Académique Documents
Professionnel Documents
Culture Documents
The Open Systems Interconnect (OSI) model has seven layers. This article
describes and explains them, beginning with the 'lowest' in the hierarchy (the
physical) and proceeding to the 'highest' (the application). The layers are
stacked this way:
Application
Presentation
Session
Transport
Network
Data Link
Physical
PHYSICAL LAYER
The physical layer, the lowest layer of the OSI model, is concerned with the
transmission and reception of the unstructured raw bit stream over a physical
medium. It describes the electrical/optical, mechanical, and functional interfaces
to the physical medium, and carries the signals for all of the higher layers. It
provides:
Data encoding: modifies the simple digital signal pattern (1s and 0s) used
by the PC to better accommodate the characteristics of the physical medium,
and to aid in bit and frame synchronization. It determines:
How many pins do the connectors have and what is each pin used
for?
NETWORK LAYER
The network layer controls the operation of the subnet, deciding which physical
path the data should take based on network conditions, priority of service, and
other factors. It provides:
Communications Subnet
The network layer software must build headers so that the network layer
software residing in the subnet intermediate systems can recognize them and
use them to route data to the destination address.
This layer relieves the upper layers of the need to know anything about the data
transmission and intermediate switching technologies used to connect systems.
It establishes, maintains and terminates connections across the intervening
communications facility (one or several intermediate systems in the
communication subnet).
In the network layer and the layers below, peer protocols exist between a node
and its immediate neighbor, but the neighbor may be a node through which
data is routed, not the destination station. The source and destination stations
may be separated by many intermediate systems.
TRANSPORT LAYER
The transport layer ensures that messages are delivered error-free, in sequence,
and with no losses or duplications. It relieves the higher layer protocols from any
concern with the transfer of data between them and their peers.
The size and complexity of a transport protocol depends on the type of service it
can get from the network layer. For a reliable network layer with virtual circuit
capability, a minimal transport layer is required. If the network layer is
unreliable and/or only supports datagrams, the transport protocol should include
extensive error detection and recovery.
The transport layer provides:
End-to-end layers
Unlike the lower "subnet" layers whose protocol is between immediately
adjacent nodes, the transport layer and the layers above are true "source to
destination" or end-to-end layers, and are not concerned with the details of the
underlying communications facility. Transport layer software (and software
above it) on the source station carries on a conversation with similar software on
the destination station by using message headers and control messages.
SESSION LAYER
The session layer allows session establishment between processes running on
different stations. It provides:
PRESENTATION LAYER
The presentation layer formats the data to be presented to the application layer.
It can be viewed as the translator for the network. This layer may translate data
from a format used by the application layer into a common format at the
sending station, then translate the common format to a format known to the
application layer at the receiving station.
The presentation layer provides:
APPLICATION LAYER
The application layer serves as the window for users and application processes
to access network services. This layer contains a variety of commonly needed
functions:
Inter-process communication
Network management
Directory services
Asynchronous transmission uses start and stop bits to signify the beginning bitASCII character would
actually be transmitted using 10 bits e.g.: A 0100 0001 would become 1 0100 0001 0. The extra one
(or zero depending on parity bit) at the start and end of the transmission tells the receiver first that a
character is coming and secondly that the character has ended. This method of transmission is used
when data is sent intermittently as opposed to in a solid stream. In the previous example the start and
stop bits are in bold. The start and stop bits must be of opposite polarity. This allows the receiver to
recognize when the second packet of information is being sent.
Synchronous transmission uses no start and stop bits but instead synchronizes transmission speeds at
both the receiving and sending end of the transmission using clock signal(s) built into each component. A
continual stream of data is then sent between the two nodes. Due to there being no start and stop bits the
data transfer rate is quicker although more errors will occur, as the clocks will eventually get out of sync,
and the receiving device would have the wrong time that had been agreed in the protocol for
sending/receiving data, so some bytes could become corrupted (by losing bits). Ways to get around this
problem include re-synchronization of the clocks and use of check digits to ensure the byte is correctly
interpreted and received.
Q. 8 (a). Explain Ethernet MAC sub layer protocol with frame formats and also analyze its performance.
Ans- The medium access control mechanisms of these protocols, which are responsible for satisfying both the timecritical/real-time response requirement over the network and the quality and reliability of communication between
devices on the network. These timing parameters, which will ultimately influence control applications, are affected by
the network data rate, the period of messages, the data or message size of the information, and the communication
protocol. For each protocol, we studied the key performance parameters of the corresponding network when used in
a control situation, including network utilization, magnitude of the expected time delay, and characteristics of time
delays. Simulation results were presented for several different scenarios. The timing analyses and comparisons of
message time delay given in this article will be useful for anyone designing a networked control system. The
evaluation study described here is based on the characteristics and requirements of control systems. The
characteristics are small data sizes and periodic messages, and the requirements include guaranteed transmission
and bounded time delay. The suitability of network protocols for use in control systems is greatly influenced by these
two criteria. Although Ethernet has seen widespread use in many data transmission applications and can support
high data rates up to 1 Gbps, it may not be suitable as the communication medium for some control systems when
compared with deterministic network systems. However, 19 because of its high data rate, Ethernet can be used for a
periodic /non-time-critical and large data size communication, such as communication between workstations or
machine cells. For intra-workstation cell communication with controller, sensors, and actuators, deterministic network
systems are generally more suitable for meeting the characteristics and requirements of control systems. For control
systems with short and/or prioritized messages, DeviceNet demonstrates better performance. The scheduled and
unscheduled messaging capabilities in ControlNet make it suitable for time-critical and non-time-critical messages.
ControlNet is also suitable for large data size message transmission. Our future efforts will focus on controller design
for networked control systems, which can differ significantly from the design of traditional centralized control systems.
This work will include conducting experimental studies of control networks for control applications. We plan to use this
analysis, along with performance evaluation of candidate control networks presented here, as the basis for future
message scheduling and control algorithm designs for networked control systems.
Q. 8 (b). Given an IP address 192.168.0.5
i. What is the binary equivalent of second octet?
ii. What is the class of this address?
iii. What is the network address of the given IP address?
Ans i.
The first, and probably most important step, is to put down this row of values:
128
64
32
16
In order to remember these values start with the number 1, go from right to left, and double that number seven times.
For example, start with 1 on the right side. For your next number, double the 1 (1 x 2 = 2). So, 2 is your next number
(remembering to go from right to left). For your third number, double the 2 (2 x 2 = 4); to continue the sequence,
double the 4 (4 x 2 = 8). Repeat this process until you've doubled your original number, seven times. The key to this
is that every single one of the values we put in that row are going to have either number 1 or number 0 assigned to it.
To convert the IP address we will take that string of numbers and start from left to right this time. For each value we
ask this question: Can I subtract this value from the decimal remaining? If the answer is NO then you put a 0
under the binary value, and if the answer is YES then you put 1 there
We take the IP address: 192.168.0.5 and the binary equivalent of second octet 168 is .
Question: Can I subtract 128 from 168? Answer: YES. So we assign 1 to 128.
128
64
32
16
1
a. Question: Can I subtract 64 from 40? Answer: NO. So we assign 0 to 64.
128
64
32
16
64
32
16
128
64
32
16
64
32
16
e. That will give us a remainder of 0. So for the rest of the values in our row, we can assign 0.
128
64
32
16
f. So now we know that a decimal number 168 is 10101000 converted to binary form. To double check, we take the
values assigned with 1 and add them together:
128+32+8=168
Ans ii. Class- C
Ansiii. 255.255.255.0