0% found this document useful (0 votes)
34 views72 pages

OSI Model & Networking Standards Guide

The document discusses networking standards organizations and the OSI model. It describes organizations that set networking standards like IEEE, ISO, and ITU. It then explains the seven-layer OSI model and the purpose and functions of each layer.

Uploaded by

Kin
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
34 views72 pages

OSI Model & Networking Standards Guide

The document discusses networking standards organizations and the OSI model. It describes organizations that set networking standards like IEEE, ISO, and ITU. It then explains the seven-layer OSI model and the purpose and functions of each layer.

Uploaded by

Kin
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd

Networking Standards & OSI Model

Source: Feleke Merin (Dr. – Engr.)


Senior Asst. Professor

Source: Feleke Merin (Dr. – Engr.) 1


Networking Standards & OSI Model
After reading this chapter and completing the exercises, you will be able to:

■ Identify organizations that set standards for networking

■ Describe the purpose of the OSI Model and each of its layers

■ Explain specific functions belonging to each OSI Model layer

■ Understand how two network nodes communicate through the OSI Model

■ Discuss the structure and purpose of data packets and frames

SOURCE: FELEKE MERIN (DR. – ENGR.) 2


Networking Standards Organizations
Standards defined:
 Documented agreements containing precise criteria that are used

as guidelines to ensure that materials, products, processes, and

services suit their purpose.

 Help to ensure interoperability between software and hardware


SOURCE: FELEKE MERIN (DR. – ENGR.) 3
Networking Standards Organizations
 Some of the significant standards organizations are ANSI, EIA/TIA,
IEEE, ISO, ITU, and ICANN.

ANSI (American National Standards Institute)


• An organization composed representatives from industry and government
who together determine standards for:
 Electronics industry,
 Chemical and nuclear engineering,
 Health and safety, and construction.

SOURCE: FELEKE MERIN (DR. – ENGR.) 4


Networking Standards Organizations
 EIA (Electronic Industries Alliance)
• trade organization composed of representatives from
electronics manufacturing firms

 TIA (Telecommunications Industry Association)


• focuses on standards for information technology, wireless, satellite,
fiber optics, and telephone equipment.
 Both TIA and EIA set standards, lobby governments and industry, and sponsor
conferences, exhibitions, and forums in their areas of interest.

SOURCE: FELEKE MERIN (DR. – ENGR.) 5


Networking Standards Organizations
 IEEE (Institute of Electrical and Electronics Engineers), or “I-triple-E,”
• International society composed of engineering professionals.
• Its goals: to promote development and education in the electrical
engineering and computer science fields.
• IEEE hosts numerous symposia, conferences, and local chapter
meetings and publishes papers designed to educate members on
technological advances.
• It also maintains a standards board that establishes its own
standards for the electronics and computer industries

SOURCE: FELEKE MERIN (DR. – ENGR.) 6


Networking Standards Organizations

ISO (International Organization for Standardization)


• Headquartered in Geneva, Switzerland,

• A collection of standards organizations representing 146 countries.

• ISO’s goal: to establish international technological standards to

facilitate global exchange of information and barrier-free trade.

SOURCE: FELEKE MERIN (DR. – ENGR.) 7


Networking Standards Organizations

 ITU (International Telecommunication Union)


• A specialized United Nations agency that regulates international
Telecommunications, including radio and TV frequencies, satellite and
telephony specifications, networking infrastructure, and tariffs
applied to global communications.
• ITU is deeply involved with the implementation of worldwide Internet
services.

SOURCE: FELEKE MERIN (DR. – ENGR.) 8


Networking Standards Organizations

 ICANN (Internet Corporation for Assigned Names


and Numbers)
• A private, nonprofit corporation.
• ICANN is now ultimately responsible for IP addressing
and domain name management.

SOURCE: FELEKE MERIN (DR. – ENGR.) 9


ISO’s Open System Interconnection(OSI)

ISO ISO’s OSI Model


 International Organization for  An ISO standard that covers all aspects of
Standardization network communications
 Established in 1947,  First introduced in the late 1970s.
 Multinational body dedicated  Model for understanding and developing
to worldwide agreement on computer-to-computer communications
international standards over a network.

