SlideShare a Scribd company logo
1 of 49
Computer Network and
Communication
SKR 3200

1
Learning Outcome
• Illustrate the layers involved in OSI model (C4)
• Illustrate the layers involved in the Internet (TCP/IP)
model (C4)
The OSI Model
•
•
•
•
•

Established in 1947, the ISO is a multinational body
dedicated to worldwide agreement on international
standard
ISO standard which covers all aspects of network
communications – Open Systems Interconnection (OSI)
model
Open System – a model that allows any two different
systems to communicate regardless of their underlying
architecture
OSI is not a protocol
Model for understanding and designing a network
architecture that is flexible, robust, and interoperable
3
Figure 2.2 Seven layers of the OSI model
The model
•
•
•
•

OSI – a layered framework for design of network
systems that allows for communication across all types
of computer system
7 layer architecture
Intermediate nodes – involve only the first three layers
Peer-to-Peer Process
– Layer n, use the services provided by layer n-1 and
provides services for layer n+1
– The process on each machine that communicate at a
given layer are called peer-to-peer process
– Use protocol
5
•

At sending machine:
– headers added to the message at L6,5,4,3,2
– Trailer is added at only L2

•

At receiving machine
– The message is unwrapped layer by layer, received
process and removing the data meant for it. (reverse
of sending machine)
Interfaces between layers – control the passing of the
data and network information down/up through the
layers of sending/receiving machine

•

6
•

•

The 7L can grouped into three subgroup
– L1,2,3 – the network support layer – deal with the
physical aspects of moving data from one device to
another
– L5,6,7 – the user support layer –allow interoperability
among unrelated software systems
– L4 – ensures end-to-end reliable data transmission
After pass through L1 of sending machine, the data unit
is changed into electromagnetic signal and transported
along a physical link
7
OSI REFERENCE MODEL

Application
Presentation
Session
Transport
Network
Data Link
Physical

Web Application, SMTP, FTP,Telnet,IRC,News dll
Translation, Encryption and Compression
Secure communication: Secure Socket Layer (SSL)
Connection/less, multiplex,flow dan error control
Packet transmission to destination
Network Protocols, Addressing, Error, flow control
FDDI,ATM, Ethernet, Token Ring, Dialup,wireless

8
The interaction Between Layers

9
12/06/13

An Exchange Using the OSI Model

10
Concept of Header in OSI model
Client

Server

Application
Presentation
Session
Transport
Network
Data Link
Physical

data

Application

segment
data

Presentation

TCP
header

Session

packet
data

Transport

TCP
header

IP
header

Network

frame
data

Data Link

TCP
header

Network card

IP
header

Ethernet
header

Physical
Function of Each Layer
•

Physical layer (L1)
– Coordinates the function required to transmit a bit
stream over a physical medium
– Deal with the mechanical/electrical spec of the
interface and transmission medium
– Defines the procedures and functions that physical
devices and interfaces have to perform for
transmission to occur

12
• Concerned with:
– Physical characteristics of interfaces and media
– Representation of bits
• Bits must be encoded into signals – electrical or
optic
– Data rate – the number of bits sent each second
– Synchronization of bits
– Line configuration – connection of devices to the
medium
12/06/13

•

Concerned with:
– Physical topology
• How devices are connected to form a network
– Transmission mode
• Direction of signal transmission between two
devices

14
Note:
The physical layer is responsible for
transmitting individual bits from one
node to the next.
15
Physical Layer

16
•

Data Link Layer (L2):
– Responsible for node-to-node delivery
– Makes appear error free to the network layer

17
• Responsibilities include:
– Framing – divides the stream data to manageable
data units – frame
– Physical addressing – adds a header to the frame – to
define the physical address of sender (source
address) and receiver (destination address)
– Flow control – to prevent overwhelming at the
receiver
– Error control – provides reliability – to detect and
retransmit damaged or lost frames, also prevent
duplication of frames –trailer
– Access control – require a protocol to determine
which device has control over the link at any given
time –> same link with two or more devices
connected.
Note:
The data link layer is responsible for
transmitting frames from
one node to the next.
19
Data Link Layer

