SlideShare une entreprise Scribd logo
1  sur  44
1
Kyung Hee
University
2.2 THE OSI MODEL
Established in 1947, the International Standards
Organization (ISO) is a multinational body dedicated to
worldwide agreement on international standards. An ISO
standard that covers all aspects of network communications is
the Open Systems Interconnection (OSI) model. It was first
introduced in the late 1970s.
Layered Architecture
Peer-to-Peer Processes
Encapsulation
Topics discussed in this section:
ISO is the organization.
OSI is the model.
2
Kyung Hee
University
Layered Architecture
 The OSI model is composed of seven layers ;
Physical (layer1), Data link (layer2), Network (layer3)
Transport (layer4), Session (layer5), Presentation (layer6)
Application (layer7)
 Layer
 Designer identified which networking functions had related
uses and collected those functions into discrete groups that
became the layers.
The OSI model allows complete interoperability between
otherwise incompatible systems.
The Each layer uses the services of the layer immediately
below it.
3
Kyung Hee
University
Figure 2.2 Seven layers of the OSI model
Layered Architecture (cont’d)
4
Kyung Hee
University
Peer-to-peer Processes
 Layer x on one machine communicates with layer x on
another machine - called Peer-to-Peer Processes.
 Interfaces between Layers
Each interface defines what information and services a layer
must provide for the layer above it.
Well defined interfaces and layer functions provide modularity
to a network
 Organizations of the layers
 Network support layers : Layers 1, 2, 3
 User support layer : Layer 5, 6, 7
 It allows interoperability among unrelated software systems
 Transport layer (Layer 4) : links the two subgroups
5
Kyung Hee
University
Figure 2.3 The interaction between layers in the OSI model
Peer-to-peer Processes (cont’d)
6
Kyung Hee
University
Figure 2.4 An exchange using the OSI model
 The data portion of a packet at level N-1 carries the whole packet
from level N. – The concept is called encapsulation.
Peer-to-peer Processes (cont’d)
7
Kyung Hee
University
2.3 LAYERS IN THE OSI MODEL
In this section we briefly describe the functions of each layer
in the OSI model.
Physical Layer
Data Link Layer
Network Layer
Transport Layer
Session Layer
Presentation Layer
Application Layer
Topics discussed in this section:
8
Kyung Hee
University
Physical Layer
 Physical layer coordinates the functions required to
transmit a bit stream over a physical medium.
 The physical layer is responsible for movements of
individual bits from one hop (node) to the next.
9
Kyung Hee
University
Physical Layer
 Physical layer is concerned with the following:
(deal with the mechanical and electrical specification of
the primary connections: cable, connector)
 Physical characteristics of interfaces and medium
 Representation of bits
 Data rate : transmission rate
 Synchronization of bits
 Line configuration
 Physical topology
 Transmission mode
10
Kyung Hee
University
Data Link Layer
 The data link layer is responsible for moving
frames from one hop (node) to the next.
11
Kyung Hee
University
Data Link Layer
 Major duties
 Framing
 Physical addressing
 Flow control
 Error control
 Access control
12
Kyung Hee
University
Data Link Layer
 Hop-to-hop (node-to-node) delivery
13
Kyung Hee
University
Network Layer
 The network layer is responsible for the delivery of
individual packets from the source host to the destination
host.
14
Kyung Hee
University
Network Layer
 Logical addressing
 Routing
15
Kyung Hee
University
Transport Layer
 The transport layer is responsible for the delivery
of a message from one process to another.
16
Kyung Hee
University
Transport Layer
Figure 2.11 Reliable process-to-process delivery of a message
17
Kyung Hee
University
Transport Layer
 Service port addressing
 Segmentation and reassembly
 Connection control
 Flow control
 Error control
18
Kyung Hee
University
Session Layer
 The session layer is responsible for dialog control and
synchronization.
19
Kyung Hee
University
Presentation Layer
 The presentation layer is responsible for translation,
compression, and encryption
20
Kyung Hee
University
Application Layer
 The application layer is responsible for providing
services to the user.
21
Kyung Hee
University
Application Layer
 The major duties of the application
 Network virtual terminal
 File transfer, access, and management
 Mail services
 Directory services
22
Kyung Hee
University
Figure 2.15 Summary of layers
Summary of Layers
23
Kyung Hee
University
2.4 TCP/IP PROTOCOL SUITE
The layers in the TCP/IP protocol suite do not exactly
match those in the OSI model. The original TCP/IP protocol
suite was defined as having four layers: host-to-network,
internet, transport, and application. However, when TCP/IP
is compared to OSI, we can say that the TCP/IP protocol
suite is made of five layers: physical, data link, network,
transport, and application.
Physical and Data Link Layers
Network Layer
Transport Layer
Application Layer
Topics discussed in this section:
24
Kyung Hee
University
Figure 2.16 TCP/IP and OSI model
TCP/IP Protocol Suite
25
Kyung Hee
University
Physical and Data Link Layers
 At the physical and data link layers, TCP/IP does not
define any specific protocol.
 It supports all the standard and proprietary protocols.
 A network in a TCP/IP internetwork can be a local-area
network or a wide-area network.
26
Kyung Hee
University
Network Layer
 TCP/IP supports the Internetworking Protocol.
 IP uses four supporting protocols : ARP, RARP, ICMP,
and IGMP.
 IP (Internetworking Protocol)
 ARP (Address Resolution Protocol)
 RARP (Reverse Address Resolution Protocol)
 ICMP (Internet Control Message Protocol)
 IGMP (Internet Group Message Protocol)
27
Kyung Hee
University
Transport Layer
 The transport layer was represented in TCP/IP by two
protocols : TCP and UDP.
IP is a host-to-host protocol
TCP and UDP are transport level protocols
responsible for delivery of a message from a
process to another process.
 UDP (User Datagram Protocol)
 TCP (Transmission Control Protocol)
 SCTP (Stream Control Transmission Protocol)
28
Kyung Hee
University
Application Layer
 The application layer in TCP/IP is equivalent to the
combined session, presentation, and application layers
in the OSI model.
 Many protocols are defined at this layer.
29
Kyung Hee
University
Question?
30
Kyung Hee
University
2-5 ADDRESSING
Four levels of addresses are used in an internet employing the
TCP/IP protocols: physical, logical, port, and specific.
Physical Addresses
Logical Addresses
Port Addresses
Specific Addresses
Topics discussed in this section:
31
Kyung Hee
University
Figure 2.17 Addresses in TCP/IP
Addresses
32
Kyung Hee
University
Figure 2.18 Relationship of layers and addresses in TCP/IP
Addresses (cont’d)
33
Kyung Hee
University
Physical Addresses
 The physical address, also known as the link address,
is the address of a node as defined by its LAN or WAN.
 It is included in the frame used by the data link layer.
The physical addresses have authority over the network (LAN
or WAN).
The size and format of these addresses vary depending on the
network.
34
Kyung Hee
University
In Figure 2.19 a node with physical address 10 sends a frame
to a node with physical address 87. The two nodes are
connected by a link (bus topology LAN). As the figure shows,
the computer with physical address 10 is the sender, and the
computer with physical address 87 is the receiver.
Example 2.1
Physical Addresses (cont’d)
35
Kyung Hee
University
Figure 2.19 Physical addresses
Physical Addresses (cont’d)
36
Kyung Hee
University
As we will see in Chapter 13, most local-area networks use
a 48-bit (6-byte) physical address written as 12 hexadecimal
digits; every byte (2 hexadecimal digits) is separated by a
colon, as shown below:
Example 2.2
07:01:02:01:2C:4B
A 6-byte (12 hexadecimal digits) physical address.
Physical Addresses (cont’d)
37
Kyung Hee
University
Logical Addresses
 Logical addresses are necessary for universal
communications that are independent of underlying
physical networks.
 Physical addresses are not adequate in an internetwork
environment where different networks can have different
address formats.
 A universal addressing system is needed in which host can be
identified uniquely, regardless of the underlying physical
network.
38
Kyung Hee
University
Figure 2.20 shows a part of an internet with two routers
connecting three LANs. Each device (computer or router)
has a pair of addresses (logical and physical) for each
connection. In this case, each computer is connected to only
one link and therefore has only one pair of addresses. Each
router, however, is connected to three networks (only two
are shown in the figure). So each router has three pairs of
addresses, one for each connection.
Example 2.3
Logical Addresses (cont’d)
39
Kyung Hee
University
Figure 2.20 IP addresses
The physical addresses will change from hop to hop,
but the logical addresses usually remain the same.
Logical Addresses (cont’d)
40
Kyung Hee
University
Port Addresses
 The IP and the physical address are necessary for a
quantity of data to travel from a source to the
destination host.
The end object of Internet communication is a process
communicating with another process.
For these processes to receive data simultaneously, we
need a method to label assigned to a process is called
a port address.
A port address in TCP/IP is 16 bits in length.
41
Kyung Hee
University
Figure 2.21 shows two computers communicating via the
Internet. The sending computer is running three processes
at this time with port addresses a, b, and c. The receiving
computer is running two processes at this time with port
addresses j and k. Process a in the sending computer needs
to communicate with process j in the receiving computer.
Note that although physical addresses change from hop to
hop, logical and port addresses remain the same from the
source to destination.
Example 2.4
Port Addresses (cont’d)
42
Kyung Hee
University
Figure 2.21 Port addresses
The physical addresses will change from hop to hop,
but the logical and port addresses usually remain the same.
Port Addresses (cont’d)
43
Kyung Hee
University
Example 2.5
As we will see in Chapter 23, a port address is a 16-bit
address represented by one decimal number as shown.
753
A 16-bit port address represented
as one single number.
Port Addresses (cont’d)
44
Kyung Hee
University
Specific Addresses
 Some applications have user-friendly addresses that
are designed for that specific address.
 E-mail address
 URL (Universal Resource Locator)

Contenu connexe

Tendances

The Data Link Layer
The Data Link LayerThe Data Link Layer
The Data Link Layeradil raja
 
Error detection and correction
Error detection and correctionError detection and correction
Error detection and correctionSiddique Ibrahim
 
Chapter 2 - Protocol Architecture, TCP/IP, and Internet-Based Applications 9e
Chapter 2 - Protocol Architecture, TCP/IP, and Internet-Based Applications 9eChapter 2 - Protocol Architecture, TCP/IP, and Internet-Based Applications 9e
Chapter 2 - Protocol Architecture, TCP/IP, and Internet-Based Applications 9eadpeer
 
M.A.C (Medium Access Control)
M.A.C (Medium Access Control)M.A.C (Medium Access Control)
M.A.C (Medium Access Control)JaironLanda
 
middleware in embedded systems
middleware in embedded systemsmiddleware in embedded systems
middleware in embedded systemsAkhil Kumar
 
Security in distributed systems
Security in distributed systems Security in distributed systems
Security in distributed systems Haitham Ahmed
 
Remote procedure call on client server computing
Remote procedure call on client server computingRemote procedure call on client server computing
Remote procedure call on client server computingSatya P. Joshi
 
Address resolution protocol
Address resolution protocolAddress resolution protocol
Address resolution protocolasimnawaz54
 
Error detection in Data Communication System
Error detection in Data Communication SystemError detection in Data Communication System
Error detection in Data Communication SystemIshan Sharma
 
Cyclic Redundancy Check in Computers Network
Cyclic Redundancy Check in Computers Network Cyclic Redundancy Check in Computers Network
Cyclic Redundancy Check in Computers Network ShivangiTak1
 
The Osi Model And Layers
The Osi Model And LayersThe Osi Model And Layers
The Osi Model And LayersKathleenSSmith
 

Tendances (20)

The Data Link Layer
The Data Link LayerThe Data Link Layer
The Data Link Layer
 
Chapter 25
Chapter 25Chapter 25
Chapter 25
 
ARP
ARPARP
ARP
 
Error detection and correction
Error detection and correctionError detection and correction
Error detection and correction
 
Chapter 2 - Protocol Architecture, TCP/IP, and Internet-Based Applications 9e
Chapter 2 - Protocol Architecture, TCP/IP, and Internet-Based Applications 9eChapter 2 - Protocol Architecture, TCP/IP, and Internet-Based Applications 9e
Chapter 2 - Protocol Architecture, TCP/IP, and Internet-Based Applications 9e
 
Presentation on arp protocol
Presentation on arp protocolPresentation on arp protocol
Presentation on arp protocol
 
Chapter 2
Chapter 2Chapter 2
Chapter 2
 
Data link layer
Data link layerData link layer
Data link layer
 
M.A.C (Medium Access Control)
M.A.C (Medium Access Control)M.A.C (Medium Access Control)
M.A.C (Medium Access Control)
 
middleware in embedded systems
middleware in embedded systemsmiddleware in embedded systems
middleware in embedded systems
 
Security in distributed systems
Security in distributed systems Security in distributed systems
Security in distributed systems
 
Transport layer protocol
Transport layer protocolTransport layer protocol
Transport layer protocol
 
Link state routing protocol
Link state routing protocolLink state routing protocol
Link state routing protocol
 
Remote procedure call on client server computing
Remote procedure call on client server computingRemote procedure call on client server computing
Remote procedure call on client server computing
 
Address resolution protocol
Address resolution protocolAddress resolution protocol
Address resolution protocol
 
Error detection in Data Communication System
Error detection in Data Communication SystemError detection in Data Communication System
Error detection in Data Communication System
 
Cyclic Redundancy Check in Computers Network
Cyclic Redundancy Check in Computers Network Cyclic Redundancy Check in Computers Network
Cyclic Redundancy Check in Computers Network
 
TCP/IP Introduction
TCP/IP IntroductionTCP/IP Introduction
TCP/IP Introduction
 
The Osi Model And Layers
The Osi Model And LayersThe Osi Model And Layers
The Osi Model And Layers
 
TCP/IP Basics
TCP/IP BasicsTCP/IP Basics
TCP/IP Basics
 

Similaire à Lecture 05 OSI Model and IP Protocol Suite.ppt

Similaire à Lecture 05 OSI Model and IP Protocol Suite.ppt (20)

Chapter-2.pdf
Chapter-2.pdfChapter-2.pdf
Chapter-2.pdf
 
1b network models
1b network models1b network models
1b network models
 
Cs8591 Computer Networks
Cs8591 Computer NetworksCs8591 Computer Networks
Cs8591 Computer Networks
 
Lecture 1.ppt
Lecture 1.pptLecture 1.ppt
Lecture 1.ppt
 
Unit 1 network models & typical examples(part a)
Unit 1 network models & typical examples(part a)Unit 1 network models & typical examples(part a)
Unit 1 network models & typical examples(part a)
 
Ch2
Ch2Ch2
Ch2
 
Chapter 2 - Network Models
Chapter 2 - Network ModelsChapter 2 - Network Models
Chapter 2 - Network Models
 
1
11
1
 
Ch02
Ch02Ch02
Ch02
 
Network Models in Networking.
Network Models in Networking.Network Models in Networking.
Network Models in Networking.
 
1
11
1
 
02 Network Models
02 Network Models02 Network Models
02 Network Models
 
Osi model 7 Layers
Osi model 7 LayersOsi model 7 Layers
Osi model 7 Layers
 
chapter 4.pptx
chapter 4.pptxchapter 4.pptx
chapter 4.pptx
 
Lecture 1 osi model
Lecture 1 osi modelLecture 1 osi model
Lecture 1 osi model
 
Ch2 v1
Ch2 v1Ch2 v1
Ch2 v1
 
Data Communication And Networking - Network Models
Data Communication And Networking - Network ModelsData Communication And Networking - Network Models
Data Communication And Networking - Network Models
 
Osi , tcp/ip protocol and Addressing
Osi , tcp/ip protocol and Addressing Osi , tcp/ip protocol and Addressing
Osi , tcp/ip protocol and Addressing
 
Osi model34
Osi model34Osi model34
Osi model34
 
OSI model.pptx
OSI model.pptxOSI model.pptx
OSI model.pptx
 

Plus de HanzlaNaveed1

Lecture 25 Link Layer - Error detection and Multiple Access.pptx
Lecture 25 Link Layer - Error detection and Multiple Access.pptxLecture 25 Link Layer - Error detection and Multiple Access.pptx
Lecture 25 Link Layer - Error detection and Multiple Access.pptxHanzlaNaveed1
 
Lecture 23 DHCP and NAT.pptx
Lecture 23 DHCP and NAT.pptxLecture 23 DHCP and NAT.pptx
Lecture 23 DHCP and NAT.pptxHanzlaNaveed1
 
Lecture 22 What inside the Router.pptx
Lecture 22 What inside the Router.pptxLecture 22 What inside the Router.pptx
Lecture 22 What inside the Router.pptxHanzlaNaveed1
 
Lecture-3 Relational Algebra I.pptx
Lecture-3 Relational Algebra I.pptxLecture-3 Relational Algebra I.pptx
Lecture-3 Relational Algebra I.pptxHanzlaNaveed1
 
Lecture-2 - Relational Model.pptx
Lecture-2 - Relational Model.pptxLecture-2 - Relational Model.pptx
Lecture-2 - Relational Model.pptxHanzlaNaveed1
 
Lecture 06 and 07.pptx
Lecture 06 and 07.pptxLecture 06 and 07.pptx
Lecture 06 and 07.pptxHanzlaNaveed1
 
Lecture 26 Link Layer .pptx
Lecture 26 Link Layer .pptxLecture 26 Link Layer .pptx
Lecture 26 Link Layer .pptxHanzlaNaveed1
 
Lecture 19 and 20 IP Addressing.pptx
Lecture 19 and 20 IP Addressing.pptxLecture 19 and 20 IP Addressing.pptx
Lecture 19 and 20 IP Addressing.pptxHanzlaNaveed1
 

Plus de HanzlaNaveed1 (8)

Lecture 25 Link Layer - Error detection and Multiple Access.pptx
Lecture 25 Link Layer - Error detection and Multiple Access.pptxLecture 25 Link Layer - Error detection and Multiple Access.pptx
Lecture 25 Link Layer - Error detection and Multiple Access.pptx
 
Lecture 23 DHCP and NAT.pptx
Lecture 23 DHCP and NAT.pptxLecture 23 DHCP and NAT.pptx
Lecture 23 DHCP and NAT.pptx
 
Lecture 22 What inside the Router.pptx
Lecture 22 What inside the Router.pptxLecture 22 What inside the Router.pptx
Lecture 22 What inside the Router.pptx
 
Lecture-3 Relational Algebra I.pptx
Lecture-3 Relational Algebra I.pptxLecture-3 Relational Algebra I.pptx
Lecture-3 Relational Algebra I.pptx
 
Lecture-2 - Relational Model.pptx
Lecture-2 - Relational Model.pptxLecture-2 - Relational Model.pptx
Lecture-2 - Relational Model.pptx
 
Lecture 06 and 07.pptx
Lecture 06 and 07.pptxLecture 06 and 07.pptx
Lecture 06 and 07.pptx
 
Lecture 26 Link Layer .pptx
Lecture 26 Link Layer .pptxLecture 26 Link Layer .pptx
Lecture 26 Link Layer .pptx
 
Lecture 19 and 20 IP Addressing.pptx
Lecture 19 and 20 IP Addressing.pptxLecture 19 and 20 IP Addressing.pptx
Lecture 19 and 20 IP Addressing.pptx
 

Dernier

GenAI Risks & Security Meetup 01052024.pdf
GenAI Risks & Security Meetup 01052024.pdfGenAI Risks & Security Meetup 01052024.pdf
GenAI Risks & Security Meetup 01052024.pdflior mazor
 
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...apidays
 
FWD Group - Insurer Innovation Award 2024
FWD Group - Insurer Innovation Award 2024FWD Group - Insurer Innovation Award 2024
FWD Group - Insurer Innovation Award 2024The Digital Insurer
 
Repurposing LNG terminals for Hydrogen Ammonia: Feasibility and Cost Saving
Repurposing LNG terminals for Hydrogen Ammonia: Feasibility and Cost SavingRepurposing LNG terminals for Hydrogen Ammonia: Feasibility and Cost Saving
Repurposing LNG terminals for Hydrogen Ammonia: Feasibility and Cost SavingEdi Saputra
 
MS Copilot expands with MS Graph connectors
MS Copilot expands with MS Graph connectorsMS Copilot expands with MS Graph connectors
MS Copilot expands with MS Graph connectorsNanddeep Nachan
 
Automating Google Workspace (GWS) & more with Apps Script
Automating Google Workspace (GWS) & more with Apps ScriptAutomating Google Workspace (GWS) & more with Apps Script
Automating Google Workspace (GWS) & more with Apps Scriptwesley chun
 
A Beginners Guide to Building a RAG App Using Open Source Milvus
A Beginners Guide to Building a RAG App Using Open Source MilvusA Beginners Guide to Building a RAG App Using Open Source Milvus
A Beginners Guide to Building a RAG App Using Open Source MilvusZilliz
 
How to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerHow to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerThousandEyes
 
presentation ICT roal in 21st century education
presentation ICT roal in 21st century educationpresentation ICT roal in 21st century education
presentation ICT roal in 21st century educationjfdjdjcjdnsjd
 
AXA XL - Insurer Innovation Award Americas 2024
AXA XL - Insurer Innovation Award Americas 2024AXA XL - Insurer Innovation Award Americas 2024
AXA XL - Insurer Innovation Award Americas 2024The Digital Insurer
 
Exploring the Future Potential of AI-Enabled Smartphone Processors
Exploring the Future Potential of AI-Enabled Smartphone ProcessorsExploring the Future Potential of AI-Enabled Smartphone Processors
Exploring the Future Potential of AI-Enabled Smartphone Processorsdebabhi2
 
Real Time Object Detection Using Open CV
Real Time Object Detection Using Open CVReal Time Object Detection Using Open CV
Real Time Object Detection Using Open CVKhem
 
Boost Fertility New Invention Ups Success Rates.pdf
Boost Fertility New Invention Ups Success Rates.pdfBoost Fertility New Invention Ups Success Rates.pdf
Boost Fertility New Invention Ups Success Rates.pdfsudhanshuwaghmare1
 
Manulife - Insurer Transformation Award 2024
Manulife - Insurer Transformation Award 2024Manulife - Insurer Transformation Award 2024
Manulife - Insurer Transformation Award 2024The Digital Insurer
 
TrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
TrustArc Webinar - Stay Ahead of US State Data Privacy Law DevelopmentsTrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
TrustArc Webinar - Stay Ahead of US State Data Privacy Law DevelopmentsTrustArc
 
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...Drew Madelung
 
ProductAnonymous-April2024-WinProductDiscovery-MelissaKlemke
ProductAnonymous-April2024-WinProductDiscovery-MelissaKlemkeProductAnonymous-April2024-WinProductDiscovery-MelissaKlemke
ProductAnonymous-April2024-WinProductDiscovery-MelissaKlemkeProduct Anonymous
 
Apidays Singapore 2024 - Modernizing Securities Finance by Madhu Subbu
Apidays Singapore 2024 - Modernizing Securities Finance by Madhu SubbuApidays Singapore 2024 - Modernizing Securities Finance by Madhu Subbu
Apidays Singapore 2024 - Modernizing Securities Finance by Madhu Subbuapidays
 
Apidays New York 2024 - The Good, the Bad and the Governed by David O'Neill, ...
Apidays New York 2024 - The Good, the Bad and the Governed by David O'Neill, ...Apidays New York 2024 - The Good, the Bad and the Governed by David O'Neill, ...
Apidays New York 2024 - The Good, the Bad and the Governed by David O'Neill, ...apidays
 

Dernier (20)

GenAI Risks & Security Meetup 01052024.pdf
GenAI Risks & Security Meetup 01052024.pdfGenAI Risks & Security Meetup 01052024.pdf
GenAI Risks & Security Meetup 01052024.pdf
 
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
 
FWD Group - Insurer Innovation Award 2024
FWD Group - Insurer Innovation Award 2024FWD Group - Insurer Innovation Award 2024
FWD Group - Insurer Innovation Award 2024
 
+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...
+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...
+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...
 
Repurposing LNG terminals for Hydrogen Ammonia: Feasibility and Cost Saving
Repurposing LNG terminals for Hydrogen Ammonia: Feasibility and Cost SavingRepurposing LNG terminals for Hydrogen Ammonia: Feasibility and Cost Saving
Repurposing LNG terminals for Hydrogen Ammonia: Feasibility and Cost Saving
 
MS Copilot expands with MS Graph connectors
MS Copilot expands with MS Graph connectorsMS Copilot expands with MS Graph connectors
MS Copilot expands with MS Graph connectors
 
Automating Google Workspace (GWS) & more with Apps Script
Automating Google Workspace (GWS) & more with Apps ScriptAutomating Google Workspace (GWS) & more with Apps Script
Automating Google Workspace (GWS) & more with Apps Script
 
A Beginners Guide to Building a RAG App Using Open Source Milvus
A Beginners Guide to Building a RAG App Using Open Source MilvusA Beginners Guide to Building a RAG App Using Open Source Milvus
A Beginners Guide to Building a RAG App Using Open Source Milvus
 
How to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerHow to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected Worker
 
presentation ICT roal in 21st century education
presentation ICT roal in 21st century educationpresentation ICT roal in 21st century education
presentation ICT roal in 21st century education
 
AXA XL - Insurer Innovation Award Americas 2024
AXA XL - Insurer Innovation Award Americas 2024AXA XL - Insurer Innovation Award Americas 2024
AXA XL - Insurer Innovation Award Americas 2024
 
Exploring the Future Potential of AI-Enabled Smartphone Processors
Exploring the Future Potential of AI-Enabled Smartphone ProcessorsExploring the Future Potential of AI-Enabled Smartphone Processors
Exploring the Future Potential of AI-Enabled Smartphone Processors
 
Real Time Object Detection Using Open CV
Real Time Object Detection Using Open CVReal Time Object Detection Using Open CV
Real Time Object Detection Using Open CV
 
Boost Fertility New Invention Ups Success Rates.pdf
Boost Fertility New Invention Ups Success Rates.pdfBoost Fertility New Invention Ups Success Rates.pdf
Boost Fertility New Invention Ups Success Rates.pdf
 
Manulife - Insurer Transformation Award 2024
Manulife - Insurer Transformation Award 2024Manulife - Insurer Transformation Award 2024
Manulife - Insurer Transformation Award 2024
 
TrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
TrustArc Webinar - Stay Ahead of US State Data Privacy Law DevelopmentsTrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
TrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
 
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
 
ProductAnonymous-April2024-WinProductDiscovery-MelissaKlemke
ProductAnonymous-April2024-WinProductDiscovery-MelissaKlemkeProductAnonymous-April2024-WinProductDiscovery-MelissaKlemke
ProductAnonymous-April2024-WinProductDiscovery-MelissaKlemke
 
Apidays Singapore 2024 - Modernizing Securities Finance by Madhu Subbu
Apidays Singapore 2024 - Modernizing Securities Finance by Madhu SubbuApidays Singapore 2024 - Modernizing Securities Finance by Madhu Subbu
Apidays Singapore 2024 - Modernizing Securities Finance by Madhu Subbu
 
Apidays New York 2024 - The Good, the Bad and the Governed by David O'Neill, ...
Apidays New York 2024 - The Good, the Bad and the Governed by David O'Neill, ...Apidays New York 2024 - The Good, the Bad and the Governed by David O'Neill, ...
Apidays New York 2024 - The Good, the Bad and the Governed by David O'Neill, ...
 

Lecture 05 OSI Model and IP Protocol Suite.ppt

  • 1. 1 Kyung Hee University 2.2 THE OSI MODEL Established in 1947, the International Standards Organization (ISO) is a multinational body dedicated to worldwide agreement on international standards. An ISO standard that covers all aspects of network communications is the Open Systems Interconnection (OSI) model. It was first introduced in the late 1970s. Layered Architecture Peer-to-Peer Processes Encapsulation Topics discussed in this section: ISO is the organization. OSI is the model.
  • 2. 2 Kyung Hee University Layered Architecture  The OSI model is composed of seven layers ; Physical (layer1), Data link (layer2), Network (layer3) Transport (layer4), Session (layer5), Presentation (layer6) Application (layer7)  Layer  Designer identified which networking functions had related uses and collected those functions into discrete groups that became the layers. The OSI model allows complete interoperability between otherwise incompatible systems. The Each layer uses the services of the layer immediately below it.
  • 3. 3 Kyung Hee University Figure 2.2 Seven layers of the OSI model Layered Architecture (cont’d)
  • 4. 4 Kyung Hee University Peer-to-peer Processes  Layer x on one machine communicates with layer x on another machine - called Peer-to-Peer Processes.  Interfaces between Layers Each interface defines what information and services a layer must provide for the layer above it. Well defined interfaces and layer functions provide modularity to a network  Organizations of the layers  Network support layers : Layers 1, 2, 3  User support layer : Layer 5, 6, 7  It allows interoperability among unrelated software systems  Transport layer (Layer 4) : links the two subgroups
  • 5. 5 Kyung Hee University Figure 2.3 The interaction between layers in the OSI model Peer-to-peer Processes (cont’d)
  • 6. 6 Kyung Hee University Figure 2.4 An exchange using the OSI model  The data portion of a packet at level N-1 carries the whole packet from level N. – The concept is called encapsulation. Peer-to-peer Processes (cont’d)
  • 7. 7 Kyung Hee University 2.3 LAYERS IN THE OSI MODEL In this section we briefly describe the functions of each layer in the OSI model. Physical Layer Data Link Layer Network Layer Transport Layer Session Layer Presentation Layer Application Layer Topics discussed in this section:
  • 8. 8 Kyung Hee University Physical Layer  Physical layer coordinates the functions required to transmit a bit stream over a physical medium.  The physical layer is responsible for movements of individual bits from one hop (node) to the next.
  • 9. 9 Kyung Hee University Physical Layer  Physical layer is concerned with the following: (deal with the mechanical and electrical specification of the primary connections: cable, connector)  Physical characteristics of interfaces and medium  Representation of bits  Data rate : transmission rate  Synchronization of bits  Line configuration  Physical topology  Transmission mode
  • 10. 10 Kyung Hee University Data Link Layer  The data link layer is responsible for moving frames from one hop (node) to the next.
  • 11. 11 Kyung Hee University Data Link Layer  Major duties  Framing  Physical addressing  Flow control  Error control  Access control
  • 12. 12 Kyung Hee University Data Link Layer  Hop-to-hop (node-to-node) delivery
  • 13. 13 Kyung Hee University Network Layer  The network layer is responsible for the delivery of individual packets from the source host to the destination host.
  • 14. 14 Kyung Hee University Network Layer  Logical addressing  Routing
  • 15. 15 Kyung Hee University Transport Layer  The transport layer is responsible for the delivery of a message from one process to another.
  • 16. 16 Kyung Hee University Transport Layer Figure 2.11 Reliable process-to-process delivery of a message
  • 17. 17 Kyung Hee University Transport Layer  Service port addressing  Segmentation and reassembly  Connection control  Flow control  Error control
  • 18. 18 Kyung Hee University Session Layer  The session layer is responsible for dialog control and synchronization.
  • 19. 19 Kyung Hee University Presentation Layer  The presentation layer is responsible for translation, compression, and encryption
  • 20. 20 Kyung Hee University Application Layer  The application layer is responsible for providing services to the user.
  • 21. 21 Kyung Hee University Application Layer  The major duties of the application  Network virtual terminal  File transfer, access, and management  Mail services  Directory services
  • 22. 22 Kyung Hee University Figure 2.15 Summary of layers Summary of Layers
  • 23. 23 Kyung Hee University 2.4 TCP/IP PROTOCOL SUITE The layers in the TCP/IP protocol suite do not exactly match those in the OSI model. The original TCP/IP protocol suite was defined as having four layers: host-to-network, internet, transport, and application. However, when TCP/IP is compared to OSI, we can say that the TCP/IP protocol suite is made of five layers: physical, data link, network, transport, and application. Physical and Data Link Layers Network Layer Transport Layer Application Layer Topics discussed in this section:
  • 24. 24 Kyung Hee University Figure 2.16 TCP/IP and OSI model TCP/IP Protocol Suite
  • 25. 25 Kyung Hee University Physical and Data Link Layers  At the physical and data link layers, TCP/IP does not define any specific protocol.  It supports all the standard and proprietary protocols.  A network in a TCP/IP internetwork can be a local-area network or a wide-area network.
  • 26. 26 Kyung Hee University Network Layer  TCP/IP supports the Internetworking Protocol.  IP uses four supporting protocols : ARP, RARP, ICMP, and IGMP.  IP (Internetworking Protocol)  ARP (Address Resolution Protocol)  RARP (Reverse Address Resolution Protocol)  ICMP (Internet Control Message Protocol)  IGMP (Internet Group Message Protocol)
  • 27. 27 Kyung Hee University Transport Layer  The transport layer was represented in TCP/IP by two protocols : TCP and UDP. IP is a host-to-host protocol TCP and UDP are transport level protocols responsible for delivery of a message from a process to another process.  UDP (User Datagram Protocol)  TCP (Transmission Control Protocol)  SCTP (Stream Control Transmission Protocol)
  • 28. 28 Kyung Hee University Application Layer  The application layer in TCP/IP is equivalent to the combined session, presentation, and application layers in the OSI model.  Many protocols are defined at this layer.
  • 30. 30 Kyung Hee University 2-5 ADDRESSING Four levels of addresses are used in an internet employing the TCP/IP protocols: physical, logical, port, and specific. Physical Addresses Logical Addresses Port Addresses Specific Addresses Topics discussed in this section:
  • 31. 31 Kyung Hee University Figure 2.17 Addresses in TCP/IP Addresses
  • 32. 32 Kyung Hee University Figure 2.18 Relationship of layers and addresses in TCP/IP Addresses (cont’d)
  • 33. 33 Kyung Hee University Physical Addresses  The physical address, also known as the link address, is the address of a node as defined by its LAN or WAN.  It is included in the frame used by the data link layer. The physical addresses have authority over the network (LAN or WAN). The size and format of these addresses vary depending on the network.
  • 34. 34 Kyung Hee University In Figure 2.19 a node with physical address 10 sends a frame to a node with physical address 87. The two nodes are connected by a link (bus topology LAN). As the figure shows, the computer with physical address 10 is the sender, and the computer with physical address 87 is the receiver. Example 2.1 Physical Addresses (cont’d)
  • 35. 35 Kyung Hee University Figure 2.19 Physical addresses Physical Addresses (cont’d)
  • 36. 36 Kyung Hee University As we will see in Chapter 13, most local-area networks use a 48-bit (6-byte) physical address written as 12 hexadecimal digits; every byte (2 hexadecimal digits) is separated by a colon, as shown below: Example 2.2 07:01:02:01:2C:4B A 6-byte (12 hexadecimal digits) physical address. Physical Addresses (cont’d)
  • 37. 37 Kyung Hee University Logical Addresses  Logical addresses are necessary for universal communications that are independent of underlying physical networks.  Physical addresses are not adequate in an internetwork environment where different networks can have different address formats.  A universal addressing system is needed in which host can be identified uniquely, regardless of the underlying physical network.
  • 38. 38 Kyung Hee University Figure 2.20 shows a part of an internet with two routers connecting three LANs. Each device (computer or router) has a pair of addresses (logical and physical) for each connection. In this case, each computer is connected to only one link and therefore has only one pair of addresses. Each router, however, is connected to three networks (only two are shown in the figure). So each router has three pairs of addresses, one for each connection. Example 2.3 Logical Addresses (cont’d)
  • 39. 39 Kyung Hee University Figure 2.20 IP addresses The physical addresses will change from hop to hop, but the logical addresses usually remain the same. Logical Addresses (cont’d)
  • 40. 40 Kyung Hee University Port Addresses  The IP and the physical address are necessary for a quantity of data to travel from a source to the destination host. The end object of Internet communication is a process communicating with another process. For these processes to receive data simultaneously, we need a method to label assigned to a process is called a port address. A port address in TCP/IP is 16 bits in length.
  • 41. 41 Kyung Hee University Figure 2.21 shows two computers communicating via the Internet. The sending computer is running three processes at this time with port addresses a, b, and c. The receiving computer is running two processes at this time with port addresses j and k. Process a in the sending computer needs to communicate with process j in the receiving computer. Note that although physical addresses change from hop to hop, logical and port addresses remain the same from the source to destination. Example 2.4 Port Addresses (cont’d)
  • 42. 42 Kyung Hee University Figure 2.21 Port addresses The physical addresses will change from hop to hop, but the logical and port addresses usually remain the same. Port Addresses (cont’d)
  • 43. 43 Kyung Hee University Example 2.5 As we will see in Chapter 23, a port address is a 16-bit address represented by one decimal number as shown. 753 A 16-bit port address represented as one single number. Port Addresses (cont’d)
  • 44. 44 Kyung Hee University Specific Addresses  Some applications have user-friendly addresses that are designed for that specific address.  E-mail address  URL (Universal Resource Locator)