You are on page 1of 42

Data

communication
s
LECTURE - 3
Outline
 Importance of Layering

 Introduction to OSI Model

 Introduction to TCP/IP Model

 TCP/IP Addressing

01
Importance of Layering
Change: When changes are made to one layer, the impact on the other layers is
minimized. If the model consists of a single, all-encompassing layer, any change
affects the entire model.

Design: A layered model defines each layer separately. If the interconnections


between layers remain constant, protocol designers can specialize in one area
(layer) without worrying about how any new implementations affect other layers.

Learning: The layered approach reduces a very complex set of topics, activities,
and actions into several smaller, interrelated groupings. This makes learning and
understanding the actions of each layer and the model generally much easier.

02
Importance of Layering
Troubleshooting: The protocols, actions, and data contained in each layer of the
model relate only to the purpose of that layer. This enables troubleshooting
efforts to be pinpointed on the layer that carries out the suspected cause of the
problem.

Standards: Probably the most important reason for using a layered model is that
it establishes a prescribed guideline for interoperability between the various
vendors developing products that perform different data communications tasks.
Remember, though, that layered models, including the OSI model, provide only
a guideline and framework, not a rigid standard that manufacturers can use when
creating their products.

03
History of OSI Model
 In 1978, the International Standards Organization (ISO) began to develop its
OSI framework architecture.

 OSI has two major components: an abstract model of networking, called the
Basic Reference Model or seven-layer model, and a set of specific protocols.

 The concept of a 7-layer model was provided by the work of Charles Bachman,
then of Honeywell.

  Various aspects of OSI design evolved from experiences with the Advanced
Research Projects Agency Network (ARPANET) and the fledgling Internet.

04
Introduction to OSI Model
 The Open System Interconnection Reference Model (OSI Reference
Model or OSI Model) is an abstract description for layered communications
and computer network protocol design.

 It divides network architecture into seven layers which, from top to bottom,
are the Application, Presentation, Session, Transport, Network, Data Link,
and Physical Layers. It is therefore often referred to as the OSI Seven Layer
Model.

 The mnemonic for remembering the seven layers in OSI Model is


 Going from layer 1 to 7: Please Do Not Throw Sausage Pizza Away
 Going from layer 7 to 1: All People Seem To Need Data Processing
05
Introduction to OSI Model
OSI Model
Data unit Layer Function
7. Application Network process to application
Data representation, encryption and
Data 6. Presentation
Host decryption
layers 5. Session Interhost communication
End-to-end connections and reliability,
Segments 4. Transport
Flow control
Path determination and logical
Packet 3. Network
Media addressing
layers Frame 2. Data Link Physical addressing
Bit 1. Physical Media, signal and binary transmission
06
Introduction to OSI Model
 The process of breaking up the functions or tasks of networking into layers
reduces complexity.
 Each layer provides a service to the layer above it in the protocol specification.
 Each layer communicates with the same layer’s software or hardware on other
computers.
 The lower 4 layers (transport, network, data link and physical —Layers 4, 3, 2,
and 1) are concerned with the flow of data from end to end through the
network.
 The upper three layers of the OSI model (application, presentation and session
—Layers 7, 6 and 5) are orientated more toward services to the applications.
 Data is Encapsulated with the necessary protocol information as it moves down
the layers before network transmission.

07
08
An exchange using the OSI model
09
Description of different layers of OSI Model

10
Physical Layer
 The Physical Layer defines the electrical and physical specifications for
devices. It defines the relationship between a device and a physical medium.
 This includes the layout of pin, voltages, cable specification, hubs, repeaters, 
network adapters, host bus adapters, and more.
 The major functions and services performed by the Physical Layer are:
 Establishment and termination of a connection to a communication
medium.
 Participation in the process whereby the communication resources are
effectively shared among multiple users. For example, flow control.
 Modulation, or conversion between the representation of digital data in
user equipment and the corresponding signals transmitted over a
communications channel. These are signals operating over the physical
cabling (such as copper and optical fiber) or over a radio link. 11
The physical layer is responsible for movements of
individual bits from one hop (node) to the next.
12
Physical Layer is also concerned with the followings:

 Physical characteristics of interfaces and medium: The physical layer defines


the characteristics of the interface between the devices and the transmission
medium. It also defines the type of transmission medium.
 Representation of bits: The physical layer data consists of a stream of bits
(sequence of 0s or 1s) with no interpretation. To be transmitted, bits must be
encoded into signals-electrical or optical. The physical layer defines the type
of encoding (how 0s and 1s are changed to signals).
 Data rate: The transmission rate-the number of bits sent each second is also
defined by the physical layer. In other words, the physical layer defines the
duration of a bit, which is how long it lasts.
 Synchronization of bits: The sender and receiver not only must use the same
bit rate but also must be synchronized at the bit level. In other words, the
sender and the receiver clocks must be synchronized. 13
Physical Layer is also concerned with the followings:

 Line configuration: The physical layer is concerned with the connection of


devices to the media. In a point-to-point configuration, two devices are
connected through a dedicated link. In a multipoint configuration, a link is
shared among several devices.
 Physical topology: The physical topology defines how devices are connected
to make a network. Devices can be connected by using a mesh topology (every
device is connected to every other device), a star topology (devices are
connected through a central device), a ring topology (each device is connected
to the next, forming a ring), a bus topology (every device is on a common
link), or a hybrid topology (this is a combination of two or more topologies).

