Unit 3 - Network Models & Addressing Mechanism
Unit 3 - Network Models & Addressing Mechanism
Computer Networks
Unit 3
Network Models &
Addressing
Mechanism
ISO OSI Reference Model
• The OSI model stands for Open Systems Interconnection model.
• The OSI model is also known as the ISO-OSI reference model as it was
developed by ISO (International Organization for Standardization) in 1984.
• It is a conceptual reference model that describes the entire flow of
information from one computer to the other computer.
• The OSI model is a 7-layered model, so it is also known as a 7-layered
architecture model.
• The basic idea behind layered architecture is to divide the design into
smaller pieces.
• There are numerous users around the world, and to ensure national and
worldwide communication, the ISO developed a conceptual model named
the OSI model.
Representation of the OSI model
• The layered
architecture
reduces the
complexity by
dividing the task in
a manageable way.
• The layered
architecture
provides
abstraction from
other layers.
• Due to the
abstraction, any
layer can be
changed
independently.
1. Physical Layer
• The physical layer is the lowest layer of the OSI model.
• The main work of the physical layer of the OSI model is to activate,
maintain, and deactivate the physical connection.
• The physical layer is also responsible for the transmission and reception of
the unstructured raw data over the network.
• The data in the physical layer consists of a stream of bits. The bits of data
must be encoded into the form of signals for transmission.
• Now, for the transmission, the physical layer sets the voltages, light
speed(in the case of fiber optics cable), and data rates (numbers of bits to be
transmitted per second).
Functions provided by the physical layer:
• The physical layer encodes the signals at the sender's end and decodes the
signals at the receiver's end. It also defines the type of encoding scheme to be
used (how 0's and 1's are to be changed into signals).
• It deals with the synchronization of the sender and the receiver so that the
receiver and the sender are at the same bit level. (Their clocks must be
synchronized).
• The physical layer deals with the line configuration i.e. how the devices are
connected through a dedicated link.
• It deals with the type of topology to be used for example ring, mesh, bus,
star, hybrid, etc. Network topology is the physical and logical arrangement of
nodes and connections in a computer network.
• The physical layer also deals with the direction and type of transmission
between two or more devices. The mode of transmission can be simplex,
half-duplex, and full duplex.
The various devices used in the physical layer are Network adapters, Hubs,
Cables, Repeaters, Modem, etc.
2. Data Link Layer
• The data link is the second layer of the OSI model, which is used to transmit
the error-free frames from one node to the other.
• If the two computer nodes are on the same networks, then the data link layer
provides a connection between the two nodes.
• The main work of the data link layer is to convert the data into the form of
frames.
Functions provided by the Data Link layer
• Framing :
Framing is the technique in which the data is divided into streams of bits
(called frames) received from the network layer. Along with the conversion
of data into frames, the data link layer adds a header and trailer to the frames.
The header (present at the starting of the frame) contains the hardware's
physical address of source and destination. The trailer (present at the end of
the frame) contains the error detection and correction bits.
• The data link layer also maintains the flow control of data during
transmission. Suppose that the rate of data transmission and data absorption
varies then there is data loss, so the data link layer maintains the flow control.
• The data link layer adds the error detection and correction bits at the end of
the frames in the form of trailers. These bits are used to detect the errors and
then retransmit the damaged or lost data to prevent any kind of duplication.
• It also maintains access control. In situations where two or more devices are
connected to the same communication medium then the data link layer
protocols determine the device that can transmit the data.
Note: The physical address is also known as the MAC (media access control)
address. The MAC address is a unique address of each computer present on
the NIC card.
The various protocols used in this layer are : TCP (Transmission Control
Protocol), UDP (User Datagram Protocol), etc.
The various devices used in this layer are Load Balancers/Firewalls, etc.
5. Session Layer
The session layer is the fifth layer of the OSI model whose main aim is to
establish, manage, and terminate the connection between applications.
Functions provided by the Session layer
• The session layer is responsible to create a dialog box which allows two
systems to enter into a dialog and transmit the data in either half-duplex or
full-duplex mode.
• The session layer is also responsible for adding synchronization bits or
checkpoints into the stream of data. These checkpoints help to detect any
kind of error that may have occurred during the data transmission. So, if an
error has occurred in between the transmission then the re-transmission will
take place from the last checkpoint only.
• Example: If a system is sending a file of 800 pages, adding checkpoints
after every 50 pages is recommended. This ensures that 50 page unit is
successfully received and acknowledged. This is beneficial at the time of
crash as if a crash happens at page number 110; there is no need to
retransmit 1 to100 pages.
The various protocols used in this layer are PAP (Password Authentication
Protocol), PPTP (Point-to-Point Tunnelling Protocol), RPC (Remote
Procedure Call Protocol), RTCP (Real-time Transport Control Protocol), etc.
The device used in this layer is Gateway.
6. Presentation Layer
• The presentation layer is the sixth layer of the OSI model which mainly
concentrates on the syntax and semantics of the information exchanged
between the systems.
• The main aim of the presentation layer is to convert the data from one
presentation format to the other format as different applications may use
different applications.
Functions provided by the Presentation layer
• Since different computer systems use different encoding systems so the
presentation layer must translate the data into a computer-dependent format.
• The presentation layer deals with the encryption and decryption of the data so
that the data can be transmitted securely.
• The presentation layer also deals with the compression and expansion of the
information.
• In Class A, the first bit in higher order bits of the first octet is
always set to 0 and the remaining 7 bits determine the
network ID. The 24 bits determine the host ID in any
network.
• The total number of networks in Class A = 27 = 128 network
address
• The total number of hosts in Class A = 224 - 2 = 16,777,214
host address.
• 2 IP addresses are decreased because they cannot be
assigned to hosts, i.e. the first IP of a network is network
number and the last IP is reserved for Broadcast IP.
Class B
• In Class B, an IP address is assigned to those networks that range from small-
sized to large-sized networks.
Class E
In Class E, an IP address is used for the future use or for the research and
development purposes. It does not possess any subnetting. The higher order
bits of the first octet is always set to 1111, and the remaining bits determines
the host ID in any network.
Rules for assigning Host ID:
• The Host ID must be unique within any network.
• The Host ID in which all the bits are set to 0 cannot be assigned as it is used
to represent the network ID of the IP address.
• The Host ID in which all the bits are set to 1 cannot be assigned as it is
reserved for the multicast address.
Inside local address: This IP address represents the host of the private network.
This address cannot be used by a private network to access the internet directly.
Inside global address: This IP address represents the whole private network, by
using a globally recognized public IP address. It is used to access the internet
services for the private network
Outside global address: This IP address represents the outside network address
for the host before the NAT translation process.
Outside local address: This IP address represents the actual address representing
the host on the internet, after the NAT translation process.
Types of NAT
Static NAT: Static NAT maps an internal IP address to an external one
on a one-to-one basis.
Dynamic NAT - For this NAT translation process, the private network
address is converted to a public IP address by choosing it from a pool
of public IP addresses available to the network model.
Port Address Translation - This translation process is configured to convert all the
private IP addresses available to a single public IP address, but with a different
port number assigned to each of the public addresses.
Advantages of NAT