Free Essay

Osi Model

In:

Submitted By mshivam383
Words 3221
Pages 13
8/25/2013

Analog Communication

MODULATION

1

8/25/2013

Introduction

Topics to be covered
• Need for Modulation
• What is Modulation? • Types of Modulation • Amplitude Modulation (AM) • Angle Modulation • Frequency Modulation (FM) • Phase Modulation (PM)

2

8/25/2013

Baseband vs Passband Transmission
• Baseband Signal:- Information bearing Signal or Message Signal. • The term Baseband refers to the band of frequencies representing the original signal obtained from the source (or Base).
– Voice (0-4kHz) – TV (0-6 MHz)

• A signal may be sent in its baseband format when a dedicated wired channel is available. • Otherwise, it must be converted to passband.

Need for Modulation
• Size of the antenna
• For efficient radiation, the size of the antenna should be λ/10 or more (preferably around λ/4 ), where λ is the wavelength of the signal to be radiated.

• Easy to Multiplex
• Several message signals can be transmitted on a given channel, by assigning to each message signal an appropriate slot in the channel.

• Channel Selectivity
• Each station can be assigned a suitable carrier so that the corresponding program material can be received by tuning to the station desired.

3

8/25/2013

Need for Modulation
• Improved Signal to Noise Ratio
• Will be dealt in future lectures

• Less Fading of transmitted signal
• As the energy of a signal is proportional to its frequency, fading by the atmospheric particle is less

What is Modulation?
• So for better transmission, we need to send a high frequency signal. • But message signal is of low frequency. • If we alter the frequency of message signal, the information will be lost. • We can send a high frequency signal which reflects the characteristics of message signal. • This high frequency signal is called CARRIER SIGNAL

4

8/25/2013

What is Modulation?
• The message signal is called MODULATING SIGNAL or BASEBAND SIGNAL. • The word modulation means the systematic alteration of one waveform, called the carrier, according to the characteristic of another waveform, the modulating signal or the message. • We use c(t ) and m(t ), to denote the carrier and the message waveforms respectively.

What is Modulation?
• The resultant signal after modulation is called MODULATED SIGNAL.
• For study purpose, the commonly used carrier and message signal is SINUSOIDAL WAVE. • Transmitter Side - Modulation • Receiver Side - Demodulation

5

8/25/2013

Definition for Modulation
• Modulation is defined as the process by which some characteristic of a carrier wave is varied in accordance with the message signal.

Modulation and Demodulation

6

8/25/2013

Types of Modulation
• Modulation - Characteristics of Carrier Wave is varied in accordance with the characteristics of message signal. ( 2πfc t + φ ) • Consider a Carrier wave:

c(t) = Ac Cos ( θ )
Instantaneous Value Maximum Amplitude Angle

Frequency
Phase

Types of Modulation
MODULATION
Amplitude Modulation (AM) AM DSB FC AM DSB SC SSB VSB

Angle Modulation

Frequency Modulation (FM) Phase Modulation (PM)

NBFM WBFM NBPM WBPM

7

8/25/2013

Amplitude & Angle Modulation Definition

AM, FM & PM
• AM – The amplitude of the carrier signal is varied in accordance with the instantaneous amplitude of the message signal.
• FM – The frequency of the carrier signal is varied in accordance with the instantaneous amplitude of the message signal.

• PM – The phase of the carrier signal is varied in accordance with the instantaneous amplitude of the message signal.

8

8/25/2013

AM & FM Waveforms
CARRIER

MESSAGE

AM

FM

FM & PM Waveforms
CARRIER

MESSAGE

FM

PM

9

8/25/2013

TDM

FDM

10

8/25/2013

FDM

AMPLITUDE MODULATION

11

8/25/2013

Definition of Amplitude Modulation (AM)

Amplitude Modulation (AM) is defined as the process in which the amplitude of the Carrier Signal, c(t) is varied about a mean value, linearly with the Base band Signal, m(t).

Types of Amplitude Modulation
Non Linear AM AMPLITUDE MODULATION Linear AM

AM DSB FC

AM DSB SC SSB VSB

12

8/25/2013

Topics to be Covered
• AM DSB FC (or simply AM)

• AM DSB SC
• SSB

• VSB
• Signal to Noise Ratio of AM

AM DSB FC (or simply AM)
• Introduction
• Signal & Spectrum representation of AM • Power Relation

• Modulators
– Switching Modulator – Square Law Modulator

• Demodulators
– Square Law Demodulator – Envelope Detector

13

8/25/2013

Introduction

Introduction

14

8/25/2013

AM DSB FC or simply AM
• Consider a Carrier Signal: • Message signal m(t) and Carrier signal c(t) are independent.

