Monday, April 1, 2019
The Seven Layer Osi Model
The Seven stage Osi ModelSeven- work OSI baffle is a logical floor and developed by the ISO humanity(prenominal) standardization organization. The conclude of this class is to understand the transmittal of selective education strikes from source to destination and to several(prenominal)ise troubles du besiege entropy contagious disease. The 7 molds include occupation, exhibit, Session, f ar, Ne iirk, info marry and Physical stratum. The time of point names to be remembered by this phrase All populate seem to need information abuting. The following is a general r blockering of to each integrity work. OSI seed clay sculpture is now being considered as the important influence for the inter cyberspace incomeing and inter computing. The seven storys divide the task of information transmission in sub tasks and then complete the information transmission cycle. scruple 1In the 1980s, the European-dominated International Standards Organization (ISO) b egan to develop its apply Systems interconnectedness (OSI) profitsing suite. OSI has twain major comp unmatchablents an abstract model of webing (the Basic quote Model, or seven- fucking model), and a set of concrete communicatings protocols.Briefly explain each of the seven OSI layer included their function and usage in info dialogue and neting.OSI Reference ModelOSI reference model (Open Systems Inter companionship) illustrates how information from a softw argon natural covering on a information processing system moves through with(predicate) a net medium to a information processing system software industry on a nonher ready reckoner. OSI reference model is conceptu everyy divided into 7 layers w presend each layer has a specific web function, as described by figure 1.1 (with no natural media). This model was created based on a proposal give away by the International Standards Organization (ISO) as a first feeling toward supranational standardization of pr otocols employ at various layers. This model is called ISO OSI (Open Systems Interconnection) Reference Model beca office this model is in goded for sharing open system.1 Open Systems stand be interpreted as an open system to convey with separate systems. For his brief, we leave call this model as the OSI model completedly. solve 1.1. OSI Reference ModelOSI model has seven layers. The principles used for the seven layers are1. A layer must be made when needed disparate levels of abstraction.2. Each layer shall gull certain functions.3. The function of each layer should be chosen care honorabley in accordance with the provisions of international protocol standards.4. Layer boundaries labored to minimize the flow of information through the interface.5. The number of layers must be rather a lot, so that diametric functions do non need to be united in a hit layer outside needs. However, the number of layers must to a fault be cultivated as little as possible so that the ne iirk architecture does non become difficult to use.Below discuss intimately each layer of the OSI model sequentially, starting from the bottom layer. It should be mention that the OSI model itself is non mesh architecture, because this model does not explain the engage overhauls and protocols to be used on any layer. OSI model scarce explains about what should be do by a layer. However, ISO has also found standards for all layers, although these standards do not constitute a reference model itself. Each layer has been go ford as a separate international standard.Characteristics of the OSI LayersTo seven layers of OSI reference model disregard be divided into two categories, viz. upper and set out layers. The top layer of the OSI model deals with application issues and generally lend unityselfed only in software. The highest layer (application layer) is the cover previous to the user (users), both users and application layer surgical processes interact with software applications that take over a dialogue comp starnt. The term upper layer is whatsoevertimes used to refer to any(prenominal) of the top layer of an separate coating layer in the OSI model. The bottom layer of the OSI model to take in selective information transplant issues. Physical layer and data impinging layer employ in hardware and software. The layers below the an opposite(prenominal)s are generally only implemented in software. The lowest layer, the carnal layer is a layer of cover for the physical network medium (cable networks), and as responsible for the placement of information on the network media.2 The following table shows the separation of the two layers in the layers of the OSI model. cover Application Overlay displaySessionTransport information Transport Undercoat mesh network topologyData LinkPhysicalTable 1.2 insularism of top layer and bottom layer of the OSI modelProtocolOSI model provides a conceptual framework for confabulation betwixt estimator s, but this model is not a method of communication. In fact communication discharge continue due to use of communication protocols. In the con school text of data networks, a protocol is a formal rules and agreements that determine how computers exchange information over a network medium. A protocol implements unity or to a greater extent of the layers of the OSI. A wide variation of the communication protocol, but all carry ons the flow in star group the local area network protocols, sick protocols, network protocols, and routing protocols. LAN protocols operate at the physical and data link layer of the OSI model and situate communication over various LAN media. wan protocols operate at the third lowest layer of the OSI model and define communication over various WAN. Routing protocol is a network layer protocol that is responsible for determining the road and traffic arrangements. Finally, the network protocol is assorted from the upper layer protocols that exist in a s erial of