SlideShare a Scribd company logo
This is continuation of part 2, we are going to
discuss
ISO OSI reference model
Reference model
formally defines what is meant by a layer, a service etc.
Service architecture
describes the services provided by each layer and the service
access point
Protocol architecture
set of protocols that implement the service architecture
compliant service architectures may still use non-compliant
protocol architectures
The seven Layers
Presentation
Application
Session
Transport
Network
Data Link
Physical
Presentation
Application
Session
Transport
Network
Data Link
Physical
Network
Data Link
Physical
End system End systemIntermediate
system
The seven Layers - protocol stack
Presentation
Application
Session
Transport
Network
Data Link
Physical
Presentation
Application
Session
Transport
Network
Data Link
Physical
data
DH+data+DT
bits
data
data
data
data
AH
PH
SH
TH
Network
Data Link
Physical
dataNH
 Session and presentation layers are not so important, and are often ignoredSession and presentation layers are not so important, and are often ignored
Physical layer
Moves bits between physically connected end-systems
Standard prescribes
coding scheme to represent a bit
shapes and sizes of connectors
bit-level synchronization
Internet
technology to move bits on a wire, wireless link, satellite channel etc.
Datalink layer
(Reliable) communication over a single link.
Introduces the notion of a frame
set of bits that belong together
Idle markers tell us that a link is not carrying a frame
Begin and end markers delimit a frame
Internet
a variety of data link layer protocols
most common is Ethernet
others are FDDI, SONET, HDLC
Datalink layer (contd.)
Datalink layer protocols are the first layer of software
Very dependent on underlying physical link properties
Usually bundle both physical and datalink in hardware.

Ethernet (broadcast link)
 end-system must receive only bits meant for it
 need data link-layer address
 also need to decide who gets to speak next
 these functions are provided by Medium Access sub layer (MAC)
Network layer
Carries data from source to destination.
Logically concatenates a set of links to form the abstraction of an
end-to-end link
Allows an end-system to communicate with any other end-system
by computing a route between them
Hides idiosyncrasies of data link layer
Provides unique network-wide addresses
Found both in end-systems and in intermediate systems
Network layer types
 In datagram networks
 provides both routing and data forwarding
 In connection-oriented network
 separate data plane and control plane
 data plane only forwards and schedules data (touches every
byte)
 control plane responsible for routing, call-establishment, call-
teardown (doesn’t touch data bytes)
 Internet
 network layer is provided by Internet Protocol (IP)
 found in all end-systems and intermediate systems
 provides abstraction of end-to-end link
 segmentation and reassembly
 packet-forwarding, routing, scheduling
 unique IP addresses
 can be layered over anything, but only best-effort service
Network layer (contd.)
Network layer (contd.)
At intermediate systems
participates in routing protocol to create routing tables
responsible for forwarding packets
schedules the transmission order of packets
chooses which packets to drop

At end-systems
 primarily hides details of data link layer
 segments and reassemble
 detects errors
Transport layer
Reliable end-to-end communication.
creates the abstraction of an error-controlled, flow-controlled and
multiplexed end-to-end link
 (Network layer provides only a ‘raw’ end-to-end service)
Some transport layers provide fewer services
e.g. simple error detection, no flow control, and no retransmission
 Internet
 TCP provides error control, flow control, multiplexing
 UDP provides only multiplexing
Transport layer (contd.)
Error control
GOAL: message will reach destination despite packet loss, corruption and
duplication
ACTIONS: retransmit lost packets; detect, discard, and retransmit corrupted
packets; detect and discard duplicated packets
Flow control
match transmission rate to rate currently sustainable on the path to
destination, and at the destination itself
Multiplexes multiple applications to the same end-to-end
connection
adds an application-specific identifier (port number) so that receiving end-
system can hand in incoming packet to the correct application
Session layer
Not common
Provides full-duplex service, expedited data delivery, and session
synchronization
Internet
doesn’t have a standard session layer
Session layer (cont.)
Duplex
if transport layer is simplex, concatenates two transport endpoints
together
Expedited data delivery
allows some messages to skip ahead in end-system queues, by using a
separate low-delay transport layer endpoint
Synchronization
allows users to place marks in data stream and to roll back to a pre
specified mark
Presentation layer
Usually ad hoc
Touches the application data
(Unlike other layers which deal with headers)
Hides data representation differences between applications
characters (ASCII, Unicode, EBCDIC.)
Can also encrypt data
Internet
no standard presentation layer
only defines network byte order for 2- and 4-byte integers
Application layer
The set of applications that use the network
Doesn’t provide services to any other layer

