Ch No. 2 notes
Ch No. 2 notes
The Open Systems Interconnection (OSI) Reference Model is a conceptual framework used to
understand and implement standard communication protocols. It divides network
communication into seven layers, each with distinct functions.
1. Physical Layer
The Physical Layer is the first and lowest layer in the OSI (Open Systems
Interconnection) reference model. It is responsible for the physical connection between
devices and deals with the transmission and reception of raw, unstructured data over a
physical medium. Below are its main functions:
1. Bit-by-Bit Transmission
• Converts data into electrical, optical, or radio signals (depending on the medium) for
transmission.
• Ensures the raw bits are transmitted accurately from the sender to the receiver.
• Defines the physical connection medium, such as cables (coaxial, twisted pair, fiber
optics) or wireless communication.
• Manages characteristics of the medium, like type and length, and specifies its
compatibility.
• Converts digital data into physical signals (e.g., voltage, light pulses) suitable for the
medium.
5. Synchronization
• Maintains proper timing between sender and receiver to ensure bits are transmitted and
interpreted correctly.
6. Line Configuration
7. Topology Design
• Supports different network topologies (e.g., bus, star, ring, mesh) for data transmission.
8. Transmission Mode
• Detects and reports physical issues like signal distortion, noise, and attenuation.
• Defines hardware interfaces such as connectors, pins, voltage levels, and data formats.
The Physical Layer essentially provides the foundation for all higher layers by handling
the physical aspects of data transmission. It ensures that the raw bits can be
transported successfully, regardless of the underlying physical medium.
The Data Link Layer is the second layer in the OSI reference model and plays a crucial
role in ensuring reliable data transmission across a physical network.
1. Framing
• The Data Link Layer divides the data received from the Network Layer into manageable
units called frames.
• These frames are used to organize data for easier transmission and detection of errors.
• Ensures data integrity by detecting and correcting errors that may occur during
transmission.
• Techniques like cyclic redundancy check (CRC) and checksum are commonly used.
3. Flow Control
• Prevents the sender from overwhelming the receiver by regulating the flow of data.
• Techniques like stop-and-wait and sliding window are employed for flow control.
4. Addressing
• Provides physical addressing using MAC (Media Access Control) addresses to uniquely
identify devices on a network.
• Ensures that data is delivered to the correct device within a local network.
5. Access Control
• Manages collisions and ensures fair access using protocols like CSMA/CD (Carrier
Sense Multiple Access with Collision Detection) or CSMA/CA (Collision Avoidance).
6. Error Reporting
• Notifies higher layers of errors or issues that cannot be resolved at the Data Link Layer.
7. Frame Synchronization
• Ensures that the receiver can identify the beginning and end of each frame.
8. Link Management
By performing these functions, the Data Link Layer ensures error-free and efficient
communication over a physical network medium.
3. Network Layer
The Network Layer is the third layer of the OSI (Open Systems
Interconnection) reference model and is responsible for enabling data
transmission between different networks. Its primary functions include:
2. Routing
• Determines the best path for data packets to travel from the source to the
destination.
• Uses routing algorithms and protocols like RIP, OSPF, and BGP to decide
optimal paths.
• Splits large data packets into smaller fragments to fit the Maximum Transmission Unit
(MTU) of different networks.
• Detects and manages errors related to packet delivery (e.g., unreachable destinations).
• Uses protocols like ICMP (Internet Control Message Protocol) for error reporting (e.g.,
"Destination Unreachable" messages in ping).
7. Congestion Control
• Manages network traffic to prevent overload and ensure smooth data flow.
The Network Layer plays a crucial role in ensuring data reaches the correct
destination across different networks, making it essential for the functioning of
the internet and large-scale communication networks.
4. Transport Layer
The Transport Layer is the fourth layer of the OSI (Open Systems
Interconnection) reference model and is responsible for end-to-end
communication, error detection, and flow control between devices.
Functions of the Transport Layer:
• Breaks down large messages into smaller segments for efficient transmission.
2. End-to-End Communication
3. Connection Management
• Supports both:
4. Flow Control
• Uses methods like Sliding Window Protocol to ensure the sender does not overwhelm
the receiver.
5. Error Control
5. Session Layer
The Session Layer (Layer 5) of the OSI Reference Model is responsible for
establishing, managing, and terminating communication sessions between
applications. It ensures that data exchanges between devices are properly
synchronized and organized.
6. Presentation Layer
The Presentation Layer (Layer 6) of the OSI Reference Model is responsible for
the formatting, encryption, and compression of data exchanged between
applications. It ensures that data is in a readable and transferable format across
different systems.