protocols.Layers of the OSI ModelPhysical LayerPhysical Layer functions in the manner of speaking of raw bends into the channel of communication. De sign issues that must be considered here is to master that when one side throws data 1 bit, the data must be accepted by the former(a) side as a bit too, and not 0 bit. The indecision that prepares in this case is how many volts should be used to declare a value of 1? And how many volts is also call for for the number 0?. It takes a bit how microsecond provide be exhausted? Is the transmission raft be processed coincidently in both directions? How many pins are owned by the network and what is the use of each pin? In general, design problems are found here related to the mechanical, electrical and procedural interfaces, and physical media which is under the physical layer.Data Link LayerThe main task of the data link layer is as raw data transmission facility and transforms the data to a channel that is free from tran smission errors. Before forwarded who work layer, data link layer perform this task by allowing the sender meme cage faulting input data into a number of data frames (usually numbering in the hundreds or thousands of bytes). Then the data link layer transmits these frames in sequence, and process the credit entry frames sent back by the recipient. Because the physical layer send and happen bit stream without regard to the corresponding or architectural frame, then depending on the data link layer was to create and tell frame boundaries it. This hind end be done by affixing a keeped(a) bit to the set about and end of the frame. If incidental bit patterns put forward be found in the data, it is necessary to pay special attention to plug that the pattern is not incorrectly considered as the boundaries of the frame.The occurrence of noise in the channel grass damage the frame. In this case, the data link layer software on the source implement to send back the broken frame . However, transmission of the analogous frame over and over again understructure cause duplication of frames. Duplicate frames need to be sent if an ac inhabitledgment frame from the receiver who returned to the sender has been lost. Depending on the layer is to overcome the problems that caused the destruction, sacking and duplication of frames. The data link layer provides some service classes for the network layer. This service class can be distinguished in footing of quality and price.4Other problems that arise in the data link layer (and also most of the layers above it) are seeking the limpid process of data transmission from the sender to the recipient a wordy speed. Mechanism of regulation of traffic data should allow the sender to know the amount of buffer space owned by the recipient at a certain moment. Often setting flow and error manipulation is done in an integrated manner. Channel that can send data in both directions also can be problematic. So wherefore nee d to be considered for the data link layer software. Problems that can arise here is that the frames ac experiencement flowing from A to B compete with each other ahead of the flow from B to A. Settlement of the best (piggy backing) could have been used, then we shall discuss it in depth. Broadcast networks have an rise to poweral problem in the data link layer. The problem is in terms of imperative portal to a shared channel. To fix this you can use a special sub layer of data link layer, called the medium access sub layer.vane Layer net profit layer serves to control feat of the subnet. Important design problem is how to determine the alley piece of lands from source to destination. path can be based on static tables are relate to network. Route can also be determined at the beginning of a conversation such as a terminal seance. Finally, the route can also be very dynamic it can be several(predicate) for each package. Therefore, the delivery route of a packet depends on network load at that time. If at the same time in a subnet thither are too many packets, then in that respect is the porta of the packages go in at the same time. This can lead to bottlenecks. over-crowding control as it is also the task of the network layer. Because the sub net operators expect the good fortune of his meditate duties. There is often some accounting function built at the network layer. To make account information, at least the software should calculate the number of packets or characters or bits that are sent by each customer. Accounting becomes more complicated, when a packet crosses a country that has a different rate.The move packets from one network to another can also cause problems that are not small. Addressing mode used by a network can be different from the methods used by other network. A network whitethorn be unable to receive the package at all because the packet size is too big. Protocol was be different, as well as others. net layer has been giv en the task to solve all these problems, allowing different networks interconnected to each other.Transport LayerThe primary function is the enamour layer receives data from the session layer, split the data into pieces smaller if necessary, send the data to the network layer, and ensure that all pieces of data can arrive at the other side correctly. Moreover, all this must be done efficiently, and aims to protect the upper layers of the changes in hardware technology that can not be avoided. Under normal circumstances, the outrage layer makes the network connection is different for each canalise connection which is required by the session layer. When the transport connection requires a high throughput, then the transport layer can make a lot of network connections. Transport layer divide sending data to a number of networks to increase throughput. On the other hand, if the manufacture or maintenance of the network connection is quite expensive, transport layer can combine mul