More Related Content

PPT
Computer networks-2
PPT
Computer networks-4
PPT
Computer networks-1
PPT
Osi layer and network protocol
PPT
OSI Model
PPT
Introduction to Computer Networks
PPTX
Osi reference model and the tcp
PPTX
Tcp/Ip Model
Computer networks-2
Computer networks-4
Computer networks-1
Osi layer and network protocol
OSI Model
Introduction to Computer Networks
Osi reference model and the tcp
Tcp/Ip Model

What's hot (20)

PPTX
computer network OSI layer
PDF
Chap 2 network models
PPTX
COMPUTER NETWORKS UNIT 1
PPTX
COMPUTER NETWORKS UNIT 3
PPTX
Tcp/ip model and protocol
PPTX
Iso layers
PPTX
The OSI model
PPTX
Chapter 3 final
PPTX
Osi model
PPT
Bhargavi osi
PPT
COMPUTER NETWORKS UNIT 4
PPTX
Network and Protocol
PPT
OSI MODEL - A PROJECT
PPTX
OSI Reference Model and TCP/IP (Lecture #3 ET3003 Sem1 2014/2015)
PDF
Mid term Topic
PPTX
Basic Concepts of Computer Networking
PPTX
Reference models in Networks: OSI & TCP/IP
PDF
Class Note 01
PDF
Class Note 02
computer network OSI layer
Chap 2 network models
COMPUTER NETWORKS UNIT 1
COMPUTER NETWORKS UNIT 3
Tcp/ip model and protocol
Iso layers
The OSI model
Chapter 3 final
Osi model
Bhargavi osi
COMPUTER NETWORKS UNIT 4
Network and Protocol
OSI MODEL - A PROJECT
OSI Reference Model and TCP/IP (Lecture #3 ET3003 Sem1 2014/2015)
Mid term Topic
Basic Concepts of Computer Networking
Reference models in Networks: OSI & TCP/IP
Class Note 01
Class Note 02
Ad

Similar to Computer networks-3 (20)

PPTX
SYBSC IT COMPUTER NETWORKS UNIT I Network Models
PPTX
seven layer OSI model
PPT
CN Module 1 ppt final 20.08.2020.ppt
PPT
PDF
introduction to computer network lecture one
PPT
Osi , tcp/ip protocol and Addressing
PDF
Ccna notes
PPTX
Presentation5
PPT
Lecture 06
PPT
group11_DNAA:protocol stack and addressing
PDF
Computer Network Unit-1 ppt
PPT
nv.ppt
PDF
CCNA Report
PPTX
EContent_11_2024_10_15_02_14_40_UNIT2newpptx__2024_08_08_10_16_53.pptx
PDF
Ccna notes
PPT
Class_notes_InternetTechnology
PPT
Unit 1 introduction
SYBSC IT COMPUTER NETWORKS UNIT I Network Models
seven layer OSI model
CN Module 1 ppt final 20.08.2020.ppt
introduction to computer network lecture one
Osi , tcp/ip protocol and Addressing
Ccna notes
Presentation5
Lecture 06
group11_DNAA:protocol stack and addressing
Computer Network Unit-1 ppt
nv.ppt
CCNA Report
EContent_11_2024_10_15_02_14_40_UNIT2newpptx__2024_08_08_10_16_53.pptx
Ccna notes
Class_notes_InternetTechnology
Unit 1 introduction
Ad

More from MSA Technosoft (11)