SOURCE: FELEKE MERIN (DR. – ENGR.) 10


Open System Interconnection(OSI)
 Conceptual model which allows diverse systems

to communicate regardless of the underlying

internal structure and technology

 Goal is the interoperability of diverse

communication systems with standard protocols

SOURCE: FELEKE MERIN (DR. – ENGR.) 11


Open System Interconnection(OSI)
OSI Model Purpose OSI Model Purpose
 OSI model: not a protocol,  Intended to be the basis for the
but a model for understanding creation of the protocols in the
and designing a network OSI stack.
 Goal: to be a general open standard
architecture that is flexible,  To allow vendors to enter the
robust, and interoperable. market by using their own
implementation and protocols

SOURCE: FELEKE MERIN (DR. – ENGR.) 12


Open System Interconnection(OSI)
OSI Model Layers
 Partitions a communication system
into abstraction layers

 The original version of the model


divides network communications
tasks into seven layers:

SOURCE: FELEKE MERIN (DR. – ENGR.) 13


Open System Interconnection(OSI)
 OSI layers: provide guidelines for the

development of universally compatible

architecture, hardware, and software.

 Each layer has its own set of functions

and interacts with the layers directly

above and below it.

SOURCE: FELEKE MERIN (DR. – ENGR.) 14


Open System Interconnection(OSI)
 Remembering the seven layers of
the OSI Model
• Make a sentence using words that begin
with the same first letter of each layer

Example:
• Choose to remember the phrase
• “Programmers Dare Not Throw
Salty Pizza Away.”

SOURCE: FELEKE MERIN (DR. – ENGR.) 15


BENEFITS OF OSI LAYERED MODEL
• Divides the network communication process into layers to be easier
to troubleshoot
• Allows multiple-vendor development through standardization of
network components
• Various types of network hardware and software can communicate
• Layer separation makes changes in one layer do not affect other layers
• Layers can interact with each other

SOURCE: FELEKE MERIN (DR. – ENGR.) 16


FUNCTIONS OF EACH OSI LAYER
• At each layer, protocols perform
services unique to that layer.

• While performing those services,


the protocols also interact with
protocols in the layers directly
above and below.

SOURCE: FELEKE MERIN (DR. – ENGR.) 17


APPLICATION LAYER OF OSI
• Enables the user, whether
human or software, to
access the network

• Provides user interface and


support for services (such
as email, remote file
access & transfer, etc. )
SOURCE: FELEKE MERIN (DR. – ENGR.) 18
APPLICATION LAYER OF OSI (CONTD.)
• User interface to lower layers

• Preparation of data for each service

• End-to-end communication on both sides

• Software applications reside in it

• Sends requests and receives reply

SOURCE: FELEKE MERIN (DR. – ENGR.) 19


APPLICATION LAYER OF OSI (CONTD.)
• HTTP (Hyper Text Transfer Protocol)
• FTP (File Transfer Protocol)
• SMTP (Simple Mail Transfer Protocol)
• POP3 (Post Office transfers Protocol)
• IMAP (Internet Message Access Protocol)
• Telnet/SSH (Secure Shell)
• DNS (Domain Name Server)
• RTP (Real-time Protocol)

SOURCE: FELEKE MERIN (DR. – ENGR.) 20


PRESENTATION LAYER OF OSI
• Responsible for common representation
of data between source and destination
• Provides transformation of data
• Supports standardized application
interface
• Coding of data syntax
• Data encryption/decryption
• Data compression/decompression
SOURCE: FELEKE MERIN (DR. – ENGR.) 21
SESSION LAYER OF OSI
• Establishing Session

• Managing Session

• Controlling Session

• Terminating Session

SOURCE: FELEKE MERIN (DR. – ENGR.) 22


SESSION LAYER OF OSI(CONTD.)

SOURCE: FELEKE MERIN (DR. – ENGR.) 23


SESSION LAYER OF OSI(CONTD.)
• Making sure the connection is active during session
• Securing the connection
• Dialogue synchronization
• Checking for connection failure
• Reconnecting if connection cuts off
• Terminating communication
• Defining node communication order and timing
SOURCE: FELEKE MERIN (DR. – ENGR.) 24
TRANSPORT LAYER OF OSI
• Organize data into segments

• Reliable end-to-end transport


 Loss recovery

 Flow control

 Data ordering

 Data Deduplication

• Or just Best Effort delivery


SOURCE: FELEKE MERIN (DR. – ENGR.) 25
TRANSPORT LAYER OF OSI(CONTD.)
• Segmentation
 Dividing data in small fragments that can be transmitted over network
 Different networks have different Maximum Transmission Unit (MTU)
 MTU defines maximum size of one data piece carried through the network
 Data is being divided and transmitted to recipient via transport layer
 The MTU size is being acknowledged by transport layer
 MTU acknowledgment is during discovering routine and while establishing
connection with the recipient
SOURCE: FELEKE MERIN (DR. – ENGR.) 26
TRANSPORT LAYER OF OSI(CONTD.)
• Reassembly
 Done at the receiving end

