Bahria School of Engineering and Applied Sciences (BSEAS)
Bahria University, H-11 Campus, Islamabad
Assignment 1 – Spring 2025
Computer
Course Title: Communication Course Code: CEN 223 Credit Hours: 3 (3,0)
s & Networks
Course Program
Haad Akmal BS RIS
Instructor: Name:
Semester: 4th Batch: 2023 Section: C
Number of
Submission Maximum
03-03-2025 5 Extra Sheets
Due Date: Marks:
Attached:
Student’s Enrollment
Faraz Ahmed 01-139232-137
Name: Number:
Important Instructions / Guidelines:
• Late submissions would have deduction in marks.
• The students are strongly “encouraged” to use visual data (graphs, figures, images) where
necessary, to enhance the quality of their assignments.
• Use proper references at the end of the text.
• Giving real life relevant examples would also grant more marks.
• Avoid plagiarizing (copying) other works.
• The assignment should be typed in a word document and uploaded to the respective LMS
portal.
THE OSI Model
Introduction:
The Open Systems Interconnection (OSI) model is a conceptual framework used to understand
and standardize the functions of a networking system. It divides communication into seven
layers, each with specific roles and protocols. This assignment explores each layer, detailing its
function, real-world application, and key associated technologies.
1. Physical Layer (Layer 1)
Role: The Physical Layer is responsible for the physical transmission of raw data (bits) over a
medium such as cables or wireless signals.
Functions:
Defines physical media and connectors
Transmits raw bits (0s and 1s)
Manages signaling, voltages, and data rates
Real-World Example:
Ethernet cables, fiber optics, radio frequencies
Key Protocols & Technologies:
Ethernet (IEEE 802.3)
Wi-Fi (IEEE 802.11)
Bluetooth
USB
2. Data Link Layer (Layer 2)
Role: The Data Link Layer ensures reliable data transfer between adjacent network nodes and
handles error detection and correction.
Functions:
Establishes a direct connection between devices
Manages MAC addresses and framing
Error detection (e.g., CRC) and flow control
Real-World Example:
MAC address filtering on a Wi-Fi router
Key Protocols & Technologies:
Ethernet (IEEE 802.3)
MAC (Media Access Control)
PPP (Point-to-Point Protocol)
ARP (Address Resolution Protocol)
VLAN (Virtual LAN)
3. Network Layer (Layer 3)
Role: The Network Layer handles routing and forwarding of data across multiple networks using
logical addressing (IP addresses).
Functions:
Determines best routing paths
Assigns logical addresses (IP addresses)
Manages congestion and packet forwarding
Real-World Example:
IP addressing and routing on the internet
Key Protocols & Technologies:
IP (Internet Protocol, IPv4, IPv6)
ICMP (Internet Control Message Protocol)
RIP (Routing Information Protocol)
OSPF (Open Shortest Path First)
4. Transport Layer (Layer 4)
Role: The Transport Layer ensures reliable data transfer, providing error correction and flow
control.
Functions:
Manages end-to-end communication
Provides segmentation, sequencing, and reassembly
Controls flow to prevent congestion
Real-World Example:
Ensuring complete webpage loading despite network fluctuations
Key Protocols & Technologies:
TCP (Transmission Control Protocol)
UDP (User Datagram Protocol)
SCTP (Stream Control Transmission Protocol)
5. Session Layer (Layer 5)
Role: The Session Layer manages sessions (connections) between applications, ensuring proper
data exchange.
Functions:
Establishes, maintains, and terminates sessions
Synchronizes data exchange
Provides authentication and session recovery
Real-World Example:
Online banking sessions ensuring a secure connection remains active
Key Protocols & Technologies:
NetBIOS (Network Basic Input/Output System)
RPC (Remote Procedure Call)
PPTP (Point-to-Point Tunneling Protocol)
6. Presentation Layer (Layer 6)
Role: The Presentation Layer translates data into a format the application layer can understand,
handling encryption, compression, and encoding.
Functions:
Data translation, encryption, and decryption
Data compression for efficient transmission
Character encoding (ASCII, Unicode)
Real-World Example:
SSL/TLS encryption in secure web browsing (HTTPS)
Key Protocols & Technologies:
SSL/TLS (Secure Sockets Layer/Transport Layer Security)
JPEG, GIF, PNG (Image compression)
MPEG, MP3 (Multimedia encoding)
7. Application Layer (Layer 7)
Role: The Application Layer provides the interface between users and the network, facilitating
communication through applications.
Functions:
Supports network applications like email, browsing, and file transfers
Provides user authentication and data representation
Manages request-response mechanisms
Real-World Example:
Web browsing using HTTP/HTTPS
Sending emails via SMTP
Key Protocols & Technologies:
HTTP/HTTPS (Hypertext Transfer Protocol)
FTP (File Transfer Protocol)
SMTP/IMAP/POP3 (Email protocols)
DNS (Domain Name System)
Conclusion:
The OSI model plays a crucial role in networking, providing a structured approach to data
communication. Understanding its layers helps in troubleshooting network issues, designing
network infrastructure, and improving cybersecurity. Each layer works together to ensure
seamless communication across diverse network environments.