PPT
What is a Digital Signature? | How Digital Signature work?
PPT
Cascading Style Sheets - CSS - Tutorial
PPT
www | HTTP | HTML - Tutorial
PPTX
Responsive Web Design | Website Designing
DOC
BFS, Breadth first search | Search Traversal Algorithm
PPT
MIS ( Management Information System ) | DEFINITION, IMPORTANCE & BENIFITS
PPT
Hacking tutorial
PPT
eCommerce | Electronic Commerce
PPT
Digital Marketing | Internet Marketing | Social Networking
PPT
Cascading Style Sheet | CSS
PPT
Data communication and computer networks | Network Topologies
What is a Digital Signature? | How Digital Signature work?
Cascading Style Sheets - CSS - Tutorial
www | HTTP | HTML - Tutorial
Responsive Web Design | Website Designing
BFS, Breadth first search | Search Traversal Algorithm
MIS ( Management Information System ) | DEFINITION, IMPORTANCE & BENIFITS
Hacking tutorial
eCommerce | Electronic Commerce
Digital Marketing | Internet Marketing | Social Networking
Cascading Style Sheet | CSS
Data communication and computer networks | Network Topologies

Recently uploaded (20)

PPTX
IMMUNITY IMMUNITY refers to protection against infection, and the immune syst...
PDF
Basic Mud Logging Guide for educational purpose
PPTX
human mycosis Human fungal infections are called human mycosis..pptx
PPTX
master seminar digital applications in india
PDF
Classroom Observation Tools for Teachers
PDF
2.FourierTransform-ShortQuestionswithAnswers.pdf
PDF
Mark Klimek Lecture Notes_240423 revision books _173037.pdf
PDF
STATICS OF THE RIGID BODIES Hibbelers.pdf
PDF
FourierSeries-QuestionsWithAnswers(Part-A).pdf
PDF
Origin of periodic table-Mendeleev’s Periodic-Modern Periodic table
PPTX
Final Presentation General Medicine 03-08-2024.pptx
PPTX
Week 4 Term 3 Study Techniques revisited.pptx
PDF
O5-L3 Freight Transport Ops (International) V1.pdf
PDF
3rd Neelam Sanjeevareddy Memorial Lecture.pdf
PDF
RMMM.pdf make it easy to upload and study
PDF
The Lost Whites of Pakistan by Jahanzaib Mughal.pdf
PPTX
Introduction_to_Human_Anatomy_and_Physiology_for_B.Pharm.pptx
PDF
Saundersa Comprehensive Review for the NCLEX-RN Examination.pdf
PDF
Module 4: Burden of Disease Tutorial Slides S2 2025
PPTX
The Healthy Child – Unit II | Child Health Nursing I | B.Sc Nursing 5th Semester
IMMUNITY IMMUNITY refers to protection against infection, and the immune syst...
Basic Mud Logging Guide for educational purpose
human mycosis Human fungal infections are called human mycosis..pptx
master seminar digital applications in india
Classroom Observation Tools for Teachers
2.FourierTransform-ShortQuestionswithAnswers.pdf
Mark Klimek Lecture Notes_240423 revision books _173037.pdf
STATICS OF THE RIGID BODIES Hibbelers.pdf
FourierSeries-QuestionsWithAnswers(Part-A).pdf
Origin of periodic table-Mendeleev’s Periodic-Modern Periodic table
Final Presentation General Medicine 03-08-2024.pptx
Week 4 Term 3 Study Techniques revisited.pptx
O5-L3 Freight Transport Ops (International) V1.pdf
3rd Neelam Sanjeevareddy Memorial Lecture.pdf
RMMM.pdf make it easy to upload and study
The Lost Whites of Pakistan by Jahanzaib Mughal.pdf
Introduction_to_Human_Anatomy_and_Physiology_for_B.Pharm.pptx
Saundersa Comprehensive Review for the NCLEX-RN Examination.pdf
Module 4: Burden of Disease Tutorial Slides S2 2025
The Healthy Child – Unit II | Child Health Nursing I | B.Sc Nursing 5th Semester

