SlideShare une entreprise Scribd logo
1  sur  28
Data Communications & Networking
                      Lecture-05


            Course Instructor : Sehrish Rafiq
            Department Of Computer Science
                     University Of Peshawar
Lecture overview
 OSI Model
 About OSI
 Interfaces between layers
 Organization of the layers
 Functions of physical layer
 Functions of Data Link Layer
OSI Model
 International standards Organization(ISO),1947,multi-national body.
 ISO is dedicated to worldwide agreement on international standards.
 An ISO standard that covers all aspects of network communications is the Open
  Systems Interconnection(OSI ) model.
 An open system is a model that allows two different systems to communicate,
  regardless of their underlying architecture.
 Vendor specific protocols close-off communication between unrelated systems.
 The purpose of the OSI model is to open communication between different
  systems without requiring changes to the logic of the underlying hardware and
  software.
OSI Model
 OSI is not a protocol, it is a model for understanding and designing a network
  architecture that is flexible, robust & interoperable.
 It is a layered framework for the design of network systems that allow for
  communication across all types of computer systems.
 It consists of seven separate but related layers, each of which defines a segment
  of the process of moving information across a network.
 Understanding the fundamentals of the OSI model provides a solid basis for the
  exploration of data communication.
OSI Model
Layered architecture
 Each layer defines a family of functions into discrete groups
  that became the layers.
 Each layer defines a family of functions distinct from those of
  the other layers.
 Comprehensive architecture.
 The OSI model allows complete transparency between
  otherwise incompatible systems.
Layered architecture
Peer-to-Peer Processes
 Within a single machine each layer calls upon the services of the layer just
    below it.
   Between machines, layer x on one machine communicates with layer x on
    another machine.
   This communication is goverened by an agreed upon series of rules and
    conventions called protocols.
   The process on each machine that communicate at a given layer are called peer-
    to-peer processes.
   Communication between machines is therefore a peer –to-peer process using
    the protocols appropriate to a given layer.
   Direct & indirect communication.
   Each layer in the sending machine adds its own information to the message it
    receives from the layer just above it and passes the whole package to the layer
    just below it.
Peer-to-Peer Processes
 This information is added in the form of headers & trailers(control
  data).
 Headers are added at layers 6,5,4,3 and 2.
 A trailer is only added at layer 2.
 No header or trailer is added at layer 7 and 1.
 At layer 1 the entire package is converted to a form that can be
  transferred to the receiving machine.
 At the receiving machine, the message is unwrapped layer by
  layer, with each process receiving and removing data meant for it.
Communication In OSI
Interfaces between layers
 The passing of the data and network information down through the
  layers of the sending machine and back up through the layers of the
  receiving machine is made possible by an interface between each pair
  of adjacent layers.

 Each interface defines what information and services a layer must
  provide for the layer above it.

 Well defined interfaces and layer functions provide modularity to a
  network.

 As long as a layer still provides the expected services to the layer above
  it,the specific implementation of its functions can be modified or
  replaced without requiring changes to the surrounding layers.
Organization of Layers

 User support layers




Network support layers
Organization of Layers continued…
 The Network support layers deal with the physical aspects of
  moving data from one device to another (such as electrical
  specifications, physical connections, physical addressing and
  transport timing and reliability).

 The user support layers allow interoperability among unrelated
  software systems.

 The transport layer ensures end-to-end reliable data transmission.
Organization of Layers continued…
 The data link layer ensures the reliable transmission on a single
  link.

 The application, presentation, session are implemented in
  software.

 Transport, network and data link are the combination of hardware
  and software.

 Physical layer is mostly hardware.
Functions of the layers
Physical Layer
Physical Layer
 The physical layer coordinates the functions required to
  transmit a bit stream over a physical medium.
 It deals with the mechanical and electrical specifications of
  the interface and transmission medium.
 It also defines the procedures and functions that physical
  devices and interfaces have to perform for transmission to
  occur.
Concerns of the physical layer
 Physical characteristics of interfaces and media
 The physical layer defines the characteristics of the interface between the
   devices and the transmission medium.
 It also defines the type of transmission medium.