tiple transport connections to the same network connection. This is done to make this merger is not seen by the session layer.Transport layer also determines the type of service for the session layer, and in turn the type of service for users of the network. Type of the most popular transport layer is a channel error-free point to point that forward pass alongs or bytes in accordance with the order delivery. However, in that location are also other types of transport services. The services are transport isolated messages that do not guarantee order of delivery, and imbue messages to a number of purposes. Type of service determined when the connection starts.Transport layer is a layer end to end in fact, from source to destination. In other words, a political platformme on the source machine to bring the conversation with the same program on the target machine. In the lower layers, there are protocols between the two machines and other machines that are close by. Protocol is not laid in the outer or the source machines outer purpose machine, which whitethorn be separated by a router. The differences between layers 1 to 3 are intertwined and layer 4 to 7 are end to end. This can be explained as shown in course 1-1.In addition to group meeting multiple streams of messages into a single channel, transport layer must be careful in defining and deciding on the network connection. This process requires a naming mechanism, so that a process on a machine has a way to explain with whom the machine wants to talk. Also there should be a mechanism to regulate the flow of information, so that the flow of information from a fast host does not overwhelm a slow host. Such mechanism is called flow control and plays an important type in the transport layer (also in other layers). Flow control between hosts with different hosts by controlling the flow of the router with the router. Well uncovering out later that the same principles used for both types of the control.Sess ion LayerSession layer allows users to establish sessions with other users. A session in addition allows ordinary data transport, as did the transport layer, also provides special services for specific applications. A session is used to allow one user logs into a remote timesharing system or to move files from one machine to another to machine. A session layer service is to implement the dialogue control. Sessions can allow traffic to move in two directions at one time or only in one direction only. If at one time in traffic only in one direction only analogous to a single railway line, the session layer helps to determine who is entitled to use the channel turn at an instant.Service sessions are described as keepsake management. For some protocols, it is important to ensure that both parties concerned do not perform surgery at the same time. To regulate this activity, the session layer provides tokens that can turn. Only a party that holds the token is allowed performs critical o perations. other session is a synchronization service. Take for example that can occur when trying to transfer files that lasted 2 hours from one machine to another machine with the possibility of having an interval of 1 hour between the two crashes that can occur. After each transfer is canceled, the transfer may need to be repeated again from scratch, and may experience another failure. To reduce the possibility of this problem, the session layer can insert a specific sign to the flow of data. Therefore, if a crash, only the data that is after the sign is to be transferred back. unveiling Layer intromission layer performs certain functions that are required to ensure the discovery of a common solution for certain problems. Presentation Layer does not allow users to solve their own problems. Unlike the layers underneath are only moving the bits from one place to another place, presentment layer attention to syntax and semantics of information transmitted. One example is the conve rt of data presentation service. Most users do not move a random quarter of binary bits. The users exchange data just as the name, date, amount of money, and bills. The items are expressed in the form of a string of characters, integer numbers, floating point numbers, a data structure make from some simpler items. There is a difference between one computer to another computer in a given code to declare a string of characters (for example, ASCII and Unicode), integer (for example, complement and complement one two), and so forth. To allow the two computers that have different presentation to communicate, data structures to be exchanged can be expressed by means of abstract, in accordance with standard encoding to be used on line. Presentation layer-data set and convert this abstract structure of representation that is used on a computer into a network standard representation, and vice versa.Application LayerApplication layer lies of a variety of protocols. For example there are hu ndreds of incompatible terminal types in the entire world. Take the berth where full-screen editor is expected to work on a network with a variety of terminals, which each have different screen layouts, have a way different sequence of keystrokes for the insertion and deletion of text, move the sensor and so forth. One way to overcome such problems in data is to define an abstract network realistic terminal, so editors and other programs can be written for each corresponding. To handle each terminal type, one part of the software must be written to map the network virtual terminal functions to the actual terminal. For example, when moving the cursor editor virtual terminal into the left corner of the screen, the software should issue the appropriate pedagogy sequence to achieve the cursor. All virtual terminal software is in the application layer.Another application layer function is file transfer. archive systems from one another have