Computer networks-3

  • 1. This is continuation of part 2, we are going to discuss
  • 2. ISO OSI reference model Reference model formally defines what is meant by a layer, a service etc. Service architecture describes the services provided by each layer and the service access point Protocol architecture set of protocols that implement the service architecture compliant service architectures may still use non-compliant protocol architectures
  • 3. The seven Layers Presentation Application Session Transport Network Data Link Physical Presentation Application Session Transport Network Data Link Physical Network Data Link Physical End system End systemIntermediate system
  • 4. The seven Layers - protocol stack Presentation Application Session Transport Network Data Link Physical Presentation Application Session Transport Network Data Link Physical data DH+data+DT bits data data data data AH PH SH TH Network Data Link Physical dataNH  Session and presentation layers are not so important, and are often ignoredSession and presentation layers are not so important, and are often ignored
  • 5. Physical layer Moves bits between physically connected end-systems Standard prescribes coding scheme to represent a bit shapes and sizes of connectors bit-level synchronization Internet technology to move bits on a wire, wireless link, satellite channel etc.
  • 6. Datalink layer (Reliable) communication over a single link. Introduces the notion of a frame set of bits that belong together Idle markers tell us that a link is not carrying a frame Begin and end markers delimit a frame Internet a variety of data link layer protocols most common is Ethernet others are FDDI, SONET, HDLC
  • 7. Datalink layer (contd.) Datalink layer protocols are the first layer of software Very dependent on underlying physical link properties Usually bundle both physical and datalink in hardware.  Ethernet (broadcast link)  end-system must receive only bits meant for it  need data link-layer address  also need to decide who gets to speak next  these functions are provided by Medium Access sub layer (MAC)
  • 8. Network layer Carries data from source to destination. Logically concatenates a set of links to form the abstraction of an end-to-end link Allows an end-system to communicate with any other end-system by computing a route between them Hides idiosyncrasies of data link layer Provides unique network-wide addresses Found both in end-systems and in intermediate systems
  • 9. Network layer types  In datagram networks  provides both routing and data forwarding  In connection-oriented network  separate data plane and control plane  data plane only forwards and schedules data (touches every byte)  control plane responsible for routing, call-establishment, call- teardown (doesn’t touch data bytes)
  • 10.  Internet  network layer is provided by Internet Protocol (IP)  found in all end-systems and intermediate systems  provides abstraction of end-to-end link  segmentation and reassembly  packet-forwarding, routing, scheduling  unique IP addresses  can be layered over anything, but only best-effort service Network layer (contd.)
  • 11. Network layer (contd.) At intermediate systems participates in routing protocol to create routing tables responsible for forwarding packets schedules the transmission order of packets chooses which packets to drop  At end-systems  primarily hides details of data link layer  segments and reassemble  detects errors
  • 12. Transport layer Reliable end-to-end communication. creates the abstraction of an error-controlled, flow-controlled and multiplexed end-to-end link  (Network layer provides only a ‘raw’ end-to-end service) Some transport layers provide fewer services e.g. simple error detection, no flow control, and no retransmission  Internet  TCP provides error control, flow control, multiplexing  UDP provides only multiplexing
  • 13. Transport layer (contd.) Error control GOAL: message will reach destination despite packet loss, corruption and duplication ACTIONS: retransmit lost packets; detect, discard, and retransmit corrupted packets; detect and discard duplicated packets Flow control match transmission rate to rate currently sustainable on the path to destination, and at the destination itself Multiplexes multiple applications to the same end-to-end connection adds an application-specific identifier (port number) so that receiving end- system can hand in incoming packet to the correct application
  • 14. Session layer Not common Provides full-duplex service, expedited data delivery, and session synchronization Internet doesn’t have a standard session layer
  • 15. Session layer (cont.) Duplex if transport layer is simplex, concatenates two transport endpoints together Expedited data delivery allows some messages to skip ahead in end-system queues, by using a separate low-delay transport layer endpoint Synchronization allows users to place marks in data stream and to roll back to a pre specified mark
  • 16. Presentation layer Usually ad hoc Touches the application data (Unlike other layers which deal with headers) Hides data representation differences between applications characters (ASCII, Unicode, EBCDIC.) Can also encrypt data Internet no standard presentation layer only defines network byte order for 2- and 4-byte integers
  • 17. Application layer The set of applications that use the network Doesn’t provide services to any other layer