Explain the OSI reference model with neat diagram.


Answer:


-An open system is a set of protocols that allows any two different systems to communicate regardless of their underlying architecture.
The purpose of the OSI model is to show how to facilitate communication between different systems without requiring changes to the logic of the underlying hardware and software. The OSI model is not a protocol; it is a model for understanding and designing a network architecture that is flexible, robust, and interoperable.
networking3920211657.JPG

Physical Layer
-The physical layer coordinates the functions required to carry a bit stream over a physical medium. It deals with the mechanical and electrical specifications of the interface and transmission medium.
The physical layer is also concerned with the following:
-Physical characteristics of interfaces and medium: The physical layer defines the characteristics of the interface between the devices and the transmission medium. It also defines the type of transmission medium.
-Representation of bits: The physical layer data consists of a stream of bits (sequence of Os or 1s) with no interpretation. To be transmitted, bits must be encoded into signals--electrical or optical. The physical layer defines the type of encoding (how Os and I s are changed to signals).
-Data rate: The transmission rate-the number of bits sent each second-is also defined by the physical layer. In other words, the physical layer defines the duration of a bit, which is how long it lasts.
-Synchronization of bits: The sender and receiver not only must use the same bit rate but also must be synchronized at the bit level. In other words, the sender and the receiver clocks must be synchronized.
-Line configuration: The physical layer is concerned with the connection of devices to the media. In a point-to-point configuration, two devices are connected through a dedicated link. In a multipoint configuration, a link is shared among several devices.
-Physical topology: The physical topology defines how devices are connected to make a network. Devices can be connected by using a mesh topology (every device is connected to every other device), a star topology (devices are connected through a central device), a ring topology (each device is connected to the next, forming a ring), a bus topology (every device is on a common link), or a hybrid topology (this is a combination of two or more topologies).
-Transmission mode: The physical layer also defines the direction of transmission between two devices: simplex, half-duplex, or full-duplex. In simplex mode, only one device can send; the other can only receive. The simplex mode is a one-way communication. In the half-duplex mode, two devices can send and receive, but not at the same time. In a full-duplex (or simply duplex) mode, two devices can send and receive at the same time.

Data Link Layer
-The data link layer transforms the physical layer, a raw transmission facility, to a reliable link. It makes the physical layer appear error-free to the upper layer (network layer).
Other responsibilities of the data link layer include the following:
-Framing: The data link layer divides the stream of bits received from the network layer into manageable data units called frames.
-Physical addressing: If frames are to be distributed to different systems on the network, the data link layer adds a header to the frame to define the sender and/or receiver of the frame. If the frame is intended for a system outside the sender's network, the receiver address is the address of the device that connects the network to the next one.
-Flow control: If the rate at which the data are absorbed by the receiver is less than the rate at which data are produced in the sender, the data link layer imposes a flow control mechanism to avoid overwhelming the receiver.
-Error control: The data link layer adds reliability to the physical layer by adding mechanisms to detect and retransmit damaged or lost frames. It also uses a mechanism to recognize duplicate frames. Error control is normally achieved through a trailer added to the end of the frame.
-Access control: When two or more devices are connected to the same link, data link layer protocols are necessary to determine which device has control over the link at any given time.

Network Layer.
-The network layer is responsible for the source-to-destination delivery of a packet, possibly across multiple networks (links). Whereas the data link layer oversees the delivery of the packet between two systems on the same network (links), the network layer ensures that each packet gets from its point of origin to its final destination.
Other responsibilities of the network layer include the following:
-Logical addressing. The physical addressing implemented by the data link layer handles the addressing problem locally. If a packet passes the network boundary, we need another addressing system to
help distinguish the source and destination systems. The network layer adds a header to the packet coming from the upper layer that, among other things, includes the logical addresses of the sender and receiver. We discuss logical addresses later in this chapter.
-Routing. When independent networks or links are connected to create internetworks (network of networks) or a large network, the connecting devices (called routers or switches) route or switch the packets to their final destination. One of the functions of the network layer is to provide this mechanism.

Transport Layer.
-The transport layer is responsible for process-to-process delivery of the entire message. A process is an application program running on a host. Whereas the network layer oversees source-to-destination delivery of individual packets, it does not recognize any relationship between those packets.
Other responsibilities of the transport layer include the following:
-Service-point addressing: Computers often run several programs at the same time. For this reason, source-to-destination delivery means delivery not only from one computer to the next. but also from a specific process (running program) on one computer to a specific process (running program) on the other. The transport layer header must therefore include a type of address called a service-point address (or port address). The network layer gets each packet to the correct computer; the transport layer gets the entire message to the correct process on that computer.
-Segmentation and reassembly: A message is divided into transmittable segments, with each segment containing a sequence number. These numbers enable the transport layer to reassemble the message correctly upon arriving at the destination and to identify and replace packets that were lost in transmission.
Connection control: The transport layer can be either connectionless or connection oriented.
A connectionless transport layer treats each segment as an independent packet and delivers it to the transport layer at the destination machine. A connection oriented transport layer makes a connection with the transport layer at the destination machine first before delivering the packets. After all the data are transferred, the connection is terminated.
-Flow control: Like the data link layer, the transport layer is responsible for flow control. However, flow control at this layer is performed end to end rather than across a single link.
-Error control: Like the data link layer, the transport layer is responsible for error control. However, error control at this layer is performed process-to process rather than across a single link. The sending transport layer makes sure that the entire message arrives at the receiving transport layer without error (damage, loss, or duplication). Error correction is usually achieved through retransmission.