 Transport layer protocols reconstruct data to its initial form

 Data can be received in different order

 Transport layer rearranges pieces of data in the correct order

SOURCE: FELEKE MERIN (DR. – ENGR.) 27


TRANSPORT LAYER OF OSI(CONTD.)
• Sequencing
• Using sequencing identifiers
• Avoids losses and duplication
• Fixes the issue of following data different paths
• Organizing data in groups of subdivided
data segments
• Identifying the order of groups of data sending and
interpretation
SOURCE: FELEKE MERIN (DR. – ENGR.) 28
TRANSPORT LAYER OF OSI(CONTD.)
• Connection Oriented
 Reliable and more secure
 Establishing two way connection between the nodes before data
transmission
 When the browser is trying to open the webpage, transport layer
would send synchronization packet to the web server
 Browser expects synchronization-acknowledgment response
 When it receives response, it sends its own response to the server
 After this process is done the data can be transmitted

SOURCE: FELEKE MERIN (DR. – ENGR.) 29


TRANSPORT LAYER OF OSI(CONTD.)
• Connectionless Oriented
 Not Reliable
 Best-effort delivery
 No connection establishment prior to data transmission
 Less security
 Allows data flooding
 Used with delay-sensitive data (Real Time)
 Audio Calls
 Video Streaming

SOURCE: FELEKE MERIN (DR. – ENGR.) 30


NETWORK LAYER OF OSI
• Organize data into packets
• Responsible of end-to-end addressing
and routing
• Identifies unique logical address
for machines
• Selects the best path for destination
• Routers work in the network layer
• Performs fragmentation if
segmentation is not enough

SOURCE: FELEKE MERIN (DR. – ENGR.) 31


NETWORK LAYER OF OSI (CONTD.)
• Receives the segments of data from Transport layer
• Converts them to packets by adding addressing information
Source address
Destination address
• Finds a route for data to be delivered to the receiver
• Routes may differ because it is being determined based on the following:
 Network overload
 Quality of Service (QoS)
 Cost of alternative routes
 Delivery priorities

SOURCE: FELEKE MERIN (DR. – ENGR.) 32


NETWORK AND TRANSPORT LAYERS(SUMMARY)
• Network layer defines the following:
 Source Machine

 Destination Machine
• Transport Layer guarantees either of
the following according to the used
protocol:
 End-to-End Reliable Delivery
 End-to-End Best-Effort Delivery

SOURCE: FELEKE MERIN (DR. – ENGR.) 33


DATA LINK LAYER OF OSI MODE
• Reliable data transfer across physical link

• Responsible of physical addressing

• Organize the data into frames

• Puts frames on the physical medium

• Check frames for errors

• Hop-to-hop addressing
SOURCE: FELEKE MERIN (DR. – ENGR.) 34
PHYSICAL ADDRESS
• Unique identifier
• Not bound to geographical location
• Used for hop-to-hop addressing
• Burned on the NIC
• Can not be changed
• Vendor oriented
• Common example is the MAC address
• Sometimes called hardware address

SOURCE: FELEKE MERIN (DR. – ENGR.) 35


DATA LINK LAYER OF OSI (CONTD.)

• Receives data packages from network layer

• Convert data into the frames including the following:


 Data packages

 Sender and the receiver physical addresses

 Error checking and control information

SOURCE: FELEKE MERIN (DR. – ENGR.) 36


DATA LINK LAYER OF OSI (CONTD.)
• Checking and control ensures the frame has been delivered
without troubles

• If part of the frame is lost during transmission then:


 Data Link layer protocols of the receiver would see that

 Data Link layer at the receiver requests data retransmit from the sender

• Switches and Bridges devices work in Data Link layer

SOURCE: FELEKE MERIN (DR. – ENGR.) 37


FRAME CHECK SEQUENCE (FCS)
• Error checking mechanism is creating the unique frame check sequence (FCS)
• FCS number based on the values of all of the preceding fields in the frame
• The receiver’s end receives data with the FCS value
• Receiver compares FCS to the data fields in frame

• In unlucky scenario of failed comparison the following is done:


 Data is assumed corrupted

 Receiver requests data resend

SOURCE: FELEKE MERIN (DR. – ENGR.) 38


FRAME CHECK SEQUENCE (FCS)
• If the comparison is a success,
receiver sends the message of
successful data transmission back
to the sender

• If receiver did not receive the


“success” message during
specified time, automatically
the sender resends the data frames

SOURCE: FELEKE MERIN (DR. – ENGR.) 39


DATA LINK LAYER SUBLAYERS
• Another function of Data Link layer
protocols is to control the flow
when many different nodes are
sending data at the same time

• The Data Link layer has been


divided into two sublayers by
the IEEE as follows:

SOURCE: FELEKE MERIN (DR. – ENGR.) 40


DATA LINK LAYER SUBLAYERS(CONTD.)
• The top sublayer is called Logical Link Control (LLC) communicating
only with Network layer and providing the following functions:
 Hop-to-Hop Reliability
 Hop-to-Hop Flow control
• The bottom sublayer is Media Access Control (MAC)
responsible for the following:
 Adding physical address to the frame
 Communication with the Physical layer

SOURCE: FELEKE MERIN (DR. – ENGR.) 41


DATA LINK LAYER SUBLAYERS (CONTD.)
 Why has IEEE divided the Data Link layer into
two sublayers?
• Reason for this change:
 To allow higher layer protocols (for example, those operating

in the Network layer) to interact with Data Link layer protocols

without regard for Physical layer specifications.

SOURCE: FELEKE MERIN (DR. – ENGR.) 42


PHYSICAL LAYER
• Transmits bit stream over the physical link
• Sends data signals to media and receives it

• Adapts to the transmission media


 Cables
• Copper (Coaxial, Twisted Pair)
• Fiber Optic (Single Mode, Multi Mode)
 Wireless
• Responsible for the representation of 1s and 0s
• NIC, Hub, and Repeater work in Physical Layer
SOURCE: FELEKE MERIN (DR. – ENGR.) 43
FLOW OF DATA THROUGH THE OSI MODEL

SOURCE: FELEKE MERIN (DR. – ENGR.) 44


FLOW OF DATA THROUGH THE OSI MODEL (CONTD.)

Path that data takes from one computer to


another through the OSI Model

Example: Retrieving an email message from


a mail server

First, a user or device initiates a data


exchange through the Application layer.

SOURCE: FELEKE MERIN (DR. – ENGR.) 45


FLOW OF DATA THROUGH THE OSI MODEL (CONTD.)
Log on your office PC, start your e-mail
application, and then click a button in the e-
mail application to retrieve your mail from
the server.

At that point, Application layer services on


your computer accept data from your mail
application and formulate a request meant
for the mail server software.

SOURCE: FELEKE MERIN (DR. – ENGR.) 46


FLOW OF DATA THROUGH THE OSI MODEL (CONTD.)

They (or application layer services) add an


application header to the data that the
program wants to send.

The application header contains information


about the e-mail application’s requirements,
so that the mail server can fulfill its request
properly.

SOURCE: FELEKE MERIN (DR. – ENGR.) 47


FLOW OF DATA THROUGH THE OSI MODEL (CONTD.)

Application layer transfers the request to


the Presentation layer, in the form of a
protocol data unit (PDU).

The Presentation layer first determines


whether and how it should format or encrypt
the data request received from the
Application layer.

SOURCE: FELEKE MERIN (DR. – ENGR.) 48


FLOW OF DATA THROUGH THE OSI MODEL (CONTD.)

For example, if your mail client requires


encryption, the Presentation layer protocols
will add that information to the PDU in a
presentation header.

If your e-mail message contains graphics or


formatted text, that information will also be
added.

SOURCE: FELEKE MERIN (DR. – ENGR.) 49


FLOW OF DATA THROUGH THE OSI MODEL (CONTD.)

Then, the Presentation layer sends its PDU

to the Session layer, which adds a session

Header that contains information about

how your DSL communicates with the

network.

SOURCE: FELEKE MERIN (DR. – ENGR.) 50


FLOW OF DATA THROUGH THE OSI MODEL (CONTD.)

For example, the session header might

indicate that your DSL connection can

only transmit and

receive data at 250Mbps. The

Session layer then passes the PDU

to the Transport layer.

SOURCE: FELEKE MERIN (DR. – ENGR.) 51


FLOW OF DATA THROUGH THE OSI MODEL (CONTD.)

At the Transport layer, the PDU—your


request for mail and the headers added by
previous layers—is broken down into smaller
pieces of data, or segments.

