SlideShare une entreprise Scribd logo
1  sur  60
Computer Networks
OSI Model and Protocols
Date:
Department of Computer Engineering
Presented By:
Rubal Sagwal
NIT, Kurukshetra
Department of Computer Engineering
1ADAD
Contents
• Introduction to Layers and Protocols.
• OSI Model
• OSI Model layer functioning.
• TCP/IP Model
• Addressing scheme
ADAD 2
OSI Model(activity)
Introduction to OSI – Functions of Seven Layers
ADAD 3
What is Layer
ADAD 4
Network
Hardware
Physical
devices
Software
Set of
Instructions
Layers
Layers Working
ADAD 5
OSI Model
• Open System Interconnection.
• Firstly introduced in 1970s.
• An open system is a set of protocols that allow any two
different systems to communicate.
• Protocols: Set of rules.
• OSI model itself is not a protocol, it is a model that
define protocols for network communication.
• Seven separate but related layers.
ADAD 6
OSI Model representation
ADAD 7
Encapsulation
• A packet (header and data) at level 7 is
encapsulated in a packet at level 6.
• The whole packet at level 6 is encapsulated in a
packet at level 5 and so on.
ADAD 8
Layers in OSI Model
Functions of Seven Layers
ADAD 9
Organization of Layers
• 7 layers can be thought of belonging to three
subgroup.
• These are:
ADAD 10
Layer 1
• Physical
• Data link
• Network
Layer 2
• Transport
layer
Layer 3
• Session
• Presentation
• Application
1. Physical Layer
Physical characteristics of interfaces and medium:
Define physical transmission medium (Guided or Unguided).
Interface between devices and transmission medium.
Representation of bits:
PL consist of bits (0s and 1s), so, data -> bits ->signals
(electrical or optical).
Data rate
 Transmission rate (means the number of bits sent per
second).
Synchronization of bits:
Sender and receiver must not receive the same bit rate but
must be at same time (synchronized clock0.
ADAD 11
1. Physical Layer
Line configuration:
Connection (point-to-point or multipoint) of devices to
the medium.
Physical topology:
Topological Structure (Bus, Star, Mesh etc)
Transmission mode:
Simplex, half-duplex or full duplex.
ADAD 12
2. Data Link Layer
Framing:
Arranging bit streams into Data Frames.
Physical addressing (machine address):
Add header to the frame to define the sender and receiver of
the data packet.
Flow Control;
Not to overload receiver
Error Control:
Error Free
Access Control:
Which device has access to the link at specific time instance.
ADAD 13
3. Network Layer
Source-to-destination delivery
Logical Addressing (network address)
Routing
ADAD 14
4. Transport Layer
Process-to-process delivery (applications)
Service-point addressing:
Send data to the correct process on particular computer.
Segmentation and reassembly
Divide into segments and assign sequence number.
Reassembly at destination according to sequence number.
Connection control
Connectionless or connection oriented
Flow control
Error control
Without damage, loss or duplication
ADAD 15
5. Session Layer
It establish, maintains and synchronize the
interaction among communicating systems.
Dialog control (half-duplex or full duplex at
application level)
Synchronization
ADAD 16
6. Presentation Layer
Semantics and Syntax
Translation:
Change the format according receivers end.
Encryption and Decryption
Compression
Reduce the size (Video, audio, images etc)
ADAD 17
7. Application Layer
User Interface
File transfer, access and management
Mail services
Directory service (database)
ADAD 18
TCP/IP
Introduction – Functioning
ADAD 19
TCP/IP
• Transmission Control Protocol / Internet Protocol.
• Four Layers:
ADAD 20
• Application Layer
• Presentation Layer
• Session Layer
Application Layer
• Data Link Layer
• Physical Layer
Transport Layer
Internet Layer
Host-to-Network
(Network
Interface) Layer
TCP/IP Model
ADAD 21
TCP/IP Layer Functioning
• PHYSICAL LAYER: Doesn’t define any specific
protocol, define physical structure.
• NETWORK LAYER: Supports internetworking
protocol (ARP, RARP, ICMP and IGMP).
• TRANSPORT LAYER: Responsible for delivery of
message from a process to another process (TCP
and UDP).
• APPLICATION LAYER: Is a combination of Session,
Presentation and Application Layer of OSI Model.
ADAD 22
Addressing
Physical – Logical – Port – Specific Address
ADAD 23
Relationship of layers and Addresses in TCP/IP
ADAD 24
• SPECIFIC ADDRESS
• (Processes)
Application
Layer
• PORT ADDRESS
• (SCTP, TCP, UDP)Transport Layer
• LOGICAL ADDRESS
• (IP and other protocols)Network Layer
• PHYSIAL ADDRESS
• (Underlying physical Networks)
Host-to-
network
Physical Address
• Address of a node as defined by LAN or WAN.
• Included in the frame used by DLL (Data link layer).
• Address format depends upon network.
ADAD 25
Logical Address
• IP Address.
• Used for Universal Communication.
• Identify each host uniquely in a network.
• Currently is 32 bit address.
ADAD 26
Port Address
• Process Address.
• For example: Computer A can communicate with computer
B by using TALNET. At the same time A can communicate
with C using File transfer Protocol. For these process to
receive data simultaneously we need method to label the
process, i.e Port Address.
ADAD 27
Specific Address
• URLs (www.google.com)
• Email Address (abc123@gmail.com)
ADAD 28
Protocols
TCP – UDP – IP – ICMP – ARP/RARP
ADAD 29
Transmission layer
Protocols
TCP – UDP
ADAD 30
Delivery Process
1. Node-to-Node Delivery: The Data link layer is responsible
for delivery of frames between two neighboring nodes
over a link, called node-to-node delivery.
2. Host-to-Host: Network layer is responsible for delivery of
datagrams between two hosts.
3. Process-to-Process: Transport layer is responsible for
delivery of data from process-to-process (application
program).
ADAD 31
Connectionless Vs Connection Oriented
Connectionless
• For sending data from
source to destination, no
need to establish any
connection.
• Packets are not
numbered; they may be
delayed or lost may
arrive out of sequence.
• No acknowledgement.
• Ex: UDP
Connection Oriented
• Connection is first
established between the
sender and the receiver.
• Data are transferred.
• Connection is released.
• Ex: TCP and SCTP.
ADAD 32
UDP
• User Datagram Protocol.
• Connectionless Protocol and Unreliable (No flow and error
control).
• Then why are we using it?
• Very simple protocol.
• If a process wants to send a small message and does not care much
about reliability.
• For small message (no need to generate any connection).
• Multicasting
ADAD 33
Well known port used by UDP
• Command for Unix:
$grep ftp /etc/services
ftp 21/udp
ADAD 34
Port Protocol Description
7 Echo Print a received datagram back to sender.
9 Discard Discards any datagram that is received.
11 User Active user.
13 Daytime Returns the date and time
53 Nameserver Domain Name Service
User datagram of UDP
• UDP packets called User Datagrams, have fixed size header of 8
bytes. Fields are as follows:
1. Source Port Number: Used by process running on the source
host.
• 16 bit long (range from 0 to 216 = 65535)
2. Destination Port Number: used by the process running on
destination host.
• 16 bit long.
3. Length: 16-bit long (0 to 65535).
• Define the length of user datagram header plus data.
UDP datagram length field is not that much important because it is
encapsulated within IP packet.
4. Checksum: for detection of error.
ADAD 35
Operation of UDP
• Connectionless Services: it means each datagram sent by
UDP is independent datagram.
• There is no relationship between the different user datagram even
if they are coming from same source process or going to same
destination.
• Are not numbered (nothing common).
• No connection establishment, no termination.
• Can’t send stream of data and chop them into different related
datagrams.
• Only for short messages that can fit into one datagram.
• Flow and Error Control: Very simple and unreliable.
• No flow control hence no windows, can overflow.
• Sender doesn’t know message has lost or duplicate, except a small
checksum that is not enough.
• Encapsulation and Decapsulation: within IP datagram.
ADAD 36
Use of UDP
• Suitable for process that requires simple request-
response communication, like FTP.
• Suitable for a process with internal flow and error
control like Trivial File Transfer Protocol (which has
its own error and flow control).
• Suitable for multicasting.
• Used for route updating protocol.
ADAD 37
TCP
• Transmission Control Protocol.
• Like UDP, use port numbers.
• Connection oriented (create virtual connection
between two TCPs to send data).
• Use flow and error control.
• Full duplex communication.
• Connection oriented and reliable protocol.
ADAD 38
TCP Services
1. Process-to-Process communication: Using port numbers.
ADAD 39
Port Protocol Description
7 Echo Print a received datagram back to sender.
9 Discard Discards any datagram that is received.
11 User Active user.
13 Daytime Returns the date and time
20 FTP, Data File transfer Protocol(data connection)
21 FTP, Control FTP (control connection)
25 SMTP Simple Mail Transfer Protocol
53 Nameserver Domain Name Service
80 HTTP Hypertext Transfer Protocol
TCP Services
2. Stream Delivery Services: Stream Oriented Protocol.
• Allow the sending process to deliver data as a stream of
bytes and allows to receiving process to obtain as a stream.
• Create an imaginary “tube” that carries their data across the
internet.
ADAD 40
TCP Services
Sending and Receiving Buffers: Because sending and
receiving processes may not write or read data at the same
speed TCP needs buffer for storage.
Useful in Segmentation also.
ADAD 41
TCP Features
1. Numbering System: No segment number but, Segment
Number=(Sequence number and Acknowledgement number).
2. Byte Numbers: store byte into sending buffer and number
them (generate random numbers between 0 to 2^35-1)
3. Sequence Number: After the byte no. sequence number is
assigned. SN number for each segment is the number of the
first byte carried in that segment.
4. Acknowledgement Number: Conform the byte is received. And
define the number of byte that next except to receive.
5. Flow control
6. Error control
7. Congestion Control
ADAD 42
TCP Segments Format
ADAD 43
TCP Segment Fields
1. Source Port Address: 16 bit; sender’s port number.
2. Destination Port Address: 16-bit; receiver’s port number.
3. Sequence Number: 32-bit; Define the number assigned to the first
byte of data contained that segment.
4. Acknowledgement Number: 32-bit; define byte number that the
receiver of the segment is expecting (X) to receive from the other
party then reply would be X+1.
5. Header Length: 4-bit; header can be between 20 to 60 bytes.
6. Reserved: 6-bit; reserved for future.
7. Window size: 16-bit; value is normally referred to as receiving
window.
8. Checksum
9. Urgent Pointer: Valid only if urgent flag is set.
10. Options: any optional data.
ADAD 44
TCP Segment Fields
7. Control: 6 different flags.
ADAD 45
Flag Description
URG 16-bit; valid only if urgent flag is set; is used when segment contains
some urgent data.
ACK Successful Acknowledgement.
PSH PUSH similar to URG; tells the receiver to process these packets as they
are received instead of buffering them.
RST Reset the connection.
SYN Synchronization flag, is used as a first step in establishing a 3-way
handshake between two hosts
FIN Finished; Terminate the connection.
A TCP Connection
• Connection Oriented – use a virtual path between source
and destination.
• All the segments belong to a message are sent over this
path.
• Use a single path for entire message; acknowledgement
process and retransmission of damaged or lost frames.
• Path is virtual not physical.
• Three phases: Three-Way Handshaking
1. Connection Establishment
2. Data Transfer
3. Connection Termination
ADAD 46
TCP Connection Establishment
• Full-Duplex Mode
• For transmission/ communication of data each party has to
take permission of receiver.
• The process works like:
1. The server program tells its TCP that it is ready to accept a
connection (if it is passive).
2. The client program issue a request for an active open.
3. A client that need to establish a connection tells to the particular
server that it need to generate a connection.
4. Starts Three-way handshaking process.
5. Each connection shows Sequence number, acknowledgement
number, control flags and window size.
ADAD 47
1. TCP Connection Establishment Using Three-
way Handshake
ADAD 48
1. TCP Connection Establishment Using Three-
way Handshake
1. Client send first SYN segment, in which SYN flag is set for
synchronization of sequence number.
2. Server send two flag bits set: SYN+ACK.
3. Client send just an ACK segment just to acknowledge of
second segment from server.
Now connection is established.
And ready to transfer data.
ADAD 49
2. Data Transfer
ADAD 50
3. Connection Termination Using Three-Way
Handshake
ADAD 51
IP (Internet Protocol)
• Network layer protocol.
• Host-to-host delivery.
• Two main protocols are:
1. IPv4
2. IPv6
ADAD 52
1. IPv4
ADAD 53
2. IPv6
ADAD 54
ICMP
ADAD 55
ARP/ RARP
ADAD 56
OSI Model Vs TCP/IP
Comparison between OSI model and TCP/IP
ADAD 57
Comparison
ADAD 58
Ethernet Address
Comparison between OSI model and TCP/IP
ADAD 59
ARP/ RARP
ADAD 60

Contenu connexe

Tendances (20)

Ethernet
EthernetEthernet
Ethernet
 
OSI Model
OSI ModelOSI Model
OSI Model
 
Protocols and the TCP/IP Protocol Suite
Protocols and the TCP/IP Protocol SuiteProtocols and the TCP/IP Protocol Suite
Protocols and the TCP/IP Protocol Suite
 
iso osi model
 iso osi model iso osi model
iso osi model
 
Ipv4 and Ipv6
Ipv4 and Ipv6Ipv4 and Ipv6
Ipv4 and Ipv6
 
TCP/IP Protocols With All Layer Description
TCP/IP Protocols With All Layer DescriptionTCP/IP Protocols With All Layer Description
TCP/IP Protocols With All Layer Description
 
Transport layer protocol
Transport layer protocolTransport layer protocol
Transport layer protocol
 
Osi reference model
Osi reference modelOsi reference model
Osi reference model
 
OSI and TCPIP Model
OSI and TCPIP ModelOSI and TCPIP Model
OSI and TCPIP Model
 
Ip address and subnetting
Ip address and subnettingIp address and subnetting
Ip address and subnetting
 
Transport layer
Transport layer Transport layer
Transport layer
 
Basics of IP Addressing
Basics of IP AddressingBasics of IP Addressing
Basics of IP Addressing
 
Networking Standards And Protocols
Networking Standards And ProtocolsNetworking Standards And Protocols
Networking Standards And Protocols
 
Ip address
Ip addressIp address
Ip address
 
Network switch
Network switchNetwork switch
Network switch
 
TCP-IP Reference Model
TCP-IP Reference ModelTCP-IP Reference Model
TCP-IP Reference Model
 
computer network OSI layer
computer network OSI layercomputer network OSI layer
computer network OSI layer
 
Network protocals
Network protocalsNetwork protocals
Network protocals
 
IP addressing seminar ppt
IP addressing seminar pptIP addressing seminar ppt
IP addressing seminar ppt
 
Dhcp ppt
Dhcp pptDhcp ppt
Dhcp ppt
 

Similaire à OSI model and TCP/IP model

layering.pdf
layering.pdflayering.pdf
layering.pdfBoostHub
 
Networking essentials lect1
Networking essentials lect1Networking essentials lect1
Networking essentials lect1Roman Brovko
 
3131471Scanned.ppt
3131471Scanned.ppt3131471Scanned.ppt
3131471Scanned.pptssuserf21d85
 
Lecture 1 Network Reference Models Final.pptx
Lecture 1 Network Reference Models Final.pptxLecture 1 Network Reference Models Final.pptx
Lecture 1 Network Reference Models Final.pptxRonoh Kennedy
 
LECTURE-Transport-Layer_lec.ppt
LECTURE-Transport-Layer_lec.pptLECTURE-Transport-Layer_lec.ppt
LECTURE-Transport-Layer_lec.pptMonirHossain707319
 
Lecture 2 -_understanding_networks_2013
Lecture 2 -_understanding_networks_2013Lecture 2 -_understanding_networks_2013
Lecture 2 -_understanding_networks_2013Travis Leong Ping
 
10. tcp ip and do d model
10. tcp ip and do d model10. tcp ip and do d model
10. tcp ip and do d modelSwarndeep Singh
 
Networking Fundamentals
Networking Fundamentals Networking Fundamentals
Networking Fundamentals Vikas Gupta
 
Computer networking (nnm)
Computer networking (nnm)Computer networking (nnm)
Computer networking (nnm)nnmaurya
 
210202021018701 suratNetworkSecurity.ppt
210202021018701 suratNetworkSecurity.ppt210202021018701 suratNetworkSecurity.ppt
210202021018701 suratNetworkSecurity.pptjayvagasiya136
 

Similaire à OSI model and TCP/IP model (20)

layering.pdf
layering.pdflayering.pdf
layering.pdf
 
Networking essentials lect1
Networking essentials lect1Networking essentials lect1
Networking essentials lect1
 
Lecture set 7
Lecture set 7Lecture set 7
Lecture set 7
 
3131471Scanned.ppt
3131471Scanned.ppt3131471Scanned.ppt
3131471Scanned.ppt
 
Lecture 1 Network Reference Models Final.pptx
Lecture 1 Network Reference Models Final.pptxLecture 1 Network Reference Models Final.pptx
Lecture 1 Network Reference Models Final.pptx
 
LECTURE-Transport-Layer_lec.ppt
LECTURE-Transport-Layer_lec.pptLECTURE-Transport-Layer_lec.ppt
LECTURE-Transport-Layer_lec.ppt
 
Module 1 slides
Module 1 slidesModule 1 slides
Module 1 slides
 
Lecture 2 -_understanding_networks_2013
Lecture 2 -_understanding_networks_2013Lecture 2 -_understanding_networks_2013
Lecture 2 -_understanding_networks_2013
 
NP-lab-manual (1).pdf
NP-lab-manual (1).pdfNP-lab-manual (1).pdf
NP-lab-manual (1).pdf
 
NP-lab-manual.pdf
NP-lab-manual.pdfNP-lab-manual.pdf
NP-lab-manual.pdf
 
NP-lab-manual.docx
NP-lab-manual.docxNP-lab-manual.docx
NP-lab-manual.docx
 
TCP Vs UDP
TCP Vs UDP TCP Vs UDP
TCP Vs UDP
 
10. tcp ip and do d model
10. tcp ip and do d model10. tcp ip and do d model
10. tcp ip and do d model
 
OSI model.pptx
OSI model.pptxOSI model.pptx
OSI model.pptx
 
Networking Fundamentals
Networking Fundamentals Networking Fundamentals
Networking Fundamentals
 
Computer networking (nnm)
Computer networking (nnm)Computer networking (nnm)
Computer networking (nnm)
 
210202021018701 suratNetworkSecurity.ppt
210202021018701 suratNetworkSecurity.ppt210202021018701 suratNetworkSecurity.ppt
210202021018701 suratNetworkSecurity.ppt
 
computerNetworkSecurity.ppt
computerNetworkSecurity.pptcomputerNetworkSecurity.ppt
computerNetworkSecurity.ppt
 
Networking
NetworkingNetworking
Networking
 
Internetworking
InternetworkingInternetworking
Internetworking
 

Plus de Rubal Sagwal

Introduction to Information Security
Introduction to Information SecurityIntroduction to Information Security
Introduction to Information SecurityRubal Sagwal
 
Cloud and Virtualization Security
Cloud and Virtualization SecurityCloud and Virtualization Security
Cloud and Virtualization SecurityRubal Sagwal
 
Cloud and Virtualization (Using Virtualization to form Clouds)
Cloud and Virtualization (Using Virtualization to form Clouds)Cloud and Virtualization (Using Virtualization to form Clouds)
Cloud and Virtualization (Using Virtualization to form Clouds)Rubal Sagwal
 
ER Modeling and Introduction to RDBMS
ER Modeling and Introduction to RDBMSER Modeling and Introduction to RDBMS
ER Modeling and Introduction to RDBMSRubal Sagwal
 
Database Models, Client-Server Architecture, Distributed Database and Classif...
Database Models, Client-Server Architecture, Distributed Database and Classif...Database Models, Client-Server Architecture, Distributed Database and Classif...
Database Models, Client-Server Architecture, Distributed Database and Classif...Rubal Sagwal
 
Overview of Data Base Systems Concepts and Architecture
Overview of Data Base Systems Concepts and ArchitectureOverview of Data Base Systems Concepts and Architecture
Overview of Data Base Systems Concepts and ArchitectureRubal Sagwal
 
Practical Implementation of Virtual Machine
Practical Implementation of Virtual MachinePractical Implementation of Virtual Machine
Practical Implementation of Virtual MachineRubal Sagwal
 
Principles of Virtualization - Introduction to Virtualization Software
Principles of Virtualization - Introduction to Virtualization Software Principles of Virtualization - Introduction to Virtualization Software
Principles of Virtualization - Introduction to Virtualization Software Rubal Sagwal
 
Accessing virtualized published applications
Accessing virtualized published applicationsAccessing virtualized published applications
Accessing virtualized published applicationsRubal Sagwal
 
Prepare and Manage Remote Applications through Virtualization
Prepare and Manage Remote Applications through Virtualization      Prepare and Manage Remote Applications through Virtualization
Prepare and Manage Remote Applications through Virtualization Rubal Sagwal
 
Managing Virtual Hard Disk and Virtual Machine Resources
Managing Virtual Hard Disk and Virtual Machine ResourcesManaging Virtual Hard Disk and Virtual Machine Resources
Managing Virtual Hard Disk and Virtual Machine ResourcesRubal Sagwal
 
Configure and Manage Virtualization on different Platforms
Configure and Manage Virtualization on different Platforms Configure and Manage Virtualization on different Platforms
Configure and Manage Virtualization on different Platforms Rubal Sagwal
 
Virtualization Uses - Server Consolidation
Virtualization Uses - Server Consolidation Virtualization Uses - Server Consolidation
Virtualization Uses - Server Consolidation Rubal Sagwal
 
Principles of virtualization
Principles of virtualizationPrinciples of virtualization
Principles of virtualizationRubal Sagwal
 
Troubleshooting Network and Network Utilities
Troubleshooting Network and Network UtilitiesTroubleshooting Network and Network Utilities
Troubleshooting Network and Network UtilitiesRubal Sagwal
 
Application Layer and Protocols
Application Layer and ProtocolsApplication Layer and Protocols
Application Layer and ProtocolsRubal Sagwal
 
Basics of Network Layer and Transport Layer
Basics of Network Layer and Transport LayerBasics of Network Layer and Transport Layer
Basics of Network Layer and Transport LayerRubal Sagwal
 
Wireless Technologies and Standards
Wireless Technologies and StandardsWireless Technologies and Standards
Wireless Technologies and StandardsRubal Sagwal
 
Ethernet, Point-to-Point Protocol, ARP
Ethernet, Point-to-Point Protocol, ARP Ethernet, Point-to-Point Protocol, ARP
Ethernet, Point-to-Point Protocol, ARP Rubal Sagwal
 
Basics of Computer Network Device
Basics of Computer Network DeviceBasics of Computer Network Device
Basics of Computer Network DeviceRubal Sagwal
 

Plus de Rubal Sagwal (20)

Introduction to Information Security
Introduction to Information SecurityIntroduction to Information Security
Introduction to Information Security
 
Cloud and Virtualization Security
Cloud and Virtualization SecurityCloud and Virtualization Security
Cloud and Virtualization Security
 
Cloud and Virtualization (Using Virtualization to form Clouds)
Cloud and Virtualization (Using Virtualization to form Clouds)Cloud and Virtualization (Using Virtualization to form Clouds)
Cloud and Virtualization (Using Virtualization to form Clouds)
 
ER Modeling and Introduction to RDBMS
ER Modeling and Introduction to RDBMSER Modeling and Introduction to RDBMS
ER Modeling and Introduction to RDBMS
 
Database Models, Client-Server Architecture, Distributed Database and Classif...
Database Models, Client-Server Architecture, Distributed Database and Classif...Database Models, Client-Server Architecture, Distributed Database and Classif...
Database Models, Client-Server Architecture, Distributed Database and Classif...
 
Overview of Data Base Systems Concepts and Architecture
Overview of Data Base Systems Concepts and ArchitectureOverview of Data Base Systems Concepts and Architecture
Overview of Data Base Systems Concepts and Architecture
 
Practical Implementation of Virtual Machine
Practical Implementation of Virtual MachinePractical Implementation of Virtual Machine
Practical Implementation of Virtual Machine
 
Principles of Virtualization - Introduction to Virtualization Software
Principles of Virtualization - Introduction to Virtualization Software Principles of Virtualization - Introduction to Virtualization Software
Principles of Virtualization - Introduction to Virtualization Software
 
Accessing virtualized published applications
Accessing virtualized published applicationsAccessing virtualized published applications
Accessing virtualized published applications
 
Prepare and Manage Remote Applications through Virtualization
Prepare and Manage Remote Applications through Virtualization      Prepare and Manage Remote Applications through Virtualization
Prepare and Manage Remote Applications through Virtualization
 
Managing Virtual Hard Disk and Virtual Machine Resources
Managing Virtual Hard Disk and Virtual Machine ResourcesManaging Virtual Hard Disk and Virtual Machine Resources
Managing Virtual Hard Disk and Virtual Machine Resources
 
Configure and Manage Virtualization on different Platforms
Configure and Manage Virtualization on different Platforms Configure and Manage Virtualization on different Platforms
Configure and Manage Virtualization on different Platforms
 
Virtualization Uses - Server Consolidation
Virtualization Uses - Server Consolidation Virtualization Uses - Server Consolidation
Virtualization Uses - Server Consolidation
 
Principles of virtualization
Principles of virtualizationPrinciples of virtualization
Principles of virtualization
 
Troubleshooting Network and Network Utilities
Troubleshooting Network and Network UtilitiesTroubleshooting Network and Network Utilities
Troubleshooting Network and Network Utilities
 
Application Layer and Protocols
Application Layer and ProtocolsApplication Layer and Protocols
Application Layer and Protocols
 
Basics of Network Layer and Transport Layer
Basics of Network Layer and Transport LayerBasics of Network Layer and Transport Layer
Basics of Network Layer and Transport Layer
 
Wireless Technologies and Standards
Wireless Technologies and StandardsWireless Technologies and Standards
Wireless Technologies and Standards
 
Ethernet, Point-to-Point Protocol, ARP
Ethernet, Point-to-Point Protocol, ARP Ethernet, Point-to-Point Protocol, ARP
Ethernet, Point-to-Point Protocol, ARP
 
Basics of Computer Network Device
Basics of Computer Network DeviceBasics of Computer Network Device
Basics of Computer Network Device
 

Dernier

Call Girls Wakad Call Me 7737669865 Budget Friendly No Advance Booking
Call Girls Wakad Call Me 7737669865 Budget Friendly No Advance BookingCall Girls Wakad Call Me 7737669865 Budget Friendly No Advance Booking
Call Girls Wakad Call Me 7737669865 Budget Friendly No Advance Bookingroncy bisnoi
 
Work-Permit-Receiver-in-Saudi-Aramco.pptx
Work-Permit-Receiver-in-Saudi-Aramco.pptxWork-Permit-Receiver-in-Saudi-Aramco.pptx
Work-Permit-Receiver-in-Saudi-Aramco.pptxJuliansyahHarahap1
 
Unleashing the Power of the SORA AI lastest leap
Unleashing the Power of the SORA AI lastest leapUnleashing the Power of the SORA AI lastest leap
Unleashing the Power of the SORA AI lastest leapRishantSharmaFr
 
Design For Accessibility: Getting it right from the start
Design For Accessibility: Getting it right from the startDesign For Accessibility: Getting it right from the start
Design For Accessibility: Getting it right from the startQuintin Balsdon
 
Unit 2- Effective stress & Permeability.pdf
Unit 2- Effective stress & Permeability.pdfUnit 2- Effective stress & Permeability.pdf
Unit 2- Effective stress & Permeability.pdfRagavanV2
 
Call Girls Pimpri Chinchwad Call Me 7737669865 Budget Friendly No Advance Boo...
Call Girls Pimpri Chinchwad Call Me 7737669865 Budget Friendly No Advance Boo...Call Girls Pimpri Chinchwad Call Me 7737669865 Budget Friendly No Advance Boo...
Call Girls Pimpri Chinchwad Call Me 7737669865 Budget Friendly No Advance Boo...roncy bisnoi
 
Hazard Identification (HAZID) vs. Hazard and Operability (HAZOP): A Comparati...
Hazard Identification (HAZID) vs. Hazard and Operability (HAZOP): A Comparati...Hazard Identification (HAZID) vs. Hazard and Operability (HAZOP): A Comparati...
Hazard Identification (HAZID) vs. Hazard and Operability (HAZOP): A Comparati...soginsider
 
ONLINE FOOD ORDER SYSTEM PROJECT REPORT.pdf
ONLINE FOOD ORDER SYSTEM PROJECT REPORT.pdfONLINE FOOD ORDER SYSTEM PROJECT REPORT.pdf
ONLINE FOOD ORDER SYSTEM PROJECT REPORT.pdfKamal Acharya
 
Minimum and Maximum Modes of microprocessor 8086
Minimum and Maximum Modes of microprocessor 8086Minimum and Maximum Modes of microprocessor 8086
Minimum and Maximum Modes of microprocessor 8086anil_gaur
 
KubeKraft presentation @CloudNativeHooghly
KubeKraft presentation @CloudNativeHooghlyKubeKraft presentation @CloudNativeHooghly
KubeKraft presentation @CloudNativeHooghlysanyuktamishra911
 
Block diagram reduction techniques in control systems.ppt
Block diagram reduction techniques in control systems.pptBlock diagram reduction techniques in control systems.ppt
Block diagram reduction techniques in control systems.pptNANDHAKUMARA10
 
XXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXX
XXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXX
XXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXssuser89054b
 
chapter 5.pptx: drainage and irrigation engineering
chapter 5.pptx: drainage and irrigation engineeringchapter 5.pptx: drainage and irrigation engineering
chapter 5.pptx: drainage and irrigation engineeringmulugeta48
 
data_management_and _data_science_cheat_sheet.pdf
data_management_and _data_science_cheat_sheet.pdfdata_management_and _data_science_cheat_sheet.pdf
data_management_and _data_science_cheat_sheet.pdfJiananWang21
 
COST-EFFETIVE and Energy Efficient BUILDINGS ptx
COST-EFFETIVE  and Energy Efficient BUILDINGS ptxCOST-EFFETIVE  and Energy Efficient BUILDINGS ptx
COST-EFFETIVE and Energy Efficient BUILDINGS ptxJIT KUMAR GUPTA
 

Dernier (20)

Call Girls Wakad Call Me 7737669865 Budget Friendly No Advance Booking
Call Girls Wakad Call Me 7737669865 Budget Friendly No Advance BookingCall Girls Wakad Call Me 7737669865 Budget Friendly No Advance Booking
Call Girls Wakad Call Me 7737669865 Budget Friendly No Advance Booking
 
Work-Permit-Receiver-in-Saudi-Aramco.pptx
Work-Permit-Receiver-in-Saudi-Aramco.pptxWork-Permit-Receiver-in-Saudi-Aramco.pptx
Work-Permit-Receiver-in-Saudi-Aramco.pptx
 
Unleashing the Power of the SORA AI lastest leap
Unleashing the Power of the SORA AI lastest leapUnleashing the Power of the SORA AI lastest leap
Unleashing the Power of the SORA AI lastest leap
 
Design For Accessibility: Getting it right from the start
Design For Accessibility: Getting it right from the startDesign For Accessibility: Getting it right from the start
Design For Accessibility: Getting it right from the start
 
(INDIRA) Call Girl Aurangabad Call Now 8617697112 Aurangabad Escorts 24x7
(INDIRA) Call Girl Aurangabad Call Now 8617697112 Aurangabad Escorts 24x7(INDIRA) Call Girl Aurangabad Call Now 8617697112 Aurangabad Escorts 24x7
(INDIRA) Call Girl Aurangabad Call Now 8617697112 Aurangabad Escorts 24x7
 
Unit 2- Effective stress & Permeability.pdf
Unit 2- Effective stress & Permeability.pdfUnit 2- Effective stress & Permeability.pdf
Unit 2- Effective stress & Permeability.pdf
 
Call Girls Pimpri Chinchwad Call Me 7737669865 Budget Friendly No Advance Boo...
Call Girls Pimpri Chinchwad Call Me 7737669865 Budget Friendly No Advance Boo...Call Girls Pimpri Chinchwad Call Me 7737669865 Budget Friendly No Advance Boo...
Call Girls Pimpri Chinchwad Call Me 7737669865 Budget Friendly No Advance Boo...
 
Hazard Identification (HAZID) vs. Hazard and Operability (HAZOP): A Comparati...
Hazard Identification (HAZID) vs. Hazard and Operability (HAZOP): A Comparati...Hazard Identification (HAZID) vs. Hazard and Operability (HAZOP): A Comparati...
Hazard Identification (HAZID) vs. Hazard and Operability (HAZOP): A Comparati...
 
ONLINE FOOD ORDER SYSTEM PROJECT REPORT.pdf
ONLINE FOOD ORDER SYSTEM PROJECT REPORT.pdfONLINE FOOD ORDER SYSTEM PROJECT REPORT.pdf
ONLINE FOOD ORDER SYSTEM PROJECT REPORT.pdf
 
Cara Menggugurkan Sperma Yang Masuk Rahim Biyar Tidak Hamil
Cara Menggugurkan Sperma Yang Masuk Rahim Biyar Tidak HamilCara Menggugurkan Sperma Yang Masuk Rahim Biyar Tidak Hamil
Cara Menggugurkan Sperma Yang Masuk Rahim Biyar Tidak Hamil
 
Minimum and Maximum Modes of microprocessor 8086
Minimum and Maximum Modes of microprocessor 8086Minimum and Maximum Modes of microprocessor 8086
Minimum and Maximum Modes of microprocessor 8086
 
Integrated Test Rig For HTFE-25 - Neometrix
Integrated Test Rig For HTFE-25 - NeometrixIntegrated Test Rig For HTFE-25 - Neometrix
Integrated Test Rig For HTFE-25 - Neometrix
 
KubeKraft presentation @CloudNativeHooghly
KubeKraft presentation @CloudNativeHooghlyKubeKraft presentation @CloudNativeHooghly
KubeKraft presentation @CloudNativeHooghly
 
Block diagram reduction techniques in control systems.ppt
Block diagram reduction techniques in control systems.pptBlock diagram reduction techniques in control systems.ppt
Block diagram reduction techniques in control systems.ppt
 
XXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXX
XXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXX
XXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXX
 
(INDIRA) Call Girl Bhosari Call Now 8617697112 Bhosari Escorts 24x7
(INDIRA) Call Girl Bhosari Call Now 8617697112 Bhosari Escorts 24x7(INDIRA) Call Girl Bhosari Call Now 8617697112 Bhosari Escorts 24x7
(INDIRA) Call Girl Bhosari Call Now 8617697112 Bhosari Escorts 24x7
 
Call Now ≽ 9953056974 ≼🔝 Call Girls In New Ashok Nagar ≼🔝 Delhi door step de...
Call Now ≽ 9953056974 ≼🔝 Call Girls In New Ashok Nagar  ≼🔝 Delhi door step de...Call Now ≽ 9953056974 ≼🔝 Call Girls In New Ashok Nagar  ≼🔝 Delhi door step de...
Call Now ≽ 9953056974 ≼🔝 Call Girls In New Ashok Nagar ≼🔝 Delhi door step de...
 
chapter 5.pptx: drainage and irrigation engineering
chapter 5.pptx: drainage and irrigation engineeringchapter 5.pptx: drainage and irrigation engineering
chapter 5.pptx: drainage and irrigation engineering
 
data_management_and _data_science_cheat_sheet.pdf
data_management_and _data_science_cheat_sheet.pdfdata_management_and _data_science_cheat_sheet.pdf
data_management_and _data_science_cheat_sheet.pdf
 
COST-EFFETIVE and Energy Efficient BUILDINGS ptx
COST-EFFETIVE  and Energy Efficient BUILDINGS ptxCOST-EFFETIVE  and Energy Efficient BUILDINGS ptx
COST-EFFETIVE and Energy Efficient BUILDINGS ptx
 

OSI model and TCP/IP model

  • 1. Computer Networks OSI Model and Protocols Date: Department of Computer Engineering Presented By: Rubal Sagwal NIT, Kurukshetra Department of Computer Engineering 1ADAD
  • 2. Contents • Introduction to Layers and Protocols. • OSI Model • OSI Model layer functioning. • TCP/IP Model • Addressing scheme ADAD 2
  • 3. OSI Model(activity) Introduction to OSI – Functions of Seven Layers ADAD 3
  • 4. What is Layer ADAD 4 Network Hardware Physical devices Software Set of Instructions Layers
  • 6. OSI Model • Open System Interconnection. • Firstly introduced in 1970s. • An open system is a set of protocols that allow any two different systems to communicate. • Protocols: Set of rules. • OSI model itself is not a protocol, it is a model that define protocols for network communication. • Seven separate but related layers. ADAD 6
  • 8. Encapsulation • A packet (header and data) at level 7 is encapsulated in a packet at level 6. • The whole packet at level 6 is encapsulated in a packet at level 5 and so on. ADAD 8
  • 9. Layers in OSI Model Functions of Seven Layers ADAD 9
  • 10. Organization of Layers • 7 layers can be thought of belonging to three subgroup. • These are: ADAD 10 Layer 1 • Physical • Data link • Network Layer 2 • Transport layer Layer 3 • Session • Presentation • Application
  • 11. 1. Physical Layer Physical characteristics of interfaces and medium: Define physical transmission medium (Guided or Unguided). Interface between devices and transmission medium. Representation of bits: PL consist of bits (0s and 1s), so, data -> bits ->signals (electrical or optical). Data rate  Transmission rate (means the number of bits sent per second). Synchronization of bits: Sender and receiver must not receive the same bit rate but must be at same time (synchronized clock0. ADAD 11
  • 12. 1. Physical Layer Line configuration: Connection (point-to-point or multipoint) of devices to the medium. Physical topology: Topological Structure (Bus, Star, Mesh etc) Transmission mode: Simplex, half-duplex or full duplex. ADAD 12
  • 13. 2. Data Link Layer Framing: Arranging bit streams into Data Frames. Physical addressing (machine address): Add header to the frame to define the sender and receiver of the data packet. Flow Control; Not to overload receiver Error Control: Error Free Access Control: Which device has access to the link at specific time instance. ADAD 13
  • 14. 3. Network Layer Source-to-destination delivery Logical Addressing (network address) Routing ADAD 14
  • 15. 4. Transport Layer Process-to-process delivery (applications) Service-point addressing: Send data to the correct process on particular computer. Segmentation and reassembly Divide into segments and assign sequence number. Reassembly at destination according to sequence number. Connection control Connectionless or connection oriented Flow control Error control Without damage, loss or duplication ADAD 15
  • 16. 5. Session Layer It establish, maintains and synchronize the interaction among communicating systems. Dialog control (half-duplex or full duplex at application level) Synchronization ADAD 16
  • 17. 6. Presentation Layer Semantics and Syntax Translation: Change the format according receivers end. Encryption and Decryption Compression Reduce the size (Video, audio, images etc) ADAD 17
  • 18. 7. Application Layer User Interface File transfer, access and management Mail services Directory service (database) ADAD 18
  • 20. TCP/IP • Transmission Control Protocol / Internet Protocol. • Four Layers: ADAD 20 • Application Layer • Presentation Layer • Session Layer Application Layer • Data Link Layer • Physical Layer Transport Layer Internet Layer Host-to-Network (Network Interface) Layer
  • 22. TCP/IP Layer Functioning • PHYSICAL LAYER: Doesn’t define any specific protocol, define physical structure. • NETWORK LAYER: Supports internetworking protocol (ARP, RARP, ICMP and IGMP). • TRANSPORT LAYER: Responsible for delivery of message from a process to another process (TCP and UDP). • APPLICATION LAYER: Is a combination of Session, Presentation and Application Layer of OSI Model. ADAD 22
  • 23. Addressing Physical – Logical – Port – Specific Address ADAD 23
  • 24. Relationship of layers and Addresses in TCP/IP ADAD 24 • SPECIFIC ADDRESS • (Processes) Application Layer • PORT ADDRESS • (SCTP, TCP, UDP)Transport Layer • LOGICAL ADDRESS • (IP and other protocols)Network Layer • PHYSIAL ADDRESS • (Underlying physical Networks) Host-to- network
  • 25. Physical Address • Address of a node as defined by LAN or WAN. • Included in the frame used by DLL (Data link layer). • Address format depends upon network. ADAD 25
  • 26. Logical Address • IP Address. • Used for Universal Communication. • Identify each host uniquely in a network. • Currently is 32 bit address. ADAD 26
  • 27. Port Address • Process Address. • For example: Computer A can communicate with computer B by using TALNET. At the same time A can communicate with C using File transfer Protocol. For these process to receive data simultaneously we need method to label the process, i.e Port Address. ADAD 27
  • 28. Specific Address • URLs (www.google.com) • Email Address (abc123@gmail.com) ADAD 28
  • 29. Protocols TCP – UDP – IP – ICMP – ARP/RARP ADAD 29
  • 31. Delivery Process 1. Node-to-Node Delivery: The Data link layer is responsible for delivery of frames between two neighboring nodes over a link, called node-to-node delivery. 2. Host-to-Host: Network layer is responsible for delivery of datagrams between two hosts. 3. Process-to-Process: Transport layer is responsible for delivery of data from process-to-process (application program). ADAD 31
  • 32. Connectionless Vs Connection Oriented Connectionless • For sending data from source to destination, no need to establish any connection. • Packets are not numbered; they may be delayed or lost may arrive out of sequence. • No acknowledgement. • Ex: UDP Connection Oriented • Connection is first established between the sender and the receiver. • Data are transferred. • Connection is released. • Ex: TCP and SCTP. ADAD 32
  • 33. UDP • User Datagram Protocol. • Connectionless Protocol and Unreliable (No flow and error control). • Then why are we using it? • Very simple protocol. • If a process wants to send a small message and does not care much about reliability. • For small message (no need to generate any connection). • Multicasting ADAD 33
  • 34. Well known port used by UDP • Command for Unix: $grep ftp /etc/services ftp 21/udp ADAD 34 Port Protocol Description 7 Echo Print a received datagram back to sender. 9 Discard Discards any datagram that is received. 11 User Active user. 13 Daytime Returns the date and time 53 Nameserver Domain Name Service
  • 35. User datagram of UDP • UDP packets called User Datagrams, have fixed size header of 8 bytes. Fields are as follows: 1. Source Port Number: Used by process running on the source host. • 16 bit long (range from 0 to 216 = 65535) 2. Destination Port Number: used by the process running on destination host. • 16 bit long. 3. Length: 16-bit long (0 to 65535). • Define the length of user datagram header plus data. UDP datagram length field is not that much important because it is encapsulated within IP packet. 4. Checksum: for detection of error. ADAD 35
  • 36. Operation of UDP • Connectionless Services: it means each datagram sent by UDP is independent datagram. • There is no relationship between the different user datagram even if they are coming from same source process or going to same destination. • Are not numbered (nothing common). • No connection establishment, no termination. • Can’t send stream of data and chop them into different related datagrams. • Only for short messages that can fit into one datagram. • Flow and Error Control: Very simple and unreliable. • No flow control hence no windows, can overflow. • Sender doesn’t know message has lost or duplicate, except a small checksum that is not enough. • Encapsulation and Decapsulation: within IP datagram. ADAD 36
  • 37. Use of UDP • Suitable for process that requires simple request- response communication, like FTP. • Suitable for a process with internal flow and error control like Trivial File Transfer Protocol (which has its own error and flow control). • Suitable for multicasting. • Used for route updating protocol. ADAD 37
  • 38. TCP • Transmission Control Protocol. • Like UDP, use port numbers. • Connection oriented (create virtual connection between two TCPs to send data). • Use flow and error control. • Full duplex communication. • Connection oriented and reliable protocol. ADAD 38
  • 39. TCP Services 1. Process-to-Process communication: Using port numbers. ADAD 39 Port Protocol Description 7 Echo Print a received datagram back to sender. 9 Discard Discards any datagram that is received. 11 User Active user. 13 Daytime Returns the date and time 20 FTP, Data File transfer Protocol(data connection) 21 FTP, Control FTP (control connection) 25 SMTP Simple Mail Transfer Protocol 53 Nameserver Domain Name Service 80 HTTP Hypertext Transfer Protocol
  • 40. TCP Services 2. Stream Delivery Services: Stream Oriented Protocol. • Allow the sending process to deliver data as a stream of bytes and allows to receiving process to obtain as a stream. • Create an imaginary “tube” that carries their data across the internet. ADAD 40
  • 41. TCP Services Sending and Receiving Buffers: Because sending and receiving processes may not write or read data at the same speed TCP needs buffer for storage. Useful in Segmentation also. ADAD 41
  • 42. TCP Features 1. Numbering System: No segment number but, Segment Number=(Sequence number and Acknowledgement number). 2. Byte Numbers: store byte into sending buffer and number them (generate random numbers between 0 to 2^35-1) 3. Sequence Number: After the byte no. sequence number is assigned. SN number for each segment is the number of the first byte carried in that segment. 4. Acknowledgement Number: Conform the byte is received. And define the number of byte that next except to receive. 5. Flow control 6. Error control 7. Congestion Control ADAD 42
  • 44. TCP Segment Fields 1. Source Port Address: 16 bit; sender’s port number. 2. Destination Port Address: 16-bit; receiver’s port number. 3. Sequence Number: 32-bit; Define the number assigned to the first byte of data contained that segment. 4. Acknowledgement Number: 32-bit; define byte number that the receiver of the segment is expecting (X) to receive from the other party then reply would be X+1. 5. Header Length: 4-bit; header can be between 20 to 60 bytes. 6. Reserved: 6-bit; reserved for future. 7. Window size: 16-bit; value is normally referred to as receiving window. 8. Checksum 9. Urgent Pointer: Valid only if urgent flag is set. 10. Options: any optional data. ADAD 44
  • 45. TCP Segment Fields 7. Control: 6 different flags. ADAD 45 Flag Description URG 16-bit; valid only if urgent flag is set; is used when segment contains some urgent data. ACK Successful Acknowledgement. PSH PUSH similar to URG; tells the receiver to process these packets as they are received instead of buffering them. RST Reset the connection. SYN Synchronization flag, is used as a first step in establishing a 3-way handshake between two hosts FIN Finished; Terminate the connection.
  • 46. A TCP Connection • Connection Oriented – use a virtual path between source and destination. • All the segments belong to a message are sent over this path. • Use a single path for entire message; acknowledgement process and retransmission of damaged or lost frames. • Path is virtual not physical. • Three phases: Three-Way Handshaking 1. Connection Establishment 2. Data Transfer 3. Connection Termination ADAD 46
  • 47. TCP Connection Establishment • Full-Duplex Mode • For transmission/ communication of data each party has to take permission of receiver. • The process works like: 1. The server program tells its TCP that it is ready to accept a connection (if it is passive). 2. The client program issue a request for an active open. 3. A client that need to establish a connection tells to the particular server that it need to generate a connection. 4. Starts Three-way handshaking process. 5. Each connection shows Sequence number, acknowledgement number, control flags and window size. ADAD 47
  • 48. 1. TCP Connection Establishment Using Three- way Handshake ADAD 48
  • 49. 1. TCP Connection Establishment Using Three- way Handshake 1. Client send first SYN segment, in which SYN flag is set for synchronization of sequence number. 2. Server send two flag bits set: SYN+ACK. 3. Client send just an ACK segment just to acknowledge of second segment from server. Now connection is established. And ready to transfer data. ADAD 49
  • 51. 3. Connection Termination Using Three-Way Handshake ADAD 51
  • 52. IP (Internet Protocol) • Network layer protocol. • Host-to-host delivery. • Two main protocols are: 1. IPv4 2. IPv6 ADAD 52
  • 57. OSI Model Vs TCP/IP Comparison between OSI model and TCP/IP ADAD 57
  • 59. Ethernet Address Comparison between OSI model and TCP/IP ADAD 59