0% found this document useful (0 votes)
16 views7 pages

Principles of Communication Note 2

afsaf

Uploaded by

Zakir Khondokar
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
16 views7 pages

Principles of Communication Note 2

afsaf

Uploaded by

Zakir Khondokar
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
You are on page 1/ 7

1.

Layered Tasks:
We use the concept of layers in our daily life. As an example, let us consider two
friends who communicate through postal mail. The process of sending a letter to
a friend would be complex if there were no services available from the post office.
Figure 2.1 shows the steps in this task.

In Figure 2.1 we have a sender, a receiver, and a carrier that transports the letter.
There is a hierarchy of tasks.
At the Sender Site
Let us first describe, in order, the activities that take place at the sender site.
o Higher layer. The sender writes the letter, inserts the letter in an envelope,
writes the sender and receiver addresses, and drops the letter in a mailbox.
o Middle layer. The letter is picked up by a letter carrier and delivered to the post
office.
o Lower layer. The letter is sorted at the post office; a carrier transports the letter.
On the Way
The letter is then on its way to the recipient. On the way to the recipient's local
post office, the letter may actually go through a central office. In addition, it
may be transported by truck, train, airplane, boat, or a combination of these.
At the Receiver Site
o Lower layer. The carrier transports the letter to the post office.
o Middle layer. The letter is sorted and delivered to the recipient's mailbox.
o Higher layer. The receiver picks up the letter, opens the envelope, and reads
it.
There are three different activities at the sender site and another three activities
at the receiver site. The task of transporting the letter between the sender and the
receiver is done by the carrier. Something that is not obvious immediately is that
the tasks must be done in the order given in the hierarchy. At the sender site, the
letter must be written and dropped in the mailbox before being picked up by the
letter carrier and delivered to the post office. At the receiver site, the letter must
be dropped in the recipient mailbox before being picked up and read by the
recipient.
Each layer at the sending site uses the services of the layer immediately below it.
The sender at the higher layer uses the services of the middle layer. The middle
layer uses the services of the lower layer. The lower layer uses the services of the
carrier.

2. Introduction to OSI Model:


Established in 1947, the International Standards Organization (ISO) is a
multinational body dedicated to worldwide agreement on international standards.
An ISO standard that covers all aspects of network communications is the Open
Systems Interconnection model. It was first introduced in the late 1970s. An open
system is a set of protocols (set of rules) that allows any two different systems to
communicate regardless of their underlying architecture. The purpose of the OSI
model is to show how to facilitate communication between different systems
without requiring changes to the logic of the underlying hardware and software.
The OSI model is not a protocol; it is a model for understanding and designing a
network architecture that is flexible, robust, and interoperable.
The OSI model is a layered framework (as discussed in previous part) for the
design of network systems that allows communication between all types of
computer systems. It consists of seven separate but related layers, each of which
defines a part of the process of moving information across a network (see Figure
2.2). An understanding of the fundamentals of the OSI model provides a solid
basis for exploring data communications.

Figure 2.2: Seven layers of OSI model

This OSI layered model that dominated data communications and networking
literature before 1990 was the Open Systems Interconnection (OSI) model.
Everyone believed that the OSI model would become the ultimate standard
for data communications, but this did not happen. The TCPIIP protocol suite
became the dominant commercial architecture because it was used and tested
extensively in the Internet; the OSI model was never fully implemented.
Figure 2.3: Summary of each layers
3. Introduction to TCP/IP Model:
The TCPIIP protocol suite was developed prior to the OSI model. Therefore, the
layers in the TCP/IP protocol suite do not exactly match those in the OSI model.
The original TCP/IP protocol suite was defined as having four layers: host-to-
network (Network Interface), internet, transport, and application. However, when
TCP/IP is compared to OSI, it can say that the host-to-network layer is equivalent
to the combination of the physical and data link layers. The internet layer is
equivalent to the network layer, and the application layer is roughly doing the job
of the session, presentation, and
application layers with the transport layer
in TCP/IP taking care of part of the duties
of the transport layer.

Figure 2.4: OSI vs TCP/IP model


4. Data Encapsulation:
Since there may be more than one application using more than one
communication partner using more than one protocol, how does the
data get to its destination correctly?! This is accomplished through
a process called data encapsulation.

Figure 2.5: Encapsulation process


Basically, it works like this:
1. A user is working on an application and decides to save the data to are mote
server. The application calls the Application layer to start the process.
2. The Application layer takes the data and places some information, called a
header, at the beginning. The header tells the Application layer which user
application sent the data.
3. The Application layer then sends the data to the Presentation layer, where the
data conversion takes place. The Presentation layer places a header on all of the
information received from the Application layer (including the Application layer
header). This header identifies which protocol in the Application layer to pass it
back.
4. The Presentation layer then sends the complete message to the Session layer.
The Session layer sets up the synchronized communication information to speak
with the communication partner and appends the information to another header.
5. The Session layer then sends the message to the Transport layer, where
information is placed into the header identifying the source and the destination
hosts and the method of connection (connectionless versus connection-oriented).
6. The Transport layer then passes the segment to the Network layer, where the
network address for the destination and the source are included in the header.
7. The Network layer passes the packet (connection-oriented) or the datagram
(connectionless) to the Data Link layer. The Data Link layer then includes the
SSAP and the DSAP to identify which Transport protocol to return it to. It also
includes the source and the destination MAC addresses.
8. The Data Link layer then passes the frame to the Physical layer for transmitting
on the physical medium as individual bits.
9. Finally, the receiving computer receives the bits and reverses the process to
get the original data to the source application; in this case, a file server service.

Note that since the top three layers have similar functionality, we can typically
combine all of the data in those layers and simply refer to it as the Protocol Data
Unit (PDU). In this instance, we can substitute the term PDU for the term
message.
Decapsulation process: Decapsulation is the inverse of the encapsulation
process. Encapsulation is the process of wrapping the data while the
Decapsulation process is a process of opening packs. The process was reversed
from the encapsulation process. Encapsulation process starts from the uppermost
layer (Application Layer) to the lowest layer (Physical layer) while the
Decapsulation process starts from the lowest layer (Physical Layer) to the
uppermost layer (Application Layer)
Figure 2.6: Encapsulation and decapsulation process.

References:
1. Forouzan, B. A. "Data Communication and Networking. Tata McGraw."
(2005).
2. http://www.exa.unicen.edu.ar/catedras/comdat1/material/TP1-Ejercicio5-
ingles.pdf

You might also like

pFad - Phonifier reborn

Pfad - The Proxy pFad of © 2024 Garber Painting. All rights reserved.

Note: This service is not intended for secure transactions such as banking, social media, email, or purchasing. Use at your own risk. We assume no liability whatsoever for broken pages.


Alternative Proxies:

Alternative Proxy

pFad Proxy

pFad v3 Proxy

pFad v4 Proxy