Application layer

Application layer

The application layer enables the user, whether human or software, to access the network. Application layer provides user interfaces and support for services such as electronic mail. Remote file access and transfer, share database management and other types of distributed information services. Specific services provided by the application layer include the following:
Ø  Network virtual terminal. A network virtual terminal is a software version of physical terminal and allow user to log on to a remote host. To do the application creates a software emulation of a terminal at the remote host. The user's computer talk to the software terminal, which in turn  talks to the host, vice versa. The remote host believes it is communicating with one of its own terminals and allows you to log on.
Ø  File transfer, access and management (FTAM). This application allows a user to access files in remote host (to make change or read data), to retrieve files form a remote computer for use in the local computer, and to manage or control files in a remote computer locally.
Ø  E-mail services. This application provides the basis for e-mail forwarding and storage.
Ø  Directory services. The application provides distributed database sources and access for global information about various objects and services. 

0 comments:

Presentation layer

Presentation layer

The presentation layer is concerned with the syntax and semantics of the information exchange between two systems. Specific responsibilities of the presentation layer include the following:
Ø  Translation. The process(running programs) in two systems are usually exchanging  information in the form of character strings, numbers, and so on. The information should be changed to bit streams before being transmitted. Because different computers use different encoding system, the presentation layer is responsible for interoperability between these different encoding methods. The presentation layer at the sender changes the information from its sender-dependent into a common format. The presentation layer at the receiving machine changes the common format into its receiver. Dependent format.
Ø  Encryption. To carry sensitive information a system must be able to assure privacy. Encryption means that the sender transformer the original information to another form and sends the resulting message out over the network. Decryption reverses the original process to transform the message back to its original form.
Ø  Compression. Data compression reduces the number of bits contained in the information. Data compression becomes particularly important in the transmission of multimedia such as text, audio and video.

0 comments:

Session layer

Session layer

The services provided by the first four layers (physical, data link, network and transport) are not sufficient for some processes. The session layer is the network dialogue controller. It establishes, and synchronizes the interaction between communicating system. Specific responsibilities of the session layer include the following:
Ø  Dialogue control. The session layer allows two system to enter into a dialogue. It allows the communication between two processes to take place in either half-duplex (one way at a time) or full-duplex (two way at a time) mode.
Ø  Synchronization. The session layer allows a process to add check points (synchronization points) into a stream of data. For example, if a system is sending a file of 2000 pages, it is advisable to insert check point after every 100 pages to ensure that each 100-page unit is received and acknowledged independently In this case, if a crash happens during the transmission of page 515, the only pages that need be resent after system recovery are pages 475 to. Pages previous to 475 need not be resent.

0 comments:

Transport layer

Transport layer

The transport layer is responsible for process-to-process delivery of the entire message. A process is an application program running on the host. Whereas the network layer oversees source-to-destination delivery of individual packets, it does not recognize any relationship between those packets. It treats each one independently, as though each piece belong to a separate message, whether or not it does. The transport layer, on the other hand, ensures that the whole message arrives intact and in order, overseeing both error control and flow control at the source-to-destination level. Other responsibilities of the transport layer include the following:
Ø  Service-point addressing. Computers often run several programs at the same time. For this reason, source-to-destination delivery means delivery not only from one computer to the next but also from a specific process (running program) on the other. The transport layer header must therefore include a type of address called a service-point address (or port address). The network layer gets each packet to the correct computer; the transport layer gets the entire message to the correct process on that computer.
Ø  Segmentation and reassembling. A message is divided into transmittable segments, with each segment containing sequence number. These numbers enable the transport layer to reassemble the message correctly upon arriving at the destination and to identify and replace packets that were lost in transmission.
Ø  Connection control. The transport layer can be either connectionless or connection oriented. A connectionless transport layer treats each segment as an independent packet and delivers it to the transport layer at the destination computer. A connection oriented transport layer makes a connection with the transport layer at the destination machine first before delivering the packets after all the data is transferred, the connection is terminated.
Ø  Flow control. Like the data link layer, the transport layer is responsible for flow control. However, flow control at this layer is performed end to end rather than across a single link.
Ø  Error control. Like the data link layer, the transport layer is responsible for error control. However, error control at this layer is performed process-to-process rather than to across a single link. The sending transport layer make sure that the entire message arrives at the receiving transport layer without error (damage, loss or duplication). Error correction is usually achieved through transmission.

