0% found this document useful (0 votes)
11 views4 pages

ITT501_Chapter_2.pdf

The document provides an overview of the OSI Layer Model, detailing its development and structure, including the Physical, Data Link, Network, and Transport Layers. It explains key concepts such as IP addressing, MAC addresses, and various protocols like TCP and UDP, as well as error detection methods. Additionally, it highlights the importance of network standards and the roles of different standardization bodies.

Uploaded by

nik
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
11 views4 pages

ITT501_Chapter_2.pdf

The document provides an overview of the OSI Layer Model, detailing its development and structure, including the Physical, Data Link, Network, and Transport Layers. It explains key concepts such as IP addressing, MAC addresses, and various protocols like TCP and UDP, as well as error detection methods. Additionally, it highlights the importance of network standards and the roles of different standardization bodies.

Uploaded by

nik
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
You are on page 1/ 4

Page 1 OSI Layer Model

Tuesday, 3 December, 2024 9:15 PM • OSI is a model explaining how software on one
device communicates with another
Topic outline • Developed in 1983 and standardized by ISO in
1. Introduction 1984
2. OSI Layer model
3. Overview of Physical & Data Link Layer
4. Data Link Layer access control concepts
5. Internetworking & routing
6. Network standard & standardization bodies

Introduction
Network structure
Network edge Host include clients & servers,
with servers often in data centre
Access Wires & wireless connect
network & devices
media
Network core Core interconnected routers &
forms a network of networks

MAC Addresses • Protocols:


Identify devices on the Internet/intranet 1. Application, Presentation & Session Layer
• Handled by protocol specific to the application
IPs are 32-bits with 4 numbers separated by using it
dots (.) • Best treated as a single group rather than unique
First part: Network layer
Second part: Host
2. Transport Layer
192.168.1.1
• TCP/IP network guarantee 2 protocols that
works:
IP Addresses
TCP User Datagram
• Classes:
Protocol (UDP)
A B C
• Guarantee delivery • Doesn't guarantee
○ Organisation get unique IP ranges for • Used for client & delivery
Internet uses server requests & • Sends data without
• Private & Public IPs: responses caring if the data is
○ Private IP: uses in intranets and are • Established received or not
isolated from the Internet connection, • Not a established
○ Public IP: devices connecting to the connection- connection,
Internet oriented protocol connectionless
• Dynamically assigned IP addresses: protocol
○ Temporary IPs are assigned for a
session (unlike static IPs) • Sometimes connected with Network Layer
○ ISP: organisation that provide internet
access 3. Network Layer
○ NAT: let private IP devices access • Handle packet routing & forwarding
internet using a single public IP ARP Locate a host on LAN
RARP Discover Internet address of host
Packet vs Circuit Switching on LAN
Packet Messages are split into packets and ICMP Communicate problems with
sent through routers transmission to devices that need
Circuit • Resources are reserved for calls to know
• Often used in traditional phone
systems
This study source was downloaded by 100000899061603 from CourseHero.com on 05-16-2025 10:46:18 GMT -05:00

https://www.coursehero.com/file/249384348/ITT501-Chapter-2pdf/
Chapter 2 Page 1
This study source was downloaded by 100000899061603 from CourseHero.com on 05-16-2025 10:46:18 GMT -05:00

