SlideShare una empresa de Scribd logo
1 de 27
NETWORKING STANDARDS
PREPARED BY HARSHIT PATALIA
De facto, de jurie
Standards
• Standards fall into two categories: de facto and de jure.
• De facto (Latin for ‘‘from the fact’’) standards are those that have
just happened, without any formal plan. HTTP, the protocol on
which the Web runs, started life as a de facto standard. It was part
of early WWW browsers developed by Tim Berners-Lee at
CERN, and its use took off with the growth of the Web. Bluetooth is
another ex-ample. It was originally developed by Ericsson but now
everyone is using it.
• De jure(Latin for ‘‘by law’’) standards, in contrast, are adopted
through the rules of some formal standardization body.
International standardization authorities are generally divided into
two classes: those established by treaty among national
governments, and those comprising voluntary, non- treaty
organizations. In the area of computer network standards like
ISO, IEEE, ASCII.
The Seven Layers of the OSI Model
International
Organization of
Standardization
ISO
Encapsulation
7 Layers
7. Application Layer
6. Presentation Layer
5. Session Layer
4. Transport Layer
3. Network Layer
2. Data Link Layer
1. Physical Layer
All
People
Seem
To
Need
Data
Processing
Layer7
• The application layer is the OSI
layer that is closest to the user; it
provides network services to the
user’s applications. It differs from
the other layers in that it does not
provide services to any other OSI
layer, but rather, only to
applications outside the OSI model.
Examples of such applications are
spreadsheet programs, word
processing programs, and bank
terminal programs. If you want to
remember Layer 7 in as few words
as possible, think of browsers.
Application Layer
Application layer interacts with application programs and is
the highest level of OSI model.
Application layer contains management functions to
support distributed applications.
Examples of application layer are applications such as file
transfer, electronic mail, remote login etc.
Layer 6
• The presentation layer ensures
that the information that the
application layer of one system
sends out is readable by the
application layer of another
system. If necessary, the
presentation layer translates
between multiple data formats
by using a common format. If
you want to think of Layer 6 in
as few words as possible, think
of a common data format
Presentation Layer
Presentation layer defines the format in which the data is to
be exchanged between the two communicating entities.
Also handles data compression and data encryption
(cryptography).
Layer 5
• As its name implies, the session
layer establishes, manages, and
terminates sessions between two
communicating hosts. The session
layer provides its services to the
presentation layer. It also
synchronizes dialogue between
the two hosts' presentation layers
and manages their data exchange.
If you want to remember Layer 5
in as few words as possible, think
of dialogues and conversations.
Session Layer
Session layer provides mechanism for controlling the dialogue
between the two end systems. It defines how to start, control and
end conversations (called sessions) between applications.
This layer requests for a logical connection to be established on
an end-user’s request.
Any necessary log-on or password validation is also handled by
this layer.
Session layer is also responsible for terminating the connection.
This layer provides services like dialogue discipline which can be
full duplex or half duplex.
Session layer can also provide check-pointing mechanism such
that if a failure of some sort occurs between checkpoints, all data
can be retransmitted from the last checkpoint.
Layer 4
• The transport layer
Segments and Sequences
data from the sending host's
system and reassembles the
data into a data stream on
the receiving host's system.
Layer 4 is the boundary
between media-layer
protocols and host-layer
protocols. Layer 4 also deals
with Flow Control through
(Windowing) or Window
Negotiation. And is
responsible for the
Reliability of Communication
through
(Acknowledgements).
Transport Layer
Purpose of this layer is to provide a reliable mechanism for
the exchange of data between two processes in different
computers.
Ensures that the data units are delivered error free.
Ensures that data units are delivered in sequence.
Ensures that there is no loss or duplication of data units.
Provides connectionless or connection oriented service.
Provides for the connection management.
Multiplex multiple connection over a single channel.
Layer 3
• The network layer is a
complex layer that
provides connectivity
and path selection
between two host
systems that may be
located on
geographically
separated networks. If
you want to remember
Layer 3 in as few
words as
possible, think of path
selection, routing, and
logical addressing.
Routers are layer 3 devices
Network Layer
Implements routing of frames (packets) through the
network.
Defines the most optimum path the packet should take from
the source to the destination
Defines logical addressing so that any endpoint can be
identified.
Handles congestion in the network.
Facilitates interconnection between heterogeneous
networks (Internetworking).
The network layer also defines how to fragment a packet
into smaller packets to accommodate different media.
Layer 2
• The data link layer
provides reliable transit of
data across a physical link.
In so doing, the data link
layer is concerned with
physical
addressing, network
topology, network
access, error
notification, ordered
delivery of frames. If you
want to remember Layer 2
in as few words as
possible, think of physical
addressing, and topologies
Switches, Bridges, and NICs are layer 2
devices
Data Link Layer
Data link layer attempts to provide reliable communication
over the physical layer interface.
Breaks the outgoing data into frames and reassemble the
received frames.
Create and detect frame boundaries.
Handle errors by implementing an acknowledgement and
retransmission scheme.
Implement flow control.
Supports points-to-point as well as broadcast
communication.
Supports simplex, half-duplex or full-duplex communication.
Layer 1
• The physical layer defines the
electrical, mechanical, procedural,
and functional specifications for
activating, maintaining, and
deactivating the physical link
between end systems. Such
characteristics as voltage
levels, timing of voltage
changes, physical data
rates, maximum transmission
distances, physical
connectors, and
other, similar, attributes are
defined by physical layer
specifications. If you want to
remember Layer 1 in as few words
as possible, think of signals and
media.
Hubs, cables, and connectors are layer 1
devices
Physical Layer
Provides physical interface for transmission of information.
Defines rules by which bits are passed from one system to
another on a physical communication medium.
Covers all - mechanical, electrical, functional and procedural
- aspects for physical communication.
Such characteristics as voltage levels, timing of voltage
changes, physical data rates, maximum transmission
distances, physical connectors, and other similar attributes
are defined by physical layer specifications.
Summary of the OSI Model
Layer Description
Encapsulation:
Protocol Data Units (PDU) and Peer to Peer Communication
Detailed encapsulation process
• All communications on a network originate at a source, and are sent to a
destination.
• The information sent on a network is referred to as data or data packets. If
one computer (host A) wants to send data to another computer (host B), the
data must first be packaged through a process called encapsulation.
Detailed encapsulation process
Networks must perform the following five conversion steps in order to
encapsulate data:
1. Build the data.
2. Package the data for end-to-end transport.
3. Add the network IP address to the header.
4. Add the data link layer header and trailer.
5. Convert to bits for transmission.
TCP/IP model
• Unlike the proprietary networking technologies mentioned earlier, TCP/IP
was developed as an open standard.
• This meant that anyone was free to use TCP/IP. This helped speed up the
development of TCP/IP as a standard.
• Although some of the layers in the TCP/IP model have the same name as
layers in the OSI model, the layers of the two models do not correspond
exactly.
TCP/IP model
Some of the common protocols specified by the TCP/IP reference model layers. Some of the most
commonly used application layer protocols include the following:
• File Transfer Protocol (FTP)
• Hypertext Transfer Protocol (HTTP)
• Simple Mail Transfer Protocol (SMTP)
• Domain Name System (DNS)
• Trivial File Transfer Protocol (TFTP)
The common transport layer
protocols include:
• Transport Control Protocol (TCP)
• User Datagram Protocol (UDP)
The primary protocol of the
Internet layer is:
• Internet Protocol (IP)
TCP/IP model
Networking professionals differ in their opinions on which model to use. Due to the
nature of the industry it is necessary to become familiar with both. Both the OSI and
TCP/IP models will be referred to throughout the curriculum. The focus will be on the
following:
• TCP as an OSI Layer 4 protocol
• IP as an OSI Layer 3 protocol
• Ethernet as a Layer 2 and Layer 1 technology
Remember that there is a difference between a model and an actual protocol that is used
in networking. The OSI model will be used to describe TCP/IP protocols.
Use Ethereal to capture TCP/IP packets wrapped in an Ethernet frame
SLIP & PPP