0 comments:

Network layer

Network Layer

The network layer is responsible for the source-to destination delivery of a packet, possibly across multiple networks (links). Whereas the data link layer oversees the delivery of the packet between two system on the same network (link), the network layer ensures that each packet gets from its point if origin to its final destination.
        If two systems are connected to the same link, there is usually no need for a network layer. However, if the two systems are attached two different networks (link) with connecting devices between the networks (link), there is often a need for the network layer to accomplish source-to-destination delivery. Other responsibilities of the network layer include the following:
Ø  Logical addressing. The physical addressing implemented by the data link layer handles the addressing problem locally. If a packet passes the network boundary, we need another addressing system distinguish the source and destination system. The network layer adds a header to the packet coming from the upper layer that, among other thing, includes the logical addresses of the sender and receiver.
Ø  Routing. When independent networks or links are connected together to create internetworks (network of networks) or a large network, the connecting devices (called routers or switches) route or switch the packets to their final destination. One of the function of the network layer is to provides this mechanism.

0 comments:

Data link layer

Data link layer

The data link layer transforms the physical layer, a raw transmission facility, to a reliable link. It makes the physical layer appear error-free to the upper layer(network layer). Other responsibilities of the data link layer include the following:
Ø  Framing. The data link layer divides the stream of bits received from the network layer into manageable data units called frame.
Ø  Physical addressing. If frames are to be distributed to different system on the network, the data link layers add a header to the frame to define the sender and /or receiver of the frame. If the frame is intended for a system outside the sender’s network, the receiver address is the address of the connecting device that connects the network to the next one.
Ø  Flow control. If the rate at which the data is absorbed by the receiver is less than the rate produced at the sender, the data link layer imposes a flow control mechanism to prevent overwhelming the receiver.
Ø  Error control. The data link layer adds reliability to the physical layer by adding mechanism to detect and retransmit damaged or lost frames. It also uses a mechanism to recognize a duplicate frame. Error control is normally achieved through a trailer added to the end of the frame.
Ø  Access control. When two or more devices are connected to the same link, data link layer protocols are necessary to determine which device has control over the link at any given time.

0 comments:

Physical Lyer

Layers in the OSI model

Physical layer

The physical layer coordinates the function required to carry a bit stream over a physical medium. Physical Layer deals with the mechanical and electrical specifications of the interface and transmission media Physical Layer also defines the procedures and functions that physical devices and interfaces have to perform for transmission to occur.
The physical layer is responsible for moving individual bits from one
(NODE) to the next.
Physical layer is concerned with the following
Ø  Physical characteristics of interfaces and media.                The physical layer defines the characteristics of the interface between the devices and the transmission media. It also defines the type of transmission media.
Ø  Representation of bits. The physical layer data consists of a stream of bits (sequence of 0s and 1s ) with no interpretation. To be transmitted bits must be encoded into signals (electrical or optical). The physical layer defines the type of encoding (how 0s and 1s are changed to signals).
Ø  Data rate.            The transmission rate – the number of bits sent each second –is also defined by the physical layer. In other words, the physical layer defines the duration of a bit, which is how long it lasts.
Ø  Synchronization                                The sender and receiver must not only use the same bit rate but must also be synchronized at the bit level. In other words, the sender and the receiver clocks must be synchronized.
Ø  Line configuration.          The physical layer is concerned with the connection of devices to the media. In a point-to-point configuration, two devices are connected together through a dedicated link. In a multipoint configuration a link is shared between several devices .
Ø  Physical topology.            The physical topology define how devices are connected to make a network. Devices can be connected using a mesh topology (every device connected to every other device), a star topology (devices are connected through a central device), a ring topology (each device is connected to the next. Forming a ring), or a bus topology (every device ion a common link)
Ø  Transmission mode         The physical layer also defines the direction of transmission between two devices: simplex, half duplex. In the simplex mode, only one device can send; the other can only receive. The simplex mode is a one way communication. In the half duplex mode, two devices can send and receive, but not at the same time, in a full-duplex (or simple duplex) mode, two devices can send and receive at the same time.

0 comments:

SIP (Session Initiation Protocol)

SIP (Session Initiation Protocol)

SIP is an application layer protocol designed to be independent of the underlying transport layer; it can run on transmission control protocol (TCP), UDP, or SCTP. It is a text based protocol, incorporating many elements of the HTTP and the SMTP.