• AM is defined as the process in which the amplitude of the Carrier Signal, c(t) is varied about a mean value, linearly with the Base band Signal, m(t).

• where Ka = 1/Ac, is the Amplitude Sensitivity Factor or Modulation Sensitivity measured in volt-1

Non Linearity in AM DSB FC
Does Full-Amplitude Modulation Satisfy the Linearity Property ?

 Amplitude modulation, as defined in Eq. (2.2), fails the linearity test (i.e. Super Position Theorem)in a strict sense.
1) Suppose that m(t) = m1(t) + m2(t). Let s1(t) and s2(t) denote the AM waves produced by these two components acting separately. s1 (t )  Ac 1  ka m1 (t ) cos(ct ) and s2 (t )  Ac 1  ka m2 (t ) cos(ct )

2) Let the operator H denote the amplitude modulation process, therefore we have: H m1 (t )  m2 (t )  Ac 1  ka  m1 (t )  m2 (t )   cos(ct )  
 s1 (t )  s2 (t )
The superposition principle is violated!

15

8/25/2013

Conditions for AM

Modulation Index of AM
• Ka = 1 / Ac
• Ka*m(t) = (1/Ac) * Am Cos (2πfmt) = (1/Ac) * Am (1) = Am / Ac = ka*Am • This “ Ka * Am ” is called as Modulation Index. • It is denoted using ma or μ

16

8/25/2013

Modulation Index of AM
Two cases arise, depending on the magnitude of kam(t), when comparing with unity:
1) Undermodulation, which is governed by the condition ka m(t )  1 for all t

1 + kam(t) > 0

2) Overmodulation, which is governed by the weaker condition ka m(t )  1 for some t

Percentage of modulation  kam(t) 100%

Modulation Index
Important conclusion:
1. The envelope of the AM wave has a waveform that bears a one-to-one correspondence with that of the message signal if the percentage modulation is less than or equal to 100%. 2. If percentage modulation > 100%, the modulated wave is said to suffer from envelope distortion.

17

8/25/2013

Modulation Index

Modulation Index

18

8/25/2013

Modulation Index

Modulation Index

19

8/25/2013

Signal Representation of AM
An unmodulated RF carrier wave

A carrier wave amplitude modulated (AM) with a simple audio tone

Signal Representation of AM

1st Condition

Envelope Distortion

20

8/25/2013

Spectrum Representation of AM
• To draw the spectrum of any wave, we need to find out the Fourier Transform of that signal.

• Cos (x) = (1/2)*(e jx + e -jx) • F [m(t) Cos (x)] = M(f – x)/2 + M(f + x)/2
1 1 cos( A) cos( B)  cos A  B   cos A  B  2 2

s(t )  Ac cos ct  KaAc Am cos ct cos mt  Ac cos ct  KaAc Am KaAcAm cosc  m t  cosc  m t 2 2

Some properties of the Fourier transform
Frequency shifting (Modulation)

 f  t  e j0t  F   0 
Therefore multiplying a time function by e j0t causes its spectral density to be translated in frequency by ω0.
Example





 f  t  cos 0t 

1  F   0   F   0   2

F  

1 F   0  2


1 F   0  2


21

8/25/2013

Spectrum Representation of AM

Spectrum Representation of AM

S AM ( f )  F s AM (t ) 

 F Ac cos(2 f c t )  Ac k a m(t ) cos(2 f c t ) Ac  ( f  f c )   ( f  f c )  k a Ac M ( f  f c )  M ( f  f c ) 2 2

22

8/25/2013

Spectrum Representation of AM
• From Eqn. (2.5), we can draw the spectrum as:

Bandwidth

23

8/25/2013

Bandwidth of AM

Spectral Overlap (2nd Condition)

Spectral Overlap

2nd Condition

Spectral overlap phenomenon in amplitude modulation. The phenomenon arises when the carrier frequency c is less than the highest frequency component m of the modulating signal.

24

8/25/2013

Time domain & Frequency domain

Phasor Representation of AM
AcKaAm/4 Ac/2 + AcKaAm/4

AcKaAm/4 Ac/2

Ac/2 AcKaAm/4

AcKaAm/4

Ac/2 + AcKaAm/4

25

8/25/2013

Power relation in AM

Power relation in AM

26

8/25/2013

Transmission Efficiency of AM

Carrier Power Vs Sideband Power

27

8/25/2013

AM Modulators
1. Switching Modulator
– Utilizing the Switching characteristic or time varying characteristic of a diode.

2. Square Law Modulator
– Utilizing the non linear characteristic of any square law device ( like Diode, Transistor etc.)

