Professional Documents
Culture Documents
Computer Networking Layers Based On The OSI Model: Test Engineering and Management January 2021
Computer Networking Layers Based On The OSI Model: Test Engineering and Management January 2021
net/publication/348183262
CITATIONS READS
2 16,248
1 author:
Ahmad Fraihat
The World Islamic Science and Education University
5 PUBLICATIONS 3 CITATIONS
SEE PROFILE
All content following this page was uploaded by Ahmad Fraihat on 04 January 2021.
Ahmad Fraihat
Department of Computer System and Network
The World Islamic Sciences and Education University Amman, Jordan
ahmad.fraihat@wise.edu.jo.
.
Analyzing
Introduction to Computer Networks Organizing
Computer networks refers to a system of
Disseminating
computers that are interconnected in such a
way that the sharing of digital information is Concept of Intranet and Internet:
made possible.The computer network deals
Computer networking has led to the concept
with the information in such a way as to
of intranet and internet. Intranets and
maximize profit. This is achieved by
internets are internet technology-based
performing the following actions on the
given information: private networks which are utilized for the
purpose of business dealings. Intranet two computers to each other are still used.
technology has gained in reputation in the This is because wireless communication is
business world mainly because it enables a less tedious and a wireless network can
business to deal with the information in an cover a larger area, geographically, than a
improved and more efficient manner by cable network.
allowing it to:
Network Interface Device (NIC):
Collect the information
It is necessary for two physical devices that
Manage the information
need to be connected to have an NIC,
Disseminate the information
Network Interface Device, present to enable
What is a Network? communication between the two devices.
A network is essentially a collection of Switch:
physical devices such as computers which
are linked in such way that enables the Unlike a traditional switch, the switch in
exchange of information to and fro. The act computer networking allows the switching
of exchanging information between devices of information from one device to another.
in such a manner is termed as networking. Network Operating System (NOS)
Networking enables two or more physical Software:
devices that are separated geographically to
be able to communicate and exchange files Networking operating system software
and services. Some examples of such allows users to exchange files and devices
physical networks are: easily while working on two separate
devices.
→ CD-ROMs
→ Hard drives Types of Networks:
→ Fax-modems
A network can be divided on the basis of the
→ Printers, etc.
geographical areasit covers; hence, the
The aspects of a computer network are major categories of networks are as follows:
discussed under: Wireless networks
Number of Components: Local Area Network i.e. LANs
For the successful establishment of a Wide Area Network i.e. WANs
computer networks it is necessary to have at
least two physical devices present, such as Metropolitan Area Networks, i.e.
two computers or laptops, etc. MANs
i.e. the software being used. Layers can → Operates at higher speed due to
exchange information or communicate with smaller coverage area
only the layer directly above or below them. → Connectsa number of devices such as
personal computers and devices in
Computer networking layers constitute the
offices
following:
→ Enables sharing of the assets
Local Area Networks (LANs): This → Produces low delay
is the Link Layer → Ensures minimum errors
Internet Protocol (IP): This is the
A Local Area Network i.e. LAN constitutes
Internetwork Layer
thefollowing features:
Transmission Control Protocol
(TCP): This is the Transport Layer • Physical Links
Advantages of LANs:
Some of the reasons why LANs have
widespread use despite coverage limitations
are:
→ Cheaper to implement as compared
Figure 1 BUS Topology of LAN
to a Wide Area Network i.e. WAN
Mesh topology
Mesh topology is another type of point-to-
point link arrangement. However, this is not
considered one of the more practical
topologies. Despite that, this topology is
worth mentioning because of the advantages
Figure 2 RING Topology of LAN it offers in terms of high fault tolerance and
a remarkable capacity.
