Chapter 5 OSI_Reference_Model
Chapter 5 OSI_Reference_Model
1
Outline of the lecture
2
Layered frame work of OSI
3
OSI Lower Layers
Physical
Data Link
Network
4
OSI Physical Layer
6
OSI Lower Layers
Physical
Data Link
Network
7
OSI Data Link Layer
1. Addressing – Headers and trailers are added, containing the physical addresses of the adjacent
nodes, and removed upon successful delivery.
2. Flow control – This avoids overwriting on the receiver’s buffer by regulating the amount of data
that can be sent.
3. Media Access Control (MAC) – In LANs, it decides who can send data, when and how much.
4. Synchronization – Headers have bits, which tell the receiver when a frame is arriving. It also
contains bits to synchronize its timing to know the bit interval to recognize the bit correctly. Trailers
mark the end of a frame, apart from containing the error control bits.
5. Error control – It checks the CRC to ensure the correctness of the frame. If incorrect, it asks for
retransmission. Again multiple schemes (positive acknowledgement, negative acknowledgement, go-
back-n, sliding window, etc.) exist here.
6. Node to node delivery – Finally, it is responsible for error-free delivery of the entire frame/
packet to the next adjacent node (node-to-node delivery).
8
Communication at the data link layer
Physical Physical
Link 1 Link 3 Link 6
Link 5
D2 H2
Frame
D2 ame
Fr
H2
D2 H2 D2 H2
Frame Frame
9
Note
10
Framing
Data-link layer takes packets from Network Layer and encapsulates them into
Frames.
Then, it sends each frame bit-by-bit on the physical layer.
At receiver’ end, data link layer picks up signals from physical layer and assembles
them into frames.
11
Addressing
12
Error Detection and Correction
13
13
Error Detection and Correction cont’d
14
Cyclic Redundancy Check
15
Error correction
refers to a set of procedures used to restrict the amount of data that the sender can
send before receiving an acknowledgement
A technique for speed-matching of transmitter and receiver
17
17
Flow Control Protocols: Stop-and-Wait Flow Control
18
Flow Control Protocols: Sliding Window Flow Control
19
Error Control
20
Error Control…
21
Multi-Access
When host on the shared link tries to transfer the data, it has a high probability of
collision.
Data-link layer provides random access mechanism such as CSMA/CD and CSMA/CA
to equip capability of accessing a shared media among multiple Systems.
There are other multiple access protocols such as
Controlled-Access Protocols - get permission
Reservation
Polling
Token Passing Reading(Try your best to understand each)
Channelization Protocols - simultaneous use
FDMA - Frequency-Division MA
TDMA - Time-Division MA
CDMA - Code-Division MA
22
22
Carrier Sense Multiple Access with Collision Detection (CSMA/CD)
23
CSMA/CA
NB: Both RTS & CTS frame includes the duration of time that source needs to occupy the channel-transfer duration
NAV(network animation vector): a period the other station should wait before starting checking for channel idleness
24
OSI Lower Layers
Physical
Data Link
Network
25
OSI Network Layer
A key design issue is determining how packets are routed from source to
destination→ routing
path determination
Routes can be based on static tables that are ''wired into'' the network and rarely
changed, and can be highly dynamic, being determined a new for each packet
When two network connected for communication:
There may be addressing difference
Protocol difference
Packet size of each can be different
It is up to the network layer to overcome all these problems to allow
heterogeneous networks to be interconnected.