Más contenido relacionado

La actualidad más candente

Computer network
Computer networkComputer network
Computer networkKetan Garg
 
Router configuration
Router configurationRouter configuration
Router configurationChoyonBonik
 
Networking Standards And Protocols
Networking Standards And ProtocolsNetworking Standards And Protocols
Networking Standards And ProtocolsSteven Cahill
 
Introduction to computer network
Introduction to computer networkIntroduction to computer network
Introduction to computer networkAshita Agrawal
 
Computer network & communication answer
Computer network & communication answerComputer network & communication answer
Computer network & communication answersmkengkilili2011
 
Troubleshooting Your Network.pptx
Troubleshooting Your Network.pptxTroubleshooting Your Network.pptx
Troubleshooting Your Network.pptxssusere578aa
 
IT2255 Web Essentials - Unit I Website Basics
IT2255 Web Essentials - Unit I  Website BasicsIT2255 Web Essentials - Unit I  Website Basics
IT2255 Web Essentials - Unit I Website Basicspkaviya
 
W-LAN (Wireless Local Area Network)
W-LAN (Wireless Local Area Network)W-LAN (Wireless Local Area Network)
W-LAN (Wireless Local Area Network)Parvesh Taneja
 
Application server
Application serverApplication server
Application servernava rathna
 
E Mail Ppt
E Mail PptE Mail Ppt
E Mail Pptkevpatel
 
Build internet infrastructure LO1
Build internet infrastructure LO1Build internet infrastructure LO1
Build internet infrastructure LO1Abenezer Abiti
 
Basic Understanding about TCP/IP Addressing system
Basic Understanding about TCP/IP Addressing systemBasic Understanding about TCP/IP Addressing system
Basic Understanding about TCP/IP Addressing systemBharathKumarRaju DasaraRaju
 
Peer to Peer vs Client/Server Network By Ahnaf
Peer to Peer vs Client/Server Network By AhnafPeer to Peer vs Client/Server Network By Ahnaf
Peer to Peer vs Client/Server Network By Ahnafahnarokz
 

