Ass 1 Vygygy

Download as docx, pdf, or txt
Download as docx, pdf, or txt
You are on page 1of 11

Hajee Mohammad Danesh Science

and Technology University, Dinajpur


B.Sc. (Engineering) in CSE

Level 3 Semester II, Course Code: CSE 358


Course Title: Computer Networks Sessional

Submitted to Pankaj Bhowmik Sir


Lecturer, Department of Computer Science &
Engineering

Submitted by Mohammad Shahadat Ali Mollah


Student ID 1802044
The OSI (Open Systems Interconnection) model is a
conceptual framework used to understand network
communication across different systems. It divides the
communication process into seven distinct layers, each
with specific functions and associated protocols. Below is
an overview of each layer with key protocols and their
primary functions.
Application Layer (Layer 7)

Key Protocols:
HTTP (Hypertext Transfer Protocol): Used for
transmitting web pages over the internet. It enables web
browsers and servers to communicate, allowing for the
retrieval of HTML documents, images, videos, and other
resources.
FTP (File Transfer Protocol): Facilitates the transfer of
files between a client and a server on a network. It is
commonly used for uploading files to a web server or
downloading files from a server.

Primary Functions:

gives end-user apps access to network services.


makes sure the data is shown in an easy-to-use
manner.
manages resource access and network transparency.

Packet Construction and Analysis:

At this level, the data is known as the message or data


payload. The application layer specifies the structure and
format of the data to be transmitted (for example, an
HTTP request or an FTP command).

Layer 6: Presentation Layer

Key Protocols:
Data is encrypted before to transmission in order to
enable safe communication over a computer network
using TLS (Transport Layer Security).
Predecessor to TLS, SSL (Secure Sockets Layer) is an
older technology that encrypts data transmission
between a client and server.
Primary Functions: Translates data from application layer
to network format.
oversees the encryption and decryption of data to
guarantee security.
reduces the amount of the data by compressing it
for quicker transmission.

Packet Construction and Analysis:

The message from the Application layer may be


encoded (compressed or encrypted) at this layer. For
example, when TLS is used, a TLS header is added to
indicate encrypted content.

3. Layer 5 (Session Layer)

Key Protocols:
Through the use of RPC (Remote Procedure Call), a
program on one computer connected to a network can
ask another software for a service.
The session layer services provided by NetBIOS
(Network Basic Input/Output System) include connecting
and disconnecting programs.
Primary functions include managing sessions and
connections between applications.
begins, continues, and ends communication
sessions.
guarantees device synchronization and data
integrity.

Packet Construction and Analysis:

At this layer, the message may contain session


identifiers or tokens needed to manage the session state
between the sender and receiver.

4. Transport Layer (Layer 4).

Key Protocols:
TCP (Transmission Control Protocol): Ensures that
data is delivered between applications in a reliable,
orderly, and error-free manner. It is used for applications
that require data integrity, such as online browsing and
email.
UDP (User Datagram Protocol): Allows for
connectionless, lightweight communication with lower
overhead, but no guarantee of delivery. It is utilized in
real-time applications, such as video streaming and
online gaming.

Primary Functions:

Enables end-to-end communication and error recovery.


manages data fragmentation, flow control, and
reassembly.
Ensures data delivery, whether dependable or
unreliable, as required.

Packet Construction and Analysis:

The segment is formed by appending a TCP or UDP


header to the data received from the Session layer. This
header contains source and destination port numbers to
identify sending and receiving applications.
Sequence and acknowledgment numbers (in TCP)
are used to ensure orderly and dependable delivery.
Checksum for error detection.
5. Network Layer (Layer 3).

Key Protocols:
IP (Internet Protocol) addresses and routes packets
between hosts across one or more networks. It specifies
packet format and implements packet forwarding and
routing protocols.
Network devices use ICMP (Internet Control Message
Protocol) to deliver error signals and operational
information, such as "destination unreachable" or "time
exceeded."

Primary Function: Determines the optimal physical path


for data to reach its destination.
Provides logical addressing using IP addresses.
Manages routing, packet forwarding, and error
reporting.

Packet Construction and Analysis:


The Transport layer section is contained in a packet with
an IP header. This header includes source and destination
IP addresses to route packets to their destination.
To prevent infinite loops, the TTL (Time to Live) field
discards packets that exceed a certain hop count.
The protocol field indicates the transport layer
protocol (TCP or UDP).

6. Data Link Layer (Layer 2)

Key Protocols:
Ethernet is a commonly used protocol in local area
networks (LANs) for data transmission over wired
connections. It specifies network hardware and data
frames.
PPP (Point-to-Point Protocol): A common way for
sending multi-protocol data between two directly
connected nodes.

Primary functions include reliable transfer of data


frames between nodes.
Physical addresses are assigned using MAC (Media
Access Control) addresses.
Manages error detection and repair at the physical
layer.

Packet Construction and Analysis:


The packet from the Network layer is encased in a frame
with an Ethernet header and trailer. The frame contains
MAC addresses (source and destination) to identify
devices on the same local network.
Frame check sequence (FCS) used to detect errors.
The trailer aids in detecting faults that may have
happened during transmission.

7. Physical Layer (Layer 1).

Key Protocols:
IEEE 802.11 (Wi-Fi): Sets standards for wireless
network communication, such as frequency, signal
modulation, and hardware interfaces.
Ethernet Physical Layer Specifications: Details the
physical qualities and medium used in wired connections,
such as cables, connectors, and electrical signals.
Primary functions involve converting data into
electrical, optical, or radio signals for transmission.
Manages the physical connections between devices.
Manages bit-level transmission and reception,
ensuring that raw data is sent across the medium.

Packet Construction and Analysis:

The packet from the Network layer is encased in a


frame with an Ethernet header and trailer. The frame
contains MAC addresses (source and destination) to
identify devices on the same local network.
Frame check sequence (FCS) used to detect errors.
The trailer aids in detecting faults that may have
happened during transmission.

source
Contribution to the Overall Communication Process.

Each layer in the OSI model plays a specific role in the


smooth transfer of data across a network:

The Application, Presentation, and Session layers


manage application-specific and user-facing activities,
ensuring that data is presented accurately and securely.
The Transport layer ensures that data is delivered
reliably and efficiently between hosts.
The Network layer is in charge of routing data to its
destination across interconnected networks.
The Data Link layer guarantees that data is properly
formatted and transmitted across network hardware.
The Physical layer turns data into signals and sends
them across a physical media.

These layers work together to guarantee that data is


delivered, routed, and received between networked
devices in an accurate and efficient manner.

You might also like