 Representation of bits
 The physical layer data consist of a stream of bits without any interpretation.
 To be transmitted bits must be encoded int to signals-electrical or optical.
 The physical layer defines the type of encoding.
Physical layer continued…
 Data rate
 The transmission rate(the number of bits sent each second) is also defined by
  the physical layer.
 In other words the physical layer defines the duration of a bit, which is how
  long it lasts.


 Synchronization of bits
 The sender and the receiver must be synchronized at the bit level.
 In other words the sender and the receiver clocks must be synchronized.
Physical layer continued…
 Line configuration
 The physical layer is concerned with the connection of devices to the medium.
 Point-to-point configuration
 Multi-point


 Physical topology
 The physical topology defines how devices are connected to make a network.


 Transmission mode
 The physical layer also defines the direction of transmission between two
  devices.
Data Link Layer
 The data Link Layer transforms the physical layer, a raw
  transmission facility, to a reliable link and is responsible for node-
  to-node delivery.

 It makes the physical layer appear error free to the upper
  layer(network layer).
Data Link Layer
Responsibilities of the Data Link
              Layer
 Framing
 The data link layer divides the stream of bits received from the network
  layer in to manageable data units called frames.


 Physical addressing
 If frames are to be distributed to different systems on the network, the
  data link layer adds a header to the frame to define the physical address
  of the sender and receiver of the frame.
 If the frame is intended for the system outside the sender’s network, the
  receiver address is the address of the device that connects one network
  to the next.
Data Link Layer continued…
 Flow control
 If the rate at which the data are absorbed by the receiver is less than the
  rate produced in the sender, the data link layer imposes a flow control
  mechanism to prevent overwhelming the receiver.

 Error control
 The data link layer adds reliability to the physical layer by adding
  mechanisms to detect and retransmit damaged or lost frames.
 It also uses a mechanism to prevent duplication of frames.
 Error control is normally achieved through a trailer added to the end of
  the frame.
Data Link Layer continued…
 Access Control
 When two or more devices are connected to the same link,
  data link layer protocols are necessary to determine which
  device has control over the link at any given time.
Data Link Layer
Example of data link layer
Thanks!!!

Contenu connexe

Tendances

Computer network
Computer networkComputer network
Computer networkNeha Gupta
 
Introduction To Computer Networks
Introduction To Computer Networks Introduction To Computer Networks
Introduction To Computer Networks AfsanaAkterRubi
 
Network Software, System Software, Hardware, Software, Firmware, App
Network Software, System Software, Hardware, Software, Firmware, AppNetwork Software, System Software, Hardware, Software, Firmware, App
Network Software, System Software, Hardware, Software, Firmware, AppAfsanaAkterRubi
 
Hub, switch, router, bridge & and repeater
Hub, switch, router, bridge & and repeaterHub, switch, router, bridge & and repeater
Hub, switch, router, bridge & and repeaterMaksudujjaman
 
Definition of computur netwoeks
Definition of computur netwoeksDefinition of computur netwoeks
Definition of computur netwoeksMd Ashikur Rahman
 
Network internet
Network internetNetwork internet
Network internetKumar
 
Computer Network
Computer NetworkComputer Network
Computer NetworkCma Mohd
 
Presentation on computer networking
Presentation on computer networkingPresentation on computer networking
Presentation on computer networkingJyoti Tewari
 
Classification of computer networks
Classification of computer networksClassification of computer networks
Classification of computer networksMaksudujjaman
 
Data Communications and Computer Networks
Data Communications and Computer Networks Data Communications and Computer Networks
Data Communications and Computer Networks Jubayer Alam Shoikat
 
Classification of Computer
Classification of ComputerClassification of Computer
Classification of ComputerAfsanaAkterRubi
 
Network Topologies
Network TopologiesNetwork Topologies
Network Topologiesdbrown1
 
Network standards
Network standardsNetwork standards
Network standardshspatalia
 

Tendances (20)

OSI Model
OSI ModelOSI Model
OSI Model
 
Computer network
Computer networkComputer network
Computer network
 
Introduction To Computer Networks
Introduction To Computer Networks Introduction To Computer Networks
Introduction To Computer Networks
 
Network Software, System Software, Hardware, Software, Firmware, App
Network Software, System Software, Hardware, Software, Firmware, AppNetwork Software, System Software, Hardware, Software, Firmware, App
Network Software, System Software, Hardware, Software, Firmware, App
 