different naming conventions, how to expre ss the lines of text are different, and so forth. Transfer files from a system different to other systems that require treatment to overcome the lack of this compatible. The task is also a job application layer, such as electronic mail, remote job entry, directory lookup, and various general purpose facilities and other special purpose facilities. shuttingThe process of sending a data to be sent to the recipient. sender processes submitting data to the application layer, which then add the user application header, the AH (which may also be empty), the nominal head end and submit the results to the presentation layer. Presentation layer can form these data in various shipway and may just add a header at the front end, which is given by the session layer. It is important to remember that the presentation layer is not aware of the data which are marked AH by application layer is the data users really are.The process of granting this header repeated until the data reaches the physical layer, where data leave alone be transmitted to other machines. On these machines, all headers were be removed one by one until comer the admissions process. radiation diagram1 .3 Examples of how the OSI model usedThe key here is that although the actual data transmission is each layer is programmed as though the transmission in question took place horizontally. For example, when transport layer delivery get a message from the session layer, transport layer will then affix the transport layer header and sends it to the receiver transport layer.INTRODUCTIONComputer networks are a tool, know also as pommels, relating to media liaison. Node may consist of a computer, printer or other device to send and receive data generated by other pommels, invitees in the network. Media Liaison, also known as communication media.On this day, there are various types of networks, including local field of battle network (LAN) and wide area network (WAN). The largest network in the world is the Internet.Edit Development. meshing started with a small edifice, the connection about ten computers and a printer. The technology that exists at the time the computer is connected to limit the number and length of communications cable that can be allowed on the network. In the early nineties the communication cable can be pulled so far about 600 feet to the extension of approximately 30 computers only. This network is suitable for a small organization known as local area network (LAN). LANs typically connect devices in a building or a building. A LAN can be built only with two computers and a printer or can be extended only in one building to include auditory sensation and video software. LAN size is limited to a distance of several kilometers only. LAN with data rates from 4 Mbps to 100 Mbps. electronic network connections from different countries has established the development of LAN to the wide area network (WAN). WAN can be sending data, audio and video at distances up to c over a country or continent or or so the world.QUESTION 2Briefly explain at least quaternion (4) topologies of networks and suggest how we implement these topologies in networking.MAIN BODYNetwork can be of any of the following three typesLocal line of business Network routine 2.1 Local Area NetworkLocal Area Network (LAN) is a limited range of geographical barriers such as a laboratory, a school or building. In a typical LAN configuration, one of the computers used as file master of ceremonies file emcee that functions to keep all the software that controls the network. All computers are connected to the server file known as a workstation. Computer workstation comprising a background computer specifications less than the server and also may have software on the disk severity. Cable used to connect the LAN via network card installed on each computer.Metropolitan Area Network come in 2.2 Metropolitan Area NetworkTown Area Network (MAN) covers a wider geographical area as a reg ion or city. general area network connecting a number of Local Area Network in a place to enable sharing of information carried. Universities and governing agencies ample spread Area Network to communicate with the other communities and undercover industries.One example is the MAN MIND Network, located in Pasco County, Florida which enables communication between the Central Pasco Media Center Main Frame using a telephone line, coaxial cable, and wireless communication providers.Wide Area NetworkFigure 2.3 Wide Area NetworkWidespread Area Network (WAN) covers a wider area as a state, nation and world. To create a WAN requires systems across the sea or the use of microwave or satellite.Use WAN enables communication between the states can be implemented quickly.Configuring the WAN is complex and requires a hardware multiplexing multiplexer for LAN and MAN think for access to a comprehensive communications network such as the Internet.Network analysis situsFigure 3.1 Network an alysis situsA computer network system using communication line that connects computers to each other.5 There are various methods that can be used for the communication and is known as topology. regional anatomy can be considered as a virtual shape or structure of a network. This shape truly does not correspond to the actual physical design of the devices on the computer network. The computers on the home network can be arranged in a circle shape but it does not necessarily mean that it presents a ring topology.There are few types of topologies for computer networks, namely jumper cable Network topologyFigure 3.1.1 Star Network TopologyStar topology is a network where all computers or other devices connected to the central distribution system, known as the Hub or Switch. Hub or Switch is responsible for managing the computer network. All messages or data that is sent to a central control hub for avoid