La actualidad más candente (20)

Computer network
Computer networkComputer network
Computer network
 
Router configuration
Router configurationRouter configuration
Router configuration
 
Networking Standards And Protocols
Networking Standards And ProtocolsNetworking Standards And Protocols
Networking Standards And Protocols
 
Networking devices
Networking devicesNetworking devices
Networking devices
 
Networking devices
Networking devicesNetworking devices
Networking devices
 
Lab 3 internet & www
Lab 3   internet & wwwLab 3   internet & www
Lab 3 internet & www
 
Introduction to computer network
Introduction to computer networkIntroduction to computer network
Introduction to computer network
 
Computer network & communication answer
Computer network & communication answerComputer network & communication answer
Computer network & communication answer
 
Troubleshooting Your Network.pptx
Troubleshooting Your Network.pptxTroubleshooting Your Network.pptx
Troubleshooting Your Network.pptx
 
IT2255 Web Essentials - Unit I Website Basics
IT2255 Web Essentials - Unit I  Website BasicsIT2255 Web Essentials - Unit I  Website Basics
IT2255 Web Essentials - Unit I Website Basics
 
Computer network
Computer networkComputer network
Computer network
 
Mail server
Mail serverMail server
Mail server
 
W-LAN (Wireless Local Area Network)
W-LAN (Wireless Local Area Network)W-LAN (Wireless Local Area Network)
W-LAN (Wireless Local Area Network)
 
Application server
Application serverApplication server
Application server
 
E Mail Ppt
E Mail PptE Mail Ppt
E Mail Ppt
 
Build internet infrastructure LO1
Build internet infrastructure LO1Build internet infrastructure LO1
Build internet infrastructure LO1
 
Software and Networking tools
Software and Networking toolsSoftware and Networking tools
Software and Networking tools
 
Basic Understanding about TCP/IP Addressing system
Basic Understanding about TCP/IP Addressing systemBasic Understanding about TCP/IP Addressing system
Basic Understanding about TCP/IP Addressing system
 
Peer to Peer vs Client/Server Network By Ahnaf
Peer to Peer vs Client/Server Network By AhnafPeer to Peer vs Client/Server Network By Ahnaf
Peer to Peer vs Client/Server Network By Ahnaf
 
Computer networking
Computer networking Computer networking
Computer networking
 

Destacado

NETWORK STANDARD
NETWORK STANDARDNETWORK STANDARD
NETWORK STANDARDKak Yong
 
Networking standards
Networking standardsNetworking standards
Networking standardsOnline
 
types of computer networks, protocols and standards
types of computer networks, protocols and standardstypes of computer networks, protocols and standards
types of computer networks, protocols and standardsMidhun Menon
 
Network standards & protocols
Network standards & protocolsNetwork standards & protocols
Network standards & protocolsJaleel James
 
Network communication standards
Network communication standardsNetwork communication standards
Network communication standardsAdeel Khurram
 
OSI Network model ppt
OSI Network model pptOSI Network model ppt
OSI Network model pptextraganesh
 
Discovering Computers: Chapter 09
Discovering Computers: Chapter 09Discovering Computers: Chapter 09
Discovering Computers: Chapter 09Anna Stirling
 
20 common port numbers and their purposes
20 common port numbers and their purposes 20 common port numbers and their purposes
20 common port numbers and their purposes salamassh
 
Math1003 1.11 - Hex to Binary Conversion
Math1003 1.11 - Hex to Binary ConversionMath1003 1.11 - Hex to Binary Conversion
Math1003 1.11 - Hex to Binary Conversiongcmath1003
 
Day 2 IP ROUTING
Day 2 IP ROUTINGDay 2 IP ROUTING
Day 2 IP ROUTINGanilinvns
 
Cisco Router Security
Cisco Router SecurityCisco Router Security
Cisco Router Securitykktamang
 
Day 1 INTRODUCTION TO IOS AND CISCO ROUTERS
Day 1 INTRODUCTION TO IOS AND CISCO ROUTERSDay 1 INTRODUCTION TO IOS AND CISCO ROUTERS
Day 1 INTRODUCTION TO IOS AND CISCO ROUTERSanilinvns
 
Ethernet protocol
Ethernet protocolEthernet protocol
Ethernet protocolTom Chou
 
Address resolution protocol and internet control message protocol
Address resolution protocol and internet control message protocolAddress resolution protocol and internet control message protocol
Address resolution protocol and internet control message protocolasimnawaz54
 
Address resolution protocol (ARP)
Address resolution protocol (ARP)Address resolution protocol (ARP)
Address resolution protocol (ARP)NetProtocol Xpert
 

Destacado (20)

NETWORK STANDARD
NETWORK STANDARDNETWORK STANDARD
NETWORK STANDARD
 
Networking standards
Networking standardsNetworking standards
Networking standards
 
types of computer networks, protocols and standards
types of computer networks, protocols and standardstypes of computer networks, protocols and standards
types of computer networks, protocols and standards
 
Network standards & protocols
Network standards & protocolsNetwork standards & protocols
Network standards & protocols
 
