ISO OSI Layered Architecture
ISO OSI Layered Architecture
1. Transport layer is responsible for the process to process delivery of the entire message.
2. Service-point addressing
Computers often run many programs at the same time. Due to this, source-to-
destination delivery means delivery from a specific job (currently running program)
on one computer to a specific job (currently running program) on the other system not
only one computer to the next.
For this reason, the transport layer added a specific type of address to its header, it is
referred to as a service point address or port address.
By this address each packet reaches the correct computer and also the transport layer
gets the complete message to the correct process on that computer.
4. Connection Control
This Transport Layer treats each packet as an individual and delivers it to the
destination machine.
In this type of transmission, the receiver does not send an acknowledgment to the
sender about the receipt of a packet. This is a faster communication technique.
This Transport Layer creates a connection with the Transport Layer at the destination
machine before transmitting the packets to the destination.
To Create a connection following three steps are possible:
o Connection establishment
o Data transfer
o Connection termination
When all the data are transmitted connection is terminated. Connectionless Service is less
reliable than connection Oriented Service.
Multiple packets from diverse applications are transmitted across a network needs
very dedicated control mechanisms, which are found in the transport layer.
The transport layer accepts packets from different processes. These packets are
differentiated by their port numbers and pass them to the network layer after adding
proper headers.
In Demultiplexing, at the receiver's side to obtain the data coming from various
processes. It receives the segments of data from the network layer and delivers it to
the appropriate process running on the receiver's machine.
6. Flow control
The transport layer also responsible for the flow control mechanism between the
adjacent layers of the TCP/IP model.
It does not perform across a single link even it performs an end-to-end node.
By imposing flow control techniques data loss can be prevented from the cause of the
sender and slow receiver.
For instance, it uses the method of sliding window protocol in this method receiver
sends a window back to the sender to inform the size of the data is received.
7. Error Control
Error Control is also performed end to end like the data link layer.
In this layer to ensure that the entire message arrives at the receiving transport layer
without any error(damage, loss or duplication). Error Correction is achieved through
retransmission of the packet.
The data has arrived or not and checks for the integrity of data, it uses the ACK and
NACK services to inform the sender
Dialog Control
2. Synchronization
3. Token Management
This layer is also responsible for managing tokens. Through this, it prevents the two users to
simultaneously attempt access of the same critical operation.
OSI Model Layer 6: The Presentation Layer
The Presentation Layer is concerned with the syntax and semantics of the information
exchanged between two communicating devices.
1) Translation
The processes or running programs in two machines are usually exchanging the
information in the form of numbers, character strings and so on before being
transmitted. The information should be changed to bitstreams because different
computers use different encoding schemes.
The Presentation layer is responsible for compatibility between these encoding
methods.
The Presentation layer at the sender's side changes the information from its sender
dependent format.
The Presentation layer at the receiving machine changes the common format into its
receivers dependent format.
2) Encryption
The system must be able to assure privacy regarding the message or information as it
also carries sensitive information.
Encryption means that the sender transforms the original information or message to
another form, this data after encryption is known as the ciphertext and this ciphertext
sends the resulting message out over the network.
Decryption concerned with the transform of the message back to its original form.
This decrypted data is known as plain text.
3) Compression
Data Compression means reduces the number of bits to be transmitted by this reduce
the bandwidth of the data.
Data Compression becomes particularly important in the transmission of multimedia
such as audio, video, text, etc
The application layer is the software version of a physical terminal and this layer
permitted to a user to log on to a remote host.
For this, an application creates a software emulation of a terminal at the remote host.
By this user's computer can communicate with the software terminal, which in turn,
communicates with the host.
It is shown that the remote host is communicating with one of its terminals, so it
allows the user to log on.
3) Addressing
To achieve communication between client and server system, there is a need for
addressing.
When a request is sent from the client side to the server side, this request contains the
server address and its own address.
The server answered to the client request, this request contains the destination
address, i.e., client address. DNS is used to achieve this type of addressing.
4) Mail Services
5) Directory Services
6) Authentication
It provides authentication to occur between devices for an extra layer of security and it
authenticates the sender or receiver's message or both.