Osi Model and Physical Layer Notes
Osi Model and Physical Layer Notes
Protocol
A protocol is a set of rules that govern/maintain data communications.
A protocol defines what is communicated, how it is communicated, and when it is
communicated.
The key elements of a protocol are syntax, semantics, and timing.
1. Syntax:
The term syntax refers to the structure or format of the data, meaning the order in
which they are presented.
2. Semantics:
The word semantics refers to the meaning of each section of bits.
How are a particular pattern to be interpreted, and what action is to be taken based on
that interpretation?
3. Timing:
The term timing refers to two characteristics: when data should be sent and how fast
they can be sent.
Reference model
In computer networks, reference models give a conceptual framework that standardizes
communication between heterogeneous networks.
The two popular reference models are −
1. OSI Model
2. TCP/IP Model
OSI Model
OSI stands for Open System Interconnection model.
It was developed by International Standards Organization (ISO) introduced in 1984.
The OSI model is a layered framework for the design of network systems that allows communication
between all types of computer systems.
It contains 7 layers. Each layer performs its own functionality.
1. Physical Layer
It is responsible for the actual physical connection between the devices (Transmission
medium).
The physical layer contains information in the form of bits (0’s and 1’s).
The main functionality of the physical layer is to transmit the individual bits from one node to
another node.
Function
Representation of bits (0’s and 1’s)
Line configuration (P2P or Multipoint)
Topology (Star or mush etc.,)
Transmission mode (simplex or duplex)
1
2. Data link layer
It provides a reliable and efficient communication between two or more devices.
It is mainly responsible for the unique identification of each device that resides on a local network.
The main function of this layer is to make sure data transfer is error-free from one node to another.
When a packet arrives in a network, it is the responsibility of DLL to transmit it to the Host using its
MAC address.
It contains two sub-layers:
o Logical Link Control Layer
The LLC layer controls frame synchronization, flow control and error
checking.
o Media Access Control Layer
It is used for transferring the packets over the network.
Functions:
Framing: Stream of bits into manageable data units
Physical addressing: add MAC address to frames
Error control: It detects and retransmits damaged or lost frames.
Flow Control: The flow of data is controlled
Access control: Device has control over the channel (time control)
3. Network layer
The network layer works for the transmission of data from one host to the other host in different
networks.
The sender & receiver’s IP addresses are placed in the header by the network layer.
It also takes care of packet routing i.e. selection of the shortest path to transmit the packet, from the
number of routes available.
It acts as a network controller.
Function
o Addressing: is used to identify the device on the internet.
o Routing: it determines the best optimal path out of the multiple paths
4. Transport Layer
The Transport Layer provides transparent transfer of data between end systems, or hosts, and is
responsible for end-to-end error recovery and flow control.
The delivery of data packets is managed by the transport layer
It also manages the flow of data, segmentation and De-segmentation and error control.
Fragmentation and reassembly of data packets - Fragmentation is the process of breaking a packet into
smaller pieces so that they will fit into the frames of the underlying network. The receiving system
reassembles the pieces into the original packets.
The two protocols used in this layer are:
Transmission Control Protocol
It establishes and maintains a connection between hosts.
It offers an acknowledgment of the successful data transmission.
If data lost retransmit the data again (not receive the acknowledgment)
User Datagram Protocol
o It is a connection less between hosts.
o It is an unreliable transport protocol.
o It does not wait for any acknowledgment.
o In this protocol data loss is occurred.
Function
Service point addressing - port address is necessary for delivery
Segmentation and reassembly -A message divided into number of segments (sequence of number)
from sender side and receiver reassemble the segment
Connection control (connection or connection less)
5. Session Layer
This layer is responsible for the establishment of connection, maintenance of sessions,
authentication, and also ensures security.
Function
1. Session establishment, maintenance, and termination:
The layer allows the two processes to establish, use and terminate a connection.
2. Synchronization:
Session layer adds some checkpoints when transmitting the data in a sequence.
2
If some error occurs in the middle of the transmission of data, then the transmission
will take place again from the checkpoint.
This process is known as Synchronization and recovery.
3. Dialog Controller:
The session layer allows two systems to start communication with each other in
half-duplex or full-duplex.
6. Presentation Layer
A Presentation layer is mainly concerned with the syntax and semantics of the information exchanged
between the two systems.
The presentation layer is also called the Translation layer.
Function
Translation:
For example, ASCII to EBCDIC.
Encryption/ Decryption:
Data encryption translates the data into another form or code.
The encrypted data is known as the cipher text and the decrypted data is known as plain text.
A key value is used for encrypting as well as decrypting data.
Compression:
Reduces the number of bits that need to be transmitted on the network.
7. Application Layer
Application layer interacts with an application program, which is closest to the end-user. It provides user
services.
It allows users to interact with the software application.
Example web browser, file transfer, email, remote login, etc.
Function
Network Virtual Terminal (log on to a remote host)
FTAM-File transfer access and management (transfer file)
Mail Services (E-mail)
Directory Services (to access global information)
OSI Architecture
**********
3
TCP/IP Reference Model
The TCP/IP model refers to the Transmission Control Protocol/Internet Protocol Model.
The first version of TCP/IP was ARPANET (1975), which stands for Advanced Research Projects
Administration Network. The name changed to TCP/IP in 1983, when it became an open standard that
could be used on any network.
This model is a part of the network domain designed specifically for overseeing efficient and error-free
transmission of data.
TCP/IP Model helps you to determine how a specific computer should be connected to the internet and
how data should be transmitted between them.
It helps you to create a virtual network when multiple computer networks are connected together.
The purpose of TCP/IP model is to allow efficient communication over large distances and error-free
transmission of data.