Network communication standards
Network communication standardsNetwork communication standards
Network communication standards
 
OSI Network model ppt
OSI Network model pptOSI Network model ppt
OSI Network model ppt
 
Discovering Computers: Chapter 09
Discovering Computers: Chapter 09Discovering Computers: Chapter 09
Discovering Computers: Chapter 09
 
20 common port numbers and their purposes
20 common port numbers and their purposes 20 common port numbers and their purposes
20 common port numbers and their purposes
 
Math1003 1.11 - Hex to Binary Conversion
Math1003 1.11 - Hex to Binary ConversionMath1003 1.11 - Hex to Binary Conversion
Math1003 1.11 - Hex to Binary Conversion
 
ARP
ARPARP
ARP
 
Day 2 IP ROUTING
Day 2 IP ROUTINGDay 2 IP ROUTING
Day 2 IP ROUTING
 
Cisco Router Security
Cisco Router SecurityCisco Router Security
Cisco Router Security
 
Day 1 INTRODUCTION TO IOS AND CISCO ROUTERS
Day 1 INTRODUCTION TO IOS AND CISCO ROUTERSDay 1 INTRODUCTION TO IOS AND CISCO ROUTERS
Day 1 INTRODUCTION TO IOS AND CISCO ROUTERS
 
Ethernet protocol
Ethernet protocolEthernet protocol
Ethernet protocol
 
Address resolution protocol and internet control message protocol
Address resolution protocol and internet control message protocolAddress resolution protocol and internet control message protocol
Address resolution protocol and internet control message protocol
 
Address resolution protocol (ARP)
Address resolution protocol (ARP)Address resolution protocol (ARP)
Address resolution protocol (ARP)
 
Transport layer
Transport layerTransport layer
Transport layer
 
Router commands
Router commandsRouter commands
Router commands
 
Arp
ArpArp
Arp
 
Network Protocol and TCP/IP
Network Protocol and TCP/IPNetwork Protocol and TCP/IP
Network Protocol and TCP/IP
 

Similar a Network standards

unit-1fon (1).pptx
unit-1fon (1).pptxunit-1fon (1).pptx
unit-1fon (1).pptxDeepVala5
 
06 - OSI Model.ppt
06 - OSI Model.ppt06 - OSI Model.ppt
06 - OSI Model.pptssuserf7cd2b
 
06 - OSI Model.ppt
06 - OSI Model.ppt06 - OSI Model.ppt
06 - OSI Model.pptssuserf7cd2b
 
CN-OSI-TCP-Models-001.pdf
CN-OSI-TCP-Models-001.pdfCN-OSI-TCP-Models-001.pdf
CN-OSI-TCP-Models-001.pdfskknowledge
 
DCN notes adi
DCN notes adiDCN notes adi
DCN notes adiAdiseshaK
 
7 Layers OSI model description with 3 unofficial Layers.
7 Layers OSI model description with 3 unofficial Layers.7 Layers OSI model description with 3 unofficial Layers.
7 Layers OSI model description with 3 unofficial Layers.Kanishk Raj
 
IT-NET GROUP 3 REPORT.pptx
IT-NET GROUP 3 REPORT.pptxIT-NET GROUP 3 REPORT.pptx
IT-NET GROUP 3 REPORT.pptxEdJulleza
 
Osi reference model
Osi reference modelOsi reference model
Osi reference modelSagar Gor
 
osireferencemodel-170703104058 (1).pdf
osireferencemodel-170703104058 (1).pdfosireferencemodel-170703104058 (1).pdf
osireferencemodel-170703104058 (1).pdfFira253524
 
006 Osi Model
006 Osi Model006 Osi Model
006 Osi ModelBELKA08
 
Routers BY RAJIT(9816115641)
Routers BY RAJIT(9816115641)Routers BY RAJIT(9816115641)
Routers BY RAJIT(9816115641)C.U
 
Unit 2 ppt-idc
Unit 2 ppt-idcUnit 2 ppt-idc
Unit 2 ppt-idchiya123jes
 

Similar a Network standards (20)

OSI &TCP/IP Model
OSI &TCP/IP ModelOSI &TCP/IP Model
OSI &TCP/IP Model
 
unit-1fon (1).pptx
unit-1fon (1).pptxunit-1fon (1).pptx
unit-1fon (1).pptx
 
Wp simoneau osi_model
Wp simoneau osi_modelWp simoneau osi_model
Wp simoneau osi_model
 
06 - OSI Model.ppt
06 - OSI Model.ppt06 - OSI Model.ppt
06 - OSI Model.ppt
 
06 - OSI Model.ppt
06 - OSI Model.ppt06 - OSI Model.ppt
06 - OSI Model.ppt
 
CN-OSI-TCP-Models-001.pdf
CN-OSI-TCP-Models-001.pdfCN-OSI-TCP-Models-001.pdf
CN-OSI-TCP-Models-001.pdf
 
DCN notes adi
DCN notes adiDCN notes adi
DCN notes adi
 
7 Layers OSI model description with 3 unofficial Layers.
7 Layers OSI model description with 3 unofficial Layers.7 Layers OSI model description with 3 unofficial Layers.
7 Layers OSI model description with 3 unofficial Layers.
 
