are SQL, ASP(AppleTalk Session Protocol), Remote Procedure Call (RPC), X Window System.
  • 28. Presentation Layer.Presentation Layer. • The presentation layer ensures that the information that the application layer of one system sends out is readable by the application layer of another system. • The major duties of the presentation layer are: – Format conversion: • Convert message from one format into another format .i.e. for ASCII to EBCEDIC or vice versa. – Compression. • Compress the message to take less bandwidth on the transmission media and less time for transmission. – Encryption: • Convert the message into a form that will not be readable by others. • Provides security to the message. • Protocols of the presentation layer are JPEG, MPEG, ASCII, EBCDIC etc.
  • 30. Application Layer.Application Layer. • The application layer is the OSI layer that is closest to the user. • It provides network services to the user’s applications (.i.e. spreadsheet etc). • The major duties are: – Mail service: • It provides network services for the email application. – File transfer and Access: • It provides network services for a user to access files on a remote computer, to retrieve files from a remote computer for use in the local computer and to manage or control files in a remote computer locally. – World Wide Web: • It provides network services to access the World Wide Web.
  • 32. Summary.Summary. • There was no standard for networks in the early days and as a result it was difficult for networks to communicate with each other. • The International Organisation for Standardisation (ISO) recognised this. and researched various network schemes, and in 1984 introduced the Open Systems Interconnection (OSI) reference model. • The OSI reference model has standards which ensure vendors greater compatibility and interoperability between various types of network technologies. • The OSI reference model organizes network functions into seven numbered layers. • Each layer provides a service to the layer above it in the protocol specification and communicates with the same layer’s software or hardware on other computers.
  • 33. Summary of the Layers.Summary of the Layers.