Reference models in Networks: OSI & TCP/IP

Mukesh Chinta
Mukesh ChintaAssistant Professor à V R Siddhartha Engineering College
REFERENCE
MODELS
• Over the past couple of decades many of the networks
that were built used different hardware and software
implementations, as a result they were incompatible and it
became difficult for networks using different specifications
to communicate with each other.
• To address the problem of networks being incompatible
and unable to communicate with each other, the
International Organisation for Standardisation (ISO)
researched various network schemes.
• The ISO recognised there was a need to create a
NETWORK MODEL that would help vendors create
interoperable network implementations.
• A reference model is a conceptual layout that
describes how communication between devices
should occur. A reference model has many
advantages such as it defines standards for
building network components thereby permitting
multiple-vendor development and also defines
which functions should be performed at each
layer of the model thereby promoting the
standardization of network.
• In 1984 in order to aid network interconnection without
necessarily requiring complete redesign, the Open Systems
Interconnection (OSI) reference model was approved as an
international standard for communications architecture.
• The Open Systems Interconnection (OSI) reference model is a
descriptive network scheme. It ensures greater compatibility
and interoperability between various types of network
technologies.
• The OSI model describes how information or data makes its
way from application programmes (such as spreadsheets)
through a network medium (such as wire) to another
application programme located on another network.
• The OSI reference model divides the problem of moving
information between computers over a network medium into
SEVEN smaller and more manageable problems.
In 1983, Day and Zimmerman laid down certain principles that were
applied to arrive at the seven layers can be briefly summarized as
follows:
 A layer should be created where a different abstraction is needed.
 Each layer should perform a well-defined function.
 The function of each layer should be chosen with an eye toward
defining internationally standardized protocols.
 The layer boundaries should be chosen to minimize the information
flow across the interfaces.
 The number of layers should be large enough that distinct functions
need not be thrown together in the same layer out of necessity and
small enough that the architecture does not become unwieldy
Reference models in Networks: OSI & TCP/IP
Reference models in Networks: OSI & TCP/IP
8
Layer 5
Layer 6
Layer 7 Application
Presentation
Session
Application
DATADATA
Format
When to start
Signaling
9Mukesh Chinta, Asst Prof, CSE
Transport
Network
Data Link
PhysicalLayer 1
Layer 2
Layer 3
Layer 4 Reliability
0101
0101
Data transmission
at the node interval
Routing
Physical connection
11
Provides physical interface for transmission of
information.
Defines rules by which bits are passed from one
system to another on a physical communication
medium.
Covers all - mechanical, electrical, functional and
procedural - aspects for physical communication.
Such characteristics as voltage levels, timing of
voltage changes, physical data rates, maximum
transmission distances, physical connectors, and
other similar attributes are defined by physical layer
specifications.
The physical layer is responsible for movements of
individual bits from one hop (node) to the next.
12
Data link layer attempts to provide reliable
communication over the physical layer interface.
Breaks the outgoing data into frames and reassemble
the received frames.
Create and detect frame boundaries.
Handle errors by implementing an acknowledgement
and retransmission scheme.
Implement flow control.
Supports point-to-point as well as broadcast
communication.
A special sublayer Medium access control sublayer
deals with the problem of access control of shared
channel.
13
The data link layer is responsible for moving
frames from one hop (node) to the next.
14
15
16
Implements routing of frames (packets) through the
network.
Defines the most optimum path the packet should take
from the source to the destination
Defines logical addressing so that any endpoint can be
identified.
Handles congestion and Quality of service issues in the
network.
Facilitates interconnection between heterogeneous
networks (Internetworking).
The network layer also defines how to fragment a
packet into smaller packets to accommodate different
media.
In broadcast networks, the network layer is
thin(nonexistent)
The network layer is responsible for the
delivery of individual packets from
the source host to the destination host.
Reference models in Networks: OSI & TCP/IP
19
Purpose of this layer is to provide a reliable
mechanism for the exchange of data between two
processes in different computers.
Accepts data from above, split into smaller units in
needed
Ensures that the data units are delivered error free.
Ensures that data units are delivered in sequence.
Ensures that there is no loss or duplication of data
units.
Provides connectionless or connection oriented
service.
Provides for the connection management.
Multiplex multiple connection over a single channel.
The transport layer is responsible for the delivery
of a message from one process to another.
Reference models in Networks: OSI & TCP/IP
22
Session layer provides mechanism for controlling the dialogue
between the two end systems. It defines how to start, control
and end conversations (called sessions) between applications.
This layer requests for a logical connection to be established
on an end-user’s request. Responsible for maintenance and
termination of sessions.
Token Management: Prevents two parties from attempting the
same critical operation simulatenously.
This layer provides services like dialogue discipline which can
be full duplex or half duplex: dialog control
Session layer can also provide check-pointing mechanism
such that if a failure of some sort occurs between checkpoints,
all data can be retransmitted from the last checkpoint:
Synchronization.
The session layer is responsible for dialog
control and synchronization.
24
Presentation layer defines the format in which the data is to be
exchanged between the two communicating entities. It deals
with syntax and semantics of the information transmitted.
Also handles data compression and data encryption
(cryptography).
Responsible for protocol conversion, character conversions,
data encryption / decryption, expanding graphics commands
and data compression
• Used for applications specially written to run over the network
• Allows access to network services that support applications
• Directly represents the services that directly support user
applications (e.g., file transfer and email)
• What the user sees or does
• Contains a variety of protocols that are commonly needed by
users
25
The application layer is responsible for
providing services to the user.
End
System
Intermediate
Systems
Reference models in Networks: OSI & TCP/IP
29
30
31
32
Meet the Protocol Family in
the Internet
DNS
IP QoS
Winsock SMTP
NTCIP POP3
SLIP
tester
developer
administrator
OSPF
BGPRTP
WWW
 TCP/IP originated out of the investigative research into networking
protocols that the US Department of Defense (DoD) initiated in 1969.
In 1968, the DoD Advanced Research Projects Agency (ARPA) began
researching the network technology that is called packet switching.
 The network that was initially constructed as a result of this research
to provide a communication that could function in wartime., then
called ARPANET, gradually became known as the Internet. The TCP/IP
protocols played an important role in the development of the
Internet. In the early 1980s, the TCP/IP protocols were developed. In
1983, they became standard protocols for ARPANET.
 Because of the history of the TCP/IP protocol suite, it's often referred
to as the DoD protocol suite or the Internet protocol suite 34
35
The Internet Protocol Suite (commonly known
as TCP/IP) is the set of communications
protocols used for the Internet and other similar
networks.
It is named from two of the most important protocols
in it:
the Transmission Control Protocol (TCP)
The Internet Protocol (IP), which were the first two
networking protocols defined in this standard.
36
TCP/IP Network
Architecture
Application Layer
Transport Layer
Network Layer
Link Layer
operating-system/computer-architecture independent
LAN/MAN/WAN applicable
physical-medium independent
host host
network network
media media
process process
client-server model
TCP/IP Protocol Suite
Ethernet
ARP RARP
IPv4 IPv6
TCP UDP
ICMP
TelnetFTPping SNMP TFTP
Serial line
PPP
SMTP POP3
21 23 11025 69161
port
number
IP
address
TCPIP Protocol Suite
39
 The internet layer is the linchpin that holds the whole architecture
together. Its job is to permit hosts to inject packets into any network
and have them travel independently to the destination (potentially on
a different network).
 Internet Protocol (IP) is the most important protocol in this layer. It
is a connectionless protocol and does not provide reliability, flow
control, or error recovery. IP provides a routing function that
attempts to deliver transmitted messages to their destination.
 A message unit in an IP network is called an IP datagram. This is
the basic unit of information transmitted across TCP/IP networks.
 Other internetwork-layer protocols are ICMP {Internet Control
Message Protocol}, IGMP {Internet Group Management Protocol},
ARP {Address Resolution Protocol}, and RARP {Reverse ARP}.
40
 Transport layer (host-to-host) is designed to allow peer entities on the
source and destination hosts to carry on a conversation, just as in the OSI
transport layer. Two end-to-end transport protocols namely TCP
{Transmission Control Protocol} and UDP {User Datagram Protocol}
have been defined.
 TCP is a reliable connection-oriented protocol that permits a byte stream
originating on one machine to be transported without error on any
machine in the internet. It divides the incoming byte stream into discrete
message and passes each one onto the internet layer. It reassembles
these messages at the receiver. It also handles flow control.
 UDP is an unreliable, connectionless protocol for applications that do not
want TCP's sequencing or flow control and wish to provide their own. It is
also widely used for one-shot, client-server-type request-reply queries
and applications in which prompt delivery is more important than
accurate delivery, such as transmitting speech or video.
41
42
 The network interface layer, also called the link layer or the
data-link layer, is the interface to the actual network hardware. This
interface may or may not provide reliable delivery, and may be
packet or stream oriented. In fact, TCP/IP does not specify any
protocol here, but can use almost any network interface available,
which illustrates the flexibility of the IP layer.
 Examples are IEEE 802.2, X.25, ATM, FDDI, and even SNA.
 It varies from implementation to implementation with vendors
supplying their own version
• The Application layer is equivalent to the combined OSI session,
presentation and Application Layers.
• All the functions handled by these 3 layers in the OSI model are handled by
the Application layer in TCP/IP model.
• It provides a way for applications to have access to networked services.
• The Application Layer has the responsibility for authentication, data
compression, and end-user services such as terminal emulation, file transfer,
e-mail, web browsing/serving, and other network control and management
services. An application header and following data are packaged as a
message
• Application layer is present on the top of the Transport layer. It includes all
the higher-level protocols which are virtual terminal (TELNET), file
transfer (FTP), electronic mail (SMTP) & HTTP (Hyper Text Transfer
Protocol) 43
• IMAP4 - Internet Mail Access Protocol version 4 lets clients access an IMAP4 mail
server to download their e-mail to a local computer program. It works using TCP as
its transport protocol.
• FTP - File Transfer Protocol uses TCP as transport and allows the transfer of files
between two computer systems with login required by the requester.
• Telnet – Sometimes incorrectly called Terminal Emulation across a network, it is
used to remotely open a session on another computer acting as a server. It relies on
TCP for transport.
• SMTP - Simple Mail Transfer Protocol is a TCP-transported application layer
protocol used to send electronic mail.
• HTTP - Hypertext Transfer Protocol uses the TCP transport protocol to carry web
browsing requests to a web server, and web pages from web servers to web
browsers.
• POP3 - Post Office Protocol version 3 uses TCP as a way to offer clients access to a
POP3 mail server to transfer their e-mail to a local program on their computer.
• BGP4 - Border Gateway Protocol version 4 is a routing protocol most often used
between organizations. Two routers using BGP will establish a TCP connection to
send each other their BGP routing tables. In that exchange is information about
reachable networks including the full path to all BGP-known networks. 44
• DNS3 - Domain Names System provides the ability to refer to IP devices
using names instead of numerical IP addresses. It lets Domain Name Servers
resolve these names to their corresponding IP addresses.
• DHCP - Dynamic Host Configuration Protocol uses UDP as its transport
protocol to dynamically and automatically assign IP addresses and other
networking configuration information to computers starting up on a given
network.
• TFTP - Trivial File Transfer Protocol is a UDP-transported protocol that
allows file transfer between two computers with no login or user required for
its limited use.
• SNMP - Simple Network Management Protocol is used to manage all types of
network elements based on various data sent and received using UDP as its
transport protocol.
• RIP2 - Routing Information Protocol is an internal routing protocol used to
dynamically update router tables on internal organization networks. It uses
UDP as its transport protocol.
45
• ARP - Address Resolution Protocol supports the packaging of IP data into
Ethernet frames. It finds the local Ethernet (MAC) address that matches a
specific local IP address.
• ICMP4 - Internet Control Message Protocol provides diagnostics and logical
error reporting to help manage the sending of data between computers. Its
best-known function is ping.
• IGMP - Internet Group Management Protocol supports multicasting by
letting multicast routers track group memberships on each of its connected
networks.
• IPsec - Internet Protocol Security is an end-to-end security scheme for
securing Internet Protocol (IP) communications by authenticating and
encrypting each IP packet of a communication session.
46
• IP4 - Internet Protocol provides connectionless communication support
for all protocols’ data, except ARP, by packaging that data into an IP
datagram.
• OSPF - Open Shortest Path First is an internal routing protocol for use
inside an organization. It checks the function of its link to each of its
neighbor OSPF routers. Then, it sends the acquired routing information to
those neighbor routers.
• EIGRP - Enhanced Interior Gateway Routing Protocol is a local routing
protocol that is proprietary to Cisco. It is an advanced distance-vector
routing protocol that shares internal organizational routing information
found in three tables.
47
• The application layer in TCP/IP handles the responsibilities of multiple
layers in the OSI model.
• The OSI model numbers and names its layers, whereas the TCP/IP stack
only names the layers.
• Unlike the transport layer in OSI, TCP/IP only guarantees reliable delivery
of packets when TCP is the chosen protocol.
• OSI has much more complexity in its 7 layers than TCP/IP has in its 4
layers.
• In TCP/IP, protocols are deliberately designed to have more layer
flexibility than the strict layers of the OSI model.
• TCP/IP functions are implemented, then standardized. OSI is standardized
in concept only, though some functions work.
• OSI has more limited Network Management and Network Security.
48
1 sur 48

Recommandé

OSI Model par
OSI ModelOSI Model
OSI ModelDaffodil International University
5.2K vues28 diapositives
Transport layer par
Transport layer Transport layer
Transport layer Mukesh Chinta
36.5K vues51 diapositives
Transport layer protocol par
Transport layer protocolTransport layer protocol
Transport layer protocolN.Jagadish Kumar
11.5K vues66 diapositives
Chapter 4 data link layer par
Chapter 4 data link layerChapter 4 data link layer
Chapter 4 data link layerNaiyan Noor
13K vues61 diapositives
Osi reference model par
Osi reference modelOsi reference model
Osi reference modelvasanthimuniasamy
43.5K vues21 diapositives
Osi model par
Osi modelOsi model
Osi modelPriyanka Sharma
85.9K vues41 diapositives

Contenu connexe

Tendances

Computer Networks Unit 2 UNIT II DATA-LINK LAYER & MEDIA ACCESS par
Computer Networks Unit 2 UNIT II DATA-LINK LAYER & MEDIA ACCESSComputer Networks Unit 2 UNIT II DATA-LINK LAYER & MEDIA ACCESS
Computer Networks Unit 2 UNIT II DATA-LINK LAYER & MEDIA ACCESSDr. SELVAGANESAN S
3.2K vues201 diapositives
Osi model par
Osi modelOsi model
Osi modeldhawal mehta
1.9K vues42 diapositives
Tcp/ip model par
Tcp/ip  modelTcp/ip  model
Tcp/ip modelKumar Alok
3.3K vues11 diapositives
TCP/IP Network ppt par
TCP/IP Network pptTCP/IP Network ppt
TCP/IP Network pptextraganesh
139K vues15 diapositives
Chapter 2 - Network Models par
Chapter 2 - Network ModelsChapter 2 - Network Models
Chapter 2 - Network ModelsWayne Jones Jnr
20.3K vues42 diapositives
Routing algorithm par
Routing algorithmRouting algorithm
Routing algorithmBushra M
35.8K vues44 diapositives

Tendances(20)

Computer Networks Unit 2 UNIT II DATA-LINK LAYER & MEDIA ACCESS par Dr. SELVAGANESAN S
Computer Networks Unit 2 UNIT II DATA-LINK LAYER & MEDIA ACCESSComputer Networks Unit 2 UNIT II DATA-LINK LAYER & MEDIA ACCESS
Computer Networks Unit 2 UNIT II DATA-LINK LAYER & MEDIA ACCESS
Dr. SELVAGANESAN S3.2K vues
TCP/IP Network ppt par extraganesh
TCP/IP Network pptTCP/IP Network ppt
TCP/IP Network ppt
extraganesh139K vues
Routing algorithm par Bushra M
Routing algorithmRouting algorithm
Routing algorithm
Bushra M35.8K vues
OSI Model - Open Systems Interconnection par Adeel Rasheed
OSI Model - Open Systems InterconnectionOSI Model - Open Systems Interconnection
OSI Model - Open Systems Interconnection
Adeel Rasheed996 vues
Internetworking par Raghu nath
InternetworkingInternetworking
Internetworking
Raghu nath3.9K vues
Transmission Control Protocol (TCP) par k33a
Transmission Control Protocol (TCP)Transmission Control Protocol (TCP)
Transmission Control Protocol (TCP)
k33a26.7K vues

Similaire à Reference models in Networks: OSI & TCP/IP

Routers BY RAJIT(9816115641) par
Routers BY RAJIT(9816115641)Routers BY RAJIT(9816115641)
Routers BY RAJIT(9816115641)C.U
936 vues74 diapositives
Wp simoneau osi_model par
Wp simoneau osi_modelWp simoneau osi_model
Wp simoneau osi_modelJagadish Gurrala
861 vues11 diapositives
CN-OSI-TCP-Models-001.pdf par
CN-OSI-TCP-Models-001.pdfCN-OSI-TCP-Models-001.pdf
CN-OSI-TCP-Models-001.pdfskknowledge
3 vues20 diapositives
Osi reference model and the tcp par
Osi reference model and the tcpOsi reference model and the tcp
Osi reference model and the tcpAgrippa Mungazi
1.3K vues25 diapositives
Overview of an OSI reference Model par
Overview of an OSI reference ModelOverview of an OSI reference Model
Overview of an OSI reference ModelDarshan Bhatt
111 vues28 diapositives
section 4.3.pptx par
section 4.3.pptxsection 4.3.pptx
section 4.3.pptxThangamaniR3
3 vues6 diapositives

Similaire à Reference models in Networks: OSI & TCP/IP(20)

Routers BY RAJIT(9816115641) par C.U
Routers BY RAJIT(9816115641)Routers BY RAJIT(9816115641)
Routers BY RAJIT(9816115641)
C.U936 vues
Overview of an OSI reference Model par Darshan Bhatt
Overview of an OSI reference ModelOverview of an OSI reference Model
Overview of an OSI reference Model
Darshan Bhatt111 vues
Chapter 1.2 osi model par Naiyan Noor
Chapter 1.2 osi modelChapter 1.2 osi model
Chapter 1.2 osi model
Naiyan Noor130 vues
Introduction to Networks_v0.2 par Sohail Gohir
Introduction to Networks_v0.2Introduction to Networks_v0.2
Introduction to Networks_v0.2
Sohail Gohir229 vues
Automation Networking By Shivam Singh par Shivam Singh
Automation Networking By Shivam SinghAutomation Networking By Shivam Singh
Automation Networking By Shivam Singh
Shivam Singh1.4K vues
IMD 251 - Networking par isma ishak
IMD 251 - NetworkingIMD 251 - Networking
IMD 251 - Networking
isma ishak886 vues
DCN notes adi par AdiseshaK
DCN notes adiDCN notes adi
DCN notes adi
AdiseshaK122 vues
POLITEKNIK MALAYSIA par Aiman Hud
POLITEKNIK MALAYSIA POLITEKNIK MALAYSIA
POLITEKNIK MALAYSIA
Aiman Hud343 vues

Plus de Mukesh Chinta

CCNA-2 SRWE Mod-10 LAN Security Concepts par
CCNA-2 SRWE Mod-10 LAN Security ConceptsCCNA-2 SRWE Mod-10 LAN Security Concepts
CCNA-2 SRWE Mod-10 LAN Security ConceptsMukesh Chinta
957 vues36 diapositives
CCNA-2 SRWE Mod-11 Switch Security Configuration par
CCNA-2 SRWE Mod-11 Switch Security ConfigurationCCNA-2 SRWE Mod-11 Switch Security Configuration
CCNA-2 SRWE Mod-11 Switch Security ConfigurationMukesh Chinta
384 vues40 diapositives
CCNA-2 SRWE Mod-12 WLAN Concepts par
CCNA-2 SRWE Mod-12 WLAN ConceptsCCNA-2 SRWE Mod-12 WLAN Concepts
CCNA-2 SRWE Mod-12 WLAN ConceptsMukesh Chinta
495 vues47 diapositives
CCNA-2 SRWE Mod-13 WLAN Configuration par
CCNA-2 SRWE Mod-13 WLAN ConfigurationCCNA-2 SRWE Mod-13 WLAN Configuration
CCNA-2 SRWE Mod-13 WLAN ConfigurationMukesh Chinta
272 vues45 diapositives
CCNA-2 SRWE Mod-15 Static IP Routing par
CCNA-2 SRWE Mod-15 Static IP RoutingCCNA-2 SRWE Mod-15 Static IP Routing
CCNA-2 SRWE Mod-15 Static IP RoutingMukesh Chinta
308 vues33 diapositives
CCNA-2 SRWE Mod-14 Routing Concepts par
CCNA-2 SRWE Mod-14 Routing ConceptsCCNA-2 SRWE Mod-14 Routing Concepts
CCNA-2 SRWE Mod-14 Routing ConceptsMukesh Chinta
338 vues45 diapositives

Plus de Mukesh Chinta(20)

CCNA-2 SRWE Mod-10 LAN Security Concepts par Mukesh Chinta
CCNA-2 SRWE Mod-10 LAN Security ConceptsCCNA-2 SRWE Mod-10 LAN Security Concepts
CCNA-2 SRWE Mod-10 LAN Security Concepts
Mukesh Chinta957 vues
CCNA-2 SRWE Mod-11 Switch Security Configuration par Mukesh Chinta
CCNA-2 SRWE Mod-11 Switch Security ConfigurationCCNA-2 SRWE Mod-11 Switch Security Configuration
CCNA-2 SRWE Mod-11 Switch Security Configuration
Mukesh Chinta384 vues
CCNA-2 SRWE Mod-12 WLAN Concepts par Mukesh Chinta
CCNA-2 SRWE Mod-12 WLAN ConceptsCCNA-2 SRWE Mod-12 WLAN Concepts
CCNA-2 SRWE Mod-12 WLAN Concepts
Mukesh Chinta495 vues
CCNA-2 SRWE Mod-13 WLAN Configuration par Mukesh Chinta
CCNA-2 SRWE Mod-13 WLAN ConfigurationCCNA-2 SRWE Mod-13 WLAN Configuration
CCNA-2 SRWE Mod-13 WLAN Configuration
Mukesh Chinta272 vues
CCNA-2 SRWE Mod-15 Static IP Routing par Mukesh Chinta
CCNA-2 SRWE Mod-15 Static IP RoutingCCNA-2 SRWE Mod-15 Static IP Routing
CCNA-2 SRWE Mod-15 Static IP Routing
Mukesh Chinta308 vues
CCNA-2 SRWE Mod-14 Routing Concepts par Mukesh Chinta
CCNA-2 SRWE Mod-14 Routing ConceptsCCNA-2 SRWE Mod-14 Routing Concepts
CCNA-2 SRWE Mod-14 Routing Concepts
Mukesh Chinta338 vues
Protecting the Organization - Cisco: Intro to Cybersecurity Chap-4 par Mukesh Chinta
Protecting the Organization - Cisco: Intro to Cybersecurity Chap-4Protecting the Organization - Cisco: Intro to Cybersecurity Chap-4
Protecting the Organization - Cisco: Intro to Cybersecurity Chap-4
Mukesh Chinta230 vues
Protecting Your Data and Privacy- Cisco: Intro to Cybersecurity chap-3 par Mukesh Chinta
Protecting Your Data and Privacy- Cisco: Intro to Cybersecurity chap-3Protecting Your Data and Privacy- Cisco: Intro to Cybersecurity chap-3
Protecting Your Data and Privacy- Cisco: Intro to Cybersecurity chap-3
Mukesh Chinta163 vues
Attacks, Concepts and Techniques - Cisco: Intro to Cybersecurity Chap-2 par Mukesh Chinta
Attacks, Concepts and Techniques - Cisco: Intro to Cybersecurity Chap-2Attacks, Concepts and Techniques - Cisco: Intro to Cybersecurity Chap-2
Attacks, Concepts and Techniques - Cisco: Intro to Cybersecurity Chap-2
Mukesh Chinta697 vues
The need for Cybersecurity - Cisco Intro to Cybersec Chap-1 par Mukesh Chinta
The need for Cybersecurity - Cisco Intro to Cybersec Chap-1The need for Cybersecurity - Cisco Intro to Cybersec Chap-1
The need for Cybersecurity - Cisco Intro to Cybersec Chap-1
Mukesh Chinta604 vues
Cisco Cybersecurity Essentials Chapter- 7 par Mukesh Chinta
Cisco Cybersecurity Essentials Chapter- 7Cisco Cybersecurity Essentials Chapter- 7
Cisco Cybersecurity Essentials Chapter- 7
Mukesh Chinta1.5K vues
Protocols and Reference models CCNAv7-1 par Mukesh Chinta
Protocols and Reference models  CCNAv7-1Protocols and Reference models  CCNAv7-1
Protocols and Reference models CCNAv7-1
Mukesh Chinta803 vues
Basic Switch and End Device configuration CCNA7 Module 2 par Mukesh Chinta
Basic Switch and End Device configuration   CCNA7 Module 2Basic Switch and End Device configuration   CCNA7 Module 2
Basic Switch and End Device configuration CCNA7 Module 2
Mukesh Chinta632 vues
Introduction to networks CCNAv7 Module-1 par Mukesh Chinta
Introduction to networks CCNAv7 Module-1Introduction to networks CCNAv7 Module-1
Introduction to networks CCNAv7 Module-1
Mukesh Chinta3.1K vues
Process scheduling (CPU Scheduling) par Mukesh Chinta
Process scheduling (CPU Scheduling)Process scheduling (CPU Scheduling)
Process scheduling (CPU Scheduling)
Mukesh Chinta15.7K vues
Operating systems system structures par Mukesh Chinta
Operating systems   system structuresOperating systems   system structures
Operating systems system structures
Mukesh Chinta1.9K vues
Introduction to Operating Systems par Mukesh Chinta
Introduction to Operating SystemsIntroduction to Operating Systems
Introduction to Operating Systems
Mukesh Chinta21.2K vues
Cisco cybersecurity essentials chapter 8 par Mukesh Chinta
Cisco cybersecurity essentials chapter 8Cisco cybersecurity essentials chapter 8
Cisco cybersecurity essentials chapter 8
Mukesh Chinta2.2K vues
Cisco cybersecurity essentials chapter - 6 par Mukesh Chinta
Cisco cybersecurity essentials chapter - 6Cisco cybersecurity essentials chapter - 6
Cisco cybersecurity essentials chapter - 6
Mukesh Chinta2K vues

Dernier

ASSIGNMENTS ON FUZZY LOGIC IN TRAFFIC FLOW.pdf par
ASSIGNMENTS ON FUZZY LOGIC IN TRAFFIC FLOW.pdfASSIGNMENTS ON FUZZY LOGIC IN TRAFFIC FLOW.pdf
ASSIGNMENTS ON FUZZY LOGIC IN TRAFFIC FLOW.pdfAlhamduKure
10 vues11 diapositives
Renewal Projects in Seismic Construction par
Renewal Projects in Seismic ConstructionRenewal Projects in Seismic Construction
Renewal Projects in Seismic ConstructionEngineering & Seismic Construction
8 vues8 diapositives
dummy.pptx par
dummy.pptxdummy.pptx
dummy.pptxJamesLamp
7 vues2 diapositives
PIT Interpretation - Use only PIT-W EN.ppt par
PIT Interpretation - Use only PIT-W EN.pptPIT Interpretation - Use only PIT-W EN.ppt
PIT Interpretation - Use only PIT-W EN.pptRabindra Shrestha
5 vues45 diapositives
Module-1, Chapter-2 Data Types, Variables, and Arrays par
Module-1, Chapter-2 Data Types, Variables, and ArraysModule-1, Chapter-2 Data Types, Variables, and Arrays
Module-1, Chapter-2 Data Types, Variables, and ArraysDemian Antony D'Mello
9 vues44 diapositives
Web Dev Session 1.pptx par
Web Dev Session 1.pptxWeb Dev Session 1.pptx
Web Dev Session 1.pptxVedVekhande
23 vues22 diapositives

Dernier(20)

ASSIGNMENTS ON FUZZY LOGIC IN TRAFFIC FLOW.pdf par AlhamduKure
ASSIGNMENTS ON FUZZY LOGIC IN TRAFFIC FLOW.pdfASSIGNMENTS ON FUZZY LOGIC IN TRAFFIC FLOW.pdf
ASSIGNMENTS ON FUZZY LOGIC IN TRAFFIC FLOW.pdf
AlhamduKure10 vues
Ansari: Practical experiences with an LLM-based Islamic Assistant par M Waleed Kadous
Ansari: Practical experiences with an LLM-based Islamic AssistantAnsari: Practical experiences with an LLM-based Islamic Assistant
Ansari: Practical experiences with an LLM-based Islamic Assistant
M Waleed Kadous12 vues
Unlocking Research Visibility.pdf par KhatirNaima
Unlocking Research Visibility.pdfUnlocking Research Visibility.pdf
Unlocking Research Visibility.pdf
KhatirNaima11 vues
MODULE-1 CHAPTER 3- Operators - Object Oriented Programming with JAVA par Demian Antony D'Mello
MODULE-1 CHAPTER 3- Operators - Object Oriented Programming with JAVAMODULE-1 CHAPTER 3- Operators - Object Oriented Programming with JAVA
MODULE-1 CHAPTER 3- Operators - Object Oriented Programming with JAVA
GDSC Mikroskil Members Onboarding 2023.pdf par gdscmikroskil
GDSC Mikroskil Members Onboarding 2023.pdfGDSC Mikroskil Members Onboarding 2023.pdf
GDSC Mikroskil Members Onboarding 2023.pdf
gdscmikroskil72 vues
AWS Certified Solutions Architect Associate Exam Guide_published .pdf par Kiran Kumar Malik
AWS Certified Solutions Architect Associate Exam Guide_published .pdfAWS Certified Solutions Architect Associate Exam Guide_published .pdf
AWS Certified Solutions Architect Associate Exam Guide_published .pdf
Integrating Sustainable Development Goals (SDGs) in School Education par SheetalTank1
Integrating Sustainable Development Goals (SDGs) in School EducationIntegrating Sustainable Development Goals (SDGs) in School Education
Integrating Sustainable Development Goals (SDGs) in School Education
SheetalTank113 vues
2023-12 Emarei MRI Tool Set E2I0501ST (TQ).pdf par Philipp Daum
2023-12 Emarei MRI Tool Set E2I0501ST (TQ).pdf2023-12 Emarei MRI Tool Set E2I0501ST (TQ).pdf
2023-12 Emarei MRI Tool Set E2I0501ST (TQ).pdf
Philipp Daum5 vues
Basic Design Flow for Field Programmable Gate Arrays par Usha Mehta
Basic Design Flow for Field Programmable Gate ArraysBasic Design Flow for Field Programmable Gate Arrays
Basic Design Flow for Field Programmable Gate Arrays
Usha Mehta10 vues
Solution Challenge Introduction.pptx par GDSCCEC
Solution Challenge Introduction.pptxSolution Challenge Introduction.pptx
Solution Challenge Introduction.pptx
GDSCCEC13 vues
Details of Acoustic Liner for selection of material par rafiqalisyed
Details of Acoustic Liner for selection of materialDetails of Acoustic Liner for selection of material
Details of Acoustic Liner for selection of material
rafiqalisyed5 vues
REPORT Data Science EXPERT LECTURE.doc par Parulkhatri11
REPORT Data Science EXPERT LECTURE.docREPORT Data Science EXPERT LECTURE.doc
REPORT Data Science EXPERT LECTURE.doc
Parulkhatri117 vues
DevFest 2023 Daegu Speech_이재규, Implementing easy and simple chat with gol... par JQLEE6
DevFest 2023 Daegu Speech_이재규,  Implementing easy and simple chat with gol...DevFest 2023 Daegu Speech_이재규,  Implementing easy and simple chat with gol...
DevFest 2023 Daegu Speech_이재규, Implementing easy and simple chat with gol...
JQLEE68 vues

Reference models in Networks: OSI & TCP/IP

  • 2. • Over the past couple of decades many of the networks that were built used different hardware and software implementations, as a result they were incompatible and it became difficult for networks using different specifications to communicate with each other. • To address the problem of networks being incompatible and unable to communicate with each other, the International Organisation for Standardisation (ISO) researched various network schemes. • The ISO recognised there was a need to create a NETWORK MODEL that would help vendors create interoperable network implementations.
  • 3. • A reference model is a conceptual layout that describes how communication between devices should occur. A reference model has many advantages such as it defines standards for building network components thereby permitting multiple-vendor development and also defines which functions should be performed at each layer of the model thereby promoting the standardization of network.
  • 4. • In 1984 in order to aid network interconnection without necessarily requiring complete redesign, the Open Systems Interconnection (OSI) reference model was approved as an international standard for communications architecture. • The Open Systems Interconnection (OSI) reference model is a descriptive network scheme. It ensures greater compatibility and interoperability between various types of network technologies. • The OSI model describes how information or data makes its way from application programmes (such as spreadsheets) through a network medium (such as wire) to another application programme located on another network. • The OSI reference model divides the problem of moving information between computers over a network medium into SEVEN smaller and more manageable problems.
  • 5. In 1983, Day and Zimmerman laid down certain principles that were applied to arrive at the seven layers can be briefly summarized as follows:  A layer should be created where a different abstraction is needed.  Each layer should perform a well-defined function.  The function of each layer should be chosen with an eye toward defining internationally standardized protocols.  The layer boundaries should be chosen to minimize the information flow across the interfaces.  The number of layers should be large enough that distinct functions need not be thrown together in the same layer out of necessity and small enough that the architecture does not become unwieldy
  • 8. 8
  • 9. Layer 5 Layer 6 Layer 7 Application Presentation Session Application DATADATA Format When to start Signaling 9Mukesh Chinta, Asst Prof, CSE
  • 10. Transport Network Data Link PhysicalLayer 1 Layer 2 Layer 3 Layer 4 Reliability 0101 0101 Data transmission at the node interval Routing Physical connection
  • 11. 11 Provides physical interface for transmission of information. Defines rules by which bits are passed from one system to another on a physical communication medium. Covers all - mechanical, electrical, functional and procedural - aspects for physical communication. Such characteristics as voltage levels, timing of voltage changes, physical data rates, maximum transmission distances, physical connectors, and other similar attributes are defined by physical layer specifications.
  • 12. The physical layer is responsible for movements of individual bits from one hop (node) to the next. 12
  • 13. Data link layer attempts to provide reliable communication over the physical layer interface. Breaks the outgoing data into frames and reassemble the received frames. Create and detect frame boundaries. Handle errors by implementing an acknowledgement and retransmission scheme. Implement flow control. Supports point-to-point as well as broadcast communication. A special sublayer Medium access control sublayer deals with the problem of access control of shared channel. 13
  • 14. The data link layer is responsible for moving frames from one hop (node) to the next. 14
  • 15. 15
  • 16. 16 Implements routing of frames (packets) through the network. Defines the most optimum path the packet should take from the source to the destination Defines logical addressing so that any endpoint can be identified. Handles congestion and Quality of service issues in the network. Facilitates interconnection between heterogeneous networks (Internetworking). The network layer also defines how to fragment a packet into smaller packets to accommodate different media. In broadcast networks, the network layer is thin(nonexistent)
  • 17. The network layer is responsible for the delivery of individual packets from the source host to the destination host.
  • 19. 19 Purpose of this layer is to provide a reliable mechanism for the exchange of data between two processes in different computers. Accepts data from above, split into smaller units in needed Ensures that the data units are delivered error free. Ensures that data units are delivered in sequence. Ensures that there is no loss or duplication of data units. Provides connectionless or connection oriented service. Provides for the connection management. Multiplex multiple connection over a single channel.
  • 20. The transport layer is responsible for the delivery of a message from one process to another.
  • 22. 22 Session layer provides mechanism for controlling the dialogue between the two end systems. It defines how to start, control and end conversations (called sessions) between applications. This layer requests for a logical connection to be established on an end-user’s request. Responsible for maintenance and termination of sessions. Token Management: Prevents two parties from attempting the same critical operation simulatenously. This layer provides services like dialogue discipline which can be full duplex or half duplex: dialog control Session layer can also provide check-pointing mechanism such that if a failure of some sort occurs between checkpoints, all data can be retransmitted from the last checkpoint: Synchronization.
  • 23. The session layer is responsible for dialog control and synchronization.
  • 24. 24 Presentation layer defines the format in which the data is to be exchanged between the two communicating entities. It deals with syntax and semantics of the information transmitted. Also handles data compression and data encryption (cryptography). Responsible for protocol conversion, character conversions, data encryption / decryption, expanding graphics commands and data compression
  • 25. • Used for applications specially written to run over the network • Allows access to network services that support applications • Directly represents the services that directly support user applications (e.g., file transfer and email) • What the user sees or does • Contains a variety of protocols that are commonly needed by users 25
  • 26. The application layer is responsible for providing services to the user.
  • 29. 29
  • 30. 30
  • 31. 31
  • 32. 32
  • 33. Meet the Protocol Family in the Internet DNS IP QoS Winsock SMTP NTCIP POP3 SLIP tester developer administrator OSPF BGPRTP WWW
  • 34.  TCP/IP originated out of the investigative research into networking protocols that the US Department of Defense (DoD) initiated in 1969. In 1968, the DoD Advanced Research Projects Agency (ARPA) began researching the network technology that is called packet switching.  The network that was initially constructed as a result of this research to provide a communication that could function in wartime., then called ARPANET, gradually became known as the Internet. The TCP/IP protocols played an important role in the development of the Internet. In the early 1980s, the TCP/IP protocols were developed. In 1983, they became standard protocols for ARPANET.  Because of the history of the TCP/IP protocol suite, it's often referred to as the DoD protocol suite or the Internet protocol suite 34
  • 35. 35 The Internet Protocol Suite (commonly known as TCP/IP) is the set of communications protocols used for the Internet and other similar networks. It is named from two of the most important protocols in it: the Transmission Control Protocol (TCP) The Internet Protocol (IP), which were the first two networking protocols defined in this standard.
  • 36. 36
  • 37. TCP/IP Network Architecture Application Layer Transport Layer Network Layer Link Layer operating-system/computer-architecture independent LAN/MAN/WAN applicable physical-medium independent host host network network media media process process client-server model
  • 38. TCP/IP Protocol Suite Ethernet ARP RARP IPv4 IPv6 TCP UDP ICMP TelnetFTPping SNMP TFTP Serial line PPP SMTP POP3 21 23 11025 69161 port number IP address
  • 40.  The internet layer is the linchpin that holds the whole architecture together. Its job is to permit hosts to inject packets into any network and have them travel independently to the destination (potentially on a different network).  Internet Protocol (IP) is the most important protocol in this layer. It is a connectionless protocol and does not provide reliability, flow control, or error recovery. IP provides a routing function that attempts to deliver transmitted messages to their destination.  A message unit in an IP network is called an IP datagram. This is the basic unit of information transmitted across TCP/IP networks.  Other internetwork-layer protocols are ICMP {Internet Control Message Protocol}, IGMP {Internet Group Management Protocol}, ARP {Address Resolution Protocol}, and RARP {Reverse ARP}. 40
  • 41.  Transport layer (host-to-host) is designed to allow peer entities on the source and destination hosts to carry on a conversation, just as in the OSI transport layer. Two end-to-end transport protocols namely TCP {Transmission Control Protocol} and UDP {User Datagram Protocol} have been defined.  TCP is a reliable connection-oriented protocol that permits a byte stream originating on one machine to be transported without error on any machine in the internet. It divides the incoming byte stream into discrete message and passes each one onto the internet layer. It reassembles these messages at the receiver. It also handles flow control.  UDP is an unreliable, connectionless protocol for applications that do not want TCP's sequencing or flow control and wish to provide their own. It is also widely used for one-shot, client-server-type request-reply queries and applications in which prompt delivery is more important than accurate delivery, such as transmitting speech or video. 41
  • 42. 42  The network interface layer, also called the link layer or the data-link layer, is the interface to the actual network hardware. This interface may or may not provide reliable delivery, and may be packet or stream oriented. In fact, TCP/IP does not specify any protocol here, but can use almost any network interface available, which illustrates the flexibility of the IP layer.  Examples are IEEE 802.2, X.25, ATM, FDDI, and even SNA.  It varies from implementation to implementation with vendors supplying their own version
  • 43. • The Application layer is equivalent to the combined OSI session, presentation and Application Layers. • All the functions handled by these 3 layers in the OSI model are handled by the Application layer in TCP/IP model. • It provides a way for applications to have access to networked services. • The Application Layer has the responsibility for authentication, data compression, and end-user services such as terminal emulation, file transfer, e-mail, web browsing/serving, and other network control and management services. An application header and following data are packaged as a message • Application layer is present on the top of the Transport layer. It includes all the higher-level protocols which are virtual terminal (TELNET), file transfer (FTP), electronic mail (SMTP) & HTTP (Hyper Text Transfer Protocol) 43
  • 44. • IMAP4 - Internet Mail Access Protocol version 4 lets clients access an IMAP4 mail server to download their e-mail to a local computer program. It works using TCP as its transport protocol. • FTP - File Transfer Protocol uses TCP as transport and allows the transfer of files between two computer systems with login required by the requester. • Telnet – Sometimes incorrectly called Terminal Emulation across a network, it is used to remotely open a session on another computer acting as a server. It relies on TCP for transport. • SMTP - Simple Mail Transfer Protocol is a TCP-transported application layer protocol used to send electronic mail. • HTTP - Hypertext Transfer Protocol uses the TCP transport protocol to carry web browsing requests to a web server, and web pages from web servers to web browsers. • POP3 - Post Office Protocol version 3 uses TCP as a way to offer clients access to a POP3 mail server to transfer their e-mail to a local program on their computer. • BGP4 - Border Gateway Protocol version 4 is a routing protocol most often used between organizations. Two routers using BGP will establish a TCP connection to send each other their BGP routing tables. In that exchange is information about reachable networks including the full path to all BGP-known networks. 44
  • 45. • DNS3 - Domain Names System provides the ability to refer to IP devices using names instead of numerical IP addresses. It lets Domain Name Servers resolve these names to their corresponding IP addresses. • DHCP - Dynamic Host Configuration Protocol uses UDP as its transport protocol to dynamically and automatically assign IP addresses and other networking configuration information to computers starting up on a given network. • TFTP - Trivial File Transfer Protocol is a UDP-transported protocol that allows file transfer between two computers with no login or user required for its limited use. • SNMP - Simple Network Management Protocol is used to manage all types of network elements based on various data sent and received using UDP as its transport protocol. • RIP2 - Routing Information Protocol is an internal routing protocol used to dynamically update router tables on internal organization networks. It uses UDP as its transport protocol. 45
  • 46. • ARP - Address Resolution Protocol supports the packaging of IP data into Ethernet frames. It finds the local Ethernet (MAC) address that matches a specific local IP address. • ICMP4 - Internet Control Message Protocol provides diagnostics and logical error reporting to help manage the sending of data between computers. Its best-known function is ping. • IGMP - Internet Group Management Protocol supports multicasting by letting multicast routers track group memberships on each of its connected networks. • IPsec - Internet Protocol Security is an end-to-end security scheme for securing Internet Protocol (IP) communications by authenticating and encrypting each IP packet of a communication session. 46
  • 47. • IP4 - Internet Protocol provides connectionless communication support for all protocols’ data, except ARP, by packaging that data into an IP datagram. • OSPF - Open Shortest Path First is an internal routing protocol for use inside an organization. It checks the function of its link to each of its neighbor OSPF routers. Then, it sends the acquired routing information to those neighbor routers. • EIGRP - Enhanced Interior Gateway Routing Protocol is a local routing protocol that is proprietary to Cisco. It is an advanced distance-vector routing protocol that shares internal organizational routing information found in three tables. 47
  • 48. • The application layer in TCP/IP handles the responsibilities of multiple layers in the OSI model. • The OSI model numbers and names its layers, whereas the TCP/IP stack only names the layers. • Unlike the transport layer in OSI, TCP/IP only guarantees reliable delivery of packets when TCP is the chosen protocol. • OSI has much more complexity in its 7 layers than TCP/IP has in its 4 layers. • In TCP/IP, protocols are deliberately designed to have more layer flexibility than the strict layers of the OSI model. • TCP/IP functions are implemented, then standardized. OSI is standardized in concept only, though some functions work. • OSI has more limited Network Management and Network Security. 48