https://www.coursehero.com/file/249384348/ITT501-Chapter-2pdf/
Chapter 2 Page 2
• MAC Taxonomy:
Page 2 ○ Channel partitioning
Tuesday, 3 December, 2024 10:46 PM ○ Random Access
○ Taking Turns
4. Data Link & Physical Layers
• Point-to-Point Protocol (PPP): Error detection
○ Used over telephone lines EDC Error Detection & Correction bits
○ Allows a computer to connect to a (redundancy)
network using a modem
○ Manage network transmission from 1 D Data protected by error checking, may
modem to another include header fields
• EDC is not 100% reliable but larger EDC fields
Overview of Physical & Data Link Layer improve accuracy
• Data-link Layer: Responsible of transfer • Methods:
datagram from one node to physically Parity • Single-bit parity detects
adjacent node over a link Checking single-bit errors
nodes Hosts and routers • Two-dimensional parity can
links Communication channels that detect and correct single-bit
connect adjacent nodes along errors
communication path Checksum Identify errors in transmitted
• wired link packets and is used at the
• wireless link transport layer
frame Layer 2-packet (encapsulate Cycling • The sender adds a CRC field
datagram) Redundancy to the message
• Services: Check (CRC) • The receiver recalculates CRC
○ Framing and compares it to the
○ Link access transmitted value
○ Flow control • A mismatch indicates an
○ Error detection error
○ Error correction
• Parts: Network Layer
• Transfers data from a sending host to a receiving
host
• Encapsulates transport layer segments into
datagram for transmission
• Routers inspect the headers of datagrams as they
pass through
Data Link Layer access control concepts
• Internet network layer:
Link
○ Hosts & routers perform specific network
PPP Broadcast (shared layer functions:
wire/medium)
Routing protocols select paths
• Dial-up access • Old fashioned (RIP, OSPF, BGP)
• Link between Ethernet
ICMP handles error reporting &
Ethernet switch, • upstream HFC
routing signalling
host • 802.11 wireless LAN
• Key Network-Layer services:
Multiple access protocols (MAC)
Forwarding Moves packets from the router’s
Shared broadcast channel can have
input to the correct output
interference if multiple nodes transmit at
the same time Routing Determines the entire path a
packet takes from source to
• Collision happen when 2/more signals
destination
overlap
• Protocol decides when a node transmit data
• Nodes communicate about channel sharing
using same channel

This study source was downloaded by 100000899061603 from CourseHero.com on 05-16-2025 10:46:18 GMT -05:00

https://www.coursehero.com/file/249384348/ITT501-Chapter-2pdf/
Chapter 2 Page 3
User Datagram Protocol (UDP)
Page 3 • Simple, connectionless protocol with no guarantees
Tuesday, 3 December, 2024 11:30 PM for delivery/order
• Suitable for application (streaming/DNS) that
Interplay between routing & forwarding tolerate data loss
• Routing: Plan a trip from source to • Segment handled independently without
destination setup/state management
• Forwarding: Navigate through a single • Why is there UDP?
interchange on the trip ○ No connection establishment
○ No connection state on both sides
Transport Layer
• Provides logical communication between app TCP overview
processes on different hosts • Supports bi-directional data flow within same
• Transport protocols work at the endpoints of connection
communication (sender & receiver) • Connection-oriented & uses handshaking to
• Sends app messages as segments to the establish connections
network layer • Ensure reliable, ordered delivery of data & manages
• Services: flow control
Ensure error control, flow control & • TCP segment structure:
congestion control
Resend info that fail to reach destination
Track data packets for accuracy &
duplication
• Protocols:
TCP UDP
• Provide reliable, in- • Unreliable,
order delivery with unordered
flow control & delivery with • TCP sequences #'s & ACKs
congestion minimal overhead
management • Connectionless
• Connection
oriented
• Transport vs Network Layer
○ Network: handles communication
between hosts
○ Transport: manages communication
between processes within the hosts

Multiplexing & demultiplexing • TCP reliable data transfer


○ Retransmission occur due to timeout events
Multiplexing Combines multiple app
& duplicate ACKs
processes into 1 transport
○ Use a single retransmission timer for
layer segment
efficiency
Demultiplexing Separate transport layer • TCP connection management
segment & deliver them Recall
to the correct app process
Three way handshake
• How demultiplexing works:
Closing a connection

Network Standard Organisation


• Standard are documented agreements containing
technical specifications
ANSI EIA TIA IEEE IETF
ISO ITU ISOC IAB IANA &
ICANN

This study source was downloaded by 100000899061603 from CourseHero.com on 05-16-2025 10:46:18 GMT -05:00

https://www.coursehero.com/file/249384348/ITT501-Chapter-2pdf/
Powered by TCPDF (www.tcpdf.org)
Chapter 2 Page 4

You might also like