20
Example 1
In the next figure, a node with physical address 10
sends a frame to a node with physical address 87. The
two nodes are connected by a link. At the data link level
this frame contains physical addresses in the header.
These are the only addresses needed. The rest of the
header contains other information needed at this level.
The trailer usually contains extra bits needed for error
detection

21
Data Link Layer Example

22
•

•

Network Layer (L3):
– Responsible for the source-to-destination delivery of
a packet possibly across multiple networks (links)
– If two systems are attached to different networks, we
need the network layer protocol to accomplish
source-to-destination delivery
Specific responsibility:
– Logical addressing – to distinguish the source and
destination systems when a packet passes the
network boundary – also known network address
– Routing – internetwork/large network – route the
packet to the final destination
23
12/06/13

Note:
The network layer is responsible for
the delivery of packets from the
original source to the
final destination.
24
Network Layer

25
Network Layer Example
Example 2
In the next figure, we want to send data from a node with
network address A and physical address 10, located on one
LAN, to a node with a network address P and physical
address 95, located on another LAN. Because the two
devices are located on different networks, we cannot use
physical addresses only; the physical addresses only have
local jurisdiction. What we need here are universal
addresses that can pass through the LAN boundaries. The
network (logical) addresses have this characteristic.

26
Network Layer Example

27
•

Transport Layer (L4):
– Review of a network layer responsibility:
• Responsible for source-to-destination (end-to-end)
delivery of the entire message
• Individual packet – treats each packet
independently
• Ensures the whole (entire) message arrives intact
and in order
• Oversee both error control and flow control at
source-to-destination level
– To added security, transport layer create a
connection between the two end ports
• Connection - Single logical path between the
source and destination

28
•

•

Creating connection involves 3 steps:
– Connection establishment
– Data transfer
– Connection release
Has more control over sequencing, flow, error correction
and detection

29
•

Specific responsibilities:
– Service-point addressing
• Computers often run several programs at the
same time
• From a specific process (running program) on one
computer to a specific process (running program)
on the other
• TL header must include a service-point address or
port address
– Segmentation and reassembly
• Segment – add a sequence number into message
segment
30
– Connection control
• Can be either connectionless (independent packet)
or connection oriented
– Flow control
• End-to-end flow control (across multiple networks)
– Error control
• End-to-end error control (across multiple networks)
Note:
The transport layer is responsible for
delivery of a message from one process
to another.
32
Figure : Reliable process-to-process delivery of a message

33
Transport Layer

34
•

•

Session Layer (L5)
– The network dialog controller
– Establishes, maintains, and synchronizes the
Establishes
maintains
interaction between communicating systems
Responsibilities:
– Dialog control
• allows two systems to enter into a dialog
• communication between two process – half-duplex
or full-duplex
– Synchronization
• allows
a
process
to
add
checkpoints
(synchronization points) into a stream of data
• E.g.: sending a file..
35
Session Layer

36
•
•

Presentation Layer (L6)
– Concerned with the syntax and semantics of the
information exchanged between two systems.
Responsibilities:
– Translation
• The process (running programs) in two systems
are usually exchanging information
• Different computers use different encoding
systems
• Responsible for interoperability between different
encoding methods
• Sender machine change the information from its
sender-dependent format into a common format
• Receiver machine change the common format into
its receiver-dependent format
37
– Encryption
• Encryption - transform the original information to
another form and sends it over the network
• Decryption - reverse process at the receiver side
• assure privacy - to carry a sensitive data /
information
– Compression
• Reduces the number of bits to be transmitted
• multimedia data transmission – such as text, audio
and video
38
Presentation Layer

39
•

•

Application Layer (L7)
– Enables user , whether human or software to access
the network
– Provides user interfaces and support for services
such as email, remote file access, shared database
management etc
– No trailer or header are added here
Specific services
– Network virtual terminal
– File transfer, access, and management (FTAM) –
access/manage/control files in a remote computer
– Mail services - X.400 – store and forward email
– Directory services – X.500 – provides distributed
database sources
40
Application Layer

41
Note:
The application layer is responsible for
providing services to the user.

42
Summary of Layer Functions (OSI model)

43
3.3 TCP/IP Protocol Suite
•
•
•
•

Developed prior to the OSI model
5 layers – also known Internet model
The three topmost layers in the OSI model are
represented in TCP/IP by a single layer – application
layer
TCP/IP is a hierarchical protocol – the upper-level
protocol is supported by one or more lower-level
protocols