The session Initiation Protocol is a signaling communication protocol, widely used for controlling multimedia communication sessions such as voice and video calls over IP.
The protocol defines the messages that are sent between peers which govern establishment, terminations and other essential element of call. SIP can be used for creating, modifying, and terminating two party (unicast) or multiparty (multicast) sessions consisting one or several media streams. Other SIP applications include video conferencing, streaming multimedia distribution, instant messaging, presence information, file transfer and online games.
SIP work in conjunction with several other application layer protocols that identify and carry the session media identification and negotiation is achieved with session description protocol (SDP). For the transmission of media stream a(voice, video) SIP typically employs the Real-Time transport protocol (RTP), which many be secured with the secure Real-Time transport protocol (RTP). For secure transmissions of SIP message the protocol may be encrypted with transport layer security TLS.

0 comments:

NNTP (Network News Transport Protocol)


NNTP (Network News Transfer Protocol)

The News Transport Protocol (NNTP) is an application protocol used for transporting Usenet news articles (net news) between news server and for reading and posting articles by end client application.
Usenet was originally designed based on the UUCP network, with most article transfer taking place over direct point to point telephone link between news sever and which were powerful time sharing systems. Readers and posters logged into this computer reading the article directly from the local disc.
As local area network and internet participation it became describe to allow news readers to be run on personal computers connected to local networks. Because distributed files system were not yet widely available, a news protocol was developed based on the client server model. It resembled the simple Mail Transfer Protocol (SMTP), but was tailored for exchanging news group article.
A news reader, also known as a news client, is a software application that reads article on Usenet, either directly from the news server's disks or via the NNTP. The well-known TCP port 119 is reserved for NNTP. When client connect to a news server with transport layer security (TLS), TCP port 563 is used. This is sometimes referred to as NNTPS.
In October 2006, the IETF released RFC 3977 which updates the NNTP protocol and codifies many of the additions over the years since RFC977.

0 comments:

Domain Name System


DNS (Domain Name System)

The Domain Name System is a hierarchical distributed naming system for computers, services, or any resource connected to internet or a private network. It associates various information with domain names assigned to each of the participating entities. Most prominently, it translates easily memorized domain name to the numerical IP addresses needs for the purpose of locating computer services and devices worldwide. By providing a worldwide, distributed keyword-based redirection service, the Domain Name System is an essential component of the functionality of the internet.
An often-used analogy to explain the Domain Name System is that it serves as the phone book for the internet by translating human-friendly computer hostnames into IP addresses. For example the domain name www.example.com translates to the addresses 192.163.0.10 (IPv4) and 2001:500:88:200::10 (IPv6). Unlike a phonebook the DNS can be quick updated, allowing a service's location on the network to change without effecting the end users, who continue to use the same hostname. Users take advantage of this when they use meaningful uniform resource locator (URL) and E-mail addresses without having to known how the computer actually locates the services.
The Domain Name System distributes the responsibility of assigning domain names and mapping those names to IP addresses by designating authoritative name serves for each domain. Authoritative name servers are assigned to be responsible for their particular domain and in turn can assign other authoritative name servers for their sub-domains. This mechanism has made the DNS distributed and fault tolerant and has held avoid the need for a single central register to be continually consulted and updated. Additionally the responsibility for maintaining and updating the master record for the domain is spread among many domain name registers, who compete for the end-user's (the domain-owner's) business. Domain can be moved from one registrar to other registrar at any time.
The Domain Name System also specifies the technical functionality of this data base service. It defines the DNS protocol, a detailed specification of the data structures and data communication exchanges used in DNS, as part of the internet protocol suit.

0 comments:

What is Protocol?


Protocols

A communication protocol is (Networking protocol) is a system of digital message formats and rules for exchanging messages in or between computing system and in telecommunications. A protocol may have a formal description. Protocol may include signaling, authentication and error detection and correction capability.
In a routing protocol, it specifies that how routers communicate with each other and with the other types of machines. Protocols are determines and enable the routes between the nodes on a computer network. Algorithms determine the specific choice of routing. A router has knowledge only the direct attached networks and a protocol shares information about the neighbors immediate and then throughout the network. A router can understand the network topology through the protocol. So we can say that a protocol is playing very important role in a network. Although, there are many types of protocols.

Types of protocols

There are many types of protocols for different purpose in networking.