Network Topology
Network Topology Network Topology
Network Topology
 
Osi model
Osi modelOsi model
Osi model
 
Hub, switch, router, bridge & and repeater
Hub, switch, router, bridge & and repeaterHub, switch, router, bridge & and repeater
Hub, switch, router, bridge & and repeater
 
Definition of computur netwoeks
Definition of computur netwoeksDefinition of computur netwoeks
Definition of computur netwoeks
 
Network Topology
Network TopologyNetwork Topology
Network Topology
 
Network internet
Network internetNetwork internet
Network internet
 
Class work 1
Class work 1Class work 1
Class work 1
 
Computer Network
Computer NetworkComputer Network
Computer Network
 
Class work4
Class work4Class work4
Class work4
 
Presentation on computer networking
Presentation on computer networkingPresentation on computer networking
Presentation on computer networking
 
Classification of computer networks
Classification of computer networksClassification of computer networks
Classification of computer networks
 
Data Communications and Computer Networks
Data Communications and Computer Networks Data Communications and Computer Networks
Data Communications and Computer Networks
 
Networking Cable
Networking CableNetworking Cable
Networking Cable
 
Classification of Computer
Classification of ComputerClassification of Computer
Classification of Computer
 
Network Topologies
Network TopologiesNetwork Topologies
Network Topologies
 
Network standards
Network standardsNetwork standards
Network standards
 

Similaire à Lecture 05 (20)

3. osi model
3. osi model3. osi model
3. osi model
 
OSI Model.It was created in 1983 by osi.
OSI Model.It was created in 1983 by osi.OSI Model.It was created in 1983 by osi.
OSI Model.It was created in 1983 by osi.
 
The Osi Model
The Osi ModelThe Osi Model
The Osi Model
 
seven layer OSI model
seven layer OSI modelseven layer OSI model
seven layer OSI model
 
THE OSI MODEL
THE OSI MODELTHE OSI MODEL
THE OSI MODEL
 
OSI Model of Networking
OSI Model of NetworkingOSI Model of Networking
OSI Model of Networking
 
OSI models
OSI modelsOSI models
OSI models
 
DCN _ unit 2.pptx
DCN _ unit 2.pptxDCN _ unit 2.pptx
DCN _ unit 2.pptx
 
Lecture 03
Lecture 03Lecture 03
Lecture 03
 
Unit 1 introduction
Unit 1 introductionUnit 1 introduction
Unit 1 introduction
 
OSI Reference Model-Lecture-2.pptx
OSI Reference Model-Lecture-2.pptxOSI Reference Model-Lecture-2.pptx
OSI Reference Model-Lecture-2.pptx
 
OSI MODEL
OSI MODELOSI MODEL
OSI MODEL
 
Lecture2
Lecture2Lecture2
Lecture2
 
OSI Network Reference Model
OSI Network Reference ModelOSI Network Reference Model
OSI Network Reference Model
 
Osi model
Osi modelOsi model
Osi model
 
Osi model 1
Osi model 1Osi model 1
Osi model 1
 
Osi model
Osi modelOsi model
Osi model
 
Presentation1.pptx
Presentation1.pptxPresentation1.pptx
Presentation1.pptx
 
Lecture2
Lecture2Lecture2
Lecture2
 
OSI MODEL
    OSI MODEL    OSI MODEL
OSI MODEL
 

Plus de Sehrish Rafiq

Introduction to Computers Lecture # 13
Introduction to Computers Lecture # 13Introduction to Computers Lecture # 13
Introduction to Computers Lecture # 13Sehrish Rafiq
 
Introduction to Computers Lecture # 12
Introduction to Computers Lecture # 12Introduction to Computers Lecture # 12
Introduction to Computers Lecture # 12Sehrish Rafiq
 
Introduction to Computers Lecture # 11
Introduction to Computers Lecture # 11Introduction to Computers Lecture # 11
Introduction to Computers Lecture # 11Sehrish Rafiq
 
Introduction to Computers Lecture # 10
Introduction to Computers Lecture # 10Introduction to Computers Lecture # 10
Introduction to Computers Lecture # 10Sehrish Rafiq
 
Introduction to Computers Lecture # 9
Introduction to Computers Lecture # 9Introduction to Computers Lecture # 9
Introduction to Computers Lecture # 9Sehrish Rafiq
 