Functions of the Presentation Layer
1. Data Translation
o Converts data into a format that can be understood by the receiving
system.
o Handles character encoding (e.g., ASCII to EBCDIC) and data
conversion (e.g., integer to floating point).
2. Data Encryption & Decryption
o Provides security by encrypting data before transmission and
decrypting it upon reception.
o Common encryption protocols: SSL (Secure Sockets Layer), TLS
(Transport Layer Security).
3. Data Compression & Decompression
o Reduces the size of data to optimize bandwidth usage.
o Used in multimedia applications (e.g., JPEG for images, MP3 for
audio, MPEG for videos).
4. Character Encoding & Code Conversion
o Converts character sets (e.g., Unicode, ASCII) to maintain
compatibility between systems.
5. Serialization (Data Structuring)
o Converts complex data structures (like objects in programming) into
a storable and transmittable format (e.g., XML, JSON).
Examples of Protocols Used in the Presentation Layer
7. Application Layer
The Application Layer (Layer 7) of the OSI Reference Model is the topmost
layer responsible for providing network services to end-user applications. It acts
as a bridge between the user and the network, ensuring communication
between applications running on different systems.
Functions of the Application Layer
1. Network Virtual Terminal
o Allows users to log in to remote systems as if they were directly
connected.
o Example: Telnet (remote login).
2. File Transfer, Access, and Management (FTAM)
o Facilitates file transfer and management between systems.
o Example: FTP (File Transfer Protocol), TFTP (Trivial File Transfer
Protocol).
3. Mail Services
o Enables email communication between users.
o Example: SMTP (Simple Mail Transfer Protocol), POP3 (Post Office
Protocol), IMAP (Internet Message Access Protocol).
4. Directory Services
o Provides distributed database services for managing user and system
information.
o Example: LDAP (Lightweight Directory Access Protocol).
5. Remote Access Services
o Allows users to remotely access applications and data over a
network.
o Example: RDP (Remote Desktop Protocol).
6. Network Resource Sharing
o Supports access to shared resources like printers, databases, and
files.
o Example: NFS (Network File System), SMB (Server Message
Block).
7. Web Services and Browsing
o Provides protocols for web communication and data retrieval.
o Example: HTTP (Hypertext Transfer Protocol), HTTPS (Secure
HTTP).
Examples of Protocols Used in the Application Layer
The TCP/IP Reference Model is a practical framework for Internet-based communications. It has
four layers:
Network Access Layer
Internet Layer
Transport Layer
Application Layer
1. Application Layer
2. Transport Layer
3. Internet Layer
The Network Access Layer (also called the Link Layer) is the lowest layer of the
TCP/IP model. It is responsible for the physical transmission of data over
network hardware like cables, Wi-Fi, and switches.
1 Data Framing
• Adds a header (containing MAC addresses) and a trailer (for error detection).
2 MAC Addressing
• Uses Media Access Control (MAC) addresses to identify devices within a local network
(LAN).
• Every network device has a unique MAC address assigned by the manufacturer.
• Works with network hardware like Ethernet cables, fiber optics, Wi-Fi, and modems.
5 Media Access Control (MAC) Mechanisms
• Uses protocols like CSMA/CD (Ethernet) and CSMA/CA (Wi-Fi) to avoid conflicts in
data transmission.
• Translates IP addresses into MAC addresses using ARP (Address Resolution Protocol).
• Ensures that packets reach the correct physical device in a local network.
Technology/Protocol Function
5. The router/switch receives the frame, checks the MAC address, and forwards it to the
correct device.
Here is a comparison between the OSI (Open Systems Interconnection) Model and the
TCP/IP (Transmission Control Protocol/Internet Protocol) Model:
Number of
7 Layers 4 Layers
Layers
Combines application,
Application Defines application layer separately
presentation, and session into a
Support from presentation and session layers
single layer
Key Differences:
2. Usage: OSI is a theoretical model for learning, while TCP/IP is practical and widely
used in real-world networks.
3. Application Layer: OSI model has separate Application, Presentation, and Session
layers, whereas TCP/IP combines them into one Application layer.
4. Flexibility: OSI strictly follows layer separation, while TCP/IP is more flexible in how
protocols interact.
The TCP/IP Protocol Suite is a collection of protocols for the Internet. Key protocols include:
2.4 Addressing
1. Physical Addresses:
o Example: 00:1A:2B:3C:4D:5E.
2. Logical Addresses:
o Example: 192.168.1.1.
3. Port Addresses:
4. Specific Addresses:
Summary
• The OSI and TCP/IP models are essential for understanding network protocols.
• IP addressing methods (classful and classless) are critical for efficient IP management.