The Osi Model and TCP Ip Protocol Suite
The Osi Model and TCP Ip Protocol Suite
com
Chapter 2.
The OSI Model and TCP IP Protocol Suite
1|Page
www.Myitweb.Weebly.com
2|Page
www.Myitweb.Weebly.com
3|Page
www.Myitweb.Weebly.com
4|Page
www.Myitweb.Weebly.com
www.Myitweb.Weebly.com
www.Myitweb.Weebly.com
3. Network Layer
The network layer is responsible for the source-to-destination delivery of a
packet, possibly across multiple networks (links).
If two systems are connected to the same link, there is usually no need for
a network layer. However, if the two systems are attached to different
networks (links) with connecting devices between the networks (links),
there is often a need for the network layer to accomplish source-todestination delivery.
Other responsibilities of the network layer include the following:
1 Logical addressing
a. The physical addressing(MAC Address) implemented by the data link
layer handles the addressing problem locally.
b. If a packet passes the network boundary, we need another
addressing system to help distinguish the source and destination
systems.
c. The network layer adds a header to the packet coming from the
upper layer that, among other things, includes the logical
addresses(IP Addresses) of the sender and receiver.
2 Routing
a. When independent networks or links are connected together to
create internetworks (network of networks) or a large network, the
connecting devices (called routers or switches) route or switch the
packets to their final destination.
b. One of the functions of the network layer is to provide this
mechanism.
7|Page
www.Myitweb.Weebly.com
4. Transport Layer
The transport layer is responsible for process-to-process delivery of the
entire message.
The transport layer, ensures that the whole message arrives intact and in
order, overseeing both error control and flow control at the source-todestination level.
Other responsibilities of the transport layer include the following:
1 Service-point addressing :
a. Computers often run several programs at the same time. For this
reason, source-to-destination delivery means delivery not only from
one computer to the next but also from a specific process (running
program) on one computer to a specific process (running program)
on the other.
b. The transport layer header must therefore include a type of address
called a service-point address (or port address).
2 Segmentation and reassembly
a. A message is divided into transmittable segments, with each segment
containing a sequence number.
b. These numbers enable the transport layer to reassemble the
message correctly upon arriving at the destination and to identify
and replace packets that were lost in transmission.
3 Connection control
a. The transport layer can be either connectionless or connectionoriented.
8|Page
www.Myitweb.Weebly.com
5. Session Layer
The session layer is the network dialog controller. It establishes, maintains,
and synchronizes the interaction between communicating systems.
Specific responsibilities of the session layer include the following:
1 Dialog control
The session layer allows two systems to enter into a dialog. It allows
the communication between two processes to take place in either
half duplex (one way at a time) or full-duplex (two ways at a time)
mode.
9|Page
www.Myitweb.Weebly.com
2 Synchronization
The session layer allows a process to add checkpoints
(synchronization points) into a stream of data. For example, if a
system is sending a file of 2,000 pages, it is advisable to insert
checkpoints after every 100 pages to ensure that each 100-page unit
is received and acknowledged independently.
6. Presentation Layer
The presentation layer is concerned with the syntax and semantics of the
information exchanged between two systems.
Specific responsibilities of the presentation layer include the following
1 Translation
a. The processes (running programs) in two systems are usually
exchanging information in the form of character strings, numbers,
and so on.
b. The information should be changed to bit streams before being
transmitted. Because different computers use different encoding
systems, the presentation layer is responsible for interoperability
between these different encoding methods.
c. The presentation layer at the sender changes the information from
its sender-dependent format into a common format.
d. The presentation layer at the receiving machine changes the
common format into its receiver-dependent format.
10 | P a g e
www.Myitweb.Weebly.com
2 Encryption
a. To carry sensitive information a system must be able to assure
privacy.
b. Encryption means that the sender transforms the original
information to another form and sends the resulting message out
over the network.
c. Decryption reverses the original process to transform the message
back to its original form.
3 Compression
a. Data compression reduces the number of bits contained in the
information.
b. Data compression becomes particularly important in the
transmission of multimedia such as text, audio, and video.
7. Application Layer
The application layer enables the user, whether human or software, to
access the network.
It provides user interfaces and support for services such as electronic mail,
remote file access and transfer, shared database management, and other
types of distributed information services.
Specific services provided by the application layer include the following:
1 Network virtual terminal
a. A network virtual terminal is a software version of a physical terminal
and allows a user to log on to a remote host.
11 | P a g e
www.Myitweb.Weebly.com
www.Myitweb.Weebly.com
13 | P a g e
www.Myitweb.Weebly.com
14 | P a g e
www.Myitweb.Weebly.com
1. Physical Layer
1. TCP/IP does not define any specific protocol for the physical layer rather it
supports all of the standard and proprietary protocols.
2. The communication is between two hops or nodes which can be either a
computer or router.
3. The unit of communication is a single bit and when the connection is
established between the two nodes, a stream of bits is flowing between
them.
4. The physical layer, however, treats each bit individually.
5. In above figure we are assuming that the two computers have discovered
that the most efficient way to communicate with each other is via routers
R1, R3, and R4.
6. If a node is connected to n links, it needs n physical-layer protocols, one for
each link, i.e..different links may use different physical-layer protocols.
15 | P a g e
www.Myitweb.Weebly.com
7. In above representation each computer involves with only one link; each
router involves with only two links.
8. The journey of bits between computer A and computer B is made of four
independent short trips.
a. Computer A sends each bit to router R1 in the format of the protocol
used by link 1.
b. Router 1 sends each bit to router R3 in the format dictated by the
protocol used by link 3. And so on.
9. The layer connected to link 1 receives bits according to the format of the
protocol used by link 1; the layer connected to link 3 sends bits according to
the format of the protocol used by link 3.