Introduction to Computers Lecture # 8
Introduction to Computers Lecture # 8Introduction to Computers Lecture # 8
Introduction to Computers Lecture # 8Sehrish Rafiq
 
Introduction to Computers Lecture # 7
Introduction to Computers Lecture # 7Introduction to Computers Lecture # 7
Introduction to Computers Lecture # 7Sehrish Rafiq
 
Introduction to computers Lecture # 4
Introduction to computers Lecture # 4Introduction to computers Lecture # 4
Introduction to computers Lecture # 4Sehrish Rafiq
 
Introduction to Computers Lecture # 5
Introduction to Computers Lecture # 5Introduction to Computers Lecture # 5
Introduction to Computers Lecture # 5Sehrish Rafiq
 
Introduction to Computers Lecture # 3
Introduction to Computers Lecture # 3Introduction to Computers Lecture # 3
Introduction to Computers Lecture # 3Sehrish Rafiq
 
Introduction to Computers Lecture # 2
Introduction to Computers Lecture # 2Introduction to Computers Lecture # 2
Introduction to Computers Lecture # 2Sehrish Rafiq
 
Introduction to Computers Lecture # 1
Introduction to Computers Lecture # 1Introduction to Computers Lecture # 1
Introduction to Computers Lecture # 1Sehrish Rafiq
 
Data Communications and Networking Lecture 16
Data Communications and Networking Lecture 16Data Communications and Networking Lecture 16
Data Communications and Networking Lecture 16Sehrish Rafiq
 

Plus de Sehrish Rafiq (20)

Introduction to Computers Lecture # 13
Introduction to Computers Lecture # 13Introduction to Computers Lecture # 13
Introduction to Computers Lecture # 13
 
Introduction to Computers Lecture # 12
Introduction to Computers Lecture # 12Introduction to Computers Lecture # 12
Introduction to Computers Lecture # 12
 
Introduction to Computers Lecture # 11
Introduction to Computers Lecture # 11Introduction to Computers Lecture # 11
Introduction to Computers Lecture # 11
 
Introduction to Computers Lecture # 10
Introduction to Computers Lecture # 10Introduction to Computers Lecture # 10
Introduction to Computers Lecture # 10
 
Introduction to Computers Lecture # 9
Introduction to Computers Lecture # 9Introduction to Computers Lecture # 9
Introduction to Computers Lecture # 9
 
Introduction to Computers Lecture # 8
Introduction to Computers Lecture # 8Introduction to Computers Lecture # 8
Introduction to Computers Lecture # 8
 
Introduction to Computers Lecture # 7
Introduction to Computers Lecture # 7Introduction to Computers Lecture # 7
Introduction to Computers Lecture # 7
 
Introduction to computers Lecture # 4
Introduction to computers Lecture # 4Introduction to computers Lecture # 4
Introduction to computers Lecture # 4
 
Introduction to Computers Lecture # 5
Introduction to Computers Lecture # 5Introduction to Computers Lecture # 5
Introduction to Computers Lecture # 5
 
Introduction to Computers Lecture # 3
Introduction to Computers Lecture # 3Introduction to Computers Lecture # 3
Introduction to Computers Lecture # 3
 
Introduction to Computers Lecture # 2
Introduction to Computers Lecture # 2Introduction to Computers Lecture # 2
Introduction to Computers Lecture # 2
 
Introduction to Computers Lecture # 1
Introduction to Computers Lecture # 1Introduction to Computers Lecture # 1
Introduction to Computers Lecture # 1
 
Data Communications and Networking Lecture 16
Data Communications and Networking Lecture 16Data Communications and Networking Lecture 16
Data Communications and Networking Lecture 16
 
Lecture 24
Lecture 24Lecture 24
Lecture 24
 
Lecture 18
Lecture 18Lecture 18
Lecture 18
 
Lecture 21
Lecture 21Lecture 21
Lecture 21
 
Lecture 13
Lecture 13Lecture 13
Lecture 13
 
Lecture 12
Lecture 12Lecture 12
Lecture 12
 
Lecture 11
Lecture 11Lecture 11
Lecture 11
 
Lecture 07
Lecture 07Lecture 07
Lecture 07
 

Dernier

Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...
Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...
Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...Igalia
 
