Академический Документы
Профессиональный Документы
Культура Документы
The lower 4 layers (transport, network, data link and physical —Layers 4, 3, 2,
and 1) are concerned with the flow of data from end to end through the
network.
The upper 3 layers of the OSI model (application, presentation and session—
Layers 7, 6 and 5) are orientated more toward services to the applications.
Compression : It carries out data compression to reduce the bandwidth of the data
to be transmitted. The primary role of Data compression is to reduce the number of
bits to be 0transmitted. It is important in transmitting multimedia such as audio,
video, text etc.
As the name of the Session layer implies, functions at this layer create and
maintain dialogs between source and destination applications.
The Session layer handles the exchange of information to initiate dialogs, keep
them active, and to restart sessions that are disrupted or idle for a long period of
time.
If session fails, only data after the most recent checkpoint need be transmitted
Manages who can transmit data at a certain time and for how long
It is the lowest of the three upper layers, which collectively are concerned mainly with
software application issues and not with the details of network and internet implementation.
Session layer functionality includes:
• Virtual connection between application entities
• Synchronization of data flow
• Creation of dialog units
• Acknowledgements of data received during a session
• Retransmission of data if it is not received by a device
Dialog Control : This layer allows two systems to start communication with
each other in half-duplex or full-duplex.
Port Addressing
Layer 4 protocols include TCP (Transmission Control Protocol) and UDP (User Datagram
Protocol).
FUNCTIONS OF TRANSPORT LAYER:
Service Point Addressing : Transport Layer header includes service point address which is port
address. This layer gets the message to the correct process on the computer unlike Network Layer,
which gets each packet to the correct computer.
Segmentation and Reassembling : A message is divided into segments; each segment contains
sequence number, which enables this layer in reassembling the message. Message is reassembled
correctly upon arrival at the destination and replaces packets which were lost in transmission.
› Connection Oriented Transport Layer : Before delivering packets, connection is made with transport layer at
the destination machine.
Error Control : Error Control is performed end to end in this layer to ensure that the complete
message arrives at the receiving transport layer without any error. Error Correction is done through
retransmission.
Defines end-to-end delivery of packets.
The main aim of this layer is to deliver packets from source to destination across multiple links
(networks).
If two computers (system) are connected on the same link then there is no need for a network
layer.
It routes the signal through different channels to the other end and acts as a network controller.
It also divides the outgoing messages into packets and to assemble incoming packets into
messages for higher levels.
It translates logical network address into physical address. Concerned with circuit, message or
packet switching.
Routers and gateways operate in the network layer. Mechanism is provided by Network Layer
for routing the packets to final destination.
Connection services are provided including network layer flow control, network layer error
control and packet sequence control.
Bridges
Allows a device to access the network to send and receive messages
Bridges
Other responsibilities of the data link layer include the following:
Framing. The data link layer divides the stream of bits received from the
network layer into manageable data units called frames.
Flow control. If the rate at which the data are absorbed by the receiver is less
than the rate at which data are produced in the sender, the data link layer
imposes a flow control mechanism to avoid overwhelming the receiver.
Error control. The data link layer adds reliability to the physical layer by
adding mechanisms to detect and retransmit damaged or lost frames. It also uses
a mechanism to recognize duplicate frames
Access control. When two or more devices are connected to the same link, data
link layer protocols are necessary to determine which device has control over
the link at any given time.
The physical layer deals with the physical characteristics of
the transmission medium.
The physical layer coordinates the functions required to
carry a bit stream over a physical medium.
It defines the electrical, mechanical, procedural, and
functional specifications for activating, maintaining, and
deactivating the physical link between end systems.
Such characteristics as voltage levels, timing of voltage
changes, physical data rates, maximum transmission
distances, physical connectors, and other similar attributes
are defined by physical layer specifications.
Components of the physical layer include:
• Cabling system components
• Adapters that connect media to physical interfaces
• Connector design and pin assignments
• Hub, repeater, and patch panel specifications
• Wireless system components
• Network Interface Card (NIC)
There was no standard for networks in the early days and as a result it
was difficult for networks to communicate with each other.
The International Organisation for Standardisation (ISO) recognised this.
and researched various network schemes, and in 1984 introduced the
Open Systems Interconnection (OSI) reference model.
The OSI reference model has standards which ensure vendors greater
compatibility and interoperability between various types of network
technologies.
The OSI reference model organizes network functions into seven
numbered layers.
Each layer provides a service to the layer above it in the protocol
specification and communicates with the same layer’s software or
hardware on other computers.
Layers 1-4 are concerned with the flow of data from end to end through
the network and Layers 5-7 are concerned with services to the
applications.
When you send an email, or click on a
web page in a browser, a series of
events must occur before any
information leaves your computer. Many
different types of software are involved
in something as simple as sending an
email. For example:
Your email program must ask you to provide some necessary
information, such as your own name and email address, the
name and email address of the person you are sending the
email to, and the subject line and body of the email itself, which
contains your message.
If you are sending your data over a secure connection (for example, clicking
a web page protected by SSL encryption, such as your bank's web pages),
then your data also needs to be encrypted before it can be sent. This is also
done by software on your computer.
•TCP/IP supports
the Internetworking Protocol. IP, in turn, uses four supporting
protocols: ARP,RARP, ICMP, and IGMP.0
It Associates a logical address with a physical address.
Every device (NIC) has physical address
ARP is used to find the physical address of the node
when its Internet address is known.