Routing protocols

IS-IS, OSPF, IGRP and EIGRP, RIP, BGP,

Internet protocols

Application Layer

DHCP, DHCPv6, DNS, FTP, HTTP, IMAP, IRC, LDAP, MGCP, NNTP, BGP, NTP, POP, RPC, RTP, RTSP, RIP, SIP, SMTP, SNMP, SOCKS, SSH, Telnet, TLS/SSL, XMPP.

Transport Layer

 TCP, UDP, DCCP, SCTP, RSVP, TP-TCP, NC, MTP

Network Layer

IP(IPv4,IPv6), ICMP, ICMPv6, ECN, IGMP, IPSec, GGP.

Link Layer

ARP/in ARP, NDP, OSPF, TUNNELS (L2TP), PPP,

0 comments:

What is subnet mask?


Subnet mask

A network mask is used when a network is not sub netted. The subnet mask is used to find the first address in the block. However when a mask is sub netted, the situation is different. We must have a subnet mask. The subnet has more 1s.
Subnetting increases the length of the netid and decrease the length of hostid. When we divide a network to s number of subnetworks, each of number of hosts, we can calculate the subnetid for each subnetwork as in which n is the length of netid,.

Subnet Address

When a network is subnetted, the first address in the subnet is the identifier of the subnet and is used by the router to route the packets destined for that subnet works. Given any address in the subnet, the router can find the subnet mask using the same procedure we discussed to find the subnetwork mask. ANDing the given address with the subnet mask.

Super netting

Subnetting couldn’t completely solve address depletion problems in classful addreeing, because most organization did not want to share their granted blocks with others. since class C blocks were still available but the size of block did not meet the requirement of new organization that wanted to join the internet, one solution was super netting . in super netting, an organization can combine several class C block to create a larger range of addresses. In other, words several networks are combined to create a supernet work. By doing this, an organizarion can apply for several class C blocks instead of just one. For example, an organization that needs 1000 addresses can be granted four class C blocks.

0 comments:

What is subnetmask?


Subnetting

In subnetting, a network divides into several smaller networks with each subnetwork  having its own subnetworks. A portion of IP address is indicating the network (netid), and a portion indicates the network hostid. This means that there is a sense of hierarchy in IP addressing. To each a host on the internet, we must first reach the network using the first portion of the address. Then we must reach the host itself using the second portion. In the other word, IP address is designed with two level of hierarchy. However in many cases two levels of hierarchy are not enough. For example, imagine an organization with the network address 141.14.0.0 (a class B address). The organization has two hierarchical addressing, but cannot have more than one physical network. One solution of this problem is subnetting. Further division of a network into smaller networks is called subnetting.

Three level of hierarchy

Adding subnetworks an intermediate level of hierarchy in the IP addressing system. Now we have three levels; site, subnet and host. The site is the first level. The second level is subnet and the tird level is host of hierarchy, it defines the connection of the host to the subnetwork.
The routing of an IP datagram now involves steps: delivery to site, delivery to subnet work and delivery to the host

0 comments:

What is subnetmask?


Mask
If the network address is given, we can find the block and the range of addresses in the block.  What about the reserves? If an address is given, can we find the given address (the beginning address in the block). This is important because to route a packet to the correct network, a router needs to extract a network address from the destination address (a host address) in the packet header.
One way we can find the network address to first find the class of the address and the net ID. We then set the host ID to zero to find the network address. For example, if the address is 134.45.78.2 is given, we can immediately say that the address belong to class B. the net ID is 134.45 (2 bytes)  and the network address is 134.45.0.0.
The above method is feasible if we not subnetted the network; that is, if we have not divided the network into subnetworks. A general procedure that can be used involves a mask to find the network address from a given address.
A mask is a 32 bits binary number that gives first address in the block (the network address). When bit-wise ANDed with an address in the block.

AND Operation
Masking uses the bit-wise AND operation defined in computer science. The operation is applied bit by bit to the address and the mask.