Data Cloud, More than a CDP by Matt Robison
Data Cloud, More than a CDP by Matt RobisonData Cloud, More than a CDP by Matt Robison
Data Cloud, More than a CDP by Matt RobisonAnna Loughnan Colquhoun
 
Axa Assurance Maroc - Insurer Innovation Award 2024
Axa Assurance Maroc - Insurer Innovation Award 2024Axa Assurance Maroc - Insurer Innovation Award 2024
Axa Assurance Maroc - Insurer Innovation Award 2024The Digital Insurer
 
How to convert PDF to text with Nanonets
How to convert PDF to text with NanonetsHow to convert PDF to text with Nanonets
How to convert PDF to text with Nanonetsnaman860154
 
Boost PC performance: How more available memory can improve productivity
Boost PC performance: How more available memory can improve productivityBoost PC performance: How more available memory can improve productivity
Boost PC performance: How more available memory can improve productivityPrincipled Technologies
 
Powerful Google developer tools for immediate impact! (2023-24 C)
Powerful Google developer tools for immediate impact! (2023-24 C)Powerful Google developer tools for immediate impact! (2023-24 C)
Powerful Google developer tools for immediate impact! (2023-24 C)wesley chun
 
Real Time Object Detection Using Open CV
Real Time Object Detection Using Open CVReal Time Object Detection Using Open CV
Real Time Object Detection Using Open CVKhem
 
The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024Rafal Los
 
Driving Behavioral Change for Information Management through Data-Driven Gree...
Driving Behavioral Change for Information Management through Data-Driven Gree...Driving Behavioral Change for Information Management through Data-Driven Gree...
Driving Behavioral Change for Information Management through Data-Driven Gree...Enterprise Knowledge
 
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking MenDelhi Call girls
 
From Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time AutomationFrom Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time AutomationSafe Software
 
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...Drew Madelung
 
Workshop - Best of Both Worlds_ Combine KG and Vector search for enhanced R...
Workshop - Best of Both Worlds_ Combine  KG and Vector search for  enhanced R...Workshop - Best of Both Worlds_ Combine  KG and Vector search for  enhanced R...
Workshop - Best of Both Worlds_ Combine KG and Vector search for enhanced R...Neo4j
 
Histor y of HAM Radio presentation slide
Histor y of HAM Radio presentation slideHistor y of HAM Radio presentation slide
Histor y of HAM Radio presentation slidevu2urc
 
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdf
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdfThe Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdf
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdfEnterprise Knowledge
 
Understanding Discord NSFW Servers A Guide for Responsible Users.pdf
Understanding Discord NSFW Servers A Guide for Responsible Users.pdfUnderstanding Discord NSFW Servers A Guide for Responsible Users.pdf
Understanding Discord NSFW Servers A Guide for Responsible Users.pdfUK Journal
 
08448380779 Call Girls In Greater Kailash - I Women Seeking Men
08448380779 Call Girls In Greater Kailash - I Women Seeking Men08448380779 Call Girls In Greater Kailash - I Women Seeking Men
08448380779 Call Girls In Greater Kailash - I Women Seeking MenDelhi Call girls
 
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
04-2024-HHUG-Sales-and-Marketing-Alignment.pptxHampshireHUG
 
CNv6 Instructor Chapter 6 Quality of Service
CNv6 Instructor Chapter 6 Quality of ServiceCNv6 Instructor Chapter 6 Quality of Service
CNv6 Instructor Chapter 6 Quality of Servicegiselly40
 
Boost Fertility New Invention Ups Success Rates.pdf
Boost Fertility New Invention Ups Success Rates.pdfBoost Fertility New Invention Ups Success Rates.pdf
Boost Fertility New Invention Ups Success Rates.pdfsudhanshuwaghmare1
 

Dernier (20)

Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...
Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...
Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...
 