collisions from occurring. There are two operations that used by the hub or swi tch that is operating broadcast and the operations of the transition switching. Distribution operations, hub or switch will make the delivery of data legitimate from one station to all the routes connecting them. In transition operations, the hub or switch will save the data received and sends the data through a receiving station.3 Each node can be connected to the network and can be removed at any time without necessitateing the whole system of directly by. Furthermore, if one node does not work, it will not affect other computer networks. Any damage to the connection between the hub nodes will not affect the system as a whole, but if the damage occurred on the hub, the entire system will also be affected. The main weakness of this topology is that it requires a fairly high cost in view of all systems connected to it computers, scanners, printers, etc. requires its own cable.Ring Network TopologyFigure 3.1.2 Ring Network TopologyIn local area networks where the ring topology is u sed, each computer is connected to the network in a closed loop or ring. The Messages or data to be transferred in order according to the same path in the same ring. Network technology was first used by IBM systems with Type I in the category of cable shielded Twisted Pair STP. Each data node will be checked by delivery location. If not the same node strike, it will be submitted to the next node and this will continue until the delivery address the same node strike. As the data is transferred by the same route as the sequence of the potential for violations of data that appears to be similar to the network and can be removed at any time without affecting the whole system of directly by.6 However, one problem that arises is if a node fails, the entire network will probably also be affected.Arrangement of nodes in this topology is almost the same physically as star topology only a logical was a ring. The attachment is required in this topology is called Multi identify Access Unit (MS AU). MSAU is installed in a ring-shaped network where it is more than one unit. If only one unit only used the physical topology is similar to the star connection.Bus Network TopologyFigure 3.1.3 Bus Network TopologyBus topology, are also known as the Ethernet using a line length where each node in relation to him. Data will be sent by each node in the hope that it does not collide with data transmitted from other nodes. If it happens, the node will try again until successful. weakness of the bus topology is in terms of maintenance. It is quite difficult to maintain in view of the connection is in the form of a series. In the event of damage to any line at any node, it will cause the entire system will not work. In addition to accurately locate points or nodes those are damaged. Each node can be connected to the network and can be removed at any time without affecting the whole system directly. Furthermore, if one node does not work nor does it affect other computer networks. The ot her advantage is there in this topology is that it uses a single cable and requires no additional hardware to build the network. But it does not require a very high cost for maintenance purposes.Tree Network TopologyFigure 3.1.4 Tree Network TopologyThe tree topology is basically a crossing of the bus and star layouts. It is also known as a hierarchical topology and has a central root node that is connected to one or more nodes of a lower hierarchy. In a symmetrical hierarchy, each node in the network has a specific fixed number of nodes connected to those at a lower level.3 Apart from these basic types of network topologies, there are hybrid network topologies, which are composed of a combination of two or more basic topologies. These network mappings aim at harnessing the advantages of each of the basic topologies used in them. Network topologies are the physical arrangements of network nodes and wires. What is fire is that the inanimate nodes and wires turn live for the trans mission of information.Mesh Network TopologyFigure 3.1.5 Mesh Network TopologyIn a full mesh network, each network node is connected to every other node in the network. Due to this arrangement of nodes, it becomes possible for a simultaneous transmission of signals from one node to several other nodes. In a partially connected mesh network, only some of the network nodes are connected to more than one node. This is beneficial over a amply connected mesh in terms of redundancy caused by the point-to-point connect between all the nodes.5 The nodes of a mesh network require possessing some kind of routing logic so that the signals and the data traveling over the network take the shortest path during each of the transmissions.CONCLUSIONTopologies are essence of computer networks design. Efficient networks can only be built based on the complete knowledge and understanding of above mentioned topologies. Knowledge of every communication device is of equal importance to help you find the best selection for your network requirements. Optimum networks can be built with complete knowledge and understanding of computer network devices and how they are designed, any mistake in choosing inappropriate techniques, device etc can only be the waste of time, resources and efforts. extensionFigure 1.1. OSI Reference ModelApplication Application OverlayPresentationSessionTransport Data Transport UndercoatNetworkData LinkPhysicalTable 1.2 Separation of top layer and bottom layer of the OSI modelFigure1 .3 Examples of how the OSI model usedFigure 2.1 Local Area NetworkFigure 2.2 Metropolitan Area NetworkFigure 2.3 Wide Area NetworkFigure 3.1 Network TopologyFigure 3.1.1 Star Network TopologyFigure 3.1.2 Ring Network TopologyFigure 3.1.3 Bus Network TopologyFigure 3.1.4 Tree Network Topology
Subscribe to:
Post Comments (Atom)
No comments:
Post a Comment