2.Iso-osi Refference Model
2.Iso-osi Refference Model
There are many users who use computer network and are located all over the world. To ensure
national and worldwide data communication ISO (ISO stands for International Organization of
Standardization.) developed this model. This is called a model for open system interconnection
(OSI) and is normally called as OSI model.OSI model architecture consists of seven layers. It
defines seven layers or levels in a complete communication system. OSI Reference model is
explained in other chapter.
Feature of OSI Model
1.Big picture of communication over network is understandable through this OSI model.
2.We see how hardware and software work together.
1. OSI model distinguishes well between the services, interfaces and protocols.
1. Representation of Bits: Data in this layer consists of stream of bits. The bits must be encoded
into signals for transmission. It defines the type of encoding i.e. how 0’s and 1’s are changed to
signal.
2. Data Rate: This layer defines the rate of transmission which is the number of bits per second.
3. Synchronization: It deals with the synchronization of the transmitter and receiver. The sender
4. Interface: The physical layer defines the transmission interface between devices and
transmission medium.
5. Line Configuration: This layer connects devices with the medium: Point to Point configuration
6. Topologies: Devices must be connected using the following topologies: Mesh, Star, Ring and
Bus.
7. Transmission Modes: Physical Layer defines the direction of transmission between two
1. Framing: Frames are the streams of bits received from the network layer into manageable data
2. Physical Addressing: The Data Link layer adds a header to the frame in order to define
physical address of the sender or receiver of the frame, if the frames are to be distributed to
3. Flow Control: A flow control mechanism to avoid a fast transmitter from running a slow receiver
by buffering the extra bit is provided by flow control. This prevents traffic jam at the receiver side.
4. Error Control: Error control is achieved by adding a trailer at the end of the frame. Duplication
of frames are also prevented by using this mechanism. Data Link Layers adds mechanism to
5. Access Control: Protocols of this layer determine which of the devices has control over the link
at any given time, when two or more devices are connected to the same link.
3.Network Layer - OSI Model
The main aim of this layer is to deliver packets from source to destination across multiple links
(networks). If two computers (system) are connected on the same link then there is no need for a
network layer. It routes the signal through different channels to the other end and acts as a
network controller.
It also divides the outgoing messages into packets and to assemble incoming packets into
messages for higher levels.
port address. This layer gets the message to the correct process on the computer unlike
contains sequence number, which enables this layer in reassembling the message. Message is
reassembled correctly upon arrival at the destination and replaces packets which were lost in
transmission.
o Connection Oriented Transport Layer : Before delivering packets, connection is made with
5. Error Control : Error Control is performed end to end in this layer to ensure that the complete
message arrives at the receiving transport layer without any error. Error Correction is done
through retransmission.
1. Dialog Control : This layer allows two systems to start communication with each other in half-
duplex or full-duplex.
2. Synchronization : This layer allows a process to add checkpoints which are considered as
synchronization points into stream of data. Example: If a system is sending a file of 800 pages,
adding checkpoints after every 50 pages is recommended. This ensures that 50 page unit is
successfully received and acknowledged. This is beneficial at the time of crash as if a crash
should be changed to bit streams. The presentation layer is responsible for interoperability
between encoding methods as different computers use different encoding methods. It translates
data between the formats the network requires and the format the computer.
2. Encryption : It carries out encryption at the transmitter and decryption at the receiver.
3. Compression : It carries out data compression to reduce the bandwidth of the data to be
transmitted. The primary role of Data compression is to reduce the number of bits to be
1. Mail Services : This layer provides the basis for E-mail forwarding and storage.
2. Network Virtual Terminal : It allows a user to log on to a remote host. The application creates
software emulation of a terminal at the remote host. User’s computer talks to the software
terminal which in turn talks to the host and vice versa. Then the remote host believes it is
communicating with one of its own terminals and allows user to log on.
3. Directory Services : This layer provides access for global information about various services.
4. File Transfer, Access and Management (FTAM) : It is a standard mechanism to access files
and manages it. Users can access files in a remote computer and manage it. They can also