26
Network Layer has 4 basic functions:
Internetworking
Addressing
Packetizing
Fragmentation
Routing
Main functions of routers (network layer devices)
Routing (Path determination): selecting best path b/n end devices
Routing protocols(RIP, OSPF, BGP)
Forwarding: move packets from router’s input to appropriate router output
27
Legend Source Destination D Data H Header
A R1 R3 R4 B
Network Network
Physical Physical
D3 H3
Datagram
28 D3 H3
Datagram
Internetworking
Packetizing:
• encapsulates packets received from upper-layer protocols and makes new packets out of
them; done by the IP protocol in the Internet model
Fragmenting:
• a datagram can travel through different networks; each router decapsulates the IP
datagram from the received frame, processes it, and then encapsulates it in another frame
• the format and size of the
• received frame depends on the protocol used by the physical network from which the
frame has just arrived
• departing frame depends on the protocol used by the physical network to which the
frame is going
30
Addressing
To uniquely and universally identify each device on the internet to allow global
communication between all devices
Analogous to the telephone system; the department of computer science: 251 011
1222922, wherever you are on the globe
Each address belongs to a single host, but a single host can have multiple addresses (if it
has multiple connections to the internet)
The identifier used in the network layer of the internet model is called the internet
address or IP address
31
Network layer protocols
32
OSI Upper Layers
Transport
Session
Presentation
Application
33
OSI Transport Layer
34
Transport layer Functions
35
data link layer: node-to-node delivery
36
Packetizing
• the transport layer creates packets out of the
message received from the application layer
• it divides a long message into smaller ones
called segments; they are then encapsulated
into the data field of the transport-layer
packet and headers are added
Addressing
• at the data link layer, we need a MAC address
• at the network layer, we need an IP address
• at the transport layer, we need a transport-layer
address, called a port number, to choose among
several processes [0-65,535]
37
Socket address
38
Multiplexing and Demultiplexing
39
Connection Control Services: Connection less and connection oriented
Some well known ports used by UDP(more : Some well known ports used by TCP(more :
www.iana.org ) www.iana.org )
DNS 53 Telnet 23
Echo 7 FTP:Data: 20
TFTP 69 FTP: Control: 21
40
TCP Connection management
41
TCP Transmission
Reliable delivery in TCP is realized using acknowledgement
Stop-and-wait protocol scenarios
42
OSI Upper Layers
Transport
Session
Presentation
Application
43
OSI Session Layer
44
OSI Upper Layers
Transport
Session
Presentation
Application
45
OSI Presentation Layer
46
OSI Upper Layers
Transport
Session
Presentation
Application
47
OSI Application Layer
48
Receives services from the transport layer and provides services to users
(humans or software)
Provides user interfaces and support services such as email, remote file
access and transfer, access to the WWW
Three general issues related to the application layer:
the client-server paradigm,
addressing, and services
49
49
The Client-Server Model
50
50
Addressing
Addressing mechanism in the application layer is different from the ones in other layers
These are aliases convenient for human beings; they must be mapped to IP addresses
An application program needs the services of another program for this; this application program is called DNS -
domain name system: it uses port 53
It is not directly used by the user; but by application programs to perform the mapping
51
51
Domain Name Resolution
52
52
Application Layer Services
Electronic mail
SMTP: simple mail transfer protocol
MIME: multipurpose internet mail extensions
POP3 : post office protocol 3
IMAP : internet mail access protocol
Webmail
File transfer (FTP - file transfer protocol)
HTTP - hypertext transfer protocol for accessing data on the WWW
Www
Multimedia
53
53
Application Services protocols Remarks
File transfer Protocol FTP used to send and received file from a remote host
Simple mail Transfer protocol SMTP Used to only send Email over a network
Hyper text transfer protocol HTTP Used for Internet to send document that encoded in HTML
Post Office Protocol 3 POP3 the whole mailbox will be cleared (transferred) from server to local computer;
view mail only once
Multipurpose Internet Mail Extensions MIME allows non-ASCII data to be sent using the existing mail programs and protocols
it transforms non-ASCII data at the sender site to ASCII and back to non-ASCII
at the receiving site
Internet Mail Access Protocol IMAP IMAP is similar to POP3 but with the following additional features
a user can: check the email header prior to downloading, search the contents of
the email for a specific string, partially download, email;
allows you to download emails from your email server onto multiple devices.
It keeps your messages on the email server.
Multimedia the combination of text, graphics, images, video and audio used together; at least
one must be continuous (time-dependent like audio, video, animation)
World Wide Web WWW a repository of information spread all over the world and linked together;
strings of text within a page that link to other documents are called
hyperlinks
54
Summary of OSI Layers
55
summary
56