Lecture-3,4 (OSI Model)
Lecture-3,4 (OSI Model)
Prepared by
Dr. Neha Sharma (CSE)
Index
• Operating System
• Protocols and Models
• Reference model
• Seven-Layers of OSI(Open System Interconnection)
• Concept of Layers
• Benefit of using layered Models
• Summary of layers
• Protocols used at each layer
• Protocol Data Unit (PDU)
Operating Systems (OS)
All end devices and network devices require an operating system (OS). As shown in the figure 1, the
portion of the OS that interacts directly with computer hardware is known as the kernel. The portion that
interfaces with applications and the user is known as the shell. The user can interact with the shell using a
command-line interface (CLI) or a graphical user interface (GUI).
• Shell: The user interface that allows the user to request specific tasks from the computer. These
requests can be made either through CLI or GUI interfaces.
• Kernel: Communication between hardware and software of a computer and manages how hardware
resources are used to meet software requirements.
• Hardware: The physical part of a computer including underlying electronics.
Note: The operating system on home routers is usually called firmware. The most common method for configuring a
home router is by using a web browser-based GUI.
Protocols and Models
• How a network device operates within a network?
A network device is a node in the wireless mesh network. It can transmit and receive wireless data and perform the basic
Communications Fundamentals - Networks vary in size, shape, and function. For communication to occur, devices must
individuals or devices.
• Message Destination (receiver) - The destination receives the message and interprets it.
• Channel - This consists of the media that provides the pathway over which the message travels from source to
destination.
Sending a message, whether by face-to-face communication or over a network, is governed by rules called protocols.
Protocols must account for the following requirements to successfully deliver a message that is understood by the receiver:
An identified sender and receiver, Common language and grammar, Speed and timing of delivery, Confirmation or
acknowledgment requirements.
Protocols and Models
• Message encoding
• Message size
• Message timing
The table lists the various types of protocols that are needed to enable communications across one or more networks.
Network Communications Protocols enable two or more devices to communicate over one or more networks.
Protocols The Ethernet family of technologies involves a variety of protocols such as IP,
Transmission Control Protocol (TCP), HyperText Transfer Protocol (HTTP), and
many more.
Network Security Protocols Protocols secure data to provide authentication, data integrity, and data encryption.
Examples of secure protocols include Secure Shell (SSH), Secure Sockets Layer
(SSL), and Transport Layer Security (TLS).
Routing Protocols Protocols enable routers to exchange route information, compare path information,
and then to select the best path to the destination network. Examples of routing
protocols include Open Shortest Path First (OSPF) and Border Gateway Protocol
(BGP).
Service Discovery Protocols Protocols are used for the automatic detection of devices or services. Examples of
service discovery protocols include Dynamic Host Configuration Protocol (DHCP)
which discovers services for IP address allocation, and Domain Name System
(DNS) which is used to perform name-to-IP address translation.
The functions of these protocols are addressing, reliability, flow control, sequencing, error detection,
and application interface.
OSI Reference Model
•Assisting in protocol design because protocols that operate at a specific layer have defined information that they act
upon and a defined interface to the layers above and below
•Fostering competition because products from different vendors can work together
•Preventing technology or capability changes in one layer from affecting other layers above and below
•Providing a common language to describe networking functions and capabilities
•Two layered models used: Open System Interconnection (OSI) Reference Model and TCP/IP Reference Model
• In this section we briefly describe the functions of each layer in the OSI
model.
• Physical Layer
• Data Link Layer
• Network Layer
• Transport Layer
• Session Layer
• Presentation Layer
• Application Layer
Layer 1 :Physical Layer
Note
The physical layer is responsible for movements of individual bits from
one hop (node) to the next.
Layer 2 : Data link layer
Figure 9 Shows the data link layer information transmitted in OSI model.
Note
The data link layer is responsible for moving frames from one hop
(node) to the next.
Layer 3 : Network layer
Note
The network layer is responsible for the delivery of individual packets
from the source host to the destination host.
Source to destination delivery
Figure 11 Shows the network layer detailed information transmitted in OSI model.
Layer 4: Transport Layer
• Transport Layer is responsible for end-to-end connectivity. It is also known as the heart of OSI
Layers. Following tasks are performed at the Transport Layer : -
• Identifying Service
• Multiplexing & De-multiplexing
• Segmentation
• Sequencing & Reassembling
• Error Correction
• Flow Control
• Transport
Transport layer
Note
The transport layer is responsible for the delivery of a message from one
process to another.
Identify Service
Note
The session layer is responsible for dialog control and synchronization.
Layer 6 -Presentation layer
Note
The presentation layer is responsible for translation, compression, and
encryption.
Layer 7 - Application layer
Note
The application layer is responsible for providing services to the user.
Summary of layers
• TELNET: Telnet stands for the TELetype NETwork. It helps in terminal emulation. It
allows Telnet clients to access the resources of the Telnet server. It is used for managing
files on the internet. It is used for the initial setup of devices like switches. The telnet
command is a command that uses the Telnet protocol to communicate with a remote device
or system. Port number of telnet is 23.
• FTP: FTP stands for file transfer protocol. It is the protocol that actually lets us transfer
files. It can facilitate this between any two machines using it. But FTP is not just a protocol
but it is also a program. FTP promotes sharing of files via remote computers with reliable
and efficient data transfer. The Port number for FTP is 20 for data and 21 for control.
• TFTP: The Trivial File Transfer Protocol (TFTP) is the stripped-down, stock version of
FTP, but it’s the protocol of choice if you know exactly what you want and where to find it.
It’s a technology for transferring files between network devices and is a simplified version
of FTP. The Port number for TFTP is 69.
Continued….
• SMTP: It stands for Simple Mail Transfer Protocol. It is a part of the TCP/IP protocol.
Using a process called “store and forward,” SMTP moves your email on and across
networks. It works closely with something called the Mail Transfer Agent (MTA) to send
your communication to the right computer and email inbox. The Port number for SMTP
is 25.
• SNMP: It stands for Simple Network Management Protocol. It gathers data by polling
the devices on the network from a management station at fixed or random intervals,
requiring them to disclose certain information. It is a way that servers can share
information about their current state, and also a channel through which an administrate
can modify pre-defined values. The Port number of SNMP is 161(TCP) and 162(UDP).
• DNS: It stands for Domain Name System. Every time you use a domain name, therefore,
a DNS service must translate the name into the corresponding IP address. For example,
the domain name www.abc.com might translate to 198.105.232.4.
The Port number for DNS is 53
Continued…
• MPEG: The Moving Pictures Experts Group's standard for the compression
and coding of motion video for CD's is very popular. QuickTime: This is for use
with Machintosh or Power PC programs, it manages audio and video applications.
• SSL (Secure Socket Layer) and TLS (Transport Layer Security) are popular
cryptographic protocols that are used to imbue web communications with integrity,
security, and resilience against unauthorized tampering.
Session layer protocols
2.What process is used to receive transmitted data and convert it into a readable message?
encapsulation
access control
decoding
flow control
5.A web client is sending a request for a webpage to a web server. From the perspective of the client,
what is the correct order of the protocol stack that is used to prepare the request for transmission?
Ethernet, IP, TCP, HTTP
HTTP, TCP, IP, Ethernet
HTTP, IP, TCP, Ethernet
Ethernet, TCP, IP, HTTP
References :
Data Communications and Networking’ by Forouzan, 5th Edition, 2013
Netacad course
Computer Networks Dr. Vidhu Baggan