Data Cloud, More than a CDP by Matt Robison
Data Cloud, More than a CDP by Matt RobisonData Cloud, More than a CDP by Matt Robison
Data Cloud, More than a CDP by Matt Robison
 
Axa Assurance Maroc - Insurer Innovation Award 2024
Axa Assurance Maroc - Insurer Innovation Award 2024Axa Assurance Maroc - Insurer Innovation Award 2024
Axa Assurance Maroc - Insurer Innovation Award 2024
 
How to convert PDF to text with Nanonets
How to convert PDF to text with NanonetsHow to convert PDF to text with Nanonets
How to convert PDF to text with Nanonets
 
Boost PC performance: How more available memory can improve productivity
Boost PC performance: How more available memory can improve productivityBoost PC performance: How more available memory can improve productivity
Boost PC performance: How more available memory can improve productivity
 
Powerful Google developer tools for immediate impact! (2023-24 C)
Powerful Google developer tools for immediate impact! (2023-24 C)Powerful Google developer tools for immediate impact! (2023-24 C)
Powerful Google developer tools for immediate impact! (2023-24 C)
 
Real Time Object Detection Using Open CV
Real Time Object Detection Using Open CVReal Time Object Detection Using Open CV
Real Time Object Detection Using Open CV
 
The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024
 
Driving Behavioral Change for Information Management through Data-Driven Gree...
Driving Behavioral Change for Information Management through Data-Driven Gree...Driving Behavioral Change for Information Management through Data-Driven Gree...
Driving Behavioral Change for Information Management through Data-Driven Gree...
 
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
 
From Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time AutomationFrom Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time Automation
 
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
 
Workshop - Best of Both Worlds_ Combine KG and Vector search for enhanced R...
Workshop - Best of Both Worlds_ Combine  KG and Vector search for  enhanced R...Workshop - Best of Both Worlds_ Combine  KG and Vector search for  enhanced R...
Workshop - Best of Both Worlds_ Combine KG and Vector search for enhanced R...
 
Histor y of HAM Radio presentation slide
Histor y of HAM Radio presentation slideHistor y of HAM Radio presentation slide
Histor y of HAM Radio presentation slide
 
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdf
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdfThe Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdf
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdf
 
Understanding Discord NSFW Servers A Guide for Responsible Users.pdf
Understanding Discord NSFW Servers A Guide for Responsible Users.pdfUnderstanding Discord NSFW Servers A Guide for Responsible Users.pdf
Understanding Discord NSFW Servers A Guide for Responsible Users.pdf
 
08448380779 Call Girls In Greater Kailash - I Women Seeking Men
08448380779 Call Girls In Greater Kailash - I Women Seeking Men08448380779 Call Girls In Greater Kailash - I Women Seeking Men
08448380779 Call Girls In Greater Kailash - I Women Seeking Men
 
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
 
CNv6 Instructor Chapter 6 Quality of Service
CNv6 Instructor Chapter 6 Quality of ServiceCNv6 Instructor Chapter 6 Quality of Service
CNv6 Instructor Chapter 6 Quality of Service
 
Boost Fertility New Invention Ups Success Rates.pdf
Boost Fertility New Invention Ups Success Rates.pdfBoost Fertility New Invention Ups Success Rates.pdf
Boost Fertility New Invention Ups Success Rates.pdf
 