14
Physical Layer is also concerned with the followings:

 Transmission mode. The physical layer also defines the direction of


transmission between two devices: simplex, half-duplex, or full-duplex. In
simplex mode, only one device can send; the other can only receive. The
simplex mode is a one-way communication. In the half-duplex mode, two
devices can send and receive, but not at the same time. In a full-duplex (or
simply duplex) mode, two devices can send and receive at the same time.

15
Data Link Layer
 The Data Link Layer provides the functional and procedural means to transfer
data between network entities and to detect and possibly correct errors that
may occur in the Physical Layer.
 Originally, this layer was intended for point-to-point and point-to-multipoint
media, characteristic of wide area media in the telephone system.
 The data link layer is divided into two sub-layers by IEEE.
 One is Media Access Control (MAC) and another is Logical Link Control
(LLC).
 Mac is lower sub-layer, and it defines the way about the media access transfer,
such as CSMA / CD /CA (Carrier Sense Multiple Access /Collision
Detection /Collision Avoidance)
 LLC provides data transmission method in different network. It will re-
package date and add a new header. 16
The data link layer is responsible for moving
frames from one hop (node) to the next
17
Data-Link Layer is also concerned with the followings:

 Framing: The data link layer divides the stream of bits received from the
network layer into manageable data units called frames.
 Physical addressing: If frames are to be distributed to different systems on the
network, the data link layer adds a header to the frame to define the sender
and/or receiver of the frame. If the frame is intended for a system outside the
sender’s network, the receiver address is the address of the device that
connects the network to the next one.
 Flow control: If the rate at which the data are absorbed by the receiver is less
than the rate at which data are produced in the sender, the data link layer
imposes a flow control mechanism to avoid overwhelming the receiver.

18
Data-Link Layer is also concerned with the followings:

 Error control: The data link layer adds reliability to the physical layer by
adding mechanisms to detect and retransmit damaged or lost frames. It also
uses a mechanism to recognize duplicate frames. Error control is normally
achieved through a trailer added to the end of the frame.
 Access control: When two or more devices are connected to the same link,
data link layer protocols are necessary to determine which device has control
over the link at any given time.

19
Network Layer
 Implements routing of frames (packets) through the network.

 Defines the most optimum path the packet should take from the source to the
destination
 Defines logical addressing so that any endpoint can be identified.
 Handles congestion in the network.
 Facilitates interconnection between heterogeneous networks
(Internetworking).
 The network layer also defines how to fragment a packet into smaller packets
to accommodate different media.

20
Transport Layer
 Purpose of this layer is to provide a reliable mechanism for the exchange of
data between two processes in different computers.
 Ensures that the data units are delivered error free.
 Ensures that data units are delivered in sequence.
 Ensures that there is no loss or duplication of data units.
 Provides connectionless or connection-oriented service.
 Provides for the connection management.
 Multiplex multiple connection over a single channel.

21
Session Layer
 Session layer provides mechanism for controlling the dialogue between the
two end systems. It defines how to start, control and end conversations (called
sessions) between applications.
 This layer requests for a logical connection to be established on an end-user’s
request.
 Any necessary log-on or password validation is also handled by this layer.
 Session layer is also responsible for terminating the connection.
 This layer provides services like dialogue discipline which can be full duplex
or half duplex.
 Session layer can also provide check-pointing mechanism such that if a failure
of some sort occurs between checkpoints, all data can be retransmitted from
the last checkpoint.
22
Presentation Layer
 The Presentation Layer establishes a context between Application Layer
entities, in which the higher-layer entities can use different syntax and
semantics, so the presentation service understands both and the mapping
between them.
 This layer provides independence from differences in data representation (e.g.,
encryption) by translating from application to network format, and vice versa.
 This layer formats and encrypts data to be sent across a network, providing
freedom from compatibility problems.
 It is sometimes called the syntax layer.

23
Application Layer
  The application layer is the OSI layer closest to the end user, which means that
both the OSI application layer and the user interact directly with the software
application.
 Application layer functions typically include:
 identifying communication partners,
 determining resource availability,
 synchronizing communication.
  Some examples of application layer implementations include
 Hypertext Transfer Protocol (HTTP)
 File Transfer Protocol (FTP)
 Simple Mail Transfer Protocol (SMTP)

24
Introduction to TCP/IP Model
 The Internet Protocol Suite (commonly known as TCP/IP) is the set
of communications protocols used for the Internet and other similar
networks.
 It is named from two of the most important protocols in it:
 the Transmission Control Protocol (TCP) and
 the Internet Protocol (IP), which were the first two networking
protocols defined in this standard.

