Osi 3

You might also like

Download as pdf or txt
Download as pdf or txt
You are on page 1of 13

Transport Layer – Layer 4

● The transport layer provides services to the application layer and takes services from the
network layer.
● The data in the transport layer is referred to as Segments.
● It is responsible for the End to End Delivery of the complete message.
● Layer 4 of the OSI model, also known as the transport layer, manages network traffic between
hosts and end systems to ensure complete data transfers. Transport-layer protocols such as TCP,
UDP, DCCP, and SCTP are used to control the volume of data, where it is sent, and at what rate.
Contd…
It is responsible for ensuring that the data packets arrive accurately and reliably between
sender and receiver.

At the sender’s side: The transport layer receives the formatted data from the upper layers,
performs Segmentation, and also implements Flow & Error control to ensure proper data
transmission. It also adds Source and Destination port numbers in its header and forwards the
segmented data to the Network Layer.

At the receiver’s side: Transport Layer reads the port number from its header and forwards the
Data which it has received to the respective application. It also performs sequencing and
reassembling of the segmented data.
Transport layer functions
End-to-end communication: is the ability of the transport layer to provide the application a way
to send and receive a stream of data. The network layer segments the data stream into packets that
are sent over the network and reconstructs the data on the other end. If the data packets arrive out
of order, it can reorder them by segment numbering and present the data in the correct order.

Reliability: is the ability to correct errors that can happen during data transmission over the
network. If data were to be accidentally changed in transit, error correcting and checksums would
catch it. If a packet were to be lost, it would be caught and retransmitted. If a single packet were to
be duplicated, it could be detected and dropped. It can also send an acknowledgement of received
packets for guaranteed delivery. Some protocols send a message if a packet is not received or is
corrupt.
Contd…
Flow control : is the ability for the transport layer to avoid sending more data than can be
reliably transmitted. It can buffer sending and receiving data until there is enough network
capacity for it to go through. If the receiver buffer becomes full, it can reduce the sending
rate. It also implements congestion control. If a network were to become flooded with too
many retransmit messages, it would be overwhelmed and not able to recover. Congestion
control prevents this by using dynamic retransmission timers and slow start.

Addressing: is the ability to communicate with the correct application on the computer.
Addressing typically uses network ports to assign each sending and receiving application a
specific port number on the machine. By combining the IP address used in the network layer
and the port on the transport layer, each application can have a unique address.
Contd…
1. Connection-Oriented Service: It is a three-phase process that includes
● Connection Establishment
● Data Transfer
● Termination/disconnection

In this type of transmission, the receiving device sends an acknowledgment, back to the source after a
packet or group of packets is received. This type of transmission is reliable and secure.
2. Connectionless service: It is a one-phase process and includes Data Transfer. In this type of
transmission, the receiver does not acknowledge receipt of a packet. This approach allows for much
faster communication between devices. Connection-oriented service is more reliable than
connectionless Service.
Session Layer – Layer 5

The session layer is Layer 5 layer from the bottom in the OSI model. The job of the session layer is to control and maintain
connections between systems to share data. It establishes, maintains, and ends sessions across all channels. In case of a
network error, it checks the authenticity and provides recovery options for active sessions. It manages sessions and
synchronizes data flow.

Basically, this layer regulates when computers can send data and how much data they can send. Essentially it coordinates
communication between devices.

1. All the below 3 layers(including Session Layer) are integrated as a single layer in the TCP/IP model as the
????application Layer”.
2. Implementation of these 3 layers is done by the network application itself. These are also known as Upper
Layers or Software Layers.
3. Device or Protocol Use : NetBIOS, PPTP.
Functions of the Session Layer:
○ Session Establishment: The session layer establishes connections between devices which is known as sessions. The
session which is created allows users to share data, remote access, and file management. When the session is released,
the transport connection is mapped. The ways in which transport connection maps are one-to-many, one-to-one, and
many-to-one.
○ Data Transfer: It is the very basic function of the session layer, which handles the exchange of data between systems
in a full-duplex or half-duplex mode of transmission. The session layer allows only one user to transmit data in
half-duplex as well as exchange data in full-duplex mode.
○ Dialog Management: The session layer keeps log data on which connections are established to transmit and receive
data, which is called dialog management. It is accountable for establishing, synchronizing, preserving, and ending the
conversation between the sender and the receiver. It uses a token mechanism in which the user sharing the data is
given a token in case of half duplex mode and, after the exchange, transfers it to another device. The token method
maintains the efficiency of the connection.
Contd…
○ Synchronization: The session maintains proper connectivity between systems, and if any error occurs, then it
provides a recovery option which is called a known state. The session layer adds synchronization bits to the
message to use the known state in the event of an error. These bits can be used as checkpoints. It adds
synchronization points or checkpoints to the data stream for longer communication. It ensures that the data
streams are successfully received and acknowledged up to the checkpoints. In case of any failure, only the
stream needs to be retransmitted after the checkpoints.
○ Authentication: The process of identification is known as authentication. It takes a guarantee from the user to
permit them access to the data. Authentication is very important because it provides security.
○ Authorization: It grants privileges after authentication of the user. Authorization means providing access to
the data that is authorized to the specific user.
Presentation Layer – Layer 6

This layer presents the incoming data from the application layer of the sender machine to the
receiver machine.

It converts one format of data to another format of data if both sender and receiver understand
different formats; hence this layer is also called the translation layer.

It deals with the semantics and syntax of the data, so this layer is also called the syntax layer. It
uses operations such as data compression, data encryption & decryption, data conversion, etc.
Functions of the presentation layer:

● Translation: For example, ASCII to EBCDIC.


● Encryption/ Decryption: Data encryption translates the data into another form or code. The
encrypted data is known as the ciphertext and the decrypted data is known as plain text. A key
value is used for encrypting as well as decrypting data.
● Compression: Reduces the number of bits that need to be transmitted on the network.

Note: Device or Protocol Use : JPEG, MPEG, GIF


Application Layer – Layer 7

It is a layer through which the end user can communicate directly with the software. The
application layer transmits the data in the form of a user-readable format. It provides many
services to the user.

It transfers data to the presentation layer. Furthermore, it either provides services to the
presentation layer or takes services from the presentation layer.

It is the responsibility of the application layer that the communication between two hosts is
taken place smoothly without any disturbance. The application layer ensures that the
required media is available on both hosts. It determines which protocol is to be used while
communicating between the hosts.
Functions of the application layer in the OSI model

○ The application layer determines the communication partner to whom data will be transmitted.
○ This layer specifies the availability of resources, i.e., it checks whether adequate network resources are
available or not.
○ This layer delivers protocols that are accountable for creating seamless transmission between
applications.
○ This layer serves as an interface between user applications and the network.
○ This layer delivers directory services, which means it permits access to any sort of data from a
distributed database.
○ This layer delivers several facilities to the users for multiple email forwarding and storage facilities.
Contd…
○ This layer delivers several facilities to the users for multiple email forwarding and storage
facilities.
○ This layer lets users log into a remote host and access any type of application.
○ This layer lets the user access the files in the remote host.
○ This layer provides email services.
○ This layer provides file transfer access and management.
○ This layer communicates with the operating system and guarantees that data is saved properly.
○ This layer enables users to communicate with other software applications.

You might also like