Lecture 05

  • 1. Data Communications & Networking Lecture-05 Course Instructor : Sehrish Rafiq Department Of Computer Science University Of Peshawar
  • 2. Lecture overview  OSI Model  About OSI  Interfaces between layers  Organization of the layers  Functions of physical layer  Functions of Data Link Layer
  • 3. OSI Model  International standards Organization(ISO),1947,multi-national body.  ISO is dedicated to worldwide agreement on international standards.  An ISO standard that covers all aspects of network communications is the Open Systems Interconnection(OSI ) model.  An open system is a model that allows two different systems to communicate, regardless of their underlying architecture.  Vendor specific protocols close-off communication between unrelated systems.  The purpose of the OSI model is to open communication between different systems without requiring changes to the logic of the underlying hardware and software.
  • 4. OSI Model  OSI is not a protocol, it is a model for understanding and designing a network architecture that is flexible, robust & interoperable.  It is a layered framework for the design of network systems that allow for communication across all types of computer systems.  It consists of seven separate but related layers, each of which defines a segment of the process of moving information across a network.  Understanding the fundamentals of the OSI model provides a solid basis for the exploration of data communication.
  • 6. Layered architecture  Each layer defines a family of functions into discrete groups that became the layers.  Each layer defines a family of functions distinct from those of the other layers.  Comprehensive architecture.  The OSI model allows complete transparency between otherwise incompatible systems.
  • 8. Peer-to-Peer Processes  Within a single machine each layer calls upon the services of the layer just below it.  Between machines, layer x on one machine communicates with layer x on another machine.  This communication is goverened by an agreed upon series of rules and conventions called protocols.  The process on each machine that communicate at a given layer are called peer- to-peer processes.  Communication between machines is therefore a peer –to-peer process using the protocols appropriate to a given layer.  Direct & indirect communication.  Each layer in the sending machine adds its own information to the message it receives from the layer just above it and passes the whole package to the layer just below it.
  • 9. Peer-to-Peer Processes  This information is added in the form of headers & trailers(control data).  Headers are added at layers 6,5,4,3 and 2.  A trailer is only added at layer 2.  No header or trailer is added at layer 7 and 1.  At layer 1 the entire package is converted to a form that can be transferred to the receiving machine.  At the receiving machine, the message is unwrapped layer by layer, with each process receiving and removing data meant for it.
  • 11. Interfaces between layers  The passing of the data and network information down through the layers of the sending machine and back up through the layers of the receiving machine is made possible by an interface between each pair of adjacent layers.  Each interface defines what information and services a layer must provide for the layer above it.  Well defined interfaces and layer functions provide modularity to a network.  As long as a layer still provides the expected services to the layer above it,the specific implementation of its functions can be modified or replaced without requiring changes to the surrounding layers.
  • 12. Organization of Layers User support layers Network support layers
  • 13. Organization of Layers continued…  The Network support layers deal with the physical aspects of moving data from one device to another (such as electrical specifications, physical connections, physical addressing and transport timing and reliability).  The user support layers allow interoperability among unrelated software systems.  The transport layer ensures end-to-end reliable data transmission.
  • 14. Organization of Layers continued…  The data link layer ensures the reliable transmission on a single link.  The application, presentation, session are implemented in software.  Transport, network and data link are the combination of hardware and software.  Physical layer is mostly hardware.
  • 17. Physical Layer  The physical layer coordinates the functions required to transmit a bit stream over a physical medium.  It deals with the mechanical and electrical specifications of the interface and transmission medium.  It also defines the procedures and functions that physical devices and interfaces have to perform for transmission to occur.
  • 18. Concerns of the physical layer  Physical characteristics of interfaces and media  The physical layer defines the characteristics of the interface between the devices and the transmission medium.  It also defines the type of transmission medium.  Representation of bits  The physical layer data consist of a stream of bits without any interpretation.  To be transmitted bits must be encoded int to signals-electrical or optical.  The physical layer defines the type of encoding.
  • 19. Physical layer continued…  Data rate  The transmission rate(the number of bits sent each second) is also defined by the physical layer.  In other words the physical layer defines the duration of a bit, which is how long it lasts.  Synchronization of bits  The sender and the receiver must be synchronized at the bit level.  In other words the sender and the receiver clocks must be synchronized.
  • 20. Physical layer continued…  Line configuration  The physical layer is concerned with the connection of devices to the medium.  Point-to-point configuration  Multi-point  Physical topology  The physical topology defines how devices are connected to make a network.  Transmission mode  The physical layer also defines the direction of transmission between two devices.
  • 21. Data Link Layer  The data Link Layer transforms the physical layer, a raw transmission facility, to a reliable link and is responsible for node- to-node delivery.  It makes the physical layer appear error free to the upper layer(network layer).
  • 23. Responsibilities of the Data Link Layer  Framing  The data link layer divides the stream of bits received from the network layer in to manageable data units called frames.  Physical addressing  If frames are to be distributed to different systems on the network, the data link layer adds a header to the frame to define the physical address of the sender and receiver of the frame.  If the frame is intended for the system outside the sender’s network, the receiver address is the address of the device that connects one network to the next.
  • 24. Data Link Layer continued…  Flow control  If the rate at which the data are absorbed by the receiver is less than the rate produced in the sender, the data link layer imposes a flow control mechanism to prevent overwhelming the receiver.  Error control  The data link layer adds reliability to the physical layer by adding mechanisms to detect and retransmit damaged or lost frames.  It also uses a mechanism to prevent duplication of frames.  Error control is normally achieved through a trailer added to the end of the frame.
  • 25. Data Link Layer continued…  Access Control  When two or more devices are connected to the same link, data link layer protocols are necessary to determine which device has control over the link at any given time.
  • 27. Example of data link layer