SlideShare una empresa de Scribd logo
1 de 44
1
Kyung Hee
University
2.2 THE OSI MODEL
Established in 1947, the International Standards
Organization (ISO) is a multinational body dedicated to
worldwide agreement on international standards. An ISO
standard that covers all aspects of network communications is
the Open Systems Interconnection (OSI) model. It was first
introduced in the late 1970s.
Layered Architecture
Peer-to-Peer Processes
Encapsulation
Topics discussed in this section:
ISO is the organization.
OSI is the model.
2
Kyung Hee
University
Layered Architecture
 The OSI model is composed of seven layers ;
Physical (layer1), Data link (layer2), Network (layer3)
Transport (layer4), Session (layer5), Presentation (layer6)
Application (layer7)
 Layer
 Designer identified which networking functions had related
uses and collected those functions into discrete groups that
became the layers.
The OSI model allows complete interoperability between
otherwise incompatible systems.
The Each layer uses the services of the layer immediately
below it.
3
Kyung Hee
University
Figure 2.2 Seven layers of the OSI model
Layered Architecture (cont’d)
4
Kyung Hee
University
Peer-to-peer Processes
 Layer x on one machine communicates with layer x on
another machine - called Peer-to-Peer Processes.
 Interfaces between Layers
Each interface defines what information and services a layer
must provide for the layer above it.
Well defined interfaces and layer functions provide modularity
to a network
 Organizations of the layers
 Network support layers : Layers 1, 2, 3
 User support layer : Layer 5, 6, 7
 It allows interoperability among unrelated software systems
 Transport layer (Layer 4) : links the two subgroups
5
Kyung Hee
University
Figure 2.3 The interaction between layers in the OSI model
Peer-to-peer Processes (cont’d)
6
Kyung Hee
University
Figure 2.4 An exchange using the OSI model
 The data portion of a packet at level N-1 carries the whole packet
from level N. – The concept is called encapsulation.
Peer-to-peer Processes (cont’d)
7
Kyung Hee
University
2.3 LAYERS IN THE OSI MODEL
In this section we briefly describe the functions of each layer
in the OSI model.
Physical Layer
Data Link Layer
Network Layer
Transport Layer
Session Layer
Presentation Layer
Application Layer
Topics discussed in this section:
8
Kyung Hee
University
Physical Layer
 Physical layer coordinates the functions required to
transmit a bit stream over a physical medium.
 The physical layer is responsible for movements of
individual bits from one hop (node) to the next.
9
Kyung Hee
University
Physical Layer
 Physical layer is concerned with the following:
(deal with the mechanical and electrical specification of
the primary connections: cable, connector)
 Physical characteristics of interfaces and medium
 Representation of bits
 Data rate : transmission rate
 Synchronization of bits
 Line configuration
 Physical topology
 Transmission mode
10
Kyung Hee
University
Data Link Layer
 The data link layer is responsible for moving
frames from one hop (node) to the next.
11
Kyung Hee
University
Data Link Layer
 Major duties
 Framing
 Physical addressing
 Flow control
 Error control
 Access control
12
Kyung Hee
University
Data Link Layer
 Hop-to-hop (node-to-node) delivery
13
Kyung Hee
University
Network Layer
 The network layer is responsible for the delivery of
individual packets from the source host to the destination
host.
14
Kyung Hee
University
Network Layer
 Logical addressing
 Routing
15
Kyung Hee
University
Transport Layer
 The transport layer is responsible for the delivery
of a message from one process to another.
16
Kyung Hee
University
Transport Layer
Figure 2.11 Reliable process-to-process delivery of a message
17
Kyung Hee
University
Transport Layer
 Service port addressing
 Segmentation and reassembly
 Connection control
 Flow control
 Error control
18
Kyung Hee
University
Session Layer
 The session layer is responsible for dialog control and
synchronization.
19
Kyung Hee
University
Presentation Layer
 The presentation layer is responsible for translation,
compression, and encryption
20
Kyung Hee
University
Application Layer
 The application layer is responsible for providing
services to the user.
21
Kyung Hee
University
Application Layer
 The major duties of the application
 Network virtual terminal
 File transfer, access, and management
 Mail services
 Directory services
22
Kyung Hee
University
Figure 2.15 Summary of layers
Summary of Layers
23
Kyung Hee
University
2.4 TCP/IP PROTOCOL SUITE
The layers in the TCP/IP protocol suite do not exactly
match those in the OSI model. The original TCP/IP protocol
suite was defined as having four layers: host-to-network,
internet, transport, and application. However, when TCP/IP
is compared to OSI, we can say that the TCP/IP protocol
suite is made of five layers: physical, data link, network,
transport, and application.
Physical and Data Link Layers
Network Layer
Transport Layer
Application Layer
Topics discussed in this section:
24
Kyung Hee
University
Figure 2.16 TCP/IP and OSI model
TCP/IP Protocol Suite
25
Kyung Hee
University
Physical and Data Link Layers
 At the physical and data link layers, TCP/IP does not
define any specific protocol.
 It supports all the standard and proprietary protocols.
 A network in a TCP/IP internetwork can be a local-area
network or a wide-area network.
26
Kyung Hee
University
Network Layer
 TCP/IP supports the Internetworking Protocol.
 IP uses four supporting protocols : ARP, RARP, ICMP,
and IGMP.
 IP (Internetworking Protocol)
 ARP (Address Resolution Protocol)
 RARP (Reverse Address Resolution Protocol)
 ICMP (Internet Control Message Protocol)
 IGMP (Internet Group Message Protocol)
27
Kyung Hee
University
Transport Layer
 The transport layer was represented in TCP/IP by two
protocols : TCP and UDP.
IP is a host-to-host protocol
TCP and UDP are transport level protocols
responsible for delivery of a message from a
process to another process.
 UDP (User Datagram Protocol)
 TCP (Transmission Control Protocol)
 SCTP (Stream Control Transmission Protocol)
28
Kyung Hee
University
Application Layer
 The application layer in TCP/IP is equivalent to the
combined session, presentation, and application layers
in the OSI model.
 Many protocols are defined at this layer.
29
Kyung Hee
University
Question?
30
Kyung Hee
University
2-5 ADDRESSING
Four levels of addresses are used in an internet employing the
TCP/IP protocols: physical, logical, port, and specific.
Physical Addresses
Logical Addresses
Port Addresses
Specific Addresses
Topics discussed in this section:
31
Kyung Hee
University
Figure 2.17 Addresses in TCP/IP
Addresses
32
Kyung Hee
University
Figure 2.18 Relationship of layers and addresses in TCP/IP
Addresses (cont’d)
33
Kyung Hee
University
Physical Addresses
 The physical address, also known as the link address,
is the address of a node as defined by its LAN or WAN.
 It is included in the frame used by the data link layer.
The physical addresses have authority over the network (LAN
or WAN).
The size and format of these addresses vary depending on the
network.
34
Kyung Hee
University
In Figure 2.19 a node with physical address 10 sends a frame
to a node with physical address 87. The two nodes are
connected by a link (bus topology LAN). As the figure shows,
the computer with physical address 10 is the sender, and the
computer with physical address 87 is the receiver.
Example 2.1
Physical Addresses (cont’d)
35
Kyung Hee
University
Figure 2.19 Physical addresses
Physical Addresses (cont’d)
36
Kyung Hee
University
As we will see in Chapter 13, most local-area networks use
a 48-bit (6-byte) physical address written as 12 hexadecimal
digits; every byte (2 hexadecimal digits) is separated by a
colon, as shown below:
Example 2.2
07:01:02:01:2C:4B
A 6-byte (12 hexadecimal digits) physical address.
Physical Addresses (cont’d)
37
Kyung Hee
University
Logical Addresses
 Logical addresses are necessary for universal
communications that are independent of underlying
physical networks.
 Physical addresses are not adequate in an internetwork
environment where different networks can have different
address formats.
 A universal addressing system is needed in which host can be
identified uniquely, regardless of the underlying physical
network.
38
Kyung Hee
University
Figure 2.20 shows a part of an internet with two routers
connecting three LANs. Each device (computer or router)
has a pair of addresses (logical and physical) for each
connection. In this case, each computer is connected to only
one link and therefore has only one pair of addresses. Each
router, however, is connected to three networks (only two
are shown in the figure). So each router has three pairs of
addresses, one for each connection.
Example 2.3
Logical Addresses (cont’d)
39
Kyung Hee
University
Figure 2.20 IP addresses
The physical addresses will change from hop to hop,
but the logical addresses usually remain the same.
Logical Addresses (cont’d)
40
Kyung Hee
University
Port Addresses
 The IP and the physical address are necessary for a
quantity of data to travel from a source to the
destination host.
The end object of Internet communication is a process
communicating with another process.
For these processes to receive data simultaneously, we
need a method to label assigned to a process is called
a port address.
A port address in TCP/IP is 16 bits in length.
41
Kyung Hee
University
Figure 2.21 shows two computers communicating via the
Internet. The sending computer is running three processes
at this time with port addresses a, b, and c. The receiving
computer is running two processes at this time with port
addresses j and k. Process a in the sending computer needs
to communicate with process j in the receiving computer.
Note that although physical addresses change from hop to
hop, logical and port addresses remain the same from the
source to destination.
Example 2.4
Port Addresses (cont’d)
42
Kyung Hee
University
Figure 2.21 Port addresses
The physical addresses will change from hop to hop,
but the logical and port addresses usually remain the same.
Port Addresses (cont’d)
43
Kyung Hee
University
Example 2.5
As we will see in Chapter 23, a port address is a 16-bit
address represented by one decimal number as shown.
753
A 16-bit port address represented
as one single number.
Port Addresses (cont’d)
44
Kyung Hee
University
Specific Addresses
 Some applications have user-friendly addresses that
are designed for that specific address.
 E-mail address
 URL (Universal Resource Locator)

Más contenido relacionado

La actualidad más candente

Multiple Access in wireless communication
Multiple Access in wireless communicationMultiple Access in wireless communication
Multiple Access in wireless communicationMaulik Togadiya
 
WIRELESS TRANSMISSION
WIRELESS TRANSMISSIONWIRELESS TRANSMISSION
WIRELESS TRANSMISSIONjunnubabu
 
Routing Information Protocol
Routing Information ProtocolRouting Information Protocol
Routing Information ProtocolKashif Latif
 
Lec 1 introduction to wireless communication(1)
Lec 1   introduction to wireless communication(1)Lec 1   introduction to wireless communication(1)
Lec 1 introduction to wireless communication(1)Ravi Patel
 
Digital Video Broadcasting (DVB)
Digital Video Broadcasting (DVB)Digital Video Broadcasting (DVB)
Digital Video Broadcasting (DVB)Anees Akhtar
 
Frequency Division Multiple Access (FDMA)
Frequency Division Multiple Access (FDMA)Frequency Division Multiple Access (FDMA)
Frequency Division Multiple Access (FDMA)Miles Kevin Galario
 
Carrier Sense Multiple Access (CSMA)
Carrier Sense Multiple Access (CSMA)Carrier Sense Multiple Access (CSMA)
Carrier Sense Multiple Access (CSMA)Mohammed Abuibaid
 
TCP protocol flow control
TCP protocol flow control TCP protocol flow control
TCP protocol flow control anuragjagetiya
 
Mimo communication System
Mimo communication SystemMimo communication System
Mimo communication SystemVinod Prajapat
 
OSI reference model
OSI reference modelOSI reference model
OSI reference modelIshan Udyoga
 
Novel microstrip patch antenna for WLAN and Wi-MAX applications
Novel microstrip patch antenna for WLAN and Wi-MAX applicationsNovel microstrip patch antenna for WLAN and Wi-MAX applications
Novel microstrip patch antenna for WLAN and Wi-MAX applicationsMonodip Singha Roy
 
Chapter03 -- transmission basics and networking media
Chapter03  -- transmission basics and networking mediaChapter03  -- transmission basics and networking media
Chapter03 -- transmission basics and networking mediaRaja Waseem Akhtar
 

La actualidad más candente (20)

Multiple Access in wireless communication
Multiple Access in wireless communicationMultiple Access in wireless communication
Multiple Access in wireless communication
 
Icmp V4 And Icmp V6
Icmp V4 And Icmp V6Icmp V4 And Icmp V6
Icmp V4 And Icmp V6
 
TDMA
TDMATDMA
TDMA
 
WIRELESS TRANSMISSION
WIRELESS TRANSMISSIONWIRELESS TRANSMISSION
WIRELESS TRANSMISSION
 
Routing Information Protocol
Routing Information ProtocolRouting Information Protocol
Routing Information Protocol
 
Lec 1 introduction to wireless communication(1)
Lec 1   introduction to wireless communication(1)Lec 1   introduction to wireless communication(1)
Lec 1 introduction to wireless communication(1)
 
Digital Video Broadcasting (DVB)
Digital Video Broadcasting (DVB)Digital Video Broadcasting (DVB)
Digital Video Broadcasting (DVB)
 
Frequency Division Multiple Access (FDMA)
Frequency Division Multiple Access (FDMA)Frequency Division Multiple Access (FDMA)
Frequency Division Multiple Access (FDMA)
 
Computer network
Computer networkComputer network
Computer network
 
Carrier Sense Multiple Access (CSMA)
Carrier Sense Multiple Access (CSMA)Carrier Sense Multiple Access (CSMA)
Carrier Sense Multiple Access (CSMA)
 
Csc341 – Lecture 1 network management
Csc341 – Lecture 1 network managementCsc341 – Lecture 1 network management
Csc341 – Lecture 1 network management
 
TCP protocol flow control
TCP protocol flow control TCP protocol flow control
TCP protocol flow control
 
Unit 4 - Network Layer
Unit 4 - Network LayerUnit 4 - Network Layer
Unit 4 - Network Layer
 
Mimo communication System
Mimo communication SystemMimo communication System
Mimo communication System
 
OSI reference model
OSI reference modelOSI reference model
OSI reference model
 
EIA / TIA IS-136 Digital Cellular System
EIA / TIA IS-136 Digital Cellular SystemEIA / TIA IS-136 Digital Cellular System
EIA / TIA IS-136 Digital Cellular System
 
Novel microstrip patch antenna for WLAN and Wi-MAX applications
Novel microstrip patch antenna for WLAN and Wi-MAX applicationsNovel microstrip patch antenna for WLAN and Wi-MAX applications
Novel microstrip patch antenna for WLAN and Wi-MAX applications
 
Chapter03 -- transmission basics and networking media
Chapter03  -- transmission basics and networking mediaChapter03  -- transmission basics and networking media
Chapter03 -- transmission basics and networking media
 
Chap 09 icmp
Chap 09 icmpChap 09 icmp
Chap 09 icmp
 
FDDI
FDDIFDDI
FDDI
 

Similar a Lecture 05 OSI Model and IP Protocol Suite.ppt

Similar a Lecture 05 OSI Model and IP Protocol Suite.ppt (20)

Chapter-2.pdf
Chapter-2.pdfChapter-2.pdf
Chapter-2.pdf
 
1b network models
1b network models1b network models
1b network models
 
Cs8591 Computer Networks
Cs8591 Computer NetworksCs8591 Computer Networks
Cs8591 Computer Networks
 
Lecture 1.ppt
Lecture 1.pptLecture 1.ppt
Lecture 1.ppt
 
Unit 1 network models & typical examples(part a)
Unit 1 network models & typical examples(part a)Unit 1 network models & typical examples(part a)
Unit 1 network models & typical examples(part a)
 
Ch2
Ch2Ch2
Ch2
 
Chapter 2
Chapter 2Chapter 2
Chapter 2
 
Chapter 2 - Network Models
Chapter 2 - Network ModelsChapter 2 - Network Models
Chapter 2 - Network Models
 
1
11
1
 
Ch02
Ch02Ch02
Ch02
 
Network Models in Networking.
Network Models in Networking.Network Models in Networking.
Network Models in Networking.
 
1
11
1
 
02 Network Models
02 Network Models02 Network Models
02 Network Models
 
Osi model 7 Layers
Osi model 7 LayersOsi model 7 Layers
Osi model 7 Layers
 
chapter 4.pptx
chapter 4.pptxchapter 4.pptx
chapter 4.pptx
 
Lecture 1 osi model
Lecture 1 osi modelLecture 1 osi model
Lecture 1 osi model
 
Ch2 v1
Ch2 v1Ch2 v1
Ch2 v1
 
Data Communication And Networking - Network Models
Data Communication And Networking - Network ModelsData Communication And Networking - Network Models
Data Communication And Networking - Network Models
 
Osi , tcp/ip protocol and Addressing
Osi , tcp/ip protocol and Addressing Osi , tcp/ip protocol and Addressing
Osi , tcp/ip protocol and Addressing
 
Osi model34
Osi model34Osi model34
Osi model34
 

Más de HanzlaNaveed1

Lecture 25 Link Layer - Error detection and Multiple Access.pptx
Lecture 25 Link Layer - Error detection and Multiple Access.pptxLecture 25 Link Layer - Error detection and Multiple Access.pptx
Lecture 25 Link Layer - Error detection and Multiple Access.pptxHanzlaNaveed1
 
Lecture 23 DHCP and NAT.pptx
Lecture 23 DHCP and NAT.pptxLecture 23 DHCP and NAT.pptx
Lecture 23 DHCP and NAT.pptxHanzlaNaveed1
 
Lecture 22 What inside the Router.pptx
Lecture 22 What inside the Router.pptxLecture 22 What inside the Router.pptx
Lecture 22 What inside the Router.pptxHanzlaNaveed1
 
Lecture-3 Relational Algebra I.pptx
Lecture-3 Relational Algebra I.pptxLecture-3 Relational Algebra I.pptx
Lecture-3 Relational Algebra I.pptxHanzlaNaveed1
 
Lecture-2 - Relational Model.pptx
Lecture-2 - Relational Model.pptxLecture-2 - Relational Model.pptx
Lecture-2 - Relational Model.pptxHanzlaNaveed1
 
Lecture 06 and 07.pptx
Lecture 06 and 07.pptxLecture 06 and 07.pptx
Lecture 06 and 07.pptxHanzlaNaveed1
 
Lecture 26 Link Layer .pptx
Lecture 26 Link Layer .pptxLecture 26 Link Layer .pptx
Lecture 26 Link Layer .pptxHanzlaNaveed1
 
Lecture 19 and 20 IP Addressing.pptx
Lecture 19 and 20 IP Addressing.pptxLecture 19 and 20 IP Addressing.pptx
Lecture 19 and 20 IP Addressing.pptxHanzlaNaveed1
 

Más de HanzlaNaveed1 (8)

Lecture 25 Link Layer - Error detection and Multiple Access.pptx
Lecture 25 Link Layer - Error detection and Multiple Access.pptxLecture 25 Link Layer - Error detection and Multiple Access.pptx
Lecture 25 Link Layer - Error detection and Multiple Access.pptx
 
Lecture 23 DHCP and NAT.pptx
Lecture 23 DHCP and NAT.pptxLecture 23 DHCP and NAT.pptx
Lecture 23 DHCP and NAT.pptx
 
Lecture 22 What inside the Router.pptx
Lecture 22 What inside the Router.pptxLecture 22 What inside the Router.pptx
Lecture 22 What inside the Router.pptx
 
Lecture-3 Relational Algebra I.pptx
Lecture-3 Relational Algebra I.pptxLecture-3 Relational Algebra I.pptx
Lecture-3 Relational Algebra I.pptx
 
Lecture-2 - Relational Model.pptx
Lecture-2 - Relational Model.pptxLecture-2 - Relational Model.pptx
Lecture-2 - Relational Model.pptx
 
Lecture 06 and 07.pptx
Lecture 06 and 07.pptxLecture 06 and 07.pptx
Lecture 06 and 07.pptx
 
Lecture 26 Link Layer .pptx
Lecture 26 Link Layer .pptxLecture 26 Link Layer .pptx
Lecture 26 Link Layer .pptx
 
Lecture 19 and 20 IP Addressing.pptx
Lecture 19 and 20 IP Addressing.pptxLecture 19 and 20 IP Addressing.pptx
Lecture 19 and 20 IP Addressing.pptx
 

Último

Understanding the Laravel MVC Architecture
Understanding the Laravel MVC ArchitectureUnderstanding the Laravel MVC Architecture
Understanding the Laravel MVC ArchitecturePixlogix Infotech
 
Swan(sea) Song – personal research during my six years at Swansea ... and bey...
Swan(sea) Song – personal research during my six years at Swansea ... and bey...Swan(sea) Song – personal research during my six years at Swansea ... and bey...
Swan(sea) Song – personal research during my six years at Swansea ... and bey...Alan Dix
 
Pigging Solutions Piggable Sweeping Elbows
Pigging Solutions Piggable Sweeping ElbowsPigging Solutions Piggable Sweeping Elbows
Pigging Solutions Piggable Sweeping ElbowsPigging Solutions
 
Pigging Solutions in Pet Food Manufacturing
Pigging Solutions in Pet Food ManufacturingPigging Solutions in Pet Food Manufacturing
Pigging Solutions in Pet Food ManufacturingPigging Solutions
 
A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)Gabriella Davis
 
Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...
Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...
Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...shyamraj55
 
Integration and Automation in Practice: CI/CD in Mule Integration and Automat...
Integration and Automation in Practice: CI/CD in Mule Integration and Automat...Integration and Automation in Practice: CI/CD in Mule Integration and Automat...
Integration and Automation in Practice: CI/CD in Mule Integration and Automat...Patryk Bandurski
 
How to convert PDF to text with Nanonets
How to convert PDF to text with NanonetsHow to convert PDF to text with Nanonets
How to convert PDF to text with Nanonetsnaman860154
 
#StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
#StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024#StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
#StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024BookNet Canada
 
08448380779 Call Girls In Greater Kailash - I Women Seeking Men
08448380779 Call Girls In Greater Kailash - I Women Seeking Men08448380779 Call Girls In Greater Kailash - I Women Seeking Men
08448380779 Call Girls In Greater Kailash - I Women Seeking MenDelhi Call girls
 
Azure Monitor & Application Insight to monitor Infrastructure & Application
Azure Monitor & Application Insight to monitor Infrastructure & ApplicationAzure Monitor & Application Insight to monitor Infrastructure & Application
Azure Monitor & Application Insight to monitor Infrastructure & ApplicationAndikSusilo4
 
Key Features Of Token Development (1).pptx
Key  Features Of Token  Development (1).pptxKey  Features Of Token  Development (1).pptx
Key Features Of Token Development (1).pptxLBM Solutions
 
Salesforce Community Group Quito, Salesforce 101
Salesforce Community Group Quito, Salesforce 101Salesforce Community Group Quito, Salesforce 101
Salesforce Community Group Quito, Salesforce 101Paola De la Torre
 
[2024]Digital Global Overview Report 2024 Meltwater.pdf
[2024]Digital Global Overview Report 2024 Meltwater.pdf[2024]Digital Global Overview Report 2024 Meltwater.pdf
[2024]Digital Global Overview Report 2024 Meltwater.pdfhans926745
 
The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024Rafal Los
 
Scaling API-first – The story of a global engineering organization
Scaling API-first – The story of a global engineering organizationScaling API-first – The story of a global engineering organization
Scaling API-first – The story of a global engineering organizationRadu Cotescu
 
My Hashitalk Indonesia April 2024 Presentation
My Hashitalk Indonesia April 2024 PresentationMy Hashitalk Indonesia April 2024 Presentation
My Hashitalk Indonesia April 2024 PresentationRidwan Fadjar
 
Transforming Data Streams with Kafka Connect: An Introduction to Single Messa...
Transforming Data Streams with Kafka Connect: An Introduction to Single Messa...Transforming Data Streams with Kafka Connect: An Introduction to Single Messa...
Transforming Data Streams with Kafka Connect: An Introduction to Single Messa...HostedbyConfluent
 
Beyond Boundaries: Leveraging No-Code Solutions for Industry Innovation
Beyond Boundaries: Leveraging No-Code Solutions for Industry InnovationBeyond Boundaries: Leveraging No-Code Solutions for Industry Innovation
Beyond Boundaries: Leveraging No-Code Solutions for Industry InnovationSafe Software
 
IAC 2024 - IA Fast Track to Search Focused AI Solutions
IAC 2024 - IA Fast Track to Search Focused AI SolutionsIAC 2024 - IA Fast Track to Search Focused AI Solutions
IAC 2024 - IA Fast Track to Search Focused AI SolutionsEnterprise Knowledge
 

Último (20)

Understanding the Laravel MVC Architecture
Understanding the Laravel MVC ArchitectureUnderstanding the Laravel MVC Architecture
Understanding the Laravel MVC Architecture
 
Swan(sea) Song – personal research during my six years at Swansea ... and bey...
Swan(sea) Song – personal research during my six years at Swansea ... and bey...Swan(sea) Song – personal research during my six years at Swansea ... and bey...
Swan(sea) Song – personal research during my six years at Swansea ... and bey...
 
Pigging Solutions Piggable Sweeping Elbows
Pigging Solutions Piggable Sweeping ElbowsPigging Solutions Piggable Sweeping Elbows
Pigging Solutions Piggable Sweeping Elbows
 
Pigging Solutions in Pet Food Manufacturing
Pigging Solutions in Pet Food ManufacturingPigging Solutions in Pet Food Manufacturing
Pigging Solutions in Pet Food Manufacturing
 
A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)
 
Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...
Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...
Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...
 
Integration and Automation in Practice: CI/CD in Mule Integration and Automat...
Integration and Automation in Practice: CI/CD in Mule Integration and Automat...Integration and Automation in Practice: CI/CD in Mule Integration and Automat...
Integration and Automation in Practice: CI/CD in Mule Integration and Automat...
 
How to convert PDF to text with Nanonets
How to convert PDF to text with NanonetsHow to convert PDF to text with Nanonets
How to convert PDF to text with Nanonets
 
#StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
#StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024#StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
#StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
 
08448380779 Call Girls In Greater Kailash - I Women Seeking Men
08448380779 Call Girls In Greater Kailash - I Women Seeking Men08448380779 Call Girls In Greater Kailash - I Women Seeking Men
08448380779 Call Girls In Greater Kailash - I Women Seeking Men
 
Azure Monitor & Application Insight to monitor Infrastructure & Application
Azure Monitor & Application Insight to monitor Infrastructure & ApplicationAzure Monitor & Application Insight to monitor Infrastructure & Application
Azure Monitor & Application Insight to monitor Infrastructure & Application
 
Key Features Of Token Development (1).pptx
Key  Features Of Token  Development (1).pptxKey  Features Of Token  Development (1).pptx
Key Features Of Token Development (1).pptx
 
Salesforce Community Group Quito, Salesforce 101
Salesforce Community Group Quito, Salesforce 101Salesforce Community Group Quito, Salesforce 101
Salesforce Community Group Quito, Salesforce 101
 
[2024]Digital Global Overview Report 2024 Meltwater.pdf
[2024]Digital Global Overview Report 2024 Meltwater.pdf[2024]Digital Global Overview Report 2024 Meltwater.pdf
[2024]Digital Global Overview Report 2024 Meltwater.pdf
 
The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024
 
Scaling API-first – The story of a global engineering organization
Scaling API-first – The story of a global engineering organizationScaling API-first – The story of a global engineering organization
Scaling API-first – The story of a global engineering organization
 
My Hashitalk Indonesia April 2024 Presentation
My Hashitalk Indonesia April 2024 PresentationMy Hashitalk Indonesia April 2024 Presentation
My Hashitalk Indonesia April 2024 Presentation
 
Transforming Data Streams with Kafka Connect: An Introduction to Single Messa...
Transforming Data Streams with Kafka Connect: An Introduction to Single Messa...Transforming Data Streams with Kafka Connect: An Introduction to Single Messa...
Transforming Data Streams with Kafka Connect: An Introduction to Single Messa...
 
Beyond Boundaries: Leveraging No-Code Solutions for Industry Innovation
Beyond Boundaries: Leveraging No-Code Solutions for Industry InnovationBeyond Boundaries: Leveraging No-Code Solutions for Industry Innovation
Beyond Boundaries: Leveraging No-Code Solutions for Industry Innovation
 
IAC 2024 - IA Fast Track to Search Focused AI Solutions
IAC 2024 - IA Fast Track to Search Focused AI SolutionsIAC 2024 - IA Fast Track to Search Focused AI Solutions
IAC 2024 - IA Fast Track to Search Focused AI Solutions
 

Lecture 05 OSI Model and IP Protocol Suite.ppt

  • 1. 1 Kyung Hee University 2.2 THE OSI MODEL Established in 1947, the International Standards Organization (ISO) is a multinational body dedicated to worldwide agreement on international standards. An ISO standard that covers all aspects of network communications is the Open Systems Interconnection (OSI) model. It was first introduced in the late 1970s. Layered Architecture Peer-to-Peer Processes Encapsulation Topics discussed in this section: ISO is the organization. OSI is the model.
  • 2. 2 Kyung Hee University Layered Architecture  The OSI model is composed of seven layers ; Physical (layer1), Data link (layer2), Network (layer3) Transport (layer4), Session (layer5), Presentation (layer6) Application (layer7)  Layer  Designer identified which networking functions had related uses and collected those functions into discrete groups that became the layers. The OSI model allows complete interoperability between otherwise incompatible systems. The Each layer uses the services of the layer immediately below it.
  • 3. 3 Kyung Hee University Figure 2.2 Seven layers of the OSI model Layered Architecture (cont’d)
  • 4. 4 Kyung Hee University Peer-to-peer Processes  Layer x on one machine communicates with layer x on another machine - called Peer-to-Peer Processes.  Interfaces between Layers Each interface defines what information and services a layer must provide for the layer above it. Well defined interfaces and layer functions provide modularity to a network  Organizations of the layers  Network support layers : Layers 1, 2, 3  User support layer : Layer 5, 6, 7  It allows interoperability among unrelated software systems  Transport layer (Layer 4) : links the two subgroups
  • 5. 5 Kyung Hee University Figure 2.3 The interaction between layers in the OSI model Peer-to-peer Processes (cont’d)
  • 6. 6 Kyung Hee University Figure 2.4 An exchange using the OSI model  The data portion of a packet at level N-1 carries the whole packet from level N. – The concept is called encapsulation. Peer-to-peer Processes (cont’d)
  • 7. 7 Kyung Hee University 2.3 LAYERS IN THE OSI MODEL In this section we briefly describe the functions of each layer in the OSI model. Physical Layer Data Link Layer Network Layer Transport Layer Session Layer Presentation Layer Application Layer Topics discussed in this section:
  • 8. 8 Kyung Hee University Physical Layer  Physical layer coordinates the functions required to transmit a bit stream over a physical medium.  The physical layer is responsible for movements of individual bits from one hop (node) to the next.
  • 9. 9 Kyung Hee University Physical Layer  Physical layer is concerned with the following: (deal with the mechanical and electrical specification of the primary connections: cable, connector)  Physical characteristics of interfaces and medium  Representation of bits  Data rate : transmission rate  Synchronization of bits  Line configuration  Physical topology  Transmission mode
  • 10. 10 Kyung Hee University Data Link Layer  The data link layer is responsible for moving frames from one hop (node) to the next.
  • 11. 11 Kyung Hee University Data Link Layer  Major duties  Framing  Physical addressing  Flow control  Error control  Access control
  • 12. 12 Kyung Hee University Data Link Layer  Hop-to-hop (node-to-node) delivery
  • 13. 13 Kyung Hee University Network Layer  The network layer is responsible for the delivery of individual packets from the source host to the destination host.
  • 14. 14 Kyung Hee University Network Layer  Logical addressing  Routing
  • 15. 15 Kyung Hee University Transport Layer  The transport layer is responsible for the delivery of a message from one process to another.
  • 16. 16 Kyung Hee University Transport Layer Figure 2.11 Reliable process-to-process delivery of a message
  • 17. 17 Kyung Hee University Transport Layer  Service port addressing  Segmentation and reassembly  Connection control  Flow control  Error control
  • 18. 18 Kyung Hee University Session Layer  The session layer is responsible for dialog control and synchronization.
  • 19. 19 Kyung Hee University Presentation Layer  The presentation layer is responsible for translation, compression, and encryption
  • 20. 20 Kyung Hee University Application Layer  The application layer is responsible for providing services to the user.
  • 21. 21 Kyung Hee University Application Layer  The major duties of the application  Network virtual terminal  File transfer, access, and management  Mail services  Directory services
  • 22. 22 Kyung Hee University Figure 2.15 Summary of layers Summary of Layers
  • 23. 23 Kyung Hee University 2.4 TCP/IP PROTOCOL SUITE The layers in the TCP/IP protocol suite do not exactly match those in the OSI model. The original TCP/IP protocol suite was defined as having four layers: host-to-network, internet, transport, and application. However, when TCP/IP is compared to OSI, we can say that the TCP/IP protocol suite is made of five layers: physical, data link, network, transport, and application. Physical and Data Link Layers Network Layer Transport Layer Application Layer Topics discussed in this section:
  • 24. 24 Kyung Hee University Figure 2.16 TCP/IP and OSI model TCP/IP Protocol Suite
  • 25. 25 Kyung Hee University Physical and Data Link Layers  At the physical and data link layers, TCP/IP does not define any specific protocol.  It supports all the standard and proprietary protocols.  A network in a TCP/IP internetwork can be a local-area network or a wide-area network.
  • 26. 26 Kyung Hee University Network Layer  TCP/IP supports the Internetworking Protocol.  IP uses four supporting protocols : ARP, RARP, ICMP, and IGMP.  IP (Internetworking Protocol)  ARP (Address Resolution Protocol)  RARP (Reverse Address Resolution Protocol)  ICMP (Internet Control Message Protocol)  IGMP (Internet Group Message Protocol)
  • 27. 27 Kyung Hee University Transport Layer  The transport layer was represented in TCP/IP by two protocols : TCP and UDP. IP is a host-to-host protocol TCP and UDP are transport level protocols responsible for delivery of a message from a process to another process.  UDP (User Datagram Protocol)  TCP (Transmission Control Protocol)  SCTP (Stream Control Transmission Protocol)
  • 28. 28 Kyung Hee University Application Layer  The application layer in TCP/IP is equivalent to the combined session, presentation, and application layers in the OSI model.  Many protocols are defined at this layer.
  • 30. 30 Kyung Hee University 2-5 ADDRESSING Four levels of addresses are used in an internet employing the TCP/IP protocols: physical, logical, port, and specific. Physical Addresses Logical Addresses Port Addresses Specific Addresses Topics discussed in this section:
  • 31. 31 Kyung Hee University Figure 2.17 Addresses in TCP/IP Addresses
  • 32. 32 Kyung Hee University Figure 2.18 Relationship of layers and addresses in TCP/IP Addresses (cont’d)
  • 33. 33 Kyung Hee University Physical Addresses  The physical address, also known as the link address, is the address of a node as defined by its LAN or WAN.  It is included in the frame used by the data link layer. The physical addresses have authority over the network (LAN or WAN). The size and format of these addresses vary depending on the network.
  • 34. 34 Kyung Hee University In Figure 2.19 a node with physical address 10 sends a frame to a node with physical address 87. The two nodes are connected by a link (bus topology LAN). As the figure shows, the computer with physical address 10 is the sender, and the computer with physical address 87 is the receiver. Example 2.1 Physical Addresses (cont’d)
  • 35. 35 Kyung Hee University Figure 2.19 Physical addresses Physical Addresses (cont’d)
  • 36. 36 Kyung Hee University As we will see in Chapter 13, most local-area networks use a 48-bit (6-byte) physical address written as 12 hexadecimal digits; every byte (2 hexadecimal digits) is separated by a colon, as shown below: Example 2.2 07:01:02:01:2C:4B A 6-byte (12 hexadecimal digits) physical address. Physical Addresses (cont’d)
  • 37. 37 Kyung Hee University Logical Addresses  Logical addresses are necessary for universal communications that are independent of underlying physical networks.  Physical addresses are not adequate in an internetwork environment where different networks can have different address formats.  A universal addressing system is needed in which host can be identified uniquely, regardless of the underlying physical network.
  • 38. 38 Kyung Hee University Figure 2.20 shows a part of an internet with two routers connecting three LANs. Each device (computer or router) has a pair of addresses (logical and physical) for each connection. In this case, each computer is connected to only one link and therefore has only one pair of addresses. Each router, however, is connected to three networks (only two are shown in the figure). So each router has three pairs of addresses, one for each connection. Example 2.3 Logical Addresses (cont’d)
  • 39. 39 Kyung Hee University Figure 2.20 IP addresses The physical addresses will change from hop to hop, but the logical addresses usually remain the same. Logical Addresses (cont’d)
  • 40. 40 Kyung Hee University Port Addresses  The IP and the physical address are necessary for a quantity of data to travel from a source to the destination host. The end object of Internet communication is a process communicating with another process. For these processes to receive data simultaneously, we need a method to label assigned to a process is called a port address. A port address in TCP/IP is 16 bits in length.
  • 41. 41 Kyung Hee University Figure 2.21 shows two computers communicating via the Internet. The sending computer is running three processes at this time with port addresses a, b, and c. The receiving computer is running two processes at this time with port addresses j and k. Process a in the sending computer needs to communicate with process j in the receiving computer. Note that although physical addresses change from hop to hop, logical and port addresses remain the same from the source to destination. Example 2.4 Port Addresses (cont’d)
  • 42. 42 Kyung Hee University Figure 2.21 Port addresses The physical addresses will change from hop to hop, but the logical and port addresses usually remain the same. Port Addresses (cont’d)
  • 43. 43 Kyung Hee University Example 2.5 As we will see in Chapter 23, a port address is a 16-bit address represented by one decimal number as shown. 753 A 16-bit port address represented as one single number. Port Addresses (cont’d)
  • 44. 44 Kyung Hee University Specific Addresses  Some applications have user-friendly addresses that are designed for that specific address.  E-mail address  URL (Universal Resource Locator)