Four Layers of TCP/IP model
Application Layer
Application layer interacts with an application program, which is closest to the end-user. It means
application layer allows users to interact with other software application to implement a communicating
component.
It maintains a smooth connection between the application and user for data exchange.
Example: file transfer, email, remote login, etc.
4
Some of the protocols used in this layer are:
1. HTTP: Hypertext transfer protocol is used for accessing the information available on the internet.
2. SMTP: Simple mail transfer protocol, assigned the task of handling e-mail-related steps and issues.
3. FTP: This is the standard protocol that oversees the transfer of files over the network channel.
4. SNMP: SNMP stands for Simple Network Management Protocol. It is a framework which is used for
managing the devices on the internet by using the TCP/IP protocol.
5. DNS: DNS stands for Domain Name System. An IP address that is used to identify the connection of a host
to the internet uniquely. However, users prefer to use names instead of addresses for that DNS.
6. TELNET:TELNET stands for Terminal Network. It establishes the connection between the local and
remote computer. It established connection in such a manner that you can simulate your local system at the
remote system.
Transport Layer
This layer is responsible for establishing the connection between the sender and the receiver device and
also performs the task of dividing the data from the application layer into packets, which are then used
to create sequences.
It also performs the task of maintaining the data, i.e., to be transmitted without error, and controls the
data flow rate over the communication channel for smooth transmission of data.
The main work of this layer is to send the packets from any network, and any computer still they reach
the destination irrespective of the route they take.
The Internet layer offers the functional and procedural method for transferring variable length data
sequences from one node to another with the help of various networks.
Function
1. It is responsible for specifying the path that the data packets will use for transmission.
2. This layer is responsible for providing IP addresses to the system for the identification matters over
the network channel.
Some of the protocols applied in this layer are:
1. IP: This protocol assigns your device with a unique address; the IP address is also responsible for routing
the data over the communication channel.
5
2. ARP: This protocol refers to the Address Resolution Protocol that is responsible for finding the physical
address using the IP address.
3. RARP: The RARP retrieves a computer's logical address from its available server.
4. ICMP: The Internet Control Message Protocol (ICMP) is a network layer protocol used by network devices
to diagnose network communication issues. ICMP is mainly used to determine whether or not data is
reaching its intended destination in a timely manner.
5. IGMP: The Internet Group Management Protocol (IGMP) is a protocol that allows several devices to share
one IP address so they can all receive the same data.
Host to Network
6
Chapter-2: Physical layer: Transmission Media
Transmission media is a communication channel that carries the information from the sender to the
receiver.
Data is transmitted through the electromagnetic signals or cable wires.
Advantages Disadvantages
o Least expensive o This cable can only be used for shorter
o Easy to install distances because of attenuation.
o High capacity
Application
o Telephone connection and LAN network.
7
Shielded Twisted Pair
It is a cable that contains the mesh (metal foil covering) surrounding the wire that allows the
higher transmission rate.
This type of cable consists of a special jacket to block external interference.
Advantages
o It provides high transmission rate
o Easy to install
o Cost is not very high and not very low
o Eliminates crosstalk
Disadvantages
o It has a higher attenuation rate
o It is more expensive compared with
UTP and coaxible cable.
Application
o Extermely Cold Climate (to prevent
from temperature)
2. Coaxial Cable
Coaxial cable is very commonly used transmission media.
It transmitted signals may travel longer distances at higher speeds.
The shield minimizes electrical and radio frequency interference.
Example:- Cable TV, Telephone and computer network(Internet)
8
o Signals can travel longer distances at higher speed
o Easy to install and maintain
Disadvantages
o Expensive as compared to Twisted Pair Cable
o It is bulky
o In case of any damage the entire network goes down as a single cable is used for transmission.
The cable consists of one or more strands of glass, each only slightly thicker than a human
hair.The centre of each strand is called the core, which provides the pathway for light to travel.
The core is surrounded by a layer of glass called cladding that reflects light inward to avoid loss
of signal and allow the light to pass through bends in the cable.
No light ecapes the glass core because of this reflective cladding.
Advantages Disadvantages
o High rate signal can be transmit o Optical fibre cables are expensive
o No crosstalk o Difficult to install
o Large bandwidth , Greater Capacity o Maintenance is expensive and difficult
(2Gbps)
o Smaller size and lighter weight
o Lower attenuation
o Immunity to environment
o Highly secure
o Repeaters are not required
*******
Wireless / Unguided Media
Transmitted data travels through lighting or signal (wireless)
1. Radio waves
2. Micro waves
3. Infrared waves
1. Radio Waves
Electromagnetic waves ranging in frequencies between 3kHz to 1GHz are normally called radio
waves.
When an antenna transmit radio waves in all directions (omnidirectional).
Radio waves that propagate in the sky mode, can travel long distance.
Radio waves are good at bending around buildings and hills
9
2. Microwaves
Electromagnetic waves having frequencies between 1 to 300 GHz are called
microwaves.
It travel in straight lines (uni direction), it allows multiple receivers.
When an antenna transmit microwaves, this means that the sending
and receiving antennas need to be narrowly focused.
Microwaves are often refracted by the atomspheric layers.
Advantages
o Cheaper than using cables
o It don’t require any land for the installation of cables.
o Communication over oceans
Disadvantages
o Susceptible to weather condition
o Eavesdropping : any malicious user can catch the signal in the air by using its
own.
Application
o Cellular phones
o Television networks
3. Infrared Waves
Frequencies from 300GHz to 400GHz
(wavelengths from 1mm to 770nm)
It can be used for short range communication (upto 5 meters)
Purpose such as television and its remote.
Infrared cannot cross wall-like obstacles.
Example:- TV Remote Control, DVD
players,wireless mouse, keyboard,
printer, etc..
************
10