Session Layer
-The services provided by the first three layers (physical, data link, and network) are not sufficient for some processes. The session layer is the network dialog controller. It establishes, maintains, and synchronizes the interaction among communicating systems. The session layer is responsible for dialog control and synchronization.
Specific responsibilities of the session layer include the following:
-Dialog control: The session layer allows two systems to enter into a dialog. It allows the communication between two processes to take place in either half duplex (one way at a time) or full-duplex (two ways at a time) mode.
-Synchronization: The session layer allows a process to add checkpoints, or synchronization points, to a stream of data. For
example, if a system is sending a file of 2000 pages, it is advisable to insert checkpoints after every 100 pages to ensure that each 100-page unit is. received and acknowledged independently. In this case, if a crash happens during the transmission of page 523, the only pages that need to be resent after system recovery are pages 501 to 523. Pages previous to 501 need not be resent. received and acknowledged independently. In this case, if a crash happens during the transmission of page 523, the only pages that need to be resent after system recovery are pages 501 to 523. Pages previous to 501 need not be resent.
Presentation Layer
-The presentation layer is concerned with the syntax and semantics of the information exchanged
between two systems.
Specific responsibilities of the presentation layer include the following:
-Translation: The processes (running programs) in two systems are usually exchanging information in the form of character strings, numbers, and so on. The information must be changed to bit streams before being transmitted. Because different computers use different encoding systems, the presentation layer is responsible for interoperability between these different encoding methods. The presentation layer at the sender changes the information from its sender-dependent format into a common format. The presentation layer at the receiving machine changes the common format into its receiver-dependent format.
-Encryption: To carry sensitive information, a system must be able to ensure privacy. Encryption means that the sender transforms the original information another form and sends the resulting message out over the network. Decryption reverses the original process to transform the message back to its original form.
-Compression: Data compression reduces the number of bits contained in the information. Data compression becomes particularly important in the transmission of multimedia such as text, audio, and video.

Application Layer :
The application layer enables the user, whether human or software, to access the network. It provides user interfaces and support for services such as electronic mail, remote file access and transfer, shared database management, and other types of distributed information services.
-Bit Rate
Most digital signals are non periodic, and thus period and frequency are not appropriate characteristics. Another term-bit rate is used to describe digital signals.
The bit rate is the number of bits sent in 1s, expressed in bits per second (bps).


Share To Friends Via:
        






More Questions For Networking and Data Communication:



  Explain the types of transmission modes (Answered)
Explain the types of transmission modes .
Posted On:Tue 9, March 2021 13:30:38 pm
  What is network topology ? (Answered)
What is network topology ? .
Posted On:Tue 9, March 2021 13:47:54 pm
  Explain the different network topologies (Answered)
Explain the different network topologies .
Posted On:Tue 9, March 2021 13:53:04 pm
  What are the different types of networks? Explain in detail. (Answered)
What are the different types of networks? Explain in detail. .
Posted On:Tue 9, March 2021 13:56:05 pm
  What are the Advantages of Mesh topology network (Answered)
What are the Advantages of Mesh topology network .
Posted On:Tue 9, March 2021 17:01:02 pm
  What are the disadvantages of Mesh topology network (Answered)
What are the disadvantages of Mesh topology network .
Posted On:Tue 9, March 2021 17:02:11 pm
  What are the advantages of Star topology network (Answered)
What are the advantages of Star topology network .
Posted On:Tue 9, March 2021 17:02:45 pm
  What are the disadvantages of Star topology network (Answered)
What are the disadvantages of Star topology network .
Posted On:Tue 9, March 2021 17:03:56 pm
  What are the advantages of Bus topology network (Answered)
What are the advantages of Bus topology network .
Posted On:Tue 9, March 2021 17:05:46 pm
  What are the disadvantages of Bus topology network (Answered)
What are the disadvantages of Bus topology network .
Posted On:Tue 9, March 2021 17:06:29 pm
  What are the advantages and disadvantages of Ring topology network (Answered)
What are the advantages and disadvantages of Ring topology network .
Posted On:Tue 9, March 2021 17:07:14 pm
  Based on the below figures: (Figure 1 and Figure 2), Answer the following questions: (30 points, 10 points each) a. What is the TCP/IP utility command to show us the content given in Figure 1.? Explain and justify your answer. b. What is the TCP/IP utility command to show us the content given in Figure 2.? Explain and justify your answer. c. Name three TCP/IP utility types and give an example of (Answered)
Based on the below figures: (Figure 1 and Figure 2), Answer the following questions: (30 points, 10 points each) a. What is the TCP/IP utility command to show us the content given in Figure 1.? Explain and justify your answer. b. What is the TCP/IP utility command to show us the content given in Figure 2.? Explain and justify your answer. c. Name three TCP/IP utility types and give an example of .
Posted On:Sat 25, September 2021 07:48:13 am
  What are the differences between persistent and non-persistent HTTP connections? Explain it. If you want to get the 8 files from the server using persistent connections, what would be the total file transmission time using RTT time? Explain and justify your answer. (Answered)
What are the differences between persistent and non-persistent HTTP connections? Explain it. If you want to get the 8 files from the server using persistent connections, what would be the total file transmission time using RTT time? Explain and justify your answer. .
Posted On:Sat 25, September 2021 07:49:39 am
  What are the differences between the fully qualified domain name (FQDN) and partially qualified domain name (PQDN)? Give an example of each type and justify your answer with a figure. (Answered)
What are the differences between the fully qualified domain name (FQDN) and partially qualified domain name (PQDN)? Give an example of each type and justify your answer with a figure. .
Posted On:Sat 25, September 2021 07:52:11 am
  Explain the general graph directory. In which condition, cycles could be happened in the graph. Explain and justify your answer.(10 points) (Answered)
Explain the general graph directory. In which condition, cycles could be happened in the graph. Explain and justify your answer.(10 points) .
Posted On:Sat 25, September 2021 07:54:18 am
  What are the ways to access the same files in more than one place in the directory structure? Explain and justify your answer. (10 points) (Answered)
What are the ways to access the same files in more than one place in the directory structure? Explain and justify your answer. (10 points) .
Posted On:Sat 25, September 2021 07:55:36 am
  What is the difference between public IP address and private IP address? Justify your answer and give an example for different private IP addresses? (10 points) (Answered)
What is the difference between public IP address and private IP address? Justify your answer and give an example for different private IP addresses? (10 points) .
Posted On:Sat 25, September 2021 07:56:45 am
  What are the differences between an acyclic-graph directory and a tree-structured directory? Explain and justify your answer by drawing the diagrams. (10 points) (Answered)
What are the differences between an acyclic-graph directory and a tree-structured directory? Explain and justify your answer by drawing the diagrams. (10 points) .
Posted On:Sat 25, September 2021 07:59:11 am
  Discuss five factors to consider when making a decision on which network topology to adopt in your academic (Answered)
Discuss five factors to consider when making a decision on which network topology to adopt in your academic .
Posted On:Thu 24, March 2022 21:32:49 pm
  What is a protocol as used in computer data communication (Answered)
What is a protocol as used in computer data communication .
Posted On:Mon 22, January 2024 21:09:34 pm
  Give 3 functions of a protocol in data communication (Answered)
Give 3 functions of a protocol in data communication .
Posted On:Mon 22, January 2024 21:40:56 pm
  Differentiate between Data Communication Equipment (DCE) and Data Terminal Equipment (DTE) (Answered)
Differentiate between Data Communication Equipment (DCE) and Data Terminal Equipment (DTE) .
Posted On:Mon 22, January 2024 21:41:41 pm
  Differentiate between Circuit switching and Packet switching as used in data communication (Answered)
Differentiate between Circuit switching and Packet switching as used in data communication .
Posted On:Mon 22, January 2024 21:42:15 pm
  Explain each of the following as used in Data communication (6 marks) a) Simplex Communication system b) Duplex Communication system c) Full Duplex Communication system (Answered)
Explain each of the following as used in Data communication (6 marks) a) Simplex Communication system b) Duplex Communication system c) Full Duplex Communication system .
Posted On:Mon 22, January 2024 21:42:52 pm
  What is a computer Network (Answered)
What is a computer Network .
Posted On:Mon 22, January 2024 21:43:45 pm
  Outline three benefits of OSI model in data communication (Answered)
Outline three benefits of OSI model in data communication .
Posted On:Mon 22, January 2024 21:44:25 pm
  Outline two typical features of 10BaseT network (Answered)
Outline two typical features of 10BaseT network .
Posted On:Mon 22, January 2024 21:45:05 pm
  Outline two functions of a network operating system (NOS) (Answered)
Outline two functions of a network operating system (NOS) .
Posted On:Mon 22, January 2024 21:45:52 pm
  Describe two components of a data communication system (Answered)
Describe two components of a data communication system .
Posted On:Mon 22, January 2024 21:46:30 pm
  Define the term latency as applied in network troubleshooting (Answered)
Define the term latency as applied in network troubleshooting .
Posted On:Mon 22, January 2024 21:47:05 pm

More Questions Categories:


About Us

Contact us

Terms of use | Privacy policy

Follow Us:               

All Rights Reserved © 2024; pscustudies.com