Beruflich Dokumente
Kultur Dokumente
The OSI, or Open System Interconnection, model defines a networking framework to implement
protocols in seven layers. Control is passed from one layer to the next, starting at the application layer in
one station, and proceeding to the bottom layer, over the channel to the next station and back up the
hierarchy.
There's really nothing to the OSI model. In fact, it's not even tangible. The OSI model doesn't do any
functions in the networking process, It is a conceptual framework so we can better understand complex
interactions that are happening. The OSI model takes the task of internetworking and divides that up
into what is referred to as a vertical stack that consists of the following layers:
Physical (Layer 1)
This layer conveys the bit stream - electrical impulse, light or radio signal -- through the network at the
electrical and mechanical level. It provides the hardware means of sending and receiving data on a
carrier, including defining cables, cards and physical aspects. Fast Ethernet, RS232, and ATM are
protocols with physical layer components.
- Layer 1 Physical examples include Ethernet, E1, Fiber optic, FDDI, B8ZS, V.35, V.24, RJ45.
Data Link (Layer 2)
At this layer, data packets are encoded and decoded into bits. It furnishes transmission protocol
knowledge and management and handles errors in the physical layer, flow control and frame
synchronization. The data link layer is divided into two sub layers: The Media Access Control (MAC) layer
and the Logical Link Control (LLC) layer. The MAC sub layer controls how a computer on the network
gains access to the data and permission to transmit it. The LLC layer controls frame synchronization,
flow control and error checking.
- Layer 2 Data Link examples include PPP, FDDI, ATM, IEEE 802.5/ 802.2, IEEE 802.3/802.2, HDLC, Frame
Relay,
Network (Layer 3)
This layer provides switching and routing technologies, creating logical paths, known as virtual circuits,
for transmitting data from node to node. Routing and forwarding are functions of this layer, as well as
addressing, internetworking, error handling, congestion control and packet sequencing.
- Layer 3 Network examples include AppleTalk DDP, IP, IPX.
Transport (Layer 4)
This layer provides transparent transfer of data between end systems, or hosts, and is responsible for
end-to-end error recovery and flow control. It ensures complete data transfer.
- Layer 4 Transport examples include SPX, TCP, UDP.
Session (Layer 5)
This layer establishes, manages and terminates connections between applications. The session layer sets
up, coordinates, and terminates conversations, exchanges, and dialogues between the applications at
each end. It deals with session and connection coordination.
- Layer 5 Session examples include NFS, NetBios names, RPC, SQL.
Presentation (Layer 6)
This layer provides independence from differences in data representation (e.g., encryption) by
translating from application to network format, and vice versa. The presentation layer works to
transform data into the form that the application layer can accept. This layer formats and encrypts data
to be sent across a network, providing freedom from compatibility problems. It is sometimes called the
syntax layer.
- Layer 6 Presentation examples include encryption, ASCII, EBCDIC, TIFF, GIF, PICT, JPEG, MPEG, MIDI.
Application (Layer 7)
This layer supports application and end-user processes. Communication partners are identified, quality
of service is identified, user authentication and privacy are considered, and any constraints on data
syntax are identified. Everything at this layer is application-specific. This layer provides application
services for file transfers, e-mail, and other network software services. Telnet and FTP are applications
that exist entirely in the application level. Tiered application architectures are part of this layer.
- Layer 7 Application examples include WWW browsers, NFS, SNMP, Telnet, HTTP, FTP
b)
Understanding it through real life example is kind of difficult but i suppose to take one
example as were carrying large amount of goods from one place to other using number of
ships travelling in sea.
1. Physical Layer: Physical layer deals with the actual connectivity between the source and
destination. If you're transferring data to another machine through LAN, physical layer is
the Ethernet connection. The water in the sea connecting your place and destination is the
physical layer in our case.
2. Data Link layer: In this layer data is broken down into pieces. That is your goods will
be separated in various categories, say expensive goods, fragile and non fragile. This layer
deals with breaking the data being sent and transmitting it through the physical layer. So
goods being categorized and sent through the sea.
3. Network layer: Here the data being sent is organized. It also decides which protocols to
use, tcp or udp. So in our case the different compartments of ship where you'll keep these
goods is the network layer. It will also decide which generators and engines to be used while
travelling (protocols).
4. Transport Layer: Transport layer gives you the best route, security and safest path to
the destination. The transportation of data takes place here. So think of the coast guard as
transport layer. He'll look after the connection, inform you if there's any danger and tell you
the best route to your destination.
5. Session layer: The best way to remember a session is thinking of it as a Hangout or
Yahoo messenger chat. When two people start communicating a session is created, as soon
as one ends the chat or disconnects session is broken. Session layer creates a new session for
a pack of data. So the time when our ships leaves our docks and till the time it reaches the
destination is one whole session, assuming there are no problems during that interval. If
your ships gets hijacked by pirates, session is terminated. If the destination blows up,
session is terminated.
Session plays an important role in online transactions. In the very last step, where you need
to enter OTP or your secure password to authorize the transaction, if you sit idle for more
than 2-3 minutes without any activity, the session will terminate itself and the transaction
will be unsuccessful.
6. Presentation Layer: There are times you send various file formats through the
network like images or videos. Presentation layer deals with all this different files. It
converts this data into a readable format for the destination. Think of a captain who's in
charge of people from various races, countries and languages. He has to make sure everyone
will reach to destination and can perform their work over there.
7. Application layer: Many people think of browsers as soon as they hear application
layer. But application layers isn't the browsers or application you're using. In our case if
browsers are taken then ships will be out application layer.
But application layer is not the browser but the common protocols used by the browsers. So
application layer are not the ships but the common fuels these ships are using.
C.) a)
So, we can say nonlinear encoding can significantly improve the PCM SNR ratio. For
voice signals, improvements of 24 to 30 dB have been achieved.
b)
0 is generated otherwise.
c)
The signal-to-noise ratio is important in the transmission of digital data because it sets the upper bound
on the achievable data rate. Shannon's result is that the maximum channel capacity, in bits per second,
obeys the equation
C = B log2(1 + SNR)
where C is the capacity of the channel in bits per second and B is the bandwidth of the channel in Hertz.
The Shannon formula represents the theoretical maximum that can be achieved. In practice, however,
only much lower rates are achieved. One reason for this is that the formula assumes white noise
(thermal noise). Impulse noise is not accounted for, nor are attenuation distortion or delay distortion.
The capacity indicated in the preceding equation is referred to as the error-free capacity. Shannon
proved that if the actual information rate on a channel is less than the error-free capacity, then it is
theoretically possible to use a suitable signal code to achieve error-free transmission through the
channel Shannon's theorem unfortunately does not suggest a means for finding such codes, but it does
provide a yardstick by which the performance of practical communication schemes may be measured.
d)
Digital to Digital -
The equipment for encoding digital data into a digital signal is less complex and less expensive than
digital-to-analog modulation equipment.
Binary data are transmitted by encoding the bit stream into signal elements.
Terminologies-
Unipolar
If all signal elements have the same algebraic sign (all positive or all negative), then the
signal is unipolar.
Polar
One logic state represented by positive voltage, the other by negative voltage
Data rate
Rate of data transmission measured in bps: bits per second
Modulation rate
Rate at which the signal level changes
Measured in baud: signal elements per second
Some principles:
An increase in data rate increases bit error rate (BER)
An increase in SNR decreases BER
An increase in bandwidth allows an increase in data rate
Multilevel Binary
Bipolar-AMI
Pseudoternary
Biphase
Manchester
Differential Manchester
Scrambling techniques
B8ZS
HDB3
ii)Analog to Digital
Digitization
Conversion of analog data into digital data
Digital data can then be transmitted using code other than NRZ-L
Delta modulatio
Sampling Theorem: If a signal is sampled at regular intervals of time and at a rate higher than
twice the highest signal frequency, then the samples contain all the information of the original
signal.
Samples are analog samples, called Pulse Amplitude Modulation (PAM) samples.
8000 samples per second and 8 bits per sample gives 64kbps, for a single voice signal.
PCM Example-
Nonlinear Encoding -
Nonlinear encoding:
Use a greater number of quantizing steps for signals of low amplitude, and a smaller
number of quantizing steps for signals of large amplitude
Reduces overall signal distortion
Delta Modulation --
Modulation:
Modulation involves operation on one or more of the three characteristics of a carrier signal
Amplitude shift keying (ASK)
Frequency shift keying (FSK)
Two binary values represented by two different frequencies (near carrier frequency)
Multiple FSK--
Binary PSK
Two phases represent two binary digits
Differential PSK
Phase shifted relative to previous transmission rather than some constant reference
signal
QAM is used in the asymmetric digital subscriber line (ADSL) and some wireless standards.
Modulation:
Combine an input signal m(t) and a carrier frequency fc to produce a signal s(t) whose
bandwidth is usually centered on fc
E.g., voice signals are transmitted over telephone lines at their original spectrum.
Types of modulation
Amplitude modulation: AM
Angle Modulation
Frequency modulation: FM
Phase modulation: PM
Analog Modulation -
Analog data are modulated by a carrier frequency to produce an analog signal in a different frequency
band, which can be utilized on an analog transmission system. The basic techniques are AM (Amplitude
Modulation), FM (Frequency Modulation), and PM (Phase Modulation).
3)
(a) Protocols defined specifically for LAN and MAN (metropolitan area network)transmission address
issues relating to the transmission of blocks of data over the network. In OSI terms, higher-layer
protocols (layer 3 or 4 and above) are independent of network architecture and are applicable to LANs,
MANs, and WANs. Thus, a discussion of LAN protocols is concerned principally with lower layers of the
OSI model.
Below figure relates the LAN protocols to the OSI architecture. This architecture was developed by the
IEEE 802 committee and has been adopted by all organizations working on the specification of LAN
standards. It is generally referred to as the IEEE 802 reference model.1 Working from the bottom up, the
lowest layer of the IEEE 802 reference model corresponds to the physical layer of the OSI model and
includes such functions as
Encoding/decoding of signals
Preamble generation/removal (for synchronization)
Bit transmission/reception
In addition, the physical layer of the 802 model includes a specification of the transmission medium and
the topology. Generally, this is considered below the lowest layer of the OSI model. However, the
choice of transmission medium and topology is critical in LAN design, and so a specification of the
medium is included. Above the physical layer are the functions associated with providing service to LAN
users. These include the following:
On transmission, assemble data into a frame with address and error detection fields.
On reception, disassemble frame, and perform address recognition and error detection.
(b)