IT-NET GROUP 3 REPORT.pptx
IT-NET GROUP 3 REPORT.pptxIT-NET GROUP 3 REPORT.pptx
IT-NET GROUP 3 REPORT.pptx
 
Networking concepts
Networking conceptsNetworking concepts
Networking concepts
 
Avani
AvaniAvani
Avani
 
OsI reference model
OsI reference modelOsI reference model
OsI reference model
 
Osi reference model
Osi reference modelOsi reference model
Osi reference model
 
Network Protocols
Network ProtocolsNetwork Protocols
Network Protocols
 
osireferencemodel-170703104058 (1).pdf
osireferencemodel-170703104058 (1).pdfosireferencemodel-170703104058 (1).pdf
osireferencemodel-170703104058 (1).pdf
 
Bhargava Presentation.ppt
Bhargava Presentation.pptBhargava Presentation.ppt
Bhargava Presentation.ppt
 
Bhargava Presentation.ppt
Bhargava Presentation.pptBhargava Presentation.ppt
Bhargava Presentation.ppt
 
006 Osi Model
006 Osi Model006 Osi Model
006 Osi Model
 
Routers BY RAJIT(9816115641)
Routers BY RAJIT(9816115641)Routers BY RAJIT(9816115641)
Routers BY RAJIT(9816115641)
 
Unit 2 ppt-idc
Unit 2 ppt-idcUnit 2 ppt-idc
Unit 2 ppt-idc
 

Último

Ransomware_Q4_2023. The report. [EN].pdf
Ransomware_Q4_2023. The report. [EN].pdfRansomware_Q4_2023. The report. [EN].pdf
Ransomware_Q4_2023. The report. [EN].pdfOverkill Security
 
Cloud Frontiers: A Deep Dive into Serverless Spatial Data and FME
Cloud Frontiers:  A Deep Dive into Serverless Spatial Data and FMECloud Frontiers:  A Deep Dive into Serverless Spatial Data and FME
Cloud Frontiers: A Deep Dive into Serverless Spatial Data and FMESafe Software
 
Manulife - Insurer Transformation Award 2024
Manulife - Insurer Transformation Award 2024Manulife - Insurer Transformation Award 2024
Manulife - Insurer Transformation Award 2024The Digital Insurer
 
A Beginners Guide to Building a RAG App Using Open Source Milvus
A Beginners Guide to Building a RAG App Using Open Source MilvusA Beginners Guide to Building a RAG App Using Open Source Milvus
A Beginners Guide to Building a RAG App Using Open Source MilvusZilliz
 
Data Cloud, More than a CDP by Matt Robison
Data Cloud, More than a CDP by Matt RobisonData Cloud, More than a CDP by Matt Robison
Data Cloud, More than a CDP by Matt RobisonAnna Loughnan Colquhoun
 
Apidays New York 2024 - Accelerating FinTech Innovation by Vasa Krishnan, Fin...
Apidays New York 2024 - Accelerating FinTech Innovation by Vasa Krishnan, Fin...Apidays New York 2024 - Accelerating FinTech Innovation by Vasa Krishnan, Fin...
Apidays New York 2024 - Accelerating FinTech Innovation by Vasa Krishnan, Fin...apidays
 
Exploring the Future Potential of AI-Enabled Smartphone Processors
Exploring the Future Potential of AI-Enabled Smartphone ProcessorsExploring the Future Potential of AI-Enabled Smartphone Processors
Exploring the Future Potential of AI-Enabled Smartphone Processorsdebabhi2
 
Automating Google Workspace (GWS) & more with Apps Script
Automating Google Workspace (GWS) & more with Apps ScriptAutomating Google Workspace (GWS) & more with Apps Script
Automating Google Workspace (GWS) & more with Apps Scriptwesley chun
 
Axa Assurance Maroc - Insurer Innovation Award 2024
Axa Assurance Maroc - Insurer Innovation Award 2024Axa Assurance Maroc - Insurer Innovation Award 2024
Axa Assurance Maroc - Insurer Innovation Award 2024The Digital Insurer
 
TrustArc Webinar - Unlock the Power of AI-Driven Data Discovery
TrustArc Webinar - Unlock the Power of AI-Driven Data DiscoveryTrustArc Webinar - Unlock the Power of AI-Driven Data Discovery
TrustArc Webinar - Unlock the Power of AI-Driven Data DiscoveryTrustArc
 
MINDCTI Revenue Release Quarter One 2024
MINDCTI Revenue Release Quarter One 2024MINDCTI Revenue Release Quarter One 2024
MINDCTI Revenue Release Quarter One 2024MIND CTI
 
TrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
TrustArc Webinar - Stay Ahead of US State Data Privacy Law DevelopmentsTrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
TrustArc Webinar - Stay Ahead of US State Data Privacy Law DevelopmentsTrustArc
 
AXA XL - Insurer Innovation Award Americas 2024
AXA XL - Insurer Innovation Award Americas 2024AXA XL - Insurer Innovation Award Americas 2024
AXA XL - Insurer Innovation Award Americas 2024The Digital Insurer
 
