Académique Documents
Professionnel Documents
Culture Documents
NETWORK ARCHITECTURE 1
OSI Model
NETWORK ARCHITECTURE 2
Note:
NETWORK ARCHITECTURE 3
OSI Model
NETWORK ARCHITECTURE 4
OSI Model
NETWORK ARCHITECTURE 6
Goals
The OSI model is used for two main reasons:
NETWORK ARCHITECTURE 7
OSI Model
NETWORK ARCHITECTURE 8
OSI Model
NETWORK ARCHITECTURE 9
NETWORK ARCHITECTURE 10
Figure 2.2 OSI layers
NETWORK ARCHITECTURE 11
Figure 2.3 An exchange using the OSI model
NETWORK ARCHITECTURE 12
NETWORK ARCHITECTURE 13
OSI Model
Data Layer Function
unit
Host Data 7. Application Network process to application
layers
6. Presentation Data representation and encryption
NETWORK ARCHITECTURE 14
NETWORK ARCHITECTURE 15
NETWORK ARCHITECTURE 16
Upper Layers
Lower Layers
Layers 3 through 1 are responsible for moving
packets from the sending station to the receiving
station.
NETWORK ARCHITECTURE 17
The Mnemonic:
“All Pretty Serious Teenagers Never Do Physics”
NETWORK ARCHITECTURE 18
The OSI Model
7. Application Layer
NNTP · SIP · SSI · DNS · FTP · Gopher · HTTP · NFS · NTP · SMPP · SMTP
· SNMP · Telnet (more)
6. Presentation Layer
MIME · XDR · SSL · TLS
5. Session Layer
NETWORK ARCHITECTURE 20
Figure 2.4 Physical layer
NETWORK ARCHITECTURE 21
2 Data Link Layer
At this layer, data packets are encoded and decoded into bits. It furnishes
transmission protocol knowledge and management and handles errors in
the physical layer, flow control and frame synchronization. The data link
layer is divided into two sub layers: The Media Access Control (MAC)
layer and the Logical Link Control (LLC) layer. The MAC sub layer
controls how a computer on the network gains access to the data and
permission to transmit it. The LLC layer controls frame synchronization,
flow control and error checking.
Framing: The data link layer divides the stream of bits received from the
network layer into manageable data units called frames.
Access control: when two or more devices are connected to the same
NETWORK ARCHITECTURE 23
Figure 2.6 Hop-to-hop delivery
NETWORK ARCHITECTURE 24
OSI Model
Network Layer
Implements routing of frames (packets) through the
network.
NETWORK ARCHITECTURE 25
continue
• This layer is responsible for source to destination delivery of a
packet possible across multiple network. The network layer
establishes the route between the sender and receiver across
switching points, which are typically routers. If all stations are
contained within a single network segment, then the routing
capability in this layer is not required.
NETWORK ARCHITECTURE 26
Figure 2.8 Source-to-destination delivery
NETWORK ARCHITECTURE 27
Figure 2.7 Network layer
NETWORK ARCHITECTURE 28
OSI Model
Transport Layer
Purpose of this layer is to provide a reliable
mechanism for the exchange of data between two
processes in different computers.
NETWORK ARCHITECTURE 30
Figure 2.10 Reliable process-to-process delivery of a message
NETWORK ARCHITECTURE 31
Figure 2.9 Transport layer
NETWORK ARCHITECTURE 32
OSI Model
Session Layer
Session layer provides mechanism for controlling the
dialogue between the two end systems. It defines how to
start, control and end conversations (called sessions)
between applications.
This layer requests for a logical connection to be
established on an end-user’s request.
Any necessary log-on or password validation is also
handled by this layer.
Session layer is also responsible for terminating the
connection.
This layer provides services like dialogue discipline which
can be full duplex or half duplex.
Session layer can also provide check-pointing mechanism
such that if a failure of some sort occurs between
checkpoints, all data canARCHITECTURE
NETWORK be retransmitted from the33last
checkpoint.
Continue -
Provides coordination of the communications in an orderly manner. It
determines one-way or two-way communications and manages the dialog
between both parties; for example, making sure that the previous request
has been fulfilled before the next one is sent. It also marks significant
parts of the transmitted data with checkpoints to allow for fast recovery in
the event of a connection failure.
In practice, this layer is often not used or services within this layer are
sometimes incorporated into the transport layer.
NETWORK ARCHITECTURE 34
Figure 2.11 Session layer
NETWORK ARCHITECTURE 35
OSI Model
Presentation Layer
Presentation layer defines the format in which the
data is to be exchanged between the two
communicating entities.
Also handles data compression and data encryption
(cryptography).
NETWORK ARCHITECTURE 36
Continue -
NETWORK ARCHITECTURE 37
Figure 2.12 Presentation layer
NETWORK ARCHITECTURE 38
Application Layer
This layer supports application and end-user processes. Communication
partners are identified, quality of service is identified, user authentication
and privacy are considered, and any constraints on data syntax are
identified. Everything at this layer is application-specific. This layer
provides application services for file transfers, e-mail, and other network
software services. Telnet and FTP are applications that exist entirely in
the application level. Tiered application architectures are part of this layer.
Protocols used:
NETWORK ARCHITECTURE 40
Figure 2.14 Summary of layers
NETWORK ARCHITECTURE 41
OSI Model
OSI in Action
A message begins at the top
application layer and moves down
the OSI layers to the bottom
physical layer.
As the message descends, each
successive OSI model layer adds a
header to it.
A header is layer-specific
information that basically explains
what functions the layer carried out.
Conversely, at the receiving end,
headers are striped from the
message as it travels up the
corresponding layers.
NETWORK ARCHITECTURE 42
Figure 2.15 TCP/IP and OSI model
NETWORK ARCHITECTURE 43