The segments’ maximum size is dictated

by the type of network transmission method in


use (for example, Ethernet).

SOURCE: FELEKE MERIN (DR. – ENGR.) 52


FLOW OF DATA THROUGH THE OSI MODEL (CONTD.)

Suppose your mail request PDU is too


large to be a single segment.

In that case, Transport layer protocols

subdivide it into two or more smaller


segments and assign sequence identifiers to
all of the smaller segments. This information
becomes part of the transport header.
SOURCE: FELEKE MERIN (DR. – ENGR.) 53
FLOW OF DATA THROUGH THE OSI MODEL (CONTD.)

Protocols also add checksum, flow control,


and acknowledgment data to the transport
header.

The Transport layer then passes these


segments, one at a time, to the Network
layer.

SOURCE: FELEKE MERIN (DR. – ENGR.) 54


FLOW OF DATA THROUGH THE OSI MODEL (CONTD.)

Next, Network layer protocols add logical


addressing information to the segments, so
that your request will be properly routed to
the mail server and the mail server will
respond to your computer.

This information is contained in the network


header.

SOURCE: FELEKE MERIN (DR. – ENGR.)


55
FLOW OF DATA THROUGH THE OSI MODEL (CONTD.)

With the addition of network address


information, the pieces of data are called
packets.

The Network layer then passes the

packets to the Data Link layer.

SOURCE: FELEKE MERIN (DR. – ENGR.) 56


FLOW OF DATA THROUGH THE OSI MODEL (CONTD.)

At the Data Link layer, protocols add a


header to the front of each packet and a
trailer to the end of each packet to make
frames.

(The trailer indicates where a frame ends.)


In other words, the Data Link layer protocols
encapsulate the Network layer packets.

SOURCE: FELEKE MERIN (DR. – ENGR.) 57


FLOW OF DATA THROUGH THE OSI MODEL (CONTD.)

Encapsulation is frequently compared to


placing an envelope within a larger
envelope.

This analogy conveys the idea that the Data


Link layer does not attempt to interpret any
information added in the Network layer,
but simply surrounds it.

SOURCE: FELEKE MERIN (DR. – ENGR.) 58


FLOW OF DATA THROUGH THE OSI MODEL (CONTD.)

Using frames reduces the possibility of lost


data or errors on the network, because a way
of checking for errors is built into each frame.

 After verifying that the data has not been


damaged, the Data Link layer then passes the
frames to the Physical layer.

SOURCE: FELEKE MERIN (DR. – ENGR.) 59


FLOW OF DATA THROUGH THE OSI MODEL (CONTD.)
Finally, your request for mail, in the form of many
frames, hits the NIC at the Physical layer.

The Physical layer does not interpret the frames or


add information to the frames; it simply transmits
them over the phone line connected to your DSL,
across your office network, and to the mail server
after the binary digits (bits), or ones and zeroes, have
been converted to electrical pulses.

SOURCE: FELEKE MERIN (DR. – ENGR.) 60


FLOW OF DATA THROUGH THE OSI MODEL (CONTD.)

As the frames arrive at the mail server, the


server’s Physical layer accepts the frames

and transfers them to the Data Link layer.

The mail server begins to unravel your request,

reversing the process just described, until it


responds to your request with its own
transmission, beginning from its Application layer.

SOURCE: FELEKE MERIN (DR. – ENGR.) 61


NETWORK TERMINOLOGY
The terms “frame,” “packet,” “datagram,” A frame is a piece of data enclosed by
and “PDU” are often used interchangeably a Data Link layer header and trailer.
to refer to a small piece of data formatted
“Datagram” is synonymous with
for network transmission.
“packet.” “PDU” generically refers to a
Technically, how ever, a packet is a piece of
unit of data at any layer of the OSI
information that contains network addressing
Model.
information

SOURCE: FELEKE MERIN (DR. – ENGR.) 62


SUMMARY (ON FUNCTIONS OF THE OSI LAYERS )

SOURCE: FELEKE MERIN (DR. – ENGR.) 63


REVIEW QUESTIONS
1. The most commonly used protocol over the Internet is the __________ . TCP/IP

2. List down different protocols that work in the application layer of TCP/IP.
3. The transport layer can work in either _______ or ______ modes of delivery.
 Reliable
 Best-effort
4. The main functionalities of the network layer are the _____ and ______ .
 Addressing
 Routing

5. The network layer is responsible of ________ addressing, while the data link layer is
responsible of _______ addressing. Answer: Logical addressing; Physical addressing

SOURCE: FELEKE MERIN (DR. – ENGR.) 64


REVIEW QUESTIONS (CONTD.)
6. Discuss the role of protocols in n the Session layer, (the fifth OSI Model layer).

 Coordinate and maintain links between two devices for the duration of their

communication

 Synchronize dialogue, determine whether communications have been cut off,

and, if so, figure out where to restart transmission.

SOURCE: FELEKE MERIN (DR. – ENGR.) 65


REVIEW QUESTIONS (CONTD.)
7. What are the primary function of protocols in the Transport layer, the fourth OSI Model layer.

 To provide source-to-destination delivery of the entire message.

 To oversee end-to-end (or source-to-destination) error free delivery of the entire message to the correct process (running

program) on that computer.

 In the case of connection-oriented protocols, this means data is delivered reliably.

They verify that data is received in the same sequence in which it was sent.

 They are also responsible for flow control, segmentation, and reassembly of packets.

 Connectionless Transport layer protocols do not offer such guarantees.

SOURCE: FELEKE MERIN (DR. – ENGR.) 66


REVIEW QUESTIONS (CONTD.)
8. What are the responsibilities of network layer of the OSI model?
 Responsible for the source-to-destination (end-to-end) delivery of a packet, possibly across multiple

networks (or links). Whereas the data link layer oversees the delivery of the packet between two systems

on the same network (or link)

 Hiding the details of the lower layer (data link and physical layer)

 Find the optimum path from the many d/t paths available.

Network layer addresses, also called logical or virtual addresses, are assigned to devices through operating system
software. They are composed of hierarchical information, so they can be easily interpreted by routers and used to direct
data to its destination.

SOURCE: FELEKE MERIN (DR. – ENGR.) 67


REVIEW QUESTIONS (CONTD.)
9. What are the responsibilities of data link layer of OSI model?
 The primary function of protocols at the Data Link layer, the second layer of the OSI Model, is
to organize data they receive from the Network layer into frames that contain error checking routines
and can then be transmitted by the Physical layer.
 Physical addressing  Medium Access Control (MAC)
When stations in a network share the same physical medium, it may happen that more than one station tries to send
data
at the same time. There needs to be a mechanism to resolve this mechanism. This mechanism is called MAC.
 Flow control (Flow control at the data link layer is hop-to-hop not end-to-end)
The data link layer can control the rate the frame are sent on the link
Error control (the DL layer can add reliability to the physical layer by adding
mechanism to detect and retransmit damaged or lost data).

SOURCE: FELEKE MERIN (DR. – ENGR.) 68


REVIEW QUESTIONS (CONTD.)
10. The Data Link layer is subdivided (by IEEE) into two layers. List down those
layers and explain their responsibilities.

Answer: Logical Link Control and MAC sublayers.


The LLC sublayer ensures a common interface for the Network layer protocols.

The MAC sublayer is responsible for adding physical address data to frames.

MAC addresses are hard-coded into a device’s NIC.

SOURCE: FELEKE MERIN (DR. – ENGR.) 69


REVIEW QUESTIONS (CONTD.)
11. What are the responsibilities of the physical layer of the OSI model?
 Protocols at the Physical layer generate and detect voltage (signal) so as to transmit and

receive signals carrying data over a network medium.

 Also set or define the data transmission rate and

 Monitor data error rates, but do not provide error correction.

 Define the characteristics of the interface between the device and transmission medium

 Define the type of the medium to be used

 Define the direction of transmission b/n two devices: simple, half-duplex, or full-duplex.

SOURCE: FELEKE MERIN (DR. – ENGR.) 70


REVIEW QUESTIONS (CONTD.)
Match the following to one or more of the seven OSI layers.
a) Provide format and code conversation
b) Establishes, manages, and terminates session
c) Ensures reliable transmission of data
d) Provide reliable log-in and log-out procedure
e) Synchronizes users
f) Route determination
g) Flow control

SOURCE: FELEKE MERIN (DR. – ENGR.) 71


REVIEW QUESTIONS (CONTD.)
h) Access to the network provided for the end user
i) Reliable end-to-end data transmission
J) Network selection
k) Frames defined
l) User services such as email and file transfer provided
m) Transmission of bit stream across physical medium
n) Error correction and retransmission
o) Reassembly of data packets
--------------------------- The End! -----------------------------
SOURCE: FELEKE MERIN (DR. – ENGR.) 72

You might also like