MS Copilot expands with MS Graph connectors
MS Copilot expands with MS Graph connectorsMS Copilot expands with MS Graph connectors
MS Copilot expands with MS Graph connectorsNanddeep Nachan
 
Apidays Singapore 2024 - Modernizing Securities Finance by Madhu Subbu
Apidays Singapore 2024 - Modernizing Securities Finance by Madhu SubbuApidays Singapore 2024 - Modernizing Securities Finance by Madhu Subbu
Apidays Singapore 2024 - Modernizing Securities Finance by Madhu Subbuapidays
 
Emergent Methods: Multi-lingual narrative tracking in the news - real-time ex...
Emergent Methods: Multi-lingual narrative tracking in the news - real-time ex...Emergent Methods: Multi-lingual narrative tracking in the news - real-time ex...
Emergent Methods: Multi-lingual narrative tracking in the news - real-time ex...Zilliz
 
Artificial Intelligence Chap.5 : Uncertainty
Artificial Intelligence Chap.5 : UncertaintyArtificial Intelligence Chap.5 : Uncertainty
Artificial Intelligence Chap.5 : UncertaintyKhushali Kathiriya
 
DBX First Quarter 2024 Investor Presentation
DBX First Quarter 2024 Investor PresentationDBX First Quarter 2024 Investor Presentation
DBX First Quarter 2024 Investor PresentationDropbox
 
Polkadot JAM Slides - Token2049 - By Dr. Gavin Wood
Polkadot JAM Slides - Token2049 - By Dr. Gavin WoodPolkadot JAM Slides - Token2049 - By Dr. Gavin Wood
Polkadot JAM Slides - Token2049 - By Dr. Gavin WoodJuan lago vázquez
 
Repurposing LNG terminals for Hydrogen Ammonia: Feasibility and Cost Saving
Repurposing LNG terminals for Hydrogen Ammonia: Feasibility and Cost SavingRepurposing LNG terminals for Hydrogen Ammonia: Feasibility and Cost Saving
Repurposing LNG terminals for Hydrogen Ammonia: Feasibility and Cost SavingEdi Saputra
 

Último (20)

Ransomware_Q4_2023. The report. [EN].pdf
Ransomware_Q4_2023. The report. [EN].pdfRansomware_Q4_2023. The report. [EN].pdf
Ransomware_Q4_2023. The report. [EN].pdf
 
Cloud Frontiers: A Deep Dive into Serverless Spatial Data and FME
Cloud Frontiers:  A Deep Dive into Serverless Spatial Data and FMECloud Frontiers:  A Deep Dive into Serverless Spatial Data and FME
Cloud Frontiers: A Deep Dive into Serverless Spatial Data and FME
 
Manulife - Insurer Transformation Award 2024
Manulife - Insurer Transformation Award 2024Manulife - Insurer Transformation Award 2024
Manulife - Insurer Transformation Award 2024
 
A Beginners Guide to Building a RAG App Using Open Source Milvus
A Beginners Guide to Building a RAG App Using Open Source MilvusA Beginners Guide to Building a RAG App Using Open Source Milvus
A Beginners Guide to Building a RAG App Using Open Source Milvus
 
Data Cloud, More than a CDP by Matt Robison
Data Cloud, More than a CDP by Matt RobisonData Cloud, More than a CDP by Matt Robison
Data Cloud, More than a CDP by Matt Robison
 
Apidays New York 2024 - Accelerating FinTech Innovation by Vasa Krishnan, Fin...
Apidays New York 2024 - Accelerating FinTech Innovation by Vasa Krishnan, Fin...Apidays New York 2024 - Accelerating FinTech Innovation by Vasa Krishnan, Fin...
Apidays New York 2024 - Accelerating FinTech Innovation by Vasa Krishnan, Fin...
 
Exploring the Future Potential of AI-Enabled Smartphone Processors
Exploring the Future Potential of AI-Enabled Smartphone ProcessorsExploring the Future Potential of AI-Enabled Smartphone Processors
Exploring the Future Potential of AI-Enabled Smartphone Processors
 
Automating Google Workspace (GWS) & more with Apps Script
Automating Google Workspace (GWS) & more with Apps ScriptAutomating Google Workspace (GWS) & more with Apps Script
Automating Google Workspace (GWS) & more with Apps Script
 
Axa Assurance Maroc - Insurer Innovation Award 2024
Axa Assurance Maroc - Insurer Innovation Award 2024Axa Assurance Maroc - Insurer Innovation Award 2024
Axa Assurance Maroc - Insurer Innovation Award 2024
 
TrustArc Webinar - Unlock the Power of AI-Driven Data Discovery
TrustArc Webinar - Unlock the Power of AI-Driven Data DiscoveryTrustArc Webinar - Unlock the Power of AI-Driven Data Discovery
TrustArc Webinar - Unlock the Power of AI-Driven Data Discovery
 