10.The responsibility of the physical layer, in addition to delivery of bits,
matches with what mentioned for the physical layer of the OSI model, but it
mostly depends on the underlying technologies that provide links.
16 | P a g e
www.Myitweb.Weebly.com
1. TCP/IP does not define any specific protocol for the data link layer either, it
supports all of the standard and proprietary protocols.
2. At this level, the communication is also between two hops or nodes, the
unit of communication however, is a packet called a frame.
3. A frame is a packet that encapsulates the data received from the network
layer with an added header and sometimes a trailer.
4. The head, among other communication information, includes the source
and destination of frame, the destination address is needed to define the
right recipient of the frame because many nodes may have been connected
to the link while the source address is needed for possible response or
acknowledgment as may be required by some protocols.
5. When the frame is received by router R1, this router passes the frame to
the data link layer protocol shown at the left.
6. Then the frame is opened, the data are removed, the data are then passed
to the data link layer protocol shown at the right to create a new frame to
be sent to the router R3, the reason is that the two links, link 1 and link 3,
may be using different protocols and require frames of different formats.
7. Note also that the figure does not show the physical movement of frames;
the physical movement happens only at the physical layer. The two nodes
communicate logically at the data link layer, not physically. In other words,
the data link layer at router R1 only thinks that a frame has been sent
directly from the data link layer at computer A. What is sent from A to R1 is
a stream of bits from one physical layer to another. Since a frame at A is
transformed to a stream of bits, and the bits at R1 are transformed to a
frame, it gives this impression to the two data link layer that a frame has
been exchanged.
17 | P a g e
www.Myitweb.Weebly.com
3 .Network Layer
1. At the network layer (or, more accurately, the internetwork layer), TCP/IP
supports the Internet Protocol (IP).
2. The Internet Protocol (IP) is the transmission mechanism used by the
TCP/IP protocols, IP transports data in packets called datagrams, each of
which is transported separately.
3. Datagrams can travel along different routes and can arrive out of sequence
or be duplicated, IP does not keep track of the routes and has no facility for
reordering datagrams once they arrive at their destination.
4. Communication at the network layer is end to end while the
communication at the other two layers are node to node.
5. The datagram started at computer A is the one that reaches computer B,
the network layers of the routers can inspect the source and destination of
the packet for finding the best route, but they are not allowed to change
the contents of the packet.
6. Of course, the communication is logical(using IP), not physical. Although the
network layer of computer A and B think that they are sending and
18 | P a g e
www.Myitweb.Weebly.com
4. Transport Layer
1. All nodes in a network need to have the network layer, only the two end
computers need to have the transport layer.
2. The network layer is responsible for sending individual datagrams from
computer A to computer B while the transport layer is responsible for
delivering the whole message, which is called a segment, a user datagram,
or a packet, from A to B.,A segment may consist of a few or tens of
datagrams.
3. Since the Internet defines a different route for each datagram, the
datagrams may arrive out of order and may be lost.
19 | P a g e
www.Myitweb.Weebly.com
4. The transport layer at computer B needs to wait until all of these datagrams
to arrive, assemble them and make a segment out of them.
5. The two transport layers only think that they are communicating with each
other using a segment; the communication is done through the physical
layer and the exchange of bits.
6. Traditionally, the transport layer was represented in the TCP/IP suite by
two protocols: User Datagram Protocol (UDP) and Transmission Control
Protocol (TCP). A new protocol called Stream Control Transmission
Protocol (SCTP) has been introduced in the last few years.
7. The unit of communication at the transport layer is a segment, user
datagram, or a packet, depending on the specific protocol used in this
layer.
5. Application Layer
20 | P a g e
www.Myitweb.Weebly.com
2. The application layer allows a user to access the services of our private
internet or the global Internet.
3. Many protocols are defined at this layer to provide services such as
electronic mail, file transfer, accessing the World Wide Web, and so on.
4. The communication at the application layer, like the one at the transport
layer, is end to end. A message generated at computer A is sent to
computer B without being changed during the transmission.
5. The unit of communication at the application layer is a message.
ADDRESSING
Four levels of addresses are used in an internet employing the TCP/IP
protocols:
1.
2.
3.
4.
Physical address
Logical address
Port address
Application-specific address.
1. Physical Addresses
a. The physical address, also known as the link address, is the address
of a node as defined by its LAN or WAN.
21 | P a g e
www.Myitweb.Weebly.com
22 | P a g e
www.Myitweb.Weebly.com
3. Port Addresses
a. The IP address and the physical address are necessary for a quantity
of data to travel from a source to the destination host.
b. However, arrival at the destination host is not the final objective of
data communications on the Internet, a system that sends nothing
but data from one computer to another is not complete.
c. Today, computers are devices that can run multiple processes at the
same time, hence the end objective of Internet communication is a
process communicating with another process.
d. For example, computer A can communicate with computer C by
using TELNET. At the same time, computer A communicates with
computer B by using the File Transfer Protocol (FTP).
e. For these processes to receive data simultaneously, we need a
method to label the different processes. In other words, they need
addresses.
f. In the TCP/IP architecture, the label assigned to a process is called a
port address.
g. A port address in TCP/IP is 16 bits in length.
4. Application-Specific Addresses
a. Some applications have user-friendly addresses that are designed for
that specific application.
b. Examples include the e-mail address (eg. [email protected]) and
the Universal Resource Locator (URL) (for example, www.mhhe.com).
23 | P a g e
www.Myitweb.Weebly.com
c. The first defines the recipient of an e-mail; the second is used to find
a document on the World Wide Web.
d. These addresses, however, get changed to the corresponding port
and logical addresses by the sending computer.
24 | P a g e