Layers in the Osi Model
Layers in the Osi Model
Physical Layer
The physical layer coordinates the functions required to carry a bit stream over a
physical medium.
It deals with the mechanical and electrical specifications of the interface and
transmission medium.
It also defines the procedures and functions that physical devices and interfaces have
Figure 2.5 shows the position of the physical layer with respect to the transmission
the characteristics of the interface between the devices and the transmission medium.
physical layer defines the type of encoding (how Os and Is are changed to signals).
□ Data rate. The transmission rate—the number of bits sent each second—is also
In other words, the physical layer defines the duration of a bit, which is how long it
lasts.
□ Synchronization of bits. The sender and receiver not only must use the same
In other words, the sender and the receiver clocks must be synchronized.
□ Physical topology. The physical topology defines how devices are connected to
make a network.
every other device), a star topology (devices are connected through a central device),
a ring topology (each device is connected to the next, forming a ring), a bus topology
or more topologies).
In simplex mode, only one device can send; the other can only receive.
In the half-duplex mode, two devices can send and receive, but not at the same time.
In a full-duplex (or simply duplex) mode, two devices can send and receive at the same
time.
The data link layer transforms the physical layer, a raw transmission facility, to a
reliable link.
It makes the physical layer appear error-free to the upper layer (network layer).
Figure 2.6 shows the relationship of the data link layer to the network and physical
layers.
network, the data link layer adds a header to the frame to define the sender and/or
If the frame is intended for a system outside the sender’s network, the receiver
address is the address of the device that connects the network to the next one.
□ Flow control. If the rate at which the data are absorbed by the receiver is less
than the rate at which data are produced in the sender, the data link layer imposes a
□ Error control. The data link layer adds reliability to the physical layer by adding
Error control is normally achieved through a trailer added to the end of the frame.
□ Access control. When two or more devices are connected to the same link, data link
layer protocols are necessary to determine which device has control over the link at
Figure 2.7 illustrates hop-to-hop (node-to-node) delivery by the data link layer.
As the figure shows, communication at the data link layer occurs between two
adjacent nodes.
To send data from A to F, three partial deliveries are made. First, the data link layer at
Finally, the data link layer at E sends a new frame to the data link layer at F.
Note that the frames that are exchanged between the three nodes have different
The frame from A to B has B as the destination address and A as the source address.
The frame from B to E has E as the destination address and B as the source address.
The frame from E to F has F as the destination address and E as the source address.
The values of the trailers can also be different if error checking includes the header of
the frame
Whereas the data link layer oversees the delivery of the packet between two systems
on the same network (links), the network layer ensures that each packet gets from its
If two systems are connected to the same link, there is usually no need for a network
layer.
However, if the two systems are attached to different networks (links) with
connecting devices between the networks (links), there is often a need for the
Figure 2.8 shows the relationship of the network layer to the data link and transport
layers.
If a packet passes the network boundary, we need another addressing system to help
The network layer adds a header to the packet coming from the upper layer that,
among other things, includes the logical addresses of the sender and receiver.
(called routers or switches') route or switch the packets to their final destination.
When the packet arrives at router B, the router makes a decision based on the final
Router B uses its routing table to find that the next hop is router E.
The network layer at B, therefore, sends the packet to the network layer at E.
The network layer at E, in turn, sends the packet to the network layer at F.
Transport Layer
message.
and in order, overseeing both error control and flow control at the source-to-
destination level.
Figure 2.10 shows the relationship of the transport layer to the network and session
layers.
□ Service-point addressing. Computers often run several programs at the same time.
For this reason, source-to-destination delivery means delivery not only from one
computer to the next but also from a specific process (running program) on one
The transport layer header must therefore include a type of address called a service-
The network layer gets each packet to the correct computer; the transport layer gets
These numbers enable the transport layer to reassemble the message correctly upon
arriving at the destination and to identify and replace packets that were lost in
transmission.
connection- oriented.
A connection- oriented transport layer makes a connection with the transport layer at
□ Flow control. Like the data link layer, the transport layer is responsible for flow
control.
However, flow control at this layer is performed end to end rather than across a single
link.
□ Error control. Like the data link layer, the transport layer is responsible for
error control.
However, error control at this layer is performed process-to- process rather than
The sending transport layer makes sure that the entire message arrives at the
Session Layer
The services provided by the first three layers (physical, data link, and network) are
systems.
□ Dialog control. The session layer allows two systems to enter into a dialog. It
allows the communication between two processes to take place in either halfduplex
presentation layers.
Presentation Layer
The presentation layer is concerned with the syntax and semantics of the information
Figure 2.13 shows the relationship between the pre-sentation layer and the
Because different computers use different encoding systems, the presentation layer is
The presentation layer at the receiving machine changes the common format into its
receiver-dependent format.
privacy.
Encryption means that the sender transforms the original information to another form
Decryption reverses the original process to transform the message back to its original
form.
information.
The application layer enables the user, whether human or software, to access the
network.
It provides user interfaces and support for services such as electronic mail, remote file
access and transfer, shared database management, and other types of distributed
information services.
Figure 2.14 shows the relationship of the application layer to the user and the pre-
sentation layer.
Of the many application services available, the figure shows only three: X.400
(message-handling services), X.500 (directory services), and file transfer, access, and
management (FTAM).
host.
The user’s computer talks to the software terminal which, in turn, talks to the host,
The remote host believes it is communicating with one of its own terminals and allows
□ File transfer, access, and management. This application allows a user to access
files in a remote host (to make changes or read data), to retrieve files from a remote
computer for use in the local computer, and to manage or control files in a remote
computer locally.
□ Mail services. This application provides the basis for e-mail forwarding and
storage.