SlideShare a Scribd company logo
1 of 32
(open systems interconnection)
             By: SAIF ULLAH KHAN
ο‚ž   The Open Systems Interconnection (OSI) model (ISO/IEC
    7498-1) is a product of the Open Systems
    Interconnection effort at the International Organization for
    Standardization
ο‚ž   Similar communication functions
    are grouped into logical layers
ο‚ž   Work on a layered model of network architecture was
    started and the International Organization for
    Standardization (ISO) began to develop its OSI framework
    architecture
ο‚ž   The concept of a seven-layer model was provided by the
    work of Charles Bachman, Honeywell Information Services
ο‚ž   Each entity interacted directly only with the layer
    immediately beneath it, and provided facilities for use by
    the layer above it
ο‚ž   Protocols enabled an entity in one host to interact with a
    corresponding entity at the same layer in another host
ο‚ž   According to recommendation X.200, there are seven
    layers, labeled 1 to 7, with layer 1 at the bottom
ο‚ž   Each layer is generically known as an N layer
ο‚ž   At each level, two entities (N-entity peers) interact by
    means of the N protocol by transmitting protocol data
    units (PDU)
ο‚ž   A Service Data Unit (SDU) is a specific unit of data that has
    been passed down from an OSI layer to a lower layer, and
    which the lower layer has not yet encapsulated into a
    protocol data unit (PDU)
ο‚ž   An SDU is a set of data that is sent by a user of the services
    of a given layer, and is transmitted semantically unchanged
    to a peer service user
ο‚ž   The PDU at a layer N is the SDU of layer N-1
ο‚ž   In effect the SDU is the 'payload' of a given PDU
ο‚ž   That is, the process of changing an SDU to a PDU, consists
    of an encapsulation process, performed by the lower layer
ο‚ž   All the data contained in the SDU becomes encapsulated
    within the PDU
ο‚ž   The layer N-1 adds headers or footers, or both, to the SDU,
    transforming it into a PDU of layer N-1
ο‚ž   The added headers or footers are part of the process used
    to make it possible to get data from a source to a
    destination
ο‚ž   The physical layer defines electrical and physical
    specifications for devices
ο‚ž   it defines the relationship between a device and
    a transmission medium, such as a copper or fiber optical
    cable
ο‚ž   This includes the layout
    of pins, voltages, line impedance, cable specifications, sig
    nal timing, hubs, repeaters, network adapters, host bus
    adapters (HBA used in storage area networks) and more
ο‚ž   Parallel SCSI buses operate in this layer
ο‚ž   The same applies to other local-area networks, such
    as token ring, FDDI, ITU-T G.hn and IEEE 802.11, as well as
    personal area networks such as Bluetooth and IEEE
    802.15.4
Network
  Layer                        Functions                         Protocols
                                                                                  Component
                                                                                Repeater
                                                                   IEEE 802
                                                                                Multiplexer Hubs
                                                                   ISO 2110
            Transmits raw bit stream over physical cable
                                                                      ISDN
                                                                                    Passive
                                                                EIA/TIA-232
                                                                                    Active
                                                                EIA/TIA-449
            Defines cables, cards, and physical aspects        ITU-T V-Series         TDR
                                                                     I.430
            Establishment and termination of a connection to         I.431        Oscilloscope
            a communications medium                                   PDH
Physical
            Defines techniques to transfer bit stream to        SONET/SDH
Hardware;                                                                           Amplifier
            cable                                                     PON
Raw bit
                                                                      OTN
Stream      Participation in the process whereby the                   DSL
            communication resources are effectively shared        IEEE 1394
            among multiple users. For                            ITU-T G.hn
            example, contention resolution and flow control           PHY
            Modulation or conversion between the                      USB
            representation of digital data in user equipment      Bluetooth
            and the corresponding signals transmitted over a        RS-232
            communications channel                                  RS-449
ο‚ž   The data link layer provides the functional and procedural
    means to transfer data between network entities and to
    detect and possibly correct errors that may occur in the
    physical layer
ο‚ž   Data Link layer defines the format of data on the network
ο‚ž   In modern practice, only error detection, not flow control
    using sliding window, is present in data link protocols such
    as Point-to-Point Protocol (PPP), and, on local area
    networks, the IEEE 802.2 LLC layer is not used for most
    protocols on the Ethernet, and on other local area
    networks, its flow control and acknowledgment
    mechanisms are rarely used
ο‚ž   A network data frame, aka packet, includes checksum,
    source and destination address, and data
ο‚ž   The largest packet that can be sent through a data link
    layer defines the Maximum Transmission Unit (MTU)
ο‚ž   Sliding window flow control and acknowledgment is used
    at the transport layer by protocols such as TCP, but is still
    used in niches where X.25 offers performance advantages
ο‚ž   The data link layer handles the physical and logical
    connections to the packet's destination, using a network
    interface
ο‚ž   The ITU-T G.hn standard, which provides high-speed local
    area networking over existing wires (power lines, phone
    lines and coaxial cables), includes a complete data link
    layer which provides both error correction and flow control
    by means of a selective repeat Sliding Window Protocol
ο‚ž   Both WAN and LAN service arranges bits, from the physical
    layer, into logical sequences called frames
ο‚ž   A host connected to an Ethernet would have an Ethernet
    interface to handle connections to the outside world, and
    a loopback interface to send packets to itself
ο‚ž   Ethernet addresses a host using a unique, 48-bit address
    called its Ethernet address or Media Access Control (MAC)
    address
ο‚ž   MAC addresses are usually represented as six colon-
    separated pairs of hex digits, e.g., 8:0:20:11:ac:85
ο‚ž   This number is unique and is associated with a particular
    Ethernet device
Network
  Layer                        Function                                 Protocol
                                                                                            Component
                                                             Logical Link Control:
             Turns packets into raw bits 100101 and at       β€’ Error correction and flow      Bridge
             the receiving end turns bits into packets       control                          Switch
                                                             β€’ Control and defines SAPs
             Handles data frames between the Network
                                                             802.2 Logical Link Control     ISDN Router
             and Physical layers
                                                             Media Access Control
             The receiving end packages raw data from        β€’ communicates with the
                                                                                            Intelligent
             the Physical layer into data frames for         adapter card
                                                                                               Hub
Data layer   delivery to the Network layer                   β€’ controls the type of media
Link Data                                                    being used:
frames to                                                    802.3 CSMA/CD (Ethernet)
   bits      Responsible for error-free transfer of frames   802.4 Token Bus (ARC net)
                                                                                                NIC
             to other computer via the Physical Layer        802.5 Token Ring
                                                             802.12 Demand Priority