44
TCP/IP

• Physical layer
– Twisted pair, optical fibers, satellite
• Data link layer
– Ethernet, WiFi
• Network layer
– IP
• Transport layer
– TCP, UDP, SCTP
• Application Layer
– SMTP, FTP
45
Figure 2.16 TCP/IP and OSI model
Summary of Layer Functions (TCP/IP)

47
Example of using TCP/IP
Prior to the example, you need to know the following
terminologies in which will mapped to the TCP/IP model

Figure 2.17 Addresses in TCP/IP

2.
48
Figure 2.18 Relationship of layers and addresses in TCP/IP

More Related Content

What's hot

Computer network : models and topologies
Computer network : models and topologiesComputer network : models and topologies
Computer network : models and topologies
Anup Pandey
 
Report of TCP/IP
Report of TCP/IPReport of TCP/IP
Report of TCP/IP
Mannu Khani
 
Osi reference model and the tcp
Osi reference model and the tcpOsi reference model and the tcp
Osi reference model and the tcp
Agrippa Mungazi
 

What's hot (20)

OSI Reference Model and TCP/IP (Lecture #3 ET3003 Sem1 2014/2015)
OSI Reference Model and TCP/IP (Lecture #3 ET3003 Sem1 2014/2015)OSI Reference Model and TCP/IP (Lecture #3 ET3003 Sem1 2014/2015)
OSI Reference Model and TCP/IP (Lecture #3 ET3003 Sem1 2014/2015)
 
Osi model
Osi modelOsi model
Osi model
 
Osi model
Osi modelOsi model
Osi model
 
Network protocol structure scope
Network protocol structure scopeNetwork protocol structure scope
Network protocol structure scope
 
Computer network : models and topologies
Computer network : models and topologiesComputer network : models and topologies
Computer network : models and topologies
 
Introduction to Computer Networks
Introduction to Computer NetworksIntroduction to Computer Networks
Introduction to Computer Networks
 
OSI 7 Layer Model
OSI 7 Layer ModelOSI 7 Layer Model
OSI 7 Layer Model
 
Iso osi
Iso osiIso osi
Iso osi
 
OSI layer by cisco
OSI layer by ciscoOSI layer by cisco
OSI layer by cisco
 
Report of TCP/IP
Report of TCP/IPReport of TCP/IP
Report of TCP/IP
 
ISO OSI Model (Infosec perspective)
ISO OSI Model (Infosec perspective)ISO OSI Model (Infosec perspective)
ISO OSI Model (Infosec perspective)
 
Slides for protocol layering and network applications
Slides for protocol layering and network applicationsSlides for protocol layering and network applications
Slides for protocol layering and network applications
 
Chap 2 network models
Chap 2 network modelsChap 2 network models
Chap 2 network models
 
Computer Networks - Layers in OSI Model
Computer Networks - Layers in OSI ModelComputer Networks - Layers in OSI Model
Computer Networks - Layers in OSI Model
 
Osi model
Osi modelOsi model
Osi model
 
Reference models in Networks: OSI & TCP/IP
Reference models in Networks: OSI & TCP/IPReference models in Networks: OSI & TCP/IP
Reference models in Networks: OSI & TCP/IP
 
OSI model and TCP/IP model
OSI model and TCP/IP modelOSI model and TCP/IP model
OSI model and TCP/IP model
 
Osi layer and network protocol
Osi layer and network protocolOsi layer and network protocol
Osi layer and network protocol
 
03. osi reference-layer
03. osi reference-layer03. osi reference-layer
03. osi reference-layer
 
Osi reference model and the tcp
Osi reference model and the tcpOsi reference model and the tcp
Osi reference model and the tcp
 

Similar to Skr+3200+chapter+2+(kweh)

Similar to Skr+3200+chapter+2+(kweh) (20)

Lecture 1 Network Reference Models Final.pptx
Lecture 1 Network Reference Models Final.pptxLecture 1 Network Reference Models Final.pptx
Lecture 1 Network Reference Models Final.pptx
 
Osi model 7 Layers
Osi model 7 LayersOsi model 7 Layers
Osi model 7 Layers
 
Dc2 t1
Dc2 t1Dc2 t1
Dc2 t1
 
PC 106 PPT-06
PC 106 PPT-06PC 106 PPT-06
PC 106 PPT-06
 
Osi model
Osi modelOsi model
Osi model
 
06 - OSI Model.ppt
06 - OSI Model.ppt06 - OSI Model.ppt
06 - OSI Model.ppt
 
06 - OSI Model.ppt
06 - OSI Model.ppt06 - OSI Model.ppt
06 - OSI Model.ppt
 
osireferencemodel-170703104058 (1).pdf
osireferencemodel-170703104058 (1).pdfosireferencemodel-170703104058 (1).pdf
osireferencemodel-170703104058 (1).pdf
 
Osi reference model
Osi reference modelOsi reference model
Osi reference model
 
unit-1fon (1).pptx
unit-1fon (1).pptxunit-1fon (1).pptx
unit-1fon (1).pptx
 
unit1 network model osi and tcpip.pptx
unit1  network model osi and tcpip.pptxunit1  network model osi and tcpip.pptx
unit1 network model osi and tcpip.pptx
 
Layering and Architecture
Layering and ArchitectureLayering and Architecture
Layering and Architecture
 
Unit 2 ppt-idc
Unit 2 ppt-idcUnit 2 ppt-idc
Unit 2 ppt-idc
 
Sargation university's open system interconnection
Sargation university's open system interconnectionSargation university's open system interconnection
Sargation university's open system interconnection
 
Concept of OSI Model_KSMS_BCA_4th_6th_Sem_Priyanka Bhattacharya_20th March 2020
Concept of OSI Model_KSMS_BCA_4th_6th_Sem_Priyanka Bhattacharya_20th March  2020Concept of OSI Model_KSMS_BCA_4th_6th_Sem_Priyanka Bhattacharya_20th March  2020
Concept of OSI Model_KSMS_BCA_4th_6th_Sem_Priyanka Bhattacharya_20th March 2020
 
OSI Model.ppt
OSI Model.pptOSI Model.ppt
OSI Model.ppt
 
MVA slides lesson 2
MVA slides lesson 2MVA slides lesson 2
MVA slides lesson 2
 
OSI TCP.pptx
OSI TCP.pptxOSI TCP.pptx
OSI TCP.pptx
 
Osi
OsiOsi
Osi
 
Protocol layer,OSI model & POP3
Protocol layer,OSI model & POP3Protocol layer,OSI model & POP3
Protocol layer,OSI model & POP3
 

More from Ammar Shafiq

Management+accounting+in+public+sector
Management+accounting+in+public+sectorManagement+accounting+in+public+sector
Management+accounting+in+public+sector
Ammar Shafiq
 
Skr+3200+chapter+3+(kweh)
Skr+3200+chapter+3+(kweh)Skr+3200+chapter+3+(kweh)
Skr+3200+chapter+3+(kweh)
Ammar Shafiq
 
Skr+3200+chapter+1+(kweh)
Skr+3200+chapter+1+(kweh)Skr+3200+chapter+1+(kweh)
Skr+3200+chapter+1+(kweh)
Ammar Shafiq
 
Software engineering lecture notes
Software engineering   lecture notesSoftware engineering   lecture notes
Software engineering lecture notes
Ammar Shafiq
 

More from Ammar Shafiq (7)

50 strategi pemasaran Internet
50 strategi pemasaran Internet50 strategi pemasaran Internet
50 strategi pemasaran Internet
 
Blueoceanstrategy | Youtube Strategy
Blueoceanstrategy | Youtube StrategyBlueoceanstrategy | Youtube Strategy
Blueoceanstrategy | Youtube Strategy
 
Management+accounting+in+public+sector
Management+accounting+in+public+sectorManagement+accounting+in+public+sector
Management+accounting+in+public+sector
 
Quality costing
Quality costingQuality costing
Quality costing
 
Skr+3200+chapter+3+(kweh)
Skr+3200+chapter+3+(kweh)Skr+3200+chapter+3+(kweh)
Skr+3200+chapter+3+(kweh)
 