As is evident from the illustration, each
device is further connected to two other Cellular topology
devices, doubling the efficiency of this Cellular topology can be considered a hybrid
topology by twice compared to the bus of ring and star topology, as this topology
topology. also deals with point-to-point links with a
central operating device referred to as a
Star topology switch. What sets cellular topology apart
Star topology was introduced to overcome from star topology is that it divides the
the shortcomings of bus and ring topologies. entire geographical area it covers into cells
This is the commonly used topology and each cell represents a part of the total
nowadays. In this arrangement there is a network of devices.
central device and all other devices are
connected to it through point-to-point link. Internet Protocol (IP):
This central device is also referred to as a Internet protocol (IP) is a set of guidelines
hub, multiport repeater, or even a switch. that govern the terminals that may have
The hub has drop cables extending in every access to the internet technology. Computers
direction which enables it to form and the networks established between two or
connections with other devices. In this more computers, wirelessly, is also made
manner a star arrangement can also be
possible through the internet so internet
nested into other star arrangements.
protocol (IP) is necessary for computer
networking.
IP is the layer that resides directly above where a packet is lost, the TCP
thetransmission control protocol (TCP) retransmits it after a timeout.
layer. Both IP and TCP are essential → For retransmission purposes, each
elements of computer networking. IP deals arriving packet is acknowledged by
with assigning the addresses to the sender the receiver. This aids in alerting the
and the receiver, whereas TCP deals with sender of the lost packet.
the delivery of data from the sender to the → After receiver acknowledgment,
receiver. timeout and retransmission occurs.
→ In addition to this, if a packet arrives
The purpose of IP is to:
early, also referred to as out-of-order
Cater to the scaling problem posed packet, then this packet is held back
by the ethernet untilthe correct arrival time.
Support different types of LAN
• Connection-Orientation:
Support point-to-point links
→ Data can be sent directly by writing
Limitation of IP:
to a particular connection once the
The major limitation faced by IP is the
TCP connection is successfully
large-scale connectivity support, better
made.
termed as universal connectivity support.
→ Application-level addressing is not
This means allowing every type of LAN to
necessary.
connect to each other. The issue arises in the
→ The operating-system kernel
form of cumbersome forwarding tables that
manages TCP connections rather
can extend to enormous lengths based on the
than the application.
size of scaling. The larger the scaling, the
larger the forwarding tables. • Stream-Orientation:
3. Network Layer
→ Sends the data to its destination address or node.
→ Splits the data into several fragments
→ Delivers each fragment by a separate path
→ Reassembles the fragments
→ Reports delivery errors of each fragment
4. Transport Layer
→ Manages connections
→ Handles errors indeliveryof data
5. Session Layer
→ Starts, manages and stop the connection between nodes.
→ Checkpoints procedures
→ Adjourns procedures
→ Terminates procedures
→ Restarts procedures
6. Presentation Layer
→ Encryption of the data
→ Sendsdata to application layer
7. Application Layer
→ Interacts with software
Presentation
The OSI Model layers mentioned above are
The presentation layer is named so because
further classified into upper and lower layers
it “presents” data to the network. It is also
as under:
referred to as the syntax layer. It allows the
data transferfrom application layout to
Upper Layers:
network layout or similarly from network
Application layout to application layout. In other words,
The application layer is the topmost layer. In the presentation layer deals with the data
the OSI Model, this layer is considered the that is exempted from data representation on
“closest to the end user”. This is so because the application layer. An apt example of a
this is the layer that users directly interact presentation layer is the encryption of data
with and is visible to them. This layer or decryption of data, in order to make safe
enables the user to receive the information data transmission possible.
directly and the data is displayed as well.
Widely used examples of this are web Main functions of the presentation layer
browsers such as Google Chrome, Firefox, include:
Safari, etc.
Independence from Data
Everything in the application layer is Representation Differences: This is
application-specific. However, actual achieved by translating data
applications do not reside in this layer. fromapplication format to network
Rather, it creates a bridge between the format or vice versa. This action
applications and lower layers. This layer eliminates the possibility of any data
enables file transferring, e-mailing, and loss due to the difference in data
other network software services. In addition representation on the application
to this, tiered application architectures are level or network level.
also part of this layer. Transformation of Data: The act of
translating data into an application
The application layer has the following
format makes it acceptable for the
functionality:
application layer to process. Due to
Identifies communication partners this, no compatibility problems arise
Supports applications and makes transmission of data
Identifies quality of service across any network smoother.