             This layer defines the methods used to
             transmit and receive data on the network. It    ATM , SDLC, HDLC, CSLIP
             consists of the wiring, the devices use to      SLIP , GFP, PLIP, IEEE802.2
                                                                                             Advanced
             connect the NIC to the wiring, the signaling    LLC , L2TP, IEEE 802.3
                                                                                            Cable Tester
             involved to transmit / receive data and the     Frame Relay, ITU-T G.hn
             ability to detect signaling errors on the       DLL , PPP, X.25
             network media
ο‚ž   The network layer provides the functional and procedural
    means of transferring variable length data sequences from
    a source host on one network to a destination host on a
    different network (in contrast to the data link layer which
    connects hosts within the same network), while
    maintaining the quality of service requested by the
    transport layer
ο‚ž   The network layer performs network routing functions, and
    might also perform fragmentation and reassembly, and
    report delivery errors
ο‚ž   Routers operate at this layer, sending data throughout the
    extended network and making the Internet possible.
ο‚ž   IP is responsible for routing, directing datagrams from one
    network to another
ο‚ž   The network layer may have to break large
    datagrams, larger than MTU, into smaller packets and host
    receiving the packet will have to reassemble the
    fragmented datagram
ο‚ž   The Internetwork Protocol identifies each host with a 32-
    bit IP address
ο‚ž   IP addresses are written as four dot-separated decimal
    numbers between 0 and 255, e.g., 129.79.16.40
ο‚ž   The leading 1-3 bytes of the IP identify the network and
    the remaining bytes identifies the host on that network.
ο‚ž   The Address Resolution Protocol (ARP) is used to map the
    IP address to it hardware address
ο‚ž   A number of layer-management protocols, a function
    defined in the Management Annex, ISO 7498/4, belong to
    the network layer
The network layer may be divided into three sub-layers:
ο‚ž Sub-network access
    ο‚‘   that considers protocols that deal with the interface to networks,
        such as X.25
ο‚ž   Sub-network (dependent convergence)
    ο‚‘   when it is necessary to bring the level of a transit network up to
        the level of networks on either side
ο‚ž   Sub-network (independent convergence)
    ο‚‘   handles transfer across multiple networks
Network
  Layer                                Function                             Protocols
                                                                                        Component


              Translates logical network address and names to their
                                                                                        Router Frame
              physical address (e.g. computer name ==> MAC address)
                                                                               IP
                                                                              ARP
                                                                             RARP
              Responsible for                                                ICMP
              β€’ Addressing                                                    RIP
 Network
              β€’ Determining routes for sending                               OSFP       Relay Device
Addressing;
              β€’ Managing network problems such as packet switching,          IGMP
  Routing
              data congestion and routing                                     IPX
                                                                            NWLink
                                                                            NetBEUI
                                                                              DDP        ATM Switch
              If router can’t send data frame as large as the source
                                                                            DECnet
              computer sends, the network layer compensates by
              breaking the data into smaller units. At the receiving end,                Advanced
              the network layer reassembles the data                                    Cable Tester
ο‚ž   Transport layer subdivides user-buffer into network-buffer
    sized datagrams and enforces desired transmission control
ο‚ž   The transport layer provides transparent transfer of data
    between end users, providing reliable data transfer
    services to the upper layers
ο‚ž   The transport layer controls the reliability of a given link
    through flow control, segmentation/de-segmentation, and
    error control
ο‚ž   Some protocols are state and connection-oriented
    ο‚‘ This means that the transport layer can keep track of
       the segments and retransmit those that fail.
ο‚ž   Two transport protocols, Transmission Control Protocol
    (TCP) and User Datagram Protocol (UDP), sits at the
    transport layer
ο‚ž   Reliability and speed are the primary difference between
    these two protocols
ο‚ž   TCP:
    ο‚‘ TCP establishes connections between two hosts on the
       network through 'sockets' which are determined by the
       IP address and port number
    ο‚‘ TCP keeps track of the packet delivery order and the
       packets that must be resent
ο‚ž   UDP:
    ο‚‘ UDP on the other hand provides a low overhead
       transmission service, but with less error checking.
ο‚ž   NFS (network file system) is built on top of UDP because of
    its speed and statelessness. Statelessness simplifies the
    crash recovery
ο‚ž   OSI defines five classes of connection-mode transport protocols ranging from class 0
    (which is also known as TP0 and provides the least features) to class 4
    (TP4, designed for less reliable networks, similar to the Internet)

      Feature Name                                             TP0   TP1   TP2   TP3   TP4

      Connection oriented network                              YES   YES   YES   YES   YES

      Connectionless network                                   NO    NO    NO    NO    YES

     Concatenation and separation                              NO    YES   YES   YES   YES

      Segmentation and reassembly                              YES   YES   YES   YES   YES

      Error Recovery                                           NO    YES   YES   YES   YES

      Reinitiate connection (if an excessive number
                                                               NO    YES   NO    YES   NO
      of PDUs are unacknowledged)
      Multiplexing and de-multiplexing over a single virtual
                                                               NO    NO    YES   YES   YES
      circuit

      Explicit flow control                                    NO    NO    YES   YES   YES

      Retransmission on timeout                                NO    NO    NO    NO    YES

      Reliable Transport Service                               NO    YES   NO    YES   YES
Network
    Layer                              Function                         Protocol
                                                                                    Component
                 Manages the flow control of data between parties         TCP
                                                                          ARP         Gateway
                 across the network
                                                                         RARP
                 Divides streams of data into chunks or packets; the      SPX          Brouter
  Transport      transport layer of the receiving computer              NWLink     (Bridge Router)
Packets; Flow    reassembles the message from packets                   NetBIOS
  control &      Provides error-checking to guarantee error-free data   NetBEUI    Advanced Cable
Error-handling   delivery, with on losses or duplications                 ATP          Tester
                                                                          UDP
                 Provides acknowledgment of successful transmissions;    SCTP
                 requests retransmission if some packets don’t arrive    DCCP
                 error-free                                               SPX
ο‚ž   The session protocol defines the format of the data sent over the
    connections
    ο‚‘ The NFS uses the Remote Procedure Call (RPC) for its session
      protocol
    ο‚‘ RPC may be built on either TCP or UDP
    ο‚‘ Login sessions uses TCP whereas NFS and broadcast use UDP
ο‚ž   The session layer controls the dialogues (connections) between
    computers
ο‚ž   It establishes, manages and terminates the connections between the
    local and remote application.
ο‚ž   It provides for full-duplex, half-duplex, or simplex operation, and
    establishes check pointing, adjournment, termination, and restart
    procedures
ο‚ž   The OSI model made this layer responsible for graceful close of
    sessions, which is a property of the Transmission Control Protocol,
    and also for session check pointing and recovery, which is not usually
    used in the Internet Protocol Suite
Network
 Layer                               Function                             Protocol
                                                                                     Component

            Establishes, maintains and ends sessions across the network
                                                                          NetBIOS
            Responsible for name recognition (identification) so only     Named
            the designated parties can participate in the session           Pipes
            Provides synchronization services by planning check points      Mail
            in the data stream => if session fails, only data after the     Slots
 Session
            most recent checkpoint need be transmitted                      RPC
Syncs and                                                                             Gateway
                                                                             SAP
 Sessions   Manages who can transmit data at a certain time and for         PPTP
            how long                                                         RTP
            Examples are interactive login and file transfer               SOCKS
            connections, the session would connect and re-connect if       SPDY
            there was an interruption; recognize names in sessions and    TLS/SSL
            register names in history
ο‚ž   The presentation layer establishes context between
    application-layer entities, in which the higher-layer
    entities may use different syntax and semantics if the
    presentation service provides a mapping between them
ο‚ž   External Data Representation (XDR) sits at the presentation
    level
    ο‚‘ It converts local representation of data to its canonical
       form and vice versa
ο‚ž   The canonical uses a standard byte ordering and structure
    packing convention, independent of the host
ο‚ž   If a mapping is available, presentation service data units
    are encapsulated into session protocol data units, and
    passed down the stack
ο‚ž   This layer provides independence from data representation
    (e.g., encryption) by translating between application and
    network formats
ο‚ž   The presentation layer transforms data into the form that
    the application accepts
ο‚ž   This layer formats and encrypts data to be sent across a
    network
ο‚ž   It is sometimes called the syntax layer
ο‚ž   The original presentation structure used the basic encoding
    rules of Abstract Syntax Notation One (ASN.1), with
    capabilities such as converting an EBCDIC-coded
    text file to an ASCII-coded file, or
    serialization of objects and other data structures from and
    to XML
Network
   Layer                                Function                            Protocol
                                                                                       Component
               Translates from application to network format and vice-
               versa
               All different formats from all sources are made into a
               common uniform format that the rest of the OSI model can
Presentation   understand                                                    MIME       Gateway
 Translation   Responsible for protocol conversion, character conversion,    XDR       Redirector
               data encryption / decryption, expanding graphics
               commands, data compression
               Sets standards for different systems to provide seamless
               communication from multiple protocol stacks
ο‚ž   Provide network services to the end-users
    ο‚‘ Mail, ftp, telnet, DNS, NIS, NFS are examples of network
      applications
ο‚ž   The application layer is the OSI layer closest to the end user,
    which means that both the OSI application layer and the user
    interact directly with the software application
ο‚ž   This layer interacts with software applications that
    implement a communicating component
ο‚ž   Application-layer functions typically include identifying
    communication partners, determining resource availability,
    and synchronizing communication
ο‚ž   When identifying communication partners, the application
    layer determines the identity and availability of
    communication partners for an application with data to
    transmit
ο‚ž   When determining resource availability, the application
    layer must decide whether sufficient network or the
    requested communication exist
ο‚ž   In synchronizing communication, all communication
    between applications requires cooperation that is managed
    by the application layer
ο‚ž   Some examples of application-layer implementations
    also include:
    ο‚‘   On OSI stack:
        ο‚’   FTAM File Transfer and Access Management Protocol
        ο‚’   X.400 Mail
        ο‚’   Common Management Information Protocol (CMIP)
    ο‚‘   On TCP/IP stack:
        ο‚’   Hypertext Transfer Protocol (HTTP),
        ο‚’   File Transfer Protocol (FTP),
        ο‚’   Simple Mail Transfer Protocol (SMTP)
        ο‚’   Simple Network Management Protocol (SNMP).
Network
  Layer                              Function                            Protocol     Componen
                                                                                          t
              Used for applications specifically written to run over      DNS, FTP
              the network                                              TFTP, BOOTP
                                                                       SNMP, RLOGIN
              Allows access to network services that support
                                                                         SMTP, MIME
              applications
                                                                        NFS, FINGER
Application   Directly represents the services that directly support    TELNET, NCP
    User      user applications                                          APPC, AFP    Gateway
 Interface                                                               SMB, NNTP
              Handles network access, flow control and error
                                                                           SIP, SSI
              recovery
                                                                       Gopher, HTTP
                                                                         NTP, SMPP
              Example apps are file transfer, e-mail, NetBIOS-
                                                                          Netconf,
              based applications
                                                                           (more)
ο‚ž   There are some functions or services that are not tied to a given layer, but they can affect
    more than one layer
ο‚ž   Examples include the following:
    ο‚‘   Security service (telecommunication) as defined by ITU-T X.800 Recommendation
    ο‚‘   management functions:
        ο‚’   functions that permit to configure, instantiate, monitor, terminate the
            communications of two or more entities: there is a specific application layer
            protocol, common management information protocol (CMIP) and its corresponding
            service, common management information service (CMIS), they need to interact
            with every layer in order to deal with their instances
    ο‚‘   ARP:
        ο‚’   It is used to translate IPv4 addresses (OSI layer 3) into Ethernet MAC addresses (OSI
            layer 2)
    ο‚‘   Multiprotocol Label Switching (MPLS):
        ο‚’   It operates at an OSI-model layer that is generally considered to lie between
            traditional definitions of layer 2 (data link layer) and layer 3 (network layer), and
            thus is often referred to as a "layer-2.5" protocol. It was designed to provide a
            unified data-carrying service for both circuit-based clients and packet-switching
            clients which provide a datagram service model. It can be used to carry many
            different kinds of traffic, including IP packets, as well as native ATM, SONET, and
            Ethernet frames
ο‚ž   In the TCP/IP model of the Internet, protocols are
    deliberately not as rigidly designed into strict layers as in
    the OSI model
ο‚ž   However, TCP/IP does recognize four broad layers of
    functionality which are derived from the operating scope
    of their contained protocols, namely the scope of the
    software application, the end-to-end transport connection,
    the internetworking range, and the scope of the direct
    links to other nodes on the local network
ο‚ž   Even though the concept is different from the OSI model,
    these layers are nevertheless often compared with the OSI
    layering scheme in the following way:
    ο‚‘   The Internet application layer includes the OSI application layer,
        presentation layer, and most of the session layer
ο‚‘ Its end-to-end transport layer includes the graceful close
      function of the OSI session layer as well as the OSI
      transport layer.
ο‚ž   The internetworking layer (Internet layer) is a subset of
    the OSI network layer, while the link layer includes the OSI
    data link and physical layers, as well as parts of OSI's
    network layer.
ο‚ž   These comparisons are based on the original seven-layer
    protocol model as defined in ISO 7498, rather than
    refinements in such things as the internal organization of
    the network layer document
Thank you for your time

More Related Content

What's hot

SPINS: Security Protocols for Sensor Networks
SPINS: Security Protocols for Sensor NetworksSPINS: Security Protocols for Sensor Networks
SPINS: Security Protocols for Sensor NetworksAbhijeet Awade
Β 
Point To Point Protocol
Point To Point ProtocolPoint To Point Protocol
Point To Point ProtocolPhan Vuong
Β 
TCP/IP Model
TCP/IP ModelTCP/IP Model
TCP/IP Modelfarhan516
Β 
Wireless routing protocols
Wireless routing protocolsWireless routing protocols
Wireless routing protocolsbarodia_1437
Β 
Destination Sequenced Distance Vector Routing (DSDV)
Destination Sequenced Distance Vector Routing (DSDV)Destination Sequenced Distance Vector Routing (DSDV)
Destination Sequenced Distance Vector Routing (DSDV)ArunChokkalingam
Β 
Configuration DHCP
Configuration DHCPConfiguration DHCP
Configuration DHCPTan Huynh Cong
Β 
Presentation on arp protocol
Presentation on arp protocolPresentation on arp protocol
Presentation on arp protocolMohd. Ahmad Siddiqi
Β 
Spanning tree protocol (stp)
Spanning tree protocol (stp)Spanning tree protocol (stp)
Spanning tree protocol (stp)RaghulR21
Β 
Congestion control
Congestion controlCongestion control
Congestion controlAman Jaiswal
Β 
Schedule and Contention based MAC protocols
Schedule and Contention based MAC protocolsSchedule and Contention based MAC protocols
Schedule and Contention based MAC protocolsDarwin Nesakumar
Β 
Cisco Networking (Routing and Switching)
Cisco Networking (Routing and Switching)Cisco Networking (Routing and Switching)
Cisco Networking (Routing and Switching)Alan Mark
Β 
Ppt of routing protocols
Ppt of routing protocolsPpt of routing protocols
Ppt of routing protocolsBhagyashri Dhoke
Β 
Distance Vector & Link state Routing Algorithm
Distance Vector & Link state Routing AlgorithmDistance Vector & Link state Routing Algorithm
Distance Vector & Link state Routing AlgorithmMOHIT AGARWAL
Β 
IP addressing and Subnetting PPT
IP addressing and Subnetting PPTIP addressing and Subnetting PPT
IP addressing and Subnetting PPTPijush Kanti Das
Β 
Subnetting Presentation
Subnetting PresentationSubnetting Presentation
Subnetting PresentationTouhidul Fahim
Β 

What's hot (20)

SPINS: Security Protocols for Sensor Networks
SPINS: Security Protocols for Sensor NetworksSPINS: Security Protocols for Sensor Networks
SPINS: Security Protocols for Sensor Networks
Β 
OSI Model
OSI ModelOSI Model
OSI Model
Β 
Point To Point Protocol
Point To Point ProtocolPoint To Point Protocol
Point To Point Protocol
Β 
TCP/IP Model
TCP/IP ModelTCP/IP Model
TCP/IP Model
Β 
Wireless routing protocols
Wireless routing protocolsWireless routing protocols
Wireless routing protocols
Β 
Leach protocol
Leach protocolLeach protocol
Leach protocol
Β 
Destination Sequenced Distance Vector Routing (DSDV)
Destination Sequenced Distance Vector Routing (DSDV)Destination Sequenced Distance Vector Routing (DSDV)
Destination Sequenced Distance Vector Routing (DSDV)
Β 
Configuration DHCP
Configuration DHCPConfiguration DHCP
Configuration DHCP
Β 
Presentation on arp protocol
Presentation on arp protocolPresentation on arp protocol
Presentation on arp protocol
Β 
Spanning tree protocol (stp)
Spanning tree protocol (stp)Spanning tree protocol (stp)
Spanning tree protocol (stp)
Β 
Congestion control
Congestion controlCongestion control
Congestion control
Β 
Schedule and Contention based MAC protocols
Schedule and Contention based MAC protocolsSchedule and Contention based MAC protocols
Schedule and Contention based MAC protocols
Β 
Cisco Networking (Routing and Switching)
Cisco Networking (Routing and Switching)Cisco Networking (Routing and Switching)
Cisco Networking (Routing and Switching)
Β 
Ppt of routing protocols
Ppt of routing protocolsPpt of routing protocols
Ppt of routing protocols
Β 
Data link layer
Data link layerData link layer
Data link layer
Β 
Distance Vector & Link state Routing Algorithm
Distance Vector & Link state Routing AlgorithmDistance Vector & Link state Routing Algorithm
Distance Vector & Link state Routing Algorithm
Β 
IP addressing and Subnetting PPT
IP addressing and Subnetting PPTIP addressing and Subnetting PPT
IP addressing and Subnetting PPT
Β 
Subnetting Presentation
Subnetting PresentationSubnetting Presentation
Subnetting Presentation
Β 
OSI Model
OSI ModelOSI Model
OSI Model
Β 
Ethernet
EthernetEthernet
Ethernet
Β 

Viewers also liked

The ISO_OSI Reference Model
The ISO_OSI Reference ModelThe ISO_OSI Reference Model
The ISO_OSI Reference ModelVishnu Vardhan
Β 
300 Slides Of Standard Interview Q & A In Telecommunications
300 Slides Of Standard Interview Q & A In Telecommunications300 Slides Of Standard Interview Q & A In Telecommunications
300 Slides Of Standard Interview Q & A In Telecommunicationsxnder
Β 
Internet of Things: Comparison of Protocols & Standards
Internet of Things: Comparison of Protocols & StandardsInternet of Things: Comparison of Protocols & Standards
Internet of Things: Comparison of Protocols & StandardsAshu Joshi
Β 
Osi model(open system interconnection)
Osi model(open system interconnection)Osi model(open system interconnection)
Osi model(open system interconnection)Dipu Thomas joy
Β 
Microwave link design
Microwave link designMicrowave link design
Microwave link designSaif Ullah Khan
Β 
Interview question for 2g,3g,4g
Interview question for 2g,3g,4gInterview question for 2g,3g,4g
Interview question for 2g,3g,4gVijay Anand
Β 
Applying eTOM (enhanced Telecom Operations Map) Framework to Non-Telecommunic...
Applying eTOM (enhanced Telecom Operations Map) Framework to Non-Telecommunic...Applying eTOM (enhanced Telecom Operations Map) Framework to Non-Telecommunic...
Applying eTOM (enhanced Telecom Operations Map) Framework to Non-Telecommunic...Alan McSweeney
Β 
Osi model
Osi modelOsi model
Osi modelOnline
Β 

Viewers also liked (14)

OSI Model
OSI ModelOSI Model
OSI Model
Β 
The ISO_OSI Reference Model
The ISO_OSI Reference ModelThe ISO_OSI Reference Model
The ISO_OSI Reference Model
Β 
Rf basics
Rf basicsRf basics
Rf basics
Β 
Iso osi
Iso osiIso osi
Iso osi
Β 
300 Slides Of Standard Interview Q & A In Telecommunications
300 Slides Of Standard Interview Q & A In Telecommunications300 Slides Of Standard Interview Q & A In Telecommunications
300 Slides Of Standard Interview Q & A In Telecommunications
Β 
Internet of Things: Comparison of Protocols & Standards
Internet of Things: Comparison of Protocols & StandardsInternet of Things: Comparison of Protocols & Standards
Internet of Things: Comparison of Protocols & Standards
Β 
MPLS
MPLSMPLS
MPLS
Β 
Osi model(open system interconnection)
Osi model(open system interconnection)Osi model(open system interconnection)
Osi model(open system interconnection)
Β 
OSI MODEL
    OSI MODEL    OSI MODEL
OSI MODEL
Β 
Microwave link design
Microwave link designMicrowave link design
Microwave link design
Β 
Interview question for 2g,3g,4g
Interview question for 2g,3g,4gInterview question for 2g,3g,4g
Interview question for 2g,3g,4g
Β 
Applying eTOM (enhanced Telecom Operations Map) Framework to Non-Telecommunic...
Applying eTOM (enhanced Telecom Operations Map) Framework to Non-Telecommunic...Applying eTOM (enhanced Telecom Operations Map) Framework to Non-Telecommunic...
Applying eTOM (enhanced Telecom Operations Map) Framework to Non-Telecommunic...
Β 
Osi model
Osi modelOsi model
Osi model
Β 
7 layer OSI
7 layer OSI7 layer OSI
7 layer OSI
Β 

Similar to OSI model (20)

