UNit 1 Part 2 OSI TCP IP Layers
UNit 1 Part 2 OSI TCP IP Layers
OSI Model
https://www.youtube.com/watch?v=vv4y_uOneC0
https://www.youtube.com/watch?v=Ilk7UXzV_Qc
Feature of OSI Model
Principles of
OSI Reference
Each layer should perform a well-defined function.
Demerits of
OSI reference Fitting of protocols is
model tedious task.
It is just used as a
reference model.
The Physical Layer
• Framing: Frames are the streams of bits received from the network layer into
manageable data units. This division of stream of bits is done by Data Link Layer.
• Physical Addressing: The Data Link layer adds a header to the frame in order to
define physical address of the sender or receiver of the frame, if the frames are to
be distributed to different systems on the network.
• Flow Control: A flow control mechanism to avoid a fast transmitter from running a
slow receiver by buffering the extra bit is provided by flow control. This prevents
traffic jam at the receiver side.
• Error Control: Error control is achieved by adding a trailer at the end of the
frame. Duplication of frames are also prevented by using this mechanism. Data
Link Layers adds mechanism to prevent duplication of frames.
• Access Control: Protocols of this layer determine which of the devices has control
over the link at any given time, when two or more devices are connected to the
same link
Network Layer
• Network layer works for the transmission of data from one host to the other
located in different networks. It also takes care of packet routing i.e.
selection of the shortest path to transmit the packet, from the number of
routes available. The sender & receiver’s IP address are placed in the header
by network layer.
The functions of the Network layer are :
• Routing: The network layer protocols determine which route is suitable from
source to destination. This function of network layer is known as routing.
• Logical Addressing: In order to identify each device on internetwork
uniquely, network layer defines an addressing scheme. The sender &
receiver’s IP address are placed in the header by network layer. Such an
address distinguishes each device uniquely and universally.
To accomplish this end-to-end transport, Layer 3 uses four basic
processes:
* Addressing
* Encapsulation
* Routing
* Decapsulation
• Addressing
• First, the Network layer must provide a mechanism for addressing these
end devices. If individual pieces of data are to be directed to an end
device, that device must have a unique address. In an IPv4 network,
when this address is added to a device, the device is then referred to as
a host.
Encapsulation
• The network layer PDU- protocol Data Unit is the packet. Encapsulation
entails adding layer 3 specific information based on the segments from the
transport layer. Such information includes headers and trailers.
• Routing
• the Network layer must provide services to direct these packets to their destination host.
The source and destination hosts are not always connected to the same network. In fact,
the packet might have to travel through many different networks. Along the way, each
packet must be guided through the network to reach its final destination.
• Decapsulation
• When the packet arrives at the destination, it must be decoded and moved up the OSI
layers to the application layer. Decapsulation is used to reassemble the packets to
segments which are then used in the transport layer.
Decapsulation
• 1. Session management
• As its name suggests, the session layer is responsible for
managing a session which includes opening, closing and
managing a session between end-user application processes.
You can think of session layer as the main layer which handles
the requests and responses between the two applications.
• For example, if you are downloading some pictures from
Facebook, a network path is defined by the network layer but
the requests for the photos and responses by Facebook to you is
handled by the session layer.
• 2. Authentication
• Before establishing a session with some network peer, it is
important for one of the computers to know that another peer
it is communicating to is a legitimate one. Authentication is
the process of verifying that "you are who , you say you are".
• 3. Authorization
• So the basic difference between the two is: authentication is
the process of verifying that "you are who you say you are",
authorization is the process of verifying that "you are
permitted to do what you are trying to do". Authorization thus
presupposes authentication.
6. Presentation Layer
• The transport layer is responsible for the reliability, flow control, and
correction of data which is being sent over the network. It uses following
protocol
• User Datagram protocol and Transmission control protocol. ( UDP & TCP )