Switching Modulator

28

8/25/2013

Switching Modulator
• • • • Assume that Ac  m(t ) Let c(t )  Ac cos(2f ct ) The diode will turn on if c(t )  0 and will turn off if c(t )  0 The output across the load resistor is
v (t ) c(t )  0 v0 (t )   i c(t )  0  0  vi (t ) g (t )  [m(t )  Ac cos(2f c t )]g (t )

• Since g(t) is a periodic rectangular function, the Fourier series is

Switching Modulator

29

8/25/2013

Switching Modulator

Switching Modulator

30

8/25/2013

Square Law Modulator

AM Demodulators
1. Square Law Demodulator

2. Envelope Detector

31

8/25/2013

Square Law Demodulator

Envelope Detector

32

8/25/2013

Envelope Detector

Envelope Detector
• The operations of the circuit requires careful selection of t=RC • If RC is too large, discharging will be slow and the circuit cannot follow a decreasing envelope. • When RC is too small the ripples will be high. • The ripples are finally removed by LPF. • The DC value is blocked by a capacitor.

33

8/25/2013

Envelope Detector

Features of AM
• AM system is very cheap to build and maintain. • AM is wasteful of power - max efficiency is 33%
• AM is wasteful of bandwidth - twice the message bandwidth is required

34

8/25/2013

Demerits of AM DSB FC
An unmodulated RF carrier requires narrow bandwidth

Modulation results in creation of a carrier and 2 Sidebands. This requires more power. Moreover carrier contains no information.

Why DSB SC?

 The carrier contains no information.

 So we can think of avoiding or suppressing carrier.

35

8/25/2013

Linear Modulation
In its most general form, linear modulation is defined by:

where sI(t) is the in-phase component and sQ(t) the quadrature component of the modulated wave s(t). In linear modulation, both sI(t) and sQ(t) are low-pass signals that are linearly related to the message signal m(t).

In-Phase and Quadrature Components of Linear Modulation
Depending on sI(t) and sQ(t), three types of linear modulation are defined:

1) DSB SC modulation, where only the upper and lower sidebands are transmitted.
2) SSB modulation, where only the lower or the upper sideband is transmitted. 3) VSB modulation, where only a vestige of one of the sidebands and a modified version of the other sideband are transmitted.

36

8/25/2013

In-Phase and Quadrature Components of Linear Modulation

There are 2 important points to be noted from this table: 1). The in-phase component sI(t) is solely dependent on the message m(t). 2). The quadrature component sQ(t) is a filtered version of m(t). Spectral modification of the modulated wave s(t) is solely due to sQ(t) .

Linear Modulation Schemes
1. AM DSB SC (AM Double Side Band Suppressed Carrier) 2. SSB (Single Side Band) 3. VSB (Vestigial Side Band)

37

8/25/2013

AM DSB SC
• Derivation • Signal & Spectra • Modulators
– Product Modulator
• Balanced Modulator • Ring Modulator (Double Balanced Modulator)

• Demodulator
– Coherent Detector – Costas Receiver

Introduction
DSB-SC modulation is generated by using a product modulator that simply multiplies the message signal m(t) by the carrier wave

Accos(2fct). Specifically, we write:

s(t) = Acm(t) cos(2fct)

(2.8)

38

8/25/2013

Introduction s DSB (t )  Ac m(t ) cos(2 f c t ).
The modulated signal s(t) undergoes a phase reversal whenever the message signal m(t) crosses zero. This is called double side-band suppressed carrier (DSBSC) modulation.
1. Transmission bandwidth is same as standard AM. 2. Transmitted power is less than that used by standard AM.

Signal Representation

Double-sideband-suppressed carrier modulation. (a) Message signal. (b) DSB-SC modulated wave, resulting from multiplication of the message signal by the sinusoidal carrier wave.

39

8/25/2013

Signal Representation

Spectrum Representation
• The envelope of a DSB-SC signal is different from the message signal; unlike the case of an AM wave that has a percentage modulation < 100 %. • From Equ. (2.8), the Fourier transform of s(t) is obtained as:

40

8/25/2013

Spectrum of AM DSB SC
When m(t) is limited to the interval -W < f < W, as in Figure 2.6a, the spectrum S(f) of the DSB-SC wave s(t) is as illustrated in Figure 2.6b.

Spectrum Representation

41

8/25/2013

Spectrum of AM DSB SC
Because it doesn’t have components of the carrier, we call this kind of modulation suppressed carrier

Time domain Vs Frequency domain
Time-domain (on the left) and frequencydomain (on the right) characteristics of DSB-SC modulation produced by a sinusoidal modulating wave. (a) Modulating wave. (b) Carrier wave. (c) DSB-SC modulated wave. Note that  = 2.