25
TCP/IP Model in relation to OSI Model:

26
Description of TCP/IP Model

27
 TCP/IP is a hierarchical protocol made up of interactive modules, each of
which provides a specific functionality; however, the modules are not
necessarily interdependent.
 Whereas the OSI model specifies which functions belong to each of its
layers, the layers of the TCP/IP protocol suite contain relatively independent
protocols that can be mixed and matched depending on the needs of the
system. At the transport layer, TCP/IP defines three protocols: Transmission
Control Protocol (TCP), User Datagram Protocol (UDP), and Stream
Control Transmission Protocol (SCTP).
 At the network layer, the main protocol defined by TCP/IP is the
Internetworking Protocol (IP); there are also some other protocols that
support data movement in this layer.

28
Physical Layer & Data-Link Layer
 At the physical and data link layers, TCP/IP does not define any
specific protocol.

 It supports all the standard and proprietary protocols.

 A network in a TCP/IP internetwork can be a local-area network or


a wide-area network.

29
Network Layer
 At the network layer (or, more accurately, the internetwork layer), TCP/IP
supports the Internetworking Protocol. IP, in turn, uses four supporting
protocols: ARP, RARP, ICMP, and IGMP.

Internetworking Protocol (IP):

 The Internetworking Protocol (IP) is the transmission mechanism used by the


TCP/IP protocols. It is an unreliable and connectionless protocol.
 IP assumes the unreliability of the underlying layers and does its best to get a
transmission through to its destination, but with no guarantees.
30
 IP transports data in packets called datagrams, each of which is transported
separately. Datagrams can travel along different routes and can arrive out of
sequence or be duplicated.
 IP does not keep track of the routes and has no facility for reordering
datagrams once they arrive at their destination.
 The limited functionality of IP allows the user to add only those facilities
necessary for a given application and thereby allows for maximum efficiency.

Address Resolution Protocol:


 The Address Resolution Protocol (ARP) is used to associate a logical address
with a physical address.
31
 On a typical physical network, such as a LAN, each device on a link is
identified by a physical or station address, usually imprinted on the network
interface card (NIC).

Reverse Address Resolution Protocol:

 The Reverse Address Resolution Protocol (RARP) allows a host to discover


its Internet address when it knows only its physical address.
 It is used when a computer is connected to a network for the first time or
when a diskless computer is booted.

32
Internet Control Message Protocol:

 The Internet Control Message Protocol (ICMP) is a mechanism used by hosts


and gateways to send notification of datagram problems back to the sender.
 ICMP sends query and error reporting messages.

Internet Group Message Protocol:

 The Internet Group Message Protocol (IGMP) is used to facilitate the


simultaneous transmission of a message to a group of recipients.

33
Transport Layer
The transport layer was represented in TCP/IP by two protocols:

User Datagram Protocol:

 The User Datagram Protocol (UDP) is the simpler of the two standard TCP/IP
transport protocols.

 It is a process-to-process protocol that adds only port addresses, checksum


error control, and length information to the data from the upper layer.

34
Transmission Control Protocol:
 The Transmission Control Protocol (TCP) provides full transport-layer
services to applications.
 TCP is a reliable stream transport protocol. The term stream, in this context,
means connection-oriented: A connection must be established between both
ends of a transmission before either can transmit data.
 At the sending end of each transmission, TCP divides a stream of data into
smaller units called segments.
 Each segment includes a sequence number for reordering after receipt,
together with an acknowledgment number for the segments received.
Segments are carried across the internet inside of IP datagrams.
 At the receiving end, TCP collects each datagram as it comes in and reorders
the transmission based on sequence numbers.
35
Application Layer
The application layer in TCP/IP is equivalent to the combined session,
presentation, and application layers in the OSI model.

36
Physical Address, also known as the link address, is
the address of a node as defined by its LAN or WAN.
It is included in the frame used by the data link layer.
It is the lowest-level address.
The physical addresses have authority over the
network (LAN or WAN). The size and format of
these addresses vary depending on the network. For
example, Ethernet uses a 6-byte (48-bit) physical
address that is imprinted on the network interface
card (NIC).

Addresses in the TCP/IP Protocol Suite


37
Logical Address is generated by CPU while a
program is running. A universal addressing system is
needed in which each host can be identified uniquely,
regardless of the underlying physical network.
A logical address in the Internet can be a 32-bit
address (IPv4) or a 128-bit address (IPv6) that can
uniquely define a host connected to the Internet. No
two publicly addressed and visible hosts on the
Internet can have the same IP address.

Addresses in the TCP/IP Protocol Suite


38
Computers are devices that can run multiple
processes at the same time. The end objective of
Internet communication is a process communicating
with another process. We need a method to label the
different processes. In other words, they need
addresses. In the TCP/IP architecture, the label
assigned to a process is called a Port Address. A
port address in TCP/IP is 16 bits in length.

Addresses in the TCP/IP Protocol Suite


39
Some applications have user-friendly addresses
that are designed for that specific address.
Examples include the e-mail address (for example,
forouzan@fhda.edu) and the Universal Resource
Locator (URL) (for example, www.mhhe.com).
The first defines the recipient of an e-mail, the
second is used to find a document on the World
Wide Web. These addresses are called
Application-Specific Address.

Addresses in the TCP/IP Protocol Suite


40
Thank You

You might also like