Wlan
WlanWlan
Wlan
Β 
802.11 wireless lan
802.11 wireless lan802.11 wireless lan
802.11 wireless lan
Β 
Lecture6
Lecture6Lecture6
Lecture6
Β 
Mobile Communication
Mobile CommunicationMobile Communication
Mobile Communication
Β 
lecture666.ppt
lecture666.pptlecture666.ppt
lecture666.ppt
Β 
Lecture6(Wireless La Ns)
Lecture6(Wireless La Ns)Lecture6(Wireless La Ns)
Lecture6(Wireless La Ns)
Β 
Rj wlan
Rj wlanRj wlan
Rj wlan
Β 
Mini Project- Implementation & Evaluation of Wireless LANs
Mini Project- Implementation & Evaluation of Wireless LANsMini Project- Implementation & Evaluation of Wireless LANs
Mini Project- Implementation & Evaluation of Wireless LANs
Β 
Ccent notes part 1
Ccent notes part 1Ccent notes part 1
Ccent notes part 1
Β 
Basic networking 07-2012
Basic networking 07-2012Basic networking 07-2012
Basic networking 07-2012
Β 
Chapter 02 - Wan Router
Chapter 02 - Wan RouterChapter 02 - Wan Router
Chapter 02 - Wan Router
Β 
Other types of networks: Bluetooth, Zigbee, & NFC
Other types of networks: Bluetooth, Zigbee, & NFCOther types of networks: Bluetooth, Zigbee, & NFC
Other types of networks: Bluetooth, Zigbee, & NFC
Β 
Ccna introduction
Ccna introductionCcna introduction
Ccna introduction
Β 
4.2 networking
4.2 networking4.2 networking
4.2 networking
Β 
Networking / Internet and Web Technologies
Networking / Internet and Web TechnologiesNetworking / Internet and Web Technologies
Networking / Internet and Web Technologies
Β 
Local area network (1)
Local area network (1)Local area network (1)
Local area network (1)
Β 
Internetworking Overview
Internetworking OverviewInternetworking Overview
Internetworking Overview
Β 
NET1.PPT
NET1.PPTNET1.PPT
NET1.PPT
Β 
Wan
WanWan
Wan
Β 
Module 2_part 2.pptx
Module 2_part 2.pptxModule 2_part 2.pptx
Module 2_part 2.pptx
Β 

Recently uploaded

How to Add Barcode on PDF Report in Odoo 17
How to Add Barcode on PDF Report in Odoo 17How to Add Barcode on PDF Report in Odoo 17
How to Add Barcode on PDF Report in Odoo 17Celine George
Β 
What is Model Inheritance in Odoo 17 ERP
What is Model Inheritance in Odoo 17 ERPWhat is Model Inheritance in Odoo 17 ERP
What is Model Inheritance in Odoo 17 ERPCeline George
Β 
Global Lehigh Strategic Initiatives (without descriptions)
Global Lehigh Strategic Initiatives (without descriptions)Global Lehigh Strategic Initiatives (without descriptions)
Global Lehigh Strategic Initiatives (without descriptions)cama23
Β 
Activity 2-unit 2-update 2024. English translation
Activity 2-unit 2-update 2024. English translationActivity 2-unit 2-update 2024. English translation
Activity 2-unit 2-update 2024. English translationRosabel UA
Β 
ICS2208 Lecture6 Notes for SL spaces.pdf
ICS2208 Lecture6 Notes for SL spaces.pdfICS2208 Lecture6 Notes for SL spaces.pdf
ICS2208 Lecture6 Notes for SL spaces.pdfVanessa Camilleri
Β 
Field Attribute Index Feature in Odoo 17
Field Attribute Index Feature in Odoo 17Field Attribute Index Feature in Odoo 17
Field Attribute Index Feature in Odoo 17Celine George
Β 
Full Stack Web Development Course for Beginners
Full Stack Web Development Course  for BeginnersFull Stack Web Development Course  for Beginners
Full Stack Web Development Course for BeginnersSabitha Banu
Β 
ENG 5 Q4 WEEk 1 DAY 1 Restate sentences heard in one’s own words. Use appropr...
ENG 5 Q4 WEEk 1 DAY 1 Restate sentences heard in one’s own words. Use appropr...ENG 5 Q4 WEEk 1 DAY 1 Restate sentences heard in one’s own words. Use appropr...
ENG 5 Q4 WEEk 1 DAY 1 Restate sentences heard in one’s own words. Use appropr...JojoEDelaCruz
Β 
4.18.24 Movement Legacies, Reflection, and Review.pptx
4.18.24 Movement Legacies, Reflection, and Review.pptx4.18.24 Movement Legacies, Reflection, and Review.pptx
4.18.24 Movement Legacies, Reflection, and Review.pptxmary850239
Β 
ROLES IN A STAGE PRODUCTION in arts.pptx
ROLES IN A STAGE PRODUCTION in arts.pptxROLES IN A STAGE PRODUCTION in arts.pptx
ROLES IN A STAGE PRODUCTION in arts.pptxVanesaIglesias10
Β 
ENGLISH 7_Q4_LESSON 2_ Employing a Variety of Strategies for Effective Interp...
ENGLISH 7_Q4_LESSON 2_ Employing a Variety of Strategies for Effective Interp...ENGLISH 7_Q4_LESSON 2_ Employing a Variety of Strategies for Effective Interp...
ENGLISH 7_Q4_LESSON 2_ Employing a Variety of Strategies for Effective Interp...JhezDiaz1
Β 
Grade 9 Quarter 4 Dll Grade 9 Quarter 4 DLL.pdf
Grade 9 Quarter 4 Dll Grade 9 Quarter 4 DLL.pdfGrade 9 Quarter 4 Dll Grade 9 Quarter 4 DLL.pdf
Grade 9 Quarter 4 Dll Grade 9 Quarter 4 DLL.pdfJemuel Francisco
Β 
Keynote by Prof. Wurzer at Nordex about IP-design
Keynote by Prof. Wurzer at Nordex about IP-designKeynote by Prof. Wurzer at Nordex about IP-design
Keynote by Prof. Wurzer at Nordex about IP-designMIPLM
Β 
Incoming and Outgoing Shipments in 3 STEPS Using Odoo 17
Incoming and Outgoing Shipments in 3 STEPS Using Odoo 17Incoming and Outgoing Shipments in 3 STEPS Using Odoo 17
Incoming and Outgoing Shipments in 3 STEPS Using Odoo 17Celine George
Β 
Influencing policy (training slides from Fast Track Impact)
Influencing policy (training slides from Fast Track Impact)Influencing policy (training slides from Fast Track Impact)
Influencing policy (training slides from Fast Track Impact)Mark Reed
Β 
Visit to a blind student's schoolπŸ§‘β€πŸ¦―πŸ§‘β€πŸ¦―(community medicine)
Visit to a blind student's schoolπŸ§‘β€πŸ¦―πŸ§‘β€πŸ¦―(community medicine)Visit to a blind student's schoolπŸ§‘β€πŸ¦―πŸ§‘β€πŸ¦―(community medicine)
Visit to a blind student's schoolπŸ§‘β€πŸ¦―πŸ§‘β€πŸ¦―(community medicine)lakshayb543
Β 
Barangay Council for the Protection of Children (BCPC) Orientation.pptx
Barangay Council for the Protection of Children (BCPC) Orientation.pptxBarangay Council for the Protection of Children (BCPC) Orientation.pptx
Barangay Council for the Protection of Children (BCPC) Orientation.pptxCarlos105
Β 

Recently uploaded (20)

How to Add Barcode on PDF Report in Odoo 17
How to Add Barcode on PDF Report in Odoo 17How to Add Barcode on PDF Report in Odoo 17
How to Add Barcode on PDF Report in Odoo 17
Β 
What is Model Inheritance in Odoo 17 ERP
What is Model Inheritance in Odoo 17 ERPWhat is Model Inheritance in Odoo 17 ERP
What is Model Inheritance in Odoo 17 ERP
Β 
Global Lehigh Strategic Initiatives (without descriptions)
Global Lehigh Strategic Initiatives (without descriptions)Global Lehigh Strategic Initiatives (without descriptions)
Global Lehigh Strategic Initiatives (without descriptions)
Β 
Raw materials used in Herbal Cosmetics.pptx
Raw materials used in Herbal Cosmetics.pptxRaw materials used in Herbal Cosmetics.pptx
Raw materials used in Herbal Cosmetics.pptx
Β 
Activity 2-unit 2-update 2024. English translation
Activity 2-unit 2-update 2024. English translationActivity 2-unit 2-update 2024. English translation
Activity 2-unit 2-update 2024. English translation
Β 
ICS2208 Lecture6 Notes for SL spaces.pdf
ICS2208 Lecture6 Notes for SL spaces.pdfICS2208 Lecture6 Notes for SL spaces.pdf
ICS2208 Lecture6 Notes for SL spaces.pdf
Β 
Field Attribute Index Feature in Odoo 17
Field Attribute Index Feature in Odoo 17Field Attribute Index Feature in Odoo 17
Field Attribute Index Feature in Odoo 17
Β 
Full Stack Web Development Course for Beginners
Full Stack Web Development Course  for BeginnersFull Stack Web Development Course  for Beginners
Full Stack Web Development Course for Beginners
Β 
ENG 5 Q4 WEEk 1 DAY 1 Restate sentences heard in one’s own words. Use appropr...
ENG 5 Q4 WEEk 1 DAY 1 Restate sentences heard in one’s own words. Use appropr...ENG 5 Q4 WEEk 1 DAY 1 Restate sentences heard in one’s own words. Use appropr...
ENG 5 Q4 WEEk 1 DAY 1 Restate sentences heard in one’s own words. Use appropr...
Β 
4.18.24 Movement Legacies, Reflection, and Review.pptx
4.18.24 Movement Legacies, Reflection, and Review.pptx4.18.24 Movement Legacies, Reflection, and Review.pptx
4.18.24 Movement Legacies, Reflection, and Review.pptx
Β 
YOUVE GOT EMAIL_FINALS_EL_DORADO_2024.pptx
YOUVE GOT EMAIL_FINALS_EL_DORADO_2024.pptxYOUVE GOT EMAIL_FINALS_EL_DORADO_2024.pptx
YOUVE GOT EMAIL_FINALS_EL_DORADO_2024.pptx
Β 
ROLES IN A STAGE PRODUCTION in arts.pptx
ROLES IN A STAGE PRODUCTION in arts.pptxROLES IN A STAGE PRODUCTION in arts.pptx
ROLES IN A STAGE PRODUCTION in arts.pptx
Β 
ENGLISH 7_Q4_LESSON 2_ Employing a Variety of Strategies for Effective Interp...
ENGLISH 7_Q4_LESSON 2_ Employing a Variety of Strategies for Effective Interp...ENGLISH 7_Q4_LESSON 2_ Employing a Variety of Strategies for Effective Interp...
ENGLISH 7_Q4_LESSON 2_ Employing a Variety of Strategies for Effective Interp...
Β 
Grade 9 Quarter 4 Dll Grade 9 Quarter 4 DLL.pdf
Grade 9 Quarter 4 Dll Grade 9 Quarter 4 DLL.pdfGrade 9 Quarter 4 Dll Grade 9 Quarter 4 DLL.pdf
Grade 9 Quarter 4 Dll Grade 9 Quarter 4 DLL.pdf
Β 
Keynote by Prof. Wurzer at Nordex about IP-design
Keynote by Prof. Wurzer at Nordex about IP-designKeynote by Prof. Wurzer at Nordex about IP-design
Keynote by Prof. Wurzer at Nordex about IP-design
Β 
Incoming and Outgoing Shipments in 3 STEPS Using Odoo 17
Incoming and Outgoing Shipments in 3 STEPS Using Odoo 17Incoming and Outgoing Shipments in 3 STEPS Using Odoo 17
Incoming and Outgoing Shipments in 3 STEPS Using Odoo 17
Β 
Influencing policy (training slides from Fast Track Impact)
Influencing policy (training slides from Fast Track Impact)Influencing policy (training slides from Fast Track Impact)
Influencing policy (training slides from Fast Track Impact)
Β 
LEFT_ON_C'N_ PRELIMS_EL_DORADO_2024.pptx
LEFT_ON_C'N_ PRELIMS_EL_DORADO_2024.pptxLEFT_ON_C'N_ PRELIMS_EL_DORADO_2024.pptx
LEFT_ON_C'N_ PRELIMS_EL_DORADO_2024.pptx
Β 
Visit to a blind student's schoolπŸ§‘β€πŸ¦―πŸ§‘β€πŸ¦―(community medicine)
Visit to a blind student's schoolπŸ§‘β€πŸ¦―πŸ§‘β€πŸ¦―(community medicine)Visit to a blind student's schoolπŸ§‘β€πŸ¦―πŸ§‘β€πŸ¦―(community medicine)
Visit to a blind student's schoolπŸ§‘β€πŸ¦―πŸ§‘β€πŸ¦―(community medicine)
Β 
Barangay Council for the Protection of Children (BCPC) Orientation.pptx
Barangay Council for the Protection of Children (BCPC) Orientation.pptxBarangay Council for the Protection of Children (BCPC) Orientation.pptx
Barangay Council for the Protection of Children (BCPC) Orientation.pptx
Β 

OSI model

  • 1. (open systems interconnection) By: SAIF ULLAH KHAN
  • 2. ο‚ž The Open Systems Interconnection (OSI) model (ISO/IEC 7498-1) is a product of the Open Systems Interconnection effort at the International Organization for Standardization ο‚ž Similar communication functions are grouped into logical layers
  • 3. ο‚ž Work on a layered model of network architecture was started and the International Organization for Standardization (ISO) began to develop its OSI framework architecture ο‚ž The concept of a seven-layer model was provided by the work of Charles Bachman, Honeywell Information Services ο‚ž Each entity interacted directly only with the layer immediately beneath it, and provided facilities for use by the layer above it ο‚ž Protocols enabled an entity in one host to interact with a corresponding entity at the same layer in another host
  • 4. ο‚ž According to recommendation X.200, there are seven layers, labeled 1 to 7, with layer 1 at the bottom ο‚ž Each layer is generically known as an N layer ο‚ž At each level, two entities (N-entity peers) interact by means of the N protocol by transmitting protocol data units (PDU) ο‚ž A Service Data Unit (SDU) is a specific unit of data that has been passed down from an OSI layer to a lower layer, and which the lower layer has not yet encapsulated into a protocol data unit (PDU) ο‚ž An SDU is a set of data that is sent by a user of the services of a given layer, and is transmitted semantically unchanged to a peer service user
  • 5. ο‚ž The PDU at a layer N is the SDU of layer N-1 ο‚ž In effect the SDU is the 'payload' of a given PDU ο‚ž That is, the process of changing an SDU to a PDU, consists of an encapsulation process, performed by the lower layer ο‚ž All the data contained in the SDU becomes encapsulated within the PDU ο‚ž The layer N-1 adds headers or footers, or both, to the SDU, transforming it into a PDU of layer N-1 ο‚ž The added headers or footers are part of the process used to make it possible to get data from a source to a destination
  • 6. ο‚ž The physical layer defines electrical and physical specifications for devices ο‚ž it defines the relationship between a device and a transmission medium, such as a copper or fiber optical cable ο‚ž This includes the layout of pins, voltages, line impedance, cable specifications, sig nal timing, hubs, repeaters, network adapters, host bus adapters (HBA used in storage area networks) and more ο‚ž Parallel SCSI buses operate in this layer ο‚ž The same applies to other local-area networks, such as token ring, FDDI, ITU-T G.hn and IEEE 802.11, as well as personal area networks such as Bluetooth and IEEE 802.15.4
  • 7. Network Layer Functions Protocols Component Repeater IEEE 802 Multiplexer Hubs ISO 2110 Transmits raw bit stream over physical cable ISDN Passive EIA/TIA-232 Active EIA/TIA-449 Defines cables, cards, and physical aspects ITU-T V-Series TDR I.430 Establishment and termination of a connection to I.431 Oscilloscope a communications medium PDH Physical Defines techniques to transfer bit stream to SONET/SDH Hardware; Amplifier cable PON Raw bit OTN Stream Participation in the process whereby the DSL communication resources are effectively shared IEEE 1394 among multiple users. For ITU-T G.hn example, contention resolution and flow control PHY Modulation or conversion between the USB representation of digital data in user equipment Bluetooth and the corresponding signals transmitted over a RS-232 communications channel RS-449
  • 8. ο‚ž The data link layer provides the functional and procedural means to transfer data between network entities and to detect and possibly correct errors that may occur in the physical layer ο‚ž Data Link layer defines the format of data on the network ο‚ž In modern practice, only error detection, not flow control using sliding window, is present in data link protocols such as Point-to-Point Protocol (PPP), and, on local area networks, the IEEE 802.2 LLC layer is not used for most protocols on the Ethernet, and on other local area networks, its flow control and acknowledgment mechanisms are rarely used ο‚ž A network data frame, aka packet, includes checksum, source and destination address, and data
  • 9. ο‚ž The largest packet that can be sent through a data link layer defines the Maximum Transmission Unit (MTU) ο‚ž Sliding window flow control and acknowledgment is used at the transport layer by protocols such as TCP, but is still used in niches where X.25 offers performance advantages ο‚ž The data link layer handles the physical and logical connections to the packet's destination, using a network interface ο‚ž The ITU-T G.hn standard, which provides high-speed local area networking over existing wires (power lines, phone lines and coaxial cables), includes a complete data link layer which provides both error correction and flow control by means of a selective repeat Sliding Window Protocol ο‚ž Both WAN and LAN service arranges bits, from the physical layer, into logical sequences called frames
  • 10. ο‚ž A host connected to an Ethernet would have an Ethernet interface to handle connections to the outside world, and a loopback interface to send packets to itself ο‚ž Ethernet addresses a host using a unique, 48-bit address called its Ethernet address or Media Access Control (MAC) address ο‚ž MAC addresses are usually represented as six colon- separated pairs of hex digits, e.g., 8:0:20:11:ac:85 ο‚ž This number is unique and is associated with a particular Ethernet device
  • 11. Network Layer Function Protocol Component Logical Link Control: Turns packets into raw bits 100101 and at β€’ Error correction and flow Bridge the receiving end turns bits into packets control Switch β€’ Control and defines SAPs Handles data frames between the Network 802.2 Logical Link Control ISDN Router and Physical layers Media Access Control The receiving end packages raw data from β€’ communicates with the Intelligent the Physical layer into data frames for adapter card Hub Data layer delivery to the Network layer β€’ controls the type of media Link Data being used: frames to 802.3 CSMA/CD (Ethernet) bits Responsible for error-free transfer of frames 802.4 Token Bus (ARC net) NIC to other computer via the Physical Layer 802.5 Token Ring 802.12 Demand Priority This layer defines the methods used to transmit and receive data on the network. It ATM , SDLC, HDLC, CSLIP consists of the wiring, the devices use to SLIP , GFP, PLIP, IEEE802.2 Advanced connect the NIC to the wiring, the signaling LLC , L2TP, IEEE 802.3 Cable Tester involved to transmit / receive data and the Frame Relay, ITU-T G.hn ability to detect signaling errors on the DLL , PPP, X.25 network media
  • 12. ο‚ž The network layer provides the functional and procedural means of transferring variable length data sequences from a source host on one network to a destination host on a different network (in contrast to the data link layer which connects hosts within the same network), while maintaining the quality of service requested by the transport layer ο‚ž The network layer performs network routing functions, and might also perform fragmentation and reassembly, and report delivery errors ο‚ž Routers operate at this layer, sending data throughout the extended network and making the Internet possible. ο‚ž IP is responsible for routing, directing datagrams from one network to another
  • 13. ο‚ž The network layer may have to break large datagrams, larger than MTU, into smaller packets and host receiving the packet will have to reassemble the fragmented datagram ο‚ž The Internetwork Protocol identifies each host with a 32- bit IP address ο‚ž IP addresses are written as four dot-separated decimal numbers between 0 and 255, e.g., 129.79.16.40 ο‚ž The leading 1-3 bytes of the IP identify the network and the remaining bytes identifies the host on that network. ο‚ž The Address Resolution Protocol (ARP) is used to map the IP address to it hardware address ο‚ž A number of layer-management protocols, a function defined in the Management Annex, ISO 7498/4, belong to the network layer
  • 14. The network layer may be divided into three sub-layers: ο‚ž Sub-network access ο‚‘ that considers protocols that deal with the interface to networks, such as X.25 ο‚ž Sub-network (dependent convergence) ο‚‘ when it is necessary to bring the level of a transit network up to the level of networks on either side ο‚ž Sub-network (independent convergence) ο‚‘ handles transfer across multiple networks
  • 15. Network Layer Function Protocols Component Translates logical network address and names to their Router Frame physical address (e.g. computer name ==> MAC address) IP ARP RARP Responsible for ICMP β€’ Addressing RIP Network β€’ Determining routes for sending OSFP Relay Device Addressing; β€’ Managing network problems such as packet switching, IGMP Routing data congestion and routing IPX NWLink NetBEUI DDP ATM Switch If router can’t send data frame as large as the source DECnet computer sends, the network layer compensates by breaking the data into smaller units. At the receiving end, Advanced the network layer reassembles the data Cable Tester
  • 16. ο‚ž Transport layer subdivides user-buffer into network-buffer sized datagrams and enforces desired transmission control ο‚ž The transport layer provides transparent transfer of data between end users, providing reliable data transfer services to the upper layers ο‚ž The transport layer controls the reliability of a given link through flow control, segmentation/de-segmentation, and error control ο‚ž Some protocols are state and connection-oriented ο‚‘ This means that the transport layer can keep track of the segments and retransmit those that fail. ο‚ž Two transport protocols, Transmission Control Protocol (TCP) and User Datagram Protocol (UDP), sits at the transport layer