42

8/25/2013

Modulators
Product Modulator
• Balanced Modulator • Ring Modulator (Double Balanced Modulator)

Product Modulator

43

8/25/2013

Balanced Modulator

Ring Modulator

44

8/25/2013

Ring Modulator

Ring Modulator

45

8/25/2013

Ring Modulator

Ring Modulator
• Therefore, we have vo (t )  m(t )c(t ) • Since c(t) is a periodic function, the Fourier series can be expressed as:

• The desired DSB-SC AM signal is obtained by passing v (t ) through a bandpass filter with center frequency f and bandwidth 2W.
0 c

46

8/25/2013

Demodulators
1. Coherent Detector
• AM DSB SC Modulator + Filter • Also called Synchronous or Homodyne Detector. • Quadrature Null Effect – Phase Error.

2. Costas Receiver
• Employs two Coherent detectors. • Avoids Quadrature Null Effect.

Coherent Detector

47

8/25/2013

Coherent Detector

Coherent Detector – Quadrature Null Effect
• Assume the Local Oscillator signal have same frequency of that of the Carrier, but a different phase. • Let the Phase difference is Ø. • The LO signal is:

48

8/25/2013

Coherent Detector – Quadrature Null Effect

Costas Receiver

49

8/25/2013

Costas Receiver
• I-channel:
• After downconverwsion, v I (t )  Ac m(t ) cos c t   cos c t     Ac m(t )cos2 c t     cos   2

• At the output of the lowpass filter, with |H(0)| = 1, mI (t )  Ac cos   m(t ) 2

• Q-channel:

vQ (t ) 

Ac m(t )sin2c t     sin   2 A mQ (t )  c sin   m(t ) 2

Costas Receiver
• Feedback path:
• At the output of the multiplier, me (t )  Ac2 2 m (t ) sin  cos  4 A2  c m 2 (t ) sin 2 8


• At the output of the lowpass filter,

mef (t )   me (t )h f (t  t )dt


• The purpose of hf (t) is to smooth out fast time variations

of me(t).
• The output of the VCO is described by xVCO (t )  cos ct   (t )

50

8/25/2013

Costas Receiver
Where c is the VCO’s reference frequency and  (t )  k v 0 mef (t )dt , is the residual phase angle due to the tracking error. t The constant kv is the frequency sensitivity of the VCO in rad/s/volt.
The instantaneous frequency in radians/sec of the VCO’s output is given by: d c t   (t )  c  k v mef (t ), dt

Clearly, if (t) were small, then the instantaneous frequency would be close to c and the output of the I-path would also be proportional to m(t).

Why SSB?

 The carrier contains no audio information.

The sidebands contains duplicated information

51

8/25/2013

AM SSB SC (SSB)
• Hilbert Transform • Derivation • Signal and Spectrum • Modulators
– Frequency Discriminator – Phase Discriminator (Hartley Modulator)

• Demodulators
– Coherent Detector – Envelope Detector

Introduction to SSB
• Two main parameters to be considered while designing a Communication System are : 1. Transmission Power 2. Transmission Bandwidth.
• In AM DSB FC, both are very high.

• In AM DSB SC Transmission Power is less than AM DSB FC, but Transmission Bandwidth is same as that of AM DSB FC.

52

8/25/2013

Introduction to SSB
• In AM SSB SC or SSB, only one Sideband will be Transmitted (Both the Sidebands contain the same information). • The Transmission Power as well as the Transmission Bandwidth can be reduced. • Transmission Bandwidth will be reduced to half of that of AM DSB FC & AM DSB SC. • To accomplish these merits, the Equipment Design in more Complex.

SSB Derivation
• A single sideband AM signal can be represented mathematically as:
LSSB AM USSB AM

53

8/25/2013

Spectrum of SSB
Suppose we want to transmit the upper sideband, then using an ideal bandpass filter with center frequency fc  Wm yields the desired 2 result, namely,

Spectrum of SSB

54

8/25/2013

SSB Modulators
• Frequency Discriminator
– Generating SSB signal from DSB SC signal by using BPF

• Phase Discriminator
– Generating SSB signal by using Hilbert Transform

Frequency Discriminator

55

8/25/2013

Frequency Discriminator
M()

C

2B

+2B

C



GDSBSC() USB
C2B

LSB
C
C+2B

LSB
C2B C

USB
C+2B



HUSB()
BW = 2B (B Hz) Center Freq = c+B C2B

C

C+2B

C2B

C

C+2B



GUSB() USB
C2B

USB
C C C+2B



HLSB()
BW = 2B (B Hz) Center Freq = c– B C2B

C

C+2B

C2B

C

C+2B



GLSB() LSB
C
C+2B

LSB


C2B C

Phase Discriminator

56

8/25/2013

SSB Demodulators
• Coherent Detector
• Envelope Detector

Coherent Detector

• Same Coherent Detector used for AM DSB SC.