MINDCTI Revenue Release Quarter One 2024
MINDCTI Revenue Release Quarter One 2024MINDCTI Revenue Release Quarter One 2024
MINDCTI Revenue Release Quarter One 2024
 
TrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
TrustArc Webinar - Stay Ahead of US State Data Privacy Law DevelopmentsTrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
TrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
 
AXA XL - Insurer Innovation Award Americas 2024
AXA XL - Insurer Innovation Award Americas 2024AXA XL - Insurer Innovation Award Americas 2024
AXA XL - Insurer Innovation Award Americas 2024
 
MS Copilot expands with MS Graph connectors
MS Copilot expands with MS Graph connectorsMS Copilot expands with MS Graph connectors
MS Copilot expands with MS Graph connectors
 
Apidays Singapore 2024 - Modernizing Securities Finance by Madhu Subbu
Apidays Singapore 2024 - Modernizing Securities Finance by Madhu SubbuApidays Singapore 2024 - Modernizing Securities Finance by Madhu Subbu
Apidays Singapore 2024 - Modernizing Securities Finance by Madhu Subbu
 
Emergent Methods: Multi-lingual narrative tracking in the news - real-time ex...
Emergent Methods: Multi-lingual narrative tracking in the news - real-time ex...Emergent Methods: Multi-lingual narrative tracking in the news - real-time ex...
Emergent Methods: Multi-lingual narrative tracking in the news - real-time ex...
 
Artificial Intelligence Chap.5 : Uncertainty
Artificial Intelligence Chap.5 : UncertaintyArtificial Intelligence Chap.5 : Uncertainty
Artificial Intelligence Chap.5 : Uncertainty
 
DBX First Quarter 2024 Investor Presentation
DBX First Quarter 2024 Investor PresentationDBX First Quarter 2024 Investor Presentation
DBX First Quarter 2024 Investor Presentation
 
Polkadot JAM Slides - Token2049 - By Dr. Gavin Wood
Polkadot JAM Slides - Token2049 - By Dr. Gavin WoodPolkadot JAM Slides - Token2049 - By Dr. Gavin Wood
Polkadot JAM Slides - Token2049 - By Dr. Gavin Wood
 
Repurposing LNG terminals for Hydrogen Ammonia: Feasibility and Cost Saving
Repurposing LNG terminals for Hydrogen Ammonia: Feasibility and Cost SavingRepurposing LNG terminals for Hydrogen Ammonia: Feasibility and Cost Saving
Repurposing LNG terminals for Hydrogen Ammonia: Feasibility and Cost Saving
 

Network standards

  • 2. De facto, de jurie Standards • Standards fall into two categories: de facto and de jure. • De facto (Latin for ‘‘from the fact’’) standards are those that have just happened, without any formal plan. HTTP, the protocol on which the Web runs, started life as a de facto standard. It was part of early WWW browsers developed by Tim Berners-Lee at CERN, and its use took off with the growth of the Web. Bluetooth is another ex-ample. It was originally developed by Ericsson but now everyone is using it. • De jure(Latin for ‘‘by law’’) standards, in contrast, are adopted through the rules of some formal standardization body. International standardization authorities are generally divided into two classes: those established by treaty among national governments, and those comprising voluntary, non- treaty organizations. In the area of computer network standards like ISO, IEEE, ASCII.
  • 3. The Seven Layers of the OSI Model International Organization of Standardization ISO
  • 5. 7 Layers 7. Application Layer 6. Presentation Layer 5. Session Layer 4. Transport Layer 3. Network Layer 2. Data Link Layer 1. Physical Layer All People Seem To Need Data Processing
  • 6. Layer7 • The application layer is the OSI layer that is closest to the user; it provides network services to the user’s applications. It differs from the other layers in that it does not provide services to any other OSI layer, but rather, only to applications outside the OSI model. Examples of such applications are spreadsheet programs, word processing programs, and bank terminal programs. If you want to remember Layer 7 in as few words as possible, think of browsers.
  • 7. Application Layer Application layer interacts with application programs and is the highest level of OSI model. Application layer contains management functions to support distributed applications. Examples of application layer are applications such as file transfer, electronic mail, remote login etc.
  • 8. Layer 6 • The presentation layer ensures that the information that the application layer of one system sends out is readable by the application layer of another system. If necessary, the presentation layer translates between multiple data formats by using a common format. If you want to think of Layer 6 in as few words as possible, think of a common data format
  • 9. Presentation Layer Presentation layer defines the format in which the data is to be exchanged between the two communicating entities. Also handles data compression and data encryption (cryptography).
  • 10. Layer 5 • As its name implies, the session layer establishes, manages, and terminates sessions between two communicating hosts. The session layer provides its services to the presentation layer. It also synchronizes dialogue between the two hosts' presentation layers and manages their data exchange. If you want to remember Layer 5 in as few words as possible, think of dialogues and conversations.
  • 11. Session Layer Session layer provides mechanism for controlling the dialogue between the two end systems. It defines how to start, control and end conversations (called sessions) between applications. This layer requests for a logical connection to be established on an end-user’s request. Any necessary log-on or password validation is also handled by this layer. Session layer is also responsible for terminating the connection. This layer provides services like dialogue discipline which can be full duplex or half duplex. Session layer can also provide check-pointing mechanism such that if a failure of some sort occurs between checkpoints, all data can be retransmitted from the last checkpoint.
  • 12. Layer 4 • The transport layer Segments and Sequences data from the sending host's system and reassembles the data into a data stream on the receiving host's system. Layer 4 is the boundary between media-layer protocols and host-layer protocols. Layer 4 also deals with Flow Control through (Windowing) or Window Negotiation. And is responsible for the Reliability of Communication through (Acknowledgements).
  • 13. Transport Layer Purpose of this layer is to provide a reliable mechanism for the exchange of data between two processes in different computers. Ensures that the data units are delivered error free. Ensures that data units are delivered in sequence. Ensures that there is no loss or duplication of data units. Provides connectionless or connection oriented service. Provides for the connection management. Multiplex multiple connection over a single channel.
  • 14. Layer 3 • The network layer is a complex layer that provides connectivity and path selection between two host systems that may be located on geographically separated networks. If you want to remember Layer 3 in as few words as possible, think of path selection, routing, and logical addressing. Routers are layer 3 devices
  • 15. Network Layer Implements routing of frames (packets) through the network. Defines the most optimum path the packet should take from the source to the destination Defines logical addressing so that any endpoint can be identified. Handles congestion in the network. Facilitates interconnection between heterogeneous networks (Internetworking). The network layer also defines how to fragment a packet into smaller packets to accommodate different media.
  • 16. Layer 2 • The data link layer provides reliable transit of data across a physical link. In so doing, the data link layer is concerned with physical addressing, network topology, network access, error notification, ordered delivery of frames. If you want to remember Layer 2 in as few words as possible, think of physical addressing, and topologies Switches, Bridges, and NICs are layer 2 devices
  • 17. Data Link Layer Data link layer attempts to provide reliable communication over the physical layer interface. Breaks the outgoing data into frames and reassemble the received frames. Create and detect frame boundaries. Handle errors by implementing an acknowledgement and retransmission scheme. Implement flow control. Supports points-to-point as well as broadcast communication. Supports simplex, half-duplex or full-duplex communication.
  • 18. Layer 1 • The physical layer defines the electrical, mechanical, procedural, and functional specifications for activating, maintaining, and deactivating the physical link between end systems. Such characteristics as voltage levels, timing of voltage changes, physical data rates, maximum transmission distances, physical connectors, and other, similar, attributes are defined by physical layer specifications. If you want to remember Layer 1 in as few words as possible, think of signals and media. Hubs, cables, and connectors are layer 1 devices
  • 19. Physical Layer Provides physical interface for transmission of information. Defines rules by which bits are passed from one system to another on a physical communication medium. Covers all - mechanical, electrical, functional and procedural - aspects for physical communication. Such characteristics as voltage levels, timing of voltage changes, physical data rates, maximum transmission distances, physical connectors, and other similar attributes are defined by physical layer specifications.
  • 20. Summary of the OSI Model Layer Description
  • 21. Encapsulation: Protocol Data Units (PDU) and Peer to Peer Communication
  • 22. Detailed encapsulation process • All communications on a network originate at a source, and are sent to a destination. • The information sent on a network is referred to as data or data packets. If one computer (host A) wants to send data to another computer (host B), the data must first be packaged through a process called encapsulation.
  • 23. Detailed encapsulation process Networks must perform the following five conversion steps in order to encapsulate data: 1. Build the data. 2. Package the data for end-to-end transport. 3. Add the network IP address to the header. 4. Add the data link layer header and trailer. 5. Convert to bits for transmission.
  • 24. TCP/IP model • Unlike the proprietary networking technologies mentioned earlier, TCP/IP was developed as an open standard. • This meant that anyone was free to use TCP/IP. This helped speed up the development of TCP/IP as a standard. • Although some of the layers in the TCP/IP model have the same name as layers in the OSI model, the layers of the two models do not correspond exactly.
  • 25. TCP/IP model Some of the common protocols specified by the TCP/IP reference model layers. Some of the most commonly used application layer protocols include the following: • File Transfer Protocol (FTP) • Hypertext Transfer Protocol (HTTP) • Simple Mail Transfer Protocol (SMTP) • Domain Name System (DNS) • Trivial File Transfer Protocol (TFTP) The common transport layer protocols include: • Transport Control Protocol (TCP) • User Datagram Protocol (UDP) The primary protocol of the Internet layer is: • Internet Protocol (IP)
  • 26. TCP/IP model Networking professionals differ in their opinions on which model to use. Due to the nature of the industry it is necessary to become familiar with both. Both the OSI and TCP/IP models will be referred to throughout the curriculum. The focus will be on the following: • TCP as an OSI Layer 4 protocol • IP as an OSI Layer 3 protocol • Ethernet as a Layer 2 and Layer 1 technology Remember that there is a difference between a model and an actual protocol that is used in networking. The OSI model will be used to describe TCP/IP protocols. Use Ethereal to capture TCP/IP packets wrapped in an Ethernet frame