0 comments:

Introduction to IP address


Classes and Blocks

One problem with the classfull addressing is that each class is dividing into a fixed number of blocks with each block having the fixed size. Let’s look
Class A
Class A is divided into 128 blocks with each block having a different net id. First block covers address from 0.0.0.0 to 0.255.255.255 (net id 0). The second block covers address 1.0.0.0 to 1.255.255.255 (net id 1). The last block covers address form 127.0.0.0 to 127.255.255.255 (net id 127).
Note: each block of addresses the first byte (net id) is the same, but the other three bytes (host id) can take any value in the given range.
The first and last block in this are reserved for special purpose as we will discuss shortly. In addition one block is used for private address. The remaining 125 blocks can be assigned to organization. This means that the total number of organization that can have class A address is only 125. However, each block in this class contains 16,777,216 addresses. This address is called network address. It defines the network of the organization, not individual hosts. The organization is not allowed to use last address; it is reserved for a special purpose. Class A address is design for large organization with a large number of hosts or routers attached t their network.
Class B
Class B is divided into 16,384 blocks with each block having a different net id. Sixteen blocks are reserved for private addresses, leaving it 16,368 blocks for assignment to organization. The first block covers address form 128.0.0.0 to 128.0.255.255 (net id 128.0). the last block covers address from 191.255.0.0 to 191.255.255.255 (net id 191.255).
Note: each block of address the first 2 bytes net ID are same but other 2 bytes are host ID can take any value in the given range.
There are 16,368 blocks that can be assigned. This means that the total number of organization that can have class B address is 16,368. However, each block in this class contain 65,536 addresses, the organization should be large enough to use all of these addresses.
Class B was designed for mid size organization that many have tens of thousands of hosts or routers attached to their network. However, the number of addresses in each block 65,536 is larger than the needs of most midsize organizations.
Class C
Class C is divided into 2097152 blocks with each block having a net ID. 256 blocks are used for private addresses, leaving 2,096,896 blocks for assignment to organization. The first block covers address from 192.0.0.0 to 192.0.0.255 (net id 192.0.0). the last address covers address from 223.255.255.0 to 223.255.255.255 (net id 223.255.255).
Note: the each block of address the first 3 bytes are the same but last one byte can take any value in the given range. There are 2096902 blocks that can be assigned have a class C address is 2096902. However, each block in this class contains 256 addresses, which means the organization should be small enough to need less than 256 addresses.
Class C was designed for small size organization with a small number of hosts or routers attached to their network.

Class D
There just one block of class D addresses. It designed for multicasting. Each address in this class is used to define one group of hosts on the internet. When a group is assigned an address in this class, every host that is member of this group will have a multicast address in addition to its normal (unicast) address.
Class E
There is just one block also in class E address. It was designed for used as reserved address. The last address in this class 255.255.255.255 is used for a special address.
Network Addresses
Network addresses play a very important role in classfull addressing. A classful address has several properties:
1-      The network address is the first address in the block
2-      The network address defines the network to the rest of internet.
3-      Given the network address, we can find the class of the address, the block and the range of the addresses in the block.
We try to understand with the example:
Given the network address 132.210.0.0, class is B  because the first byte is between the 128 to 191. The block has net id of 132.21, the address range from 132.21.0.0 to 132.21.255.255.

2 comments:

Introduction to IP address

Class full IP Addressing

IP addressing, when started a few decades ago, used the concept of classes. This architecture is called class full IP addressing. In the mid of 1990s, a new architecture, Called classless IP addressing was introduced that will eventually supersede the original architecture. However, most of the internet is still using calssfull addressing and the migration is slow. To understand the classfull IP addressing it is important to understand classless addressing.
In classfull IP addressing, the IP address is divided into five classes A,B,C,D and E. each class is occupies some part of the whole address space, see below the table mansion the class occupation of the address space (approximate).
A
B
C
D
E

We can see that the class A covers the half of the address space, a serious design flow. Class B cover ¼ of the whole address space, another design flow. Class C is cover the 1/8 of the address, and class D and E each cover the 1/16 of the address space.

Recognize the classes

We can find the class of an address when the address is given in binary notation or in dotted decimal notation.
Find the class in binary notation
If the address is given in binary notation, the first bits can immediately tell us the class of the address.
Find the class in dotted decimal notation
When the address is given in dotted decimal notation, then we need to look only at the first byte to determining the class of the address. Each class has a specific range of number.
Net ID and Host ID
In classfull addressing an IP in classes A,B and C is divided into net id and host id.
Note: Class D and E are not divided into net id and host id.
A
Net ID
Host ID
B
Net ID
Host ID
C
Net ID
Host ID
D
Reserved For Multicast
E
Reserved For future use

0 comments:

Intriduction to IP address

Classes of IP address

Sr. #
Class
Range
Bits
Network/host
Subnet mask
01
A
1-126
0000
8/24
255.0.0.0
02
B
128-191
1000
16/16
255.255.0.0
03
C
192-223
1100
24/8
255.255.255.0
04
D
224-239
1110
N/A
N/A
05
E
240-254
N/A
N/A
N/A
01. 0 is represent the network
02. 127 is reserved for testing
03. 255 is reserved for broadcast

0 comments:

Introduction to IP address


IP Address

At the network layer, we need to uniquely identify each device on the internet to allow global communication between all devices. This is analogous to the telephone system where each telephone subscriber has a unique telephone number. If we consider the country code and the area code as part of the identifying scheme
                The identifying used in IP layer of the TCP/IP protocol suit to identify each device connected to the internet is called the internet address or IP address. An IP address is a 32 bit binary address that uniquely and universally defines the connection of a host or a router to the internet. Two devices cannot have the same IP address on the internet, it is unique address. However if a device has two connection to the internet via two networks, it has two IP addresses

0 comments:

TCP/IP Protocol Suit


Define Protocol in Networking

User Datagram Protocol (UDP)

The UDP is process to process protocol that adds only port address, check-sum error control and length information to the data from the upper layer.

Transport control protocol (TCP)

The TCP provides full transport layer services to application. TCP is a reliable stream transport protocol. The term stream in this context means connection-oriented: a connection must be established between both ends of a transmission before either can transmit data.

Application Layer

The application layer in TCP/IP is equivalent to the combined session, presentation and application layer in the OSI model. Many protocols are defined at this layer.

0 comments:

Network Introduction to TCP/IP Protocol in simple words


User Datagram Protocol (UDP)

The UDP is process to process protocol that adds only port address, check-sum error control and length information to the data from the upper layer.

Transport control protocol (TCP)

The TCP provides full transport layer services to application. TCP is a reliable stream transport protocol. The term stream in this context means connection-oriented: a connection must be established between both ends of a transmission before either can transmit data.

0 comments:

Network introduction to TCP/IP Protocol suit in simple words


Transport Layer

The transport layer is represented in TCP/IP by two protocols, TCP and UDP. The IP is a host-to-host protocol; UDP and TCP are transport level protocols. IP can deliver a packet form one physical device to another. UDP and TCP are responsible for delivery of a message from a process to another process (running programs) 

0 comments:

TCP Internet protocol


TCP/IP PRTOCOL SUIT

Physical and Data link Layer
At the physical and data link layer, TCP/IP does not define any specific protocol. It support all of the standard and proprietary protocol which LAN, MAN and WAN.
Network Layer
At the network layer TCP/IP supports the internetworking protocol which contains four supported protocols: ARP, RARP, ICMP and IGMP

0 comments:

TCP/IP Protocol Suit


Define Protocol In Networking

Internetworking protocol (IP)

The internetworking protocol (IP) is the transmission mechanism used by TCP/IP protocol. It is un reliable and connectionless datagram protocol- a best-effort delivery service. The term best-effort means that IP provides no error checking or tracking.

Address Resolution Protocol (ARP)

The Address Resolution Protocol (ARP) is used to associate an IP address with the physical address. ARP is used to find the physical address of the node, when its internet address is known.

Reverse Address Resolution Protocol (RARP)

The (RARP) allows a host to discover its internet address when it known only its physical address. It is used when a computer is connected to the network for the first time or when a diskless computer is booted.

Internet control message protocol (ICMP)

The ICMP is a mechanism used by hosts and gateways to send notification datagram problems back to the sender.

Internet Group Message Protocol (IGMP)

The IGMP used to facilitate the simultaneous transmission of the message to a group of recipients.  