  • 17. ο‚ž Reliability and speed are the primary difference between these two protocols ο‚ž TCP: ο‚‘ TCP establishes connections between two hosts on the network through 'sockets' which are determined by the IP address and port number ο‚‘ TCP keeps track of the packet delivery order and the packets that must be resent ο‚ž UDP: ο‚‘ UDP on the other hand provides a low overhead transmission service, but with less error checking. ο‚ž NFS (network file system) is built on top of UDP because of its speed and statelessness. Statelessness simplifies the crash recovery
  • 18. ο‚ž OSI defines five classes of connection-mode transport protocols ranging from class 0 (which is also known as TP0 and provides the least features) to class 4 (TP4, designed for less reliable networks, similar to the Internet) Feature Name TP0 TP1 TP2 TP3 TP4 Connection oriented network YES YES YES YES YES Connectionless network NO NO NO NO YES Concatenation and separation NO YES YES YES YES Segmentation and reassembly YES YES YES YES YES Error Recovery NO YES YES YES YES Reinitiate connection (if an excessive number NO YES NO YES NO of PDUs are unacknowledged) Multiplexing and de-multiplexing over a single virtual NO NO YES YES YES circuit Explicit flow control NO NO YES YES YES Retransmission on timeout NO NO NO NO YES Reliable Transport Service NO YES NO YES YES
  • 19. Network Layer Function Protocol Component Manages the flow control of data between parties TCP ARP Gateway across the network RARP Divides streams of data into chunks or packets; the SPX Brouter Transport transport layer of the receiving computer NWLink (Bridge Router) Packets; Flow reassembles the message from packets NetBIOS control & Provides error-checking to guarantee error-free data NetBEUI Advanced Cable Error-handling delivery, with on losses or duplications ATP Tester UDP Provides acknowledgment of successful transmissions; SCTP requests retransmission if some packets don’t arrive DCCP error-free SPX
  • 20. ο‚ž The session protocol defines the format of the data sent over the connections ο‚‘ The NFS uses the Remote Procedure Call (RPC) for its session protocol ο‚‘ RPC may be built on either TCP or UDP ο‚‘ Login sessions uses TCP whereas NFS and broadcast use UDP ο‚ž The session layer controls the dialogues (connections) between computers ο‚ž It establishes, manages and terminates the connections between the local and remote application. ο‚ž It provides for full-duplex, half-duplex, or simplex operation, and establishes check pointing, adjournment, termination, and restart procedures ο‚ž The OSI model made this layer responsible for graceful close of sessions, which is a property of the Transmission Control Protocol, and also for session check pointing and recovery, which is not usually used in the Internet Protocol Suite
  • 21. Network Layer Function Protocol Component Establishes, maintains and ends sessions across the network NetBIOS Responsible for name recognition (identification) so only Named the designated parties can participate in the session Pipes Provides synchronization services by planning check points Mail in the data stream => if session fails, only data after the Slots Session most recent checkpoint need be transmitted RPC Syncs and Gateway SAP Sessions Manages who can transmit data at a certain time and for PPTP how long RTP Examples are interactive login and file transfer SOCKS connections, the session would connect and re-connect if SPDY there was an interruption; recognize names in sessions and TLS/SSL register names in history
  • 22. ο‚ž The presentation layer establishes context between application-layer entities, in which the higher-layer entities may use different syntax and semantics if the presentation service provides a mapping between them ο‚ž External Data Representation (XDR) sits at the presentation level ο‚‘ It converts local representation of data to its canonical form and vice versa ο‚ž The canonical uses a standard byte ordering and structure packing convention, independent of the host ο‚ž If a mapping is available, presentation service data units are encapsulated into session protocol data units, and passed down the stack
  • 23. ο‚ž This layer provides independence from data representation (e.g., encryption) by translating between application and network formats ο‚ž The presentation layer transforms data into the form that the application accepts ο‚ž This layer formats and encrypts data to be sent across a network ο‚ž It is sometimes called the syntax layer ο‚ž The original presentation structure used the basic encoding rules of Abstract Syntax Notation One (ASN.1), with capabilities such as converting an EBCDIC-coded text file to an ASCII-coded file, or serialization of objects and other data structures from and to XML
  • 24. Network Layer Function Protocol Component Translates from application to network format and vice- versa All different formats from all sources are made into a common uniform format that the rest of the OSI model can Presentation understand MIME Gateway Translation Responsible for protocol conversion, character conversion, XDR Redirector data encryption / decryption, expanding graphics commands, data compression Sets standards for different systems to provide seamless communication from multiple protocol stacks
  • 25. ο‚ž Provide network services to the end-users ο‚‘ Mail, ftp, telnet, DNS, NIS, NFS are examples of network applications ο‚ž The application layer is the OSI layer closest to the end user, which means that both the OSI application layer and the user interact directly with the software application ο‚ž This layer interacts with software applications that implement a communicating component ο‚ž Application-layer functions typically include identifying communication partners, determining resource availability, and synchronizing communication ο‚ž When identifying communication partners, the application layer determines the identity and availability of communication partners for an application with data to transmit
  • 26. ο‚ž When determining resource availability, the application layer must decide whether sufficient network or the requested communication exist ο‚ž In synchronizing communication, all communication between applications requires cooperation that is managed by the application layer ο‚ž Some examples of application-layer implementations also include: ο‚‘ On OSI stack: ο‚’ FTAM File Transfer and Access Management Protocol ο‚’ X.400 Mail ο‚’ Common Management Information Protocol (CMIP) ο‚‘ On TCP/IP stack: ο‚’ Hypertext Transfer Protocol (HTTP), ο‚’ File Transfer Protocol (FTP), ο‚’ Simple Mail Transfer Protocol (SMTP) ο‚’ Simple Network Management Protocol (SNMP).
  • 27. Network Layer Function Protocol Componen t Used for applications specifically written to run over DNS, FTP the network TFTP, BOOTP SNMP, RLOGIN Allows access to network services that support SMTP, MIME applications NFS, FINGER Application Directly represents the services that directly support TELNET, NCP User user applications APPC, AFP Gateway Interface SMB, NNTP Handles network access, flow control and error SIP, SSI recovery Gopher, HTTP NTP, SMPP Example apps are file transfer, e-mail, NetBIOS- Netconf, based applications (more)
  • 28.
  • 29. ο‚ž There are some functions or services that are not tied to a given layer, but they can affect more than one layer ο‚ž Examples include the following: ο‚‘ Security service (telecommunication) as defined by ITU-T X.800 Recommendation ο‚‘ management functions: ο‚’ functions that permit to configure, instantiate, monitor, terminate the communications of two or more entities: there is a specific application layer protocol, common management information protocol (CMIP) and its corresponding service, common management information service (CMIS), they need to interact with every layer in order to deal with their instances ο‚‘ ARP: ο‚’ It is used to translate IPv4 addresses (OSI layer 3) into Ethernet MAC addresses (OSI layer 2) ο‚‘ Multiprotocol Label Switching (MPLS): ο‚’ It operates at an OSI-model layer that is generally considered to lie between traditional definitions of layer 2 (data link layer) and layer 3 (network layer), and thus is often referred to as a "layer-2.5" protocol. It was designed to provide a unified data-carrying service for both circuit-based clients and packet-switching clients which provide a datagram service model. It can be used to carry many different kinds of traffic, including IP packets, as well as native ATM, SONET, and Ethernet frames
  • 30. ο‚ž In the TCP/IP model of the Internet, protocols are deliberately not as rigidly designed into strict layers as in the OSI model ο‚ž However, TCP/IP does recognize four broad layers of functionality which are derived from the operating scope of their contained protocols, namely the scope of the software application, the end-to-end transport connection, the internetworking range, and the scope of the direct links to other nodes on the local network ο‚ž Even though the concept is different from the OSI model, these layers are nevertheless often compared with the OSI layering scheme in the following way: ο‚‘ The Internet application layer includes the OSI application layer, presentation layer, and most of the session layer
  • 31. ο‚‘ Its end-to-end transport layer includes the graceful close function of the OSI session layer as well as the OSI transport layer. ο‚ž The internetworking layer (Internet layer) is a subset of the OSI network layer, while the link layer includes the OSI data link and physical layers, as well as parts of OSI's network layer. ο‚ž These comparisons are based on the original seven-layer protocol model as defined in ISO 7498, rather than refinements in such things as the internal organization of the network layer document
  • 32. Thank you for your time