Supports end-user processes Session Layer
Identifies any constraints on The session layer comes into play when the
data syntax need to create a session arises. A session is
created when two physical devices, such as a
computer or servers, need to communicate Flow Control: Ensuring the safe and
with one another. The major functions complete transfer of data.
carried out at the session layer are as
follows: Lower Layers:
Setup: Initiating a session to allow Network
The main functionality of the network layer
communication
is as follows:
Coordination: Allowing to and fro
transfer of information and Router Functionality: A router is a
specifying response time networking device that works by
Termination: Ending a session transferring data in the form of
packets and is able to connect two or
In other words, this layer deals with the
more networks together.
connection coordination between two
Packet Forwarding: It is the act of
devices. It involves the set-up procedure,
transferring data packets from the
establishment of a secure connection,
sender, i.e. the host to the receiver.
management of the connection, coordination
of conversation and exchange of Switching Technology: This allows
information, and termination of an transmission of data from node to
application on both ends at the end of a node by means of logical paths
session. which may also be referred to as
virtual circuits.
Transport
The transport layer ensures the complete and Other functions performed by the network
transparent transfer of data to and from end layer are:
systems or hosts. The coordination of this → Internetworking
data transfer is the main purpose of the → Error handling
transport layer. It deals with where the data → Addressing
goes, at what rate the data is transferred and → Packet sequencing
how much data is transmitted, and so on. → Congestion control
One of the majorly used transport layer
procedures is TCP, Transmission Control
Data Link
Protocol. TCP is situated at the top of the IP The data link layer of the OSI Model has the
layer. The main functions of the transport following functionality:
layer are:
Error correction of physical layer
End-to-end Error Recovery:
Encoding of data packets
Making sure that the data transmitted
Decoding of data packets
is also received at the user end and if
Node-to-node data transfer
not, then re-transmission and time
Transmission protocol knowledge
out procedure are carried out.
Frame synchronization
possible future problems but also empowers survey. Computer Networks, 81, pp.79-
users to be more self-reliant. 95.
9. Lifewire. 2020. The OSI Model
References Explained In Easy Steps. [online]
1. Dumas, M. and Schwartz, L., Available at:
2009. Principles Of Computer Networks <https://www.lifewire.com/layers-of-
And Communications. Upper Saddle the-osi-model-illustrated-818017>
River, NJ: Pearson Prentice Hall. [Accessed 26 October 2020].
2. Zatti, S. and Janson, P., 1988. 10. Trivedi, B., 2013. Computer Networks.
Interconnecting OSI and non-OSI New Delhi, India: Oxford University
networks using an integrated directory Press.
service. Computer Networks and ISDN
Systems, 15(4), pp.269-283.
3. Melendez, W. and Petersen, E., 1986.
The upper layers of the ISO/OSI
reference model (part I). Computer
Standards & Interfaces, 5(1), pp.13-46.
4. Anyfreepapers.com. 2020. Free IP
Protocol Research Paper Sample |
Anyfreepapers.Com. [online] Available
at: <https://anyfreepapers.com/free-
research-papers/internet-protocol-
research-paper.html> [Accessed 26
October 2020].
5. Journals, R., 2020. THE OSI MODEL:
OVERVIEW ON THE SEVEN LAYERS
OF COMPUTER NETWORKS. [online]
Academia.edu. Available at:
<https://www.academia.edu/12259737/
THE_OSI_MODEL_OVERVIEW_ON
_THE_SEVEN_LAYERS_OF_COMP
UTER_NETWORKS> [Accessed 26
October 2020].
6. Dordal, P., n.d. An Introduction To
Computer Networks.Department of
Computer Science Loyola University
Chicago.
7. Webopedia.com. 2020. The 7 Layers Of
The OSI Model - Webopedia Study
Guide. [online] Available at:
<https://www.webopedia.com/quick_ref
/OSI_Layers.asp> [Accessed 26 October
2020].
8. Farhady, H., Lee, H. and Nakao, A.,
2015. Software-Defined Networking: A