0 comments:

List of Network devices

0 comments:

OSI Referance model

Encapsulation of Data




0 comments:

OSI Referance model

Role of Data Flow layer




0 comments:

OSI Referance model

ROLE OF APPLICATION LAYER IN NETWORK




0 comments:

OSI Reference model overview

OSI reference model overview




0 comments:

OSI Referance model


Network Distribution Layer Characteristics



0 comments:

The Model of Networks


The OSI Model

Established n 1947, the international standards organization (ISO) is a multinational body dedicated to worldwide agreement on international standards. Almost three-fourths  of countries in the world are represented in the ISO. An ISO standard that covers all aspect of network communication is the open system interconnection (OSI) model. It was first introduced in the late 1970s.
An Open System is a set of protocols that allows any two systems to communicate regardless of their underlying architecture. The purpose of the OSI model is to show how to facilitate communication between different system without requiring changes to the logic of the underlying hardware and software. The OSI model is not a protocol; it is the model for understanding and designing a network architecture that is flexible, robust and interoperable. The OSI model was intended to be the basis for the creation of the protocol in the OSI stack.
The OSI model is a layered framework for the design of network system that allows communication between all types of computer systems. It consists of seven separate but related layers, each of which defines a part of the process of moving information across a network. Understanding the fundamentals of the OSI model provides a solid basis for exploring data communication.

The OSI Model

Application
Presentation
Session
Transport
Network
Data link
Physical
Layer 7
Layer6
Layer5
Layer4
Layer3
Layer2
Layer1                  

Layered Architecture

The OSI model is composed of seven ordered layers. The layers involved when a message is sent from device A to Device B. As the message travels from A to B, it may pass through many intermediate nodes. These intermediate nodes usually involve only the first three layer of the OSI model.
In developing the model, the designers distilled the process of transmitting data to its most fundamental elements. They identified which networking functions had related uses and collected those function into discrete group that became the layers. Each layer defines a family of functions distinct from those of the other layers. By defining and localizing functionality in this fashion, the designers created an architecture that is both comprehensive and flexible. Most important, the OSI model allows complete interoperability between otherwise incompatible system.
Within a single machine, each layer calls upon the services of the layer just below it. Layer 3, for example, uses the services provided by layer 2 and provides services to the layer 4. Between machines, layer x on one machine logically communicate with the layer x on another machine. This communication is governed by an agreed-upon services of rules and conventions called protocols.

Layer-to-Layer communication

Device A sends to message device B(through intermediate nodes). At the sending site the message is moved down from layer 7 to layer 1. At layer 1 the entire package is converted to a form that can be transferred to the receiving site. At the receiving site, the message is moved up from layer 1 to layer 7.

Interfaces between layers

The passing of the data and network information down through the layers of the sending device and backup through the layers of the receiving device is made possible by an interface between each pair of adjacent layer. Each Interface defines what information and services a layer must provide for the Layer above it. Well-defined interfaces and layer functions provide modularity to a network. As long as a layer provides the expected services to the layer above it, the specific implementation of its functions can be modified or replaces without requiring changes to the surrounding layers.

Organization of the layers

The seven layers can be thought of as belonging to three subgroup. Layer 1,2, and 3-physical, data link and network – are the network support layer; they deal with the physical aspects of moving data from one device to another (such as electrical specifications, physical connections, physical addressing and transport timing and reliability). layers 5,6 and 7 – session presentation and application can be thought of as the user support layers; they allow interoperability among un related software systems. Layer 4, the transport layer, links the two subgroups and ensures that what the lower layers have transmitted is in a form that the upper layers can use. The upper OSI layers are almost always implemented in software; lower layers are a combination of hardware and software, except for the physical layer, which is mostly hardware.
In this image, which gives an overall view of the OSI layers, D& data means the data unit at layer 7, D6 data means the data unit at layer 6, and so on. The process starts at layer 7 (the application layer), then moves from layer to layer in descending, sequential order. At each layer, a header can be added to the data unit. At layer 2, a trailer may also be added. When the formatted data unit passes through the physical layer (layer 1), it is changed into electromagnetic signals and transported along a physical link.       
Upon reaching its destination, the signals passes into layer 1 and is transformed back into digital form. The data units then move backup through OSI layers. As each block of data reaches the next higher layer, the headers and trailers attached to it at the corresponding sending layer are removed and action appropriate to that layer are taken. By the time it reaches layer 7, the message is again a form appropriate to the application and is made available to the recipient.

Encapsulation

 Reveals another aspect of data communication in the OSI model: encapsulation. A packet at level 7 is encapsulated in the packet at level 6. The whole packet at level 6 is encapsulated in a packet at layer 5 and so on.
In other words, the data part of a packet at level N is carrying the whole packet (data and overhead) from level N+1. The concept is called encapsulation because level N is not aware what part of the encapsulated packet is data and what part is the header or trailer. For level N, the whole packet coming from level N+1 is treated as one integral unit. 

0 comments: