0% found this document useful (0 votes)
2 views

Reference Model

The document outlines the OSI Reference Model, which consists of seven layers, each with specific functions and responsibilities, from the physical layer to the application layer. It also discusses the TCP/IP Reference Model, which simplifies the OSI model into four layers, and highlights the importance of services, interfaces, and protocols in network communication. Additionally, it critiques the OSI model regarding timing, technology, implementations, and politics.

Uploaded by

SAMUAEL ELFEGE S
Copyright
© © All Rights Reserved
Available Formats
Download as PPT, PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
2 views

Reference Model

The document outlines the OSI Reference Model, which consists of seven layers, each with specific functions and responsibilities, from the physical layer to the application layer. It also discusses the TCP/IP Reference Model, which simplifies the OSI model into four layers, and highlights the importance of services, interfaces, and protocols in network communication. Additionally, it critiques the OSI model regarding timing, technology, implementations, and politics.

Uploaded by

SAMUAEL ELFEGE S
Copyright
© © All Rights Reserved
Available Formats
Download as PPT, PDF, TXT or read online on Scribd
You are on page 1/ 29

The OSI Reference Model

Principles for the seven layers


• Layers created for different abstractions
• Each layer performs well-defined function
• Function of layer chosen with definition of
international standard protocols in mind
• Minimize information flow across interfaces
between boundaries
• Number of layers optimum
The OSI Reference Model
OSI Reference Model Layers
• Physical layer
• Data link layer
• Network layer
• Transport layer
• Session layer
• Presentation layer
• Application layer
Physical layer
• The physical layer is concerned with transmitting raw bits
over a communication channel.

• The design issues have to do with making sure that when


one side
sends a 1 bit it is received by the other side as a 1 bit, not
as a 0 bit.
electrical signals should be used to represent a 1 and a 0

• These design issues largely deal with mechanical, electrical,


and timing interfaces, as well as the physical transmission
medium, which lies below the physical layer
The Data Link Layer

• The main task of the data link layer is to transform a raw


transmission facility
into a line that appears free of undetected transmission
errors.

• It accomplishes this task by having the sender break up the


input data into data frames (typically a few hundred or a few
thousand bytes) and transmit the frames sequentially.

• If the service is reliable, the receiver confirms correct receipt


of each frame by sending back an acknowledgement frame.
Network layer
• The network layer controls the operation of the subnet.
Determining how packets are routed from source to
destination.

• Routes can be based on static tables that are ‘‘wired into’’ the
network and rarely changed, or more often they can be
updated automatically to avoid failed components.

• If too many packets are present in the subnet at the same


time, they will get in
one another’s way, forming bottlenecks.

• Handling congestion is also a responsibility of the network


layer, in conjunction with higher layers that adapt the load
transit time, jitter, etc.) is also a network layer issue.
• When a packet has to travel from one network to another to
get to its destination, many problems can arise.

• The addressing used by the second network may be different


from that used by the first one. The second one may not
accept the packet at all because it is too large.

• The protocols may differ, and so on. It is up to the network


layer to overcome all these problems to allow heterogeneous
networks to be interconnected.

• In broadcast networks, the routing problem is simple, so the


network layer is often thin or even nonexistent.
The Transport Layer

• Transport layer is to accept data from above it, split it up into


smaller units if need be, pass these to the network layer, and
ensure that the pieces all arrive correctly at the other end.

• The transport layer also determines what type of service to


provide to the session
layer, and, ultimately, to the users of the network.

• Transport connection is an error-free point-to-point channel that


delivers messages
or bytes in the order in which they were sent.
• The transport layer is a true end-to-end layer;
it carries data all the way from the source to
the destination.

• In other words, a program on the source


machine carries on a conversation with a
similar program on the destination machine,
using the message headers and control
messages.

• The difference between layers 1 through 3,


which are chained, and layers 4 through
7,which are end-to-end, is illustrated in fig
The Session Layer

•The session layer allows users on different machines to establish


sessions between them.

•Sessions offer various services, including dialog control


(keeping track of whose turn it is to transmit), token
management (preventing two parties
from attempting the same critical operation simultaneously),

•synchronization(checkpointing long transmissions to allow


them to pick up from where they left off in the event of a crash
and subsequent recovery).
The Presentation Layer

•The presentation layer is concerned with the


syntax and semantics of the information
transmitted.

•In order to make it possible for computers with


different internal data representations to
communicate, the data structures to be
exchanged

•The presentation layer manages these abstract


data structures and allows higher-level data
structures (e.g., banking records) to be defined
and exchanged.
The Application Layer
• The application layer contains a variety of protocols
that are commonly needed by users.

• HTTP (HyperText Transfer Protocol), which is the


basis for the World Wide Web.

• When a browser wants a Web page, it sends the name of


the page it wants to the server hosting the page using
HTTP. The server then sends the page back.

• Other application protocols are used for file transfer,


electronic mail, and network news.
The TCP/IP Reference Model Layers

• Link layer
• Internet layer
• Transport layer
• Application layer
The TCP/IP Reference Model (1)

The TCP/IP reference model


• The link layer describes what links such as serial lines and
classic Ethernet must do to meet the needs of this
connectionless internet layer.

• It is interface between hosts and transmission links

• Synchronous optical networking (SONET) is a standardized


digital communication protocol that synchronously transfers
multiple data streams over long distances through fiber optic
cables.

• In telephone networks, it is used for transmission of a huge


amount of telephone calls and data streams through fiber
• DSL (Digital Subscriber Line) is a modem technology that
uses existing telephone lines to transport high-bandwidth
data, such as multimedia and video, to service
subscribers. DSL provides dedicated, point-to-point,
public network access.

• The Internet Layer: Its job is to permit hosts


to inject packets into any network and have
them travel independently to the destination
(potentially on a different network).
• They may even arrive in a completely different
order than they were sent, in which case it is
the job of higher layers to rearrange them, if
in-order delivery is desired.

• The internet layer defines an official packet


format and protocol called IP(Internet
Protocol), plus a companion protocol called
ICMP (Internet Control Message Protocol)
that helps it function.

• The job of the internet layer is to deliver IP


The Transport Layer

• The layer above the internet layer in the TCP/IP model is


now usually called the transport layer.

• It is designed to allow peer entities on the source and


destination hosts to carry on a conversation, just as in
the OSI transport layer.

• Two end-to-end transport protocols TCP


(Transmission Control Protocol), is a reliable
connection-oriented protocol
• It segments the incoming byte stream into
discrete messages and passes each one on to
the internet layer.

• At the destination, the receiving TCP process


reassembles the received messages into the
output stream.

• TCP also handles flow control to make sure a


fast sender cannot swamp a slow receiver with
more messages than it can handle.
• UDP (User Datagram Protocol), is an unreliable,
connectionless protocol for applications that do not want
TCP’s sequencing or flow control and wish to provide their
own.

• It is also widely used for one-shot, client-server-type request-


reply queries and applications in which prompt delivery is
more important than accurate delivery, such as transmitting
speech or video.

• It contains all the higher- level protocols. The early ones


included virtual terminal (TELNET), file transfer (FTP), and
electronic mail (SMTP).

• Domain Name System (DNS), for mapping host names onto


their network addresses, HTTP, the protocol for fetching pages
on the World Wide Web, and RTP, the protocol for delivering
The TCP/IP Reference Model (2)

The TCP/IP reference model with some protocols we will study


The Model Used in this Book

The reference model used in this book.


• This model has five layers, running from the physical layer up
through the
link, network and transport layers to the application layer.

• The physical layer specifies how to transmit bits across different


kinds of media as electrical (or other analog) signals.

• The link layer is concerned with how to send finite-length


messages between directly connected computers with specified
levels of reliability. Ethernet and 802.11 are examples of link
layer protocols

• The network layer deals with how to combine multiple links into
networks,
and networks of networks, into internetworks so that we can
send packets between distant computers.

• This includes the task of finding the path along which to send
the packets.
• The transport layer strengthens the delivery guarantees of
the Network layer, usually with increased reliability, and
provide delivery abstractions, such as a reliable byte
stream, that match the needs of different applications. TCP
is an important example of a transport layer protocol.

• The application layer contains programs that make use of


the network.
Example- Web browser.

• This is the HTTP protocol in the case of the Web browser.


There are also important support programs in the
application layer, such as the DNS, that are used by many
applications
Comparison of the OSI and
TCP/IP Reference Models
Concepts central to OSI model
• Services
• Interfaces
• Protocols
Three concepts are central to the OSI model:
1. Services.
2. Interfaces.
3. Protocols.

•Each layer performs some services for the layer above it. The
service definition tells what the layer does, not how entities above
it access it or how the layer works. It defines the layer’s semantics.

• A layer’s interface tells the processes above it how to access it. It


specifies
what the parameters are and what results to expect. It, too, says
nothing about
how the layer works inside.

•Finally, the peer protocols used in a layer are the layer’s own
business. It can
use any protocols it wants to, as long as it gets the job done (i.e.,
provides the
Critique of the OSI Model and Protocols

• Bad timing.
• Bad technology.
• Bad implementations.
• Bad politics.
OSI Model Bad Timing

The apocalypse of the two elephants.


• This figure shows the amount of activity surrounding a new subject.
When the subject is first discovered, there is a burst of research activity
in the form of discussions, papers, and meetings.

• If they are written too early (before the research results


are well established), the subject may still be poorly
understood; the result is a bad standard.

• If they are written too late, so many companies may


have already made major investments in different ways
of doing things that the standards are effectively
ignored.

• If the interval between the two elephants is very short


(because everyone is in a hurry to get started), the
people developing the standards may get crushed.

You might also like