Skr+3200+chapter+1+(kweh)
Skr+3200+chapter+1+(kweh)Skr+3200+chapter+1+(kweh)
Skr+3200+chapter+1+(kweh)
 
Software engineering lecture notes
Software engineering   lecture notesSoftware engineering   lecture notes
Software engineering lecture notes
 

Recently uploaded

IAC 2024 - IA Fast Track to Search Focused AI Solutions
IAC 2024 - IA Fast Track to Search Focused AI SolutionsIAC 2024 - IA Fast Track to Search Focused AI Solutions
IAC 2024 - IA Fast Track to Search Focused AI Solutions
Enterprise Knowledge
 

Recently uploaded (20)

IAC 2024 - IA Fast Track to Search Focused AI Solutions
IAC 2024 - IA Fast Track to Search Focused AI SolutionsIAC 2024 - IA Fast Track to Search Focused AI Solutions
IAC 2024 - IA Fast Track to Search Focused AI Solutions
 
08448380779 Call Girls In Greater Kailash - I Women Seeking Men
08448380779 Call Girls In Greater Kailash - I Women Seeking Men08448380779 Call Girls In Greater Kailash - I Women Seeking Men
08448380779 Call Girls In Greater Kailash - I Women Seeking Men
 
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
 
Presentation on how to chat with PDF using ChatGPT code interpreter
Presentation on how to chat with PDF using ChatGPT code interpreterPresentation on how to chat with PDF using ChatGPT code interpreter
Presentation on how to chat with PDF using ChatGPT code interpreter
 
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdf
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdfThe Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdf
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdf
 
presentation ICT roal in 21st century education
presentation ICT roal in 21st century educationpresentation ICT roal in 21st century education
presentation ICT roal in 21st century education
 
Tech Trends Report 2024 Future Today Institute.pdf
Tech Trends Report 2024 Future Today Institute.pdfTech Trends Report 2024 Future Today Institute.pdf
Tech Trends Report 2024 Future Today Institute.pdf
 
GenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day PresentationGenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day Presentation
 
TrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
TrustArc Webinar - Stay Ahead of US State Data Privacy Law DevelopmentsTrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
TrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
 
[2024]Digital Global Overview Report 2024 Meltwater.pdf
[2024]Digital Global Overview Report 2024 Meltwater.pdf[2024]Digital Global Overview Report 2024 Meltwater.pdf
[2024]Digital Global Overview Report 2024 Meltwater.pdf
 
Scaling API-first – The story of a global engineering organization
Scaling API-first – The story of a global engineering organizationScaling API-first – The story of a global engineering organization
Scaling API-first – The story of a global engineering organization
 
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
 
Finology Group – Insurtech Innovation Award 2024
Finology Group – Insurtech Innovation Award 2024Finology Group – Insurtech Innovation Award 2024
Finology Group – Insurtech Innovation Award 2024
 
Evaluating the top large language models.pdf
Evaluating the top large language models.pdfEvaluating the top large language models.pdf
Evaluating the top large language models.pdf
 
Axa Assurance Maroc - Insurer Innovation Award 2024
Axa Assurance Maroc - Insurer Innovation Award 2024Axa Assurance Maroc - Insurer Innovation Award 2024
Axa Assurance Maroc - Insurer Innovation Award 2024
 
08448380779 Call Girls In Civil Lines Women Seeking Men
08448380779 Call Girls In Civil Lines Women Seeking Men08448380779 Call Girls In Civil Lines Women Seeking Men
08448380779 Call Girls In Civil Lines Women Seeking Men
 
What Are The Drone Anti-jamming Systems Technology?
What Are The Drone Anti-jamming Systems Technology?What Are The Drone Anti-jamming Systems Technology?
What Are The Drone Anti-jamming Systems Technology?
 
A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)
 
Partners Life - Insurer Innovation Award 2024
Partners Life - Insurer Innovation Award 2024Partners Life - Insurer Innovation Award 2024
Partners Life - Insurer Innovation Award 2024
 
Automating Google Workspace (GWS) & more with Apps Script
Automating Google Workspace (GWS) & more with Apps ScriptAutomating Google Workspace (GWS) & more with Apps Script
Automating Google Workspace (GWS) & more with Apps Script
 

Skr+3200+chapter+2+(kweh)

  • 2. Learning Outcome • Illustrