IEEE in the field of communication and computer network
IEEE standard in the field of communication and computer network
IEEE in the field of communication and computer network
In February 1980, the United States Institute for Electrical and Electronics Engineering (IEEE abbreviated as Ai Triple E) named Project 802. started a project. The purpose of this project was to define some standards related to network.
The explanation of the above naming of the project is as follows: “The project was taken up in the second month of February 80, so it is called Project 802”.
Under Project 802, standards are set in 12 categories.
These are 802.1 802.2 802.3 802.4 802.5 802.6 802.7 802.8 802.9 : Integrated Voice / Data Network 802.10 : Network Security 802.11 : Wireless Network 802.12 4 Demand Priority Access LAN, 100 Base VG-LAN.
is worth mentioning here that 802.3 (Ethernet) and 802.5 (Token Ring) are the most widely used standards or architectures for the physical and logical topology of the network in computer networks.
: Internet Working and Management : Logical Link Control : Carrier Sense with Multiple Access and Collision Detection (CSMA / CD) or Ethernet : Token Bus LAN : Token Ring LAN : Metropolitan Area Network or MAN (MAN) : Broadband Technical Advisory Group : Optic Fiber Technical Advisory Group
3.2 Different levels of OSI reference model (Different step of OSI reference model):
As previously mentioned, the OSI model basically consists of seven levels. The layers are described as (A) Physical (Physical): This layer does the work of sending data bits (sum of 0 and 1) from one PC to another PC. All the devices involved in doing this are hub/switch, repeater, cable, connector, transmitter etc. The physical layer of the OSI model serves to provide connectivity of two fundamental natures.
One is point-to-point, the other is multipoint. (i) Point-to-point connection 4 The best example of a point-to-point connection is a local printer connected directly to the PC by a cable. In a point-to-point connection, a host is directly connected to another host (PC or printer) on the other end of a medium or cable.
(ii) Multipoint (Multipoint) connection: In this connection method, a host is connected to many hosts at the same time. A LAN or WAN is any type of network host can be considered to be connected in a multipoint connection. Because, the host is able to exchange data with multiple hosts instead of one.
4 (b) Data link (Data link): The data link layer is divided into two sub layers (Sub layer). One of them is LLC (LC) Logical Link Control), the other MAC (MAC - Media Access Control). LLC establishes and maintains connections between network devices. This sub-layer is also responsible for dataframe error correction and hardware address determination.
The MAC sub-layer controls the process by which network devices share media channels. There are two types of media channel share method.
These are: (i) Contention: In this method network devices can transmit data at any moment. An example of a contention network is Ethernet.
(ii) Token passing: Here the PC can send data packets on the network cable at any time. That's why he has to wait for the token or frame. Token ring, ARC net etc. are examples of token passing networks. The data link layer performs all the functions of creating data packets. The second layer of the OSI model means that all the devices that work on the data link are switches, bridges, intelligent hubs, etc.
(C) Network (Network): This is an important layer of OSI model. The network layer makes data packet routing decisions and forwards the data packets (also known as datagrams) to the target or destination device. Devices that work at this level are routers, browsers, gateway services, etc.
(d) Transport (Transpot): The function of the transport layer is to accurately deliver data packets. Besides, data packet correct order (Sequence) control, ensuring data availability or preventing data duplication etc. are done at this level. If the data to be sent is larger than the allowed packet size, the transport layer breaks the data into smaller, more manageable chunks and places them into two or more packets. The process of breaking large data into smaller pieces is called fragmentation. The transport layer combines the fragmented data packets arriving at the receiving device. The process of reassembling fragmented data packets is called De-fragmentation. It does this by keeping the sequence or order of incoming data packets correct.
In addition, the transport layer controls the speed of data flow. The transport layer delivers data packets to the network by adapting to the data reception capabilities of receiving devices and other network components. If a data packet is sent beyond the reception capability of the receiving device, it only wastes network resources and time.
For example, if we speak faster than someone's comprehension capacity, then he will not understand anything. You have to say the words repeatedly to make him understand the meaning of the words. This creates annoyance for both the speaker and the audience and wastes time. Similar to the network layer, devices such as routers, browsers, gateways work at the transport layer.
(e) Session (Sessions): The work of this level is to grant share permission to the host computer to the application program of a different PC in the network.
That is, it does session or data connection setup, management and termination. Such sessions enable networked systems to exchange data with each other. Devices at this level are application interfaces, gateways, etc.
(f) Presentation (Presentation): The presentation layer basically changes the data format (Format). Network data format may differ from PC data format.
This layer changes the data format according to the needs of the network and PC. Presentation layer protocols are responsible for data encryption. Like session layer, application interface, gateway etc. devices work here too.
(g) Application (Application): The activities of the application level are highly visible in the network. The application's job is to provide all the necessary services that directly support the user's application, such as access and authorization to databases, e-mail, file transfer, etc. This layer is responsible for identifying software redirectors and shared network resources. In addition, some essential network services such as login authentication (Login Authentication) are provided by the layer. Session and presentation layer devices also operate at this layer. The functions of the seven layers of the OSI model are presented in table form below: Main Functions of the Layers Application Presentation 09. ob. of 08 , Session Transport 03 . Network services, user authentication, data packet translation, encryption connection creation, data session management with fragmentation, data fragmentation, de-fragmentation, data delivery with assurance, error correction/management, speed control of data flow, receiver, sender device addressing, routing packet/frame generation / checking, network access network data link 01, standardization of physical media, connectors, electrical signals, etc., application, presentation and session level. Compression, data encryption etc.
Application interfaces such as Microsoft Net Bios and Novell NCP (NCP - Netware Core Protocol) are active at these levels. Gateway services are the mechanism by which one application's protocol is understood by another application, i.e. building a protocol stack. The transport and network layers are responsible for logical data transmission. Data packet size or datagram. They take care to be accurate.
Besides, distribution and reception, routing of data packets among various applications are done by transport and network layer.