Chap 1-2 The OSI Model
Chap 1-2 The OSI Model
Chapter 2
The OSI Model
2.2
INTRODUCTION
• A network uses a combination of hardware and
software to send data from one location to another.
2.3
2-1 LAYERED TASKS
2.4
Figure 2.1 Tasks involved in sending a letter
2.5
SENDER, RECEIVER, AND CARRIER
At the Sender Site
• Higher layer
The sender writes the letter, inserts the letter in the envelope,
writes the sender and receiver addresses, and drops the letter in
a mailbox.
• Middle layer
The letter is picked up by a letter carrier and delivered to the
post office.
• Lower layer
The letter is sorted at the post office; a carrier transports the
letter.
2.6
SENDER, RECEIVER, AND CARRIER
On The Way (Carrier)
• On the way to the recipient’s local post office, the letter may
actually go through a central office.
• Middle layer
The letter is sorted and delivered to the recipient’s mailbox.
• Higher layer
The receiver picks up the letter, opens the envelope, and reads it.
2.7
2-2 THE OSI MODEL
• Established in 1947, the International Standards
Organization (ISO) is a multinational body dedicated to
worldwide agreement on international standards.
• An ISO standard that covers all aspects of network
communications is the Open Systems Interconnection (OSI)
model. It was first introduced in the late 1970s.
• An open system is a set of protocols that allows any two
different systems to communicate regardless of their
underlying architecture.
• Purpose : to show how to facilitate communication between
different systems without requiring changes to the logic of
the underlying hardware and software.
2.8
LAYERED ARCHITECTURE
2.9
LAYERED ARCHITECTURE
3. Transport
– Layer 4 (transport)
– Link the two subgroups and ensures that what the lower layers
have transmitted is in a form that the upper layers can use .
2.11
2-3 LAYERS IN THE OSI MODEL
Away
Pizza
Sausage
Throw
Not
Do
Please
2.12
2.13
Note
2.14
PHYSICAL LAYER
• Other responsibilities:
– Physical characteristics of interfaces and medium
– Representation of bits
– Data rate
– Synchronization of bits
– Line configuration
– Physical topology
– Transmission mode
2.15
Figure 2.5 Physical layer
2.16
Note
2.17
DATA LINK LAYER
• Other responsibilities :
– Framing
– Physical addressing
– Flow control
– Error control
– Access control
• The data link layer is divided into two sub-layers
➢ The Media Access Control (MAC) layer
➢ Logical Link Control (LLC) layer.
• The MAC sublayer controls how a computer on the network gains
access to the data and permission to transmit it.
• The LLC layer controls frame synchronization, flow control and
error checking.
2.18
Figure 2.6 Data link layer
2.19
Hop-to-hop Delivery
2.20
Note
2.21
NETWORK LAYER
• Other responsibilities :
– Logical addressing
– Routing
2.22
Figure 2.8 Network layer
2.23
Source-to-destination Delivery
2.25
TRANSPORT LAYER
• Other responsibilities :
– Service-point addressing
– Segmentation and reassembly
– Connection control
– Flow control
– Error control
2.26
Figure 2.10 Transport layer
2.27
Process-to-process Delivery
2.28
Note
2.29
SESSION LAYER
– Dialog control
Allows two system to enter into dialog.
Allows the communication between two processes to take
place in either half-duplex or full-duplex mode.
– Synchronization
Allows a process to add checkpoints, or synchronization
points, to a stream of data.
2.30
Figure 2.12 Session layer
2.31
Note
2.32
PRESENTATION LAYER
– Translation
Responsible for interoperability between the different
encoding methods.
– Encryption
Sender transforms original info to another form and
sends the resulting message out over the network.
– Compression
Reduces the number of bits contained in the
information
2.33
Figure 2.13 Presentation layer
2.34
Note
2.35
APPLICATION LAYER
• Specific service provided :
– Network virtual terminal
Creates a software emulation of a terminal at the remote host,
and vice versa.
– File transfer, access, and management
Allows user to access files in remote host, to retrieve files from a
comp for use in local comp, and to manage or control files in a
remote computer locally.
– Mail service
– Directory services
• Applications that work at Layer 7 are the ones that users interact
with directly. A web browser (Google Chrome, Firefox, Safari,
etc.) or other app - Skype, Outlook, Office - are examples of Layer
7 applications.
2.36
Figure 2.14 Application layer
2.37
Summary of Layers
2.38
2-4 TCP/IP PROTOCOL SUITE
2.39
Figure 2.16 TCP/IP and OSI model
2.40
2-5 ADDRESSING
• Four levels of addresses are used in an internet employing
the TCP/IP protocols:
1. Physical (link) addresses
2. Logical (IP) addresses
3. Port addresses
4. Specific addresses
2.41
Figure 2.18 Relationship of layers and addresses in TCP/IP
2.42
PHYSICAL ADDRESSES
• Address of a node as defined by its LAN or WAN
• Included in frame used by data link layer.
• Most local-area networks use a 48-bit (6-byte) physical address
written as 12 hexadecimal digits.
• Example:
2.43
Note
2.44
LOGICAL ADDRESSES
• Address for universal communication that are
independent of underlying physical networks.
2.45
Example
2.47
Figure 2.21 Port addresses
2.48
Note
2.49
SPECIFIC ADDRESSES
• Some applications have user-friendly addresses that
are designed for that specific address.
• Examples :
i. E-mail address
ii.Universal Resource Locator (URL)
2.50
ITT400
Introduction to Data Communication and
Networking
Q&A