57

8/25/2013

Envelope Detector (Modified)

Spectrum of SSB

58

8/25/2013

Demerit of SSB
• Selective Filtering using filters with sharp cutoff characteristics. Sharp cutoff filters are difficult to design. • The audio signal spectrum has no dc component, therefore , the spectrum of the modulated audio signal has a null around the carrier frequency. • This means a less than perfect filter can do a reasonably good job of filtering the DSB to produce SSB signals.

VSB
• Derivation

• Signal and Spectra
• Modulators
– Frequency Discriminator

• Demodulators

59

8/25/2013

Introduction to VSB

Introduction to VSB
To produce SSB signal from DSB signal ideal filters should be used. In VSB system one sideband and a vestige of other sideband are transmitted together. The resulting signal has a bandwidth > the bandwidth of the modulating (baseband) signal but < the DSB signal bandwidth.

60

8/25/2013

Spectrum of DSB SC, SSB & VSB

Generation of VSB
• Generation of VSB AM
– generate a DSB-SC AM signal – pass the DSB-SC AM signal through a sideband filter with frequency response H(f)

61

8/25/2013

Response of the Filter

Response of the Filter

62

8/25/2013

Demodulation of VSB

63

8/25/2013

Basics of Signal to Noise Ratio

Basics of Signal to Noise Ratio

64

Similar Documents

Premium Essay

Osi Model

...Describe the OSI Model and how it relates to a network. The OSI Reference Model is becoming more popular everyday because it is a useful tool for learning about networks. The OSI Reference Model is where the communication system (network) is broken down into seven layers, where each layer serves a purpose. The OSI Reference Model defines what each layer’s function is but does not specify actual services in the layers. So that the vendors can write device drivers for a device; and not be concerned about the higher layers, this speeds up the process. The seven layers are divided into three groups: 1) Application (upper) layer, 2) Intermediate layer, 3) and Network oriented (lower) layer. With this system the OSI Reference Model is convenient because you’re able to communicate with a different computer network. The WAN Network operates on the Physical and data link layer of the OSI Reference Model. What are some Protocols? The purpose of the OSI Reference Model is to determine how data should be transmitted between two points in a network. Its job is to consistently work with other products. On which layer do switches and routers operate? Layer two, three, and four the Presentation layer, Session, and Transport Layer is where the witches and routers will operate. If Routers operate on more than one layer, what is the difference? Routers operate on layer three then apply on layer two and the switch the packets. Layer two would be Ethernet and layer three is the operating...

Words: 254 - Pages: 2

Free Essay

Osi Model

...OSI MODEL Joseph Lucero College America Abstract In this paper it is going to explain the OSI model and all the layers. There are 7 layers in total: the layers are Application, Presentation, Session, Transport, Network, Data Link and Physical. It is going to explain what all the layers are and how they work in the OSI Model, it is also going to explain what every layer is. It is also going to explain why it was created and what the use for the OSI model is for today. You are going to know why we need the OSI model and how it evolved from the first time. You are also going to find out about the past history about the model and the other name is what called before. OSI Model The OSI model has been used for a long time. Why do we use it? OSI, formally known as the ISO OSI model, is the most standard model for networking communication. The ISO formed the OSI or Open System Interconnection, so that you can communicate and connect with another system over the network without having system specific configuration. The OSI model consists of 7 different layers: Physical, Data Link, Network, Transport, Sessions, Presentation, and Application. One reason why the OSI model was created, is so that the process of communication that were between two end points in a telecommunication network can be split into layers. The main reason why the OSI Model was created was to standardize the networking rules so that all the systems can communicate over the OSI reference model, which was a...

Words: 954 - Pages: 4

Premium Essay

Osi Model

...Checkpoint: Week 1 Day 5 OSI Model When we breakdown the OSI model you will see that in the seven layers of the design, a decision is made in the third layer, which WAN protocols operate on is known as the network layer. This layer carries out regular tasks such as pinpointing routings diagrams and end to end addressing. Some layers associate a unit also known as a brouter that works like a bridge and a router. Now on layers two thru four routers and switches work on these layers which are commonly known as the data link layer and the transport layer. As stated earlier on the network layer, which is layer two on the OSI model, is where the routing and addressing are carried out. In the OSI model during the transport layer is where we see the mistake handling and the flow control at work. Finally, synchronizations and assemblies are finished on the fourth layer of the OSI model. Configured of various parts every layer conducts a unique role inside the network. Additionally, each layer incorporates everything to the data which is then transmitted point to point. Protocols at work during this time are known as the frame relay protocol, HDLC, and PPP. The protocol that works as a data link layer is known as the frame relay protocol in the OSI model. The HDLC means high level data link in the model, and the PPP is an additional protocol which works on different layers of the OSI...

Words: 253 - Pages: 2

Free Essay

Osi Model

...The OSI Model Upon trying to decide what to write about, I decided to go with The Open System Interconnection or OSI Model for short. My reasons are simple. One, the OSI Model provides a ton of information to write about. Secondly, found it to be one of the most interesting topics. My objective is to obviously explain the different layers of the OSI Model. As well as how communication occurs, and the many other functions of the Model. The OSI Reference model is based on a proposal developed by the International Standards Organization (ISO). The original objective of the OSI model was to provide a set of design standards for equipment manufactures so they could communicate with each other. The OSI model defines a hierarchical architecture that logically partitions the functions required to support system-to-system communication. “The OSI model is a theoretical representation of what happens between two nodes communicating on a network.” (Network + Guide to Networks fifth edition) It goes on say “It does not prescribe the type of hardware or software that should support each layer. Nor does it describe how software programs interact with humans.” The communication in the model is defined by its seven layers, which divides the tasks into seven smaller components that can be easily managed. A task or group of task are assigned to each layer and each layer is reasonably self- contained so that the task assigned to each layer can be managed and updated independently. My...

Words: 293 - Pages: 2

Premium Essay

Osi Model

...Networking - Understanding The OSI Model The OSI is a useful model for understanding and developing computer-to-computer communications over a network. OSI stands for Open Systems Interconnection. This conceptual model groups network communication into seven layers of data: Application, Presentation, Session, Transport, Network, Data Link, and Physical. Today, we will be talking about: the history, the seven layers of data, the communication between two systems, and frame specifications of the OSI model. In the early 1980s, the ISO began working on the OSI model so that it would enable computer platforms across the world to communicate openly. The concept of the OSI model was provided by the work of Charles Bachman, Honeywell Information Services. Various aspects of OSI design evolved from experiences with the ARPANET, the fledging Internet, NPLNET, EIN, CYCLADES network and the work of IFIP WG6.1. The new design was documented in ISO 7498 and its various addenda. In the OSI, a networking system was divided into layers. Within each layer, one or more entities implement its functionality. Each entity interacted directly only with the layer immediately beneath it, and provided facilities for use by the layer above it. Protocols enabled an entity in one host to interact with a corresponding entity at the same layer in another host. Service definitions abstractly described the functionality provided to an (N)-layer by an (N-1) layer, where N was one of the seven layers of protocols...

Words: 5379 - Pages: 22

Free Essay

Osi Model

...OSI Model The Open Systems Interconnection (OSI) reference model is a way to standardize communication between networked computers and other devices. Since there are so many ways to connect and communicate, this task was too large for just one standard. It had to be broken down into seven parts and layer them so each layer adds to the data before sending it down or subtracts data before sending it up. Yet each layer does not need changes from another layer in order for it to function. Each layer can operate independently or as part of a team. It is truly a remarkable setup. There are four layers that WAN protocols operate. The session layer establishes, maintains, and terminates connections (sessions) between communicating applications. The transport layer does exactly what the name implies. It is the taxi for the data being transferred. The network layer establishes, maintains, and terminates connections with switching and data transmission technologies. The data link layer provides transportation of data from the physical layer. The physical layer deals with the switches and routers. There are two layers that deal with switches and routers: the network and physical layers. It sounds redundant, but it is not. The physical layer only deals with the routers and switches. Only the physical elements of network while the network layer does more. The network layer establishes, maintains, and terminates connections while the physical layer only deals with the drivers...

Words: 251 - Pages: 2

Premium Essay

Osi Model

...OSI Model Your Name University of Phoenix Introduction to WAN technologies  Teacher Date “The OSI (Open Systems Interconnection) model was created by the ISO to help standardize communication between computer systems.” (Tech Terms, 2011) The OSI model has seven different layers which breaks up communications and uses multiple hardware standards, protocols and even other types of services. The seven layers of this protocol are the physical layer, data link layer, network layer, transport layer, session layer, presentation layer and the application layer. The layers which WAN protocols operate are at Layer 1 and Layer 2 which are the physical layer and the data link layer. You have the cables, routers, server, connectors, signaling and standards on the first layer and then you have the frame relay, HDKX, PPP and ATM which are the WAN protocols on the second layer. “The physical layer is responsible for establishing, maintaining and ending physical connections (point to point) between computers.” (University of Pittsburg) When you talk about routers on different levels in the OSI protocols a thing to remember is they can be doing processes on more than one level but they really only reside on the first level of the protocol. Layer 1 is actually concerned with the interpretation of the bit stream and turning it into an electrical signal that will be carried across a physical medium. Then the data link layer or layer 2 will really define the format of the data ion the network...

Words: 354 - Pages: 2

Premium Essay

Osi Model

...OSI Ned Leeds CMGT/245 CMGT/245 Version 2 IS Security Concepts October 28, 2013 LAYER 1 - PHYSICAL  The physical layer is mainly responsible for establishing, maintaining and ending physical connections (point to point) between computers. This layer is concerned with the actual interpretation of the bit stream into an electrical signal that can be carried across a physical medium. The protocols at this layer deal with the binary transmission, voltage levels, and data rates. This layer would also specify physical medium properties such as cables and network cards. LAYER 2 - DATA LINK The data link layer defines the format of data on the network. All of the data sent through the network are made into a frame which is performed at this level. The frame is a uniform way of sending the data along with address information and error checking capabilities. CRC is used for the error detection at this level. The receiving end the CRC fails at this level there is a request back to the sender for retransmission of this packet. LAYER 3 - NETWORK The network layer basically handles all of the addressing issues. This layer addresses packets, determines the best path or route will manages network problems such as data congestion. There are three ways in which the packets are routed to their destinations. There could be a static route through the entire network that will never be changed. This could also be a static line only used during a particular session between the sender...

Words: 1130 - Pages: 5

Free Essay

Checkpoint Osi Model

...CheckPoint:  OSI Model Due Week 1 Day 4 Describe the OSI model and how it relates to a network in 200 to 300 words.  Your response should include answers to the following:      - On which layers of the OSI model do WAN protocols operate?      - What are some of these protocols?      - On which OSI layers do switches and routers operate?      - If routers reside at more than one layer, what is the difference between the OSI layers? • On which layers of the OSI model do WAN protocols operate? WAN protocols function at the lower three layers of the OSI reference model: the physical layer, the data-link layer, and the network layer. • What are some of these protocols? Frame Relay- is a high performance WAN protocol that operates at the physical and data-link layers of the OSI model. The Frame Relay allows for use across ISDN (Integrated Services Digital Network) interfaces. It is a good example of a packet-switched technology. LAPB, which stands for, “Link Access Procedure Balanced” – is a data-link layer protocol that manages communication and packet framing between devices. It shares the same frame format, types and field functions as SDLC and HDLC. However, unlike either of those, LAPB is restricted to the ABM transfer mode and is appropriate only for combined stations. LAPB, circuits can be established by either the data terminal equipment, or the data circuit-terminating equipment. The station initiating the call is determined to be...

Words: 609 - Pages: 3

Free Essay

Osi Model Protocol

...OSI Model Protocol Keisha Bullock NTC 361 December 9, 2013 University of Phoenix (Axia) Bruce Yamashita OSI Model Protocol Open System Interconnection (OSI) is a recommended suggestion for how messages should be transferred between any two users in a telecommunication network. The purpose of the OSI is to direct product implementers so that their items will regularly work with other items. The OSI model outlines seven layers of function that happens at each end of a message. The main purpose of the Open System Interconnection is that the communication procedure between two end points in telecommunication networks can be split up into different levels with each level having its own set of responsibilities ("OSI (open System Interconnection)", 2000-2013). The OSI slits the telecommunication into seven levels which is the application level, the presentation level, the session level, the transport level, the network level, the data link level, and the physical level ("OSI (open System Interconnection)", 2000-2013). The layers are broken up into two sets. The higher four levels are used when a message is transmitted from user to another user. The bottom three levels are exercised when any message passes through the main computer. Messages planned for this computer go through to the higher levels and messages intended for some other computer are not distributed up to the levels but are advanced to other host. The application level offers multiple services to the...

Words: 973 - Pages: 4

Premium Essay

Osi Model

...The OSI Model The OSI Model The OSI model describes how data flows in a network. From the top, highest level containing applications for the everyday user down to the bottom level of the physical connections, data and information passes through every layer which in turn can talk to the layers above and below it. Every layer is made up of complicated software. When that software and its components receive information, commonly called packets, from another source it checks it and then sends it back through if necessary (Breithaupt & Merkow, 2006, Chapter 12). The OSI Model is comprised of seven layers, each distinctly different but yet each function and communicate with the others. Application layer The application layer is the one most computer users are the most familiar with, whether it is known to them or not. This is where user forward software operates, such as e-mail and the beloved World Wide Web. The application layer handles resources, files, and verifications necessary for these things to operate. Presentation layer The presentation layer is aptly named. Its main function is to present decrypted or encrypted data to the application layer. Examples of this process include viewing video streams or listening to music online. Session layer The session layer creates a session, or connection between processes running between two separate workstations or platforms. A session includes creating the connection between the systems and eventually terminating...

Words: 564 - Pages: 3

Premium Essay

Osi Model

...This paper will discuss the Open System Interconnections (OSI). “The OSI was developed by the international Organization for Standardization (ISO) as a Model for a computer protocol architecture and as a framework for developing protocol standards. The OSI model consists of seven Layers: Application, Presentation, Session, Transport, Network, Data Link, and Physical.” (University of Phoenix) The Application layer supports application and end user processes, also it provides application services for file transfer, e-mail, and other network software service. Telnet and FTP are applications that exist completely in the application level. The Presentation layer provides self-rule from differences in data representation by translating from application to network format and vice versa. This layer works to convert data into the form that the application layer can accept. It formats and encrypts data to be sent across a network, providing lack of restrictions from compatibility problem. The Session layer launch manages and come to an end connection between applications. This layer sets up, brings together, and terminates conversations, exchanges, and dialogues between the applications at each end. The Transport layer provides crystal clear transfer of data between end systems, or hosts, and is responsible for end to end error recovery and flow control. This layer guarantee complete data transfer. The Network layer offers switching and routing technologies, creating logical paths...

Words: 483 - Pages: 2

Premium Essay

Osi Model and Tcp/Ip Model

...The following table compares the functions performed at each OSI model layer. Layer | Description and Keywords | Application (Layer 7) | The Application layer integrates network functionality into the host operating system, and enables network services. The Application layer does not include specific applications that provide services, but rather provides the capability for services to operate on the network.Most Application layer protocols operate at multiple layers down to the Session and even Transport layers. However, they are classified as Application layer protocols because they start at the Application layer (the Application layer is the highest layer where they operate). Services typically associated with the Application layer include: * HTTP * Telnet * FTP * TFTP * SNMP | Presentation (Layer 6) | The Presentation layer formats or "presents" data into a compatible form for receipt by the Application layer or the destination system. Specifically, the Presentation layer ensures: * Formatting and translation of data between systems. * Negotiation of data transfer syntax between systems, through converting character sets to the correct format. * Encapsulation of data into message envelopes by encryption and compression. * Restoration of data by decryption and decompression. | Session (Layer 5) | The Session layer's primary function is managing the sessions in which data is transferred. Functions at this layer include: * Management of multiple sessions...

Words: 836 - Pages: 4

Premium Essay

Osi Seven Layer Model

...OSI Seven Layer Model The Open System Interconnection model (OSI) defines internetworking in terms of a vertical stack of seven layers. The upper layers of the OSI model represent software that implements network services like encryption and connection management. The lower layers of the OSI model implement more primitive, hardware-oriented functions like routing, addressing, and flow control(Mitchell, 2011).The seven layers of the OSI model are - * Physical * DataLink * Network * Transport * Session * Presentation * Application Physical Layer is the first layer of the OSI model and deals with the physical aspects of the media being used to transmit the data. This layer is also responsible for bit-level transmission between network nodes. Specification examples include Ethernet, 802.3, 802.5, and Fiber Distributed Data Interface. Data Link Layer is the second layer of the OSI model and is responsible for ensuring there are data link connections between two network entities so that data can get across a specific medium and individual links. Examples of this layer include IEEE 802.3, IEEE 802.5, Token Ring, and Frame Relay. Network Layer is the third layer of the OSI model and is responsible for the packet sequencing, congestion control, and error handling. This layer also provides paths for data to transfer through the network. At the Network layer routers began to operate. Examples of this layer include the use of Internetwork Protocol (IP)...

Words: 596 - Pages: 3

Free Essay

Tcp/Ip Osi Model

...TCP/IP OSI MODEL TCP/IPMODEL OS MODEL Eric Jones 1/31/2014 TCP/IP MODEL OS MODEL TCP/IP is a set of protocols that allows communication between to different computers. It separates networking functions into different layers. Each layer has a different task that is similar to another layer or functions. The TCP/IP is a short version of the OS Model it has four layers instead of seven. TCP/IP is the language of how computers communicate with other computers through the internet. TCP/IP is not a single network protocols it’s a suite of protocols. The TCP layer handles the message being sent and breaks it down into small units called packets which are transferred over to the network. The IP layer is most concerned about transmission. By using unique IP addresses assign to every active receiver on the network. TCP/IP combines the OSI application and the presentation layers and supports flexibility in hostnames and also handles Dns errors and mapping domain names. The OSI also known as the reference model it provides a method of standards and protocols which can be compared to assist in other connectivity. Most developers today now use a reference model/OSI Model learn how transmissions are framed and created to translate to other systems. I it begins with the physical layer of the transmitting system and travels through the other layers to the application layer. Once the data reaches the application layer it is processed by the receiving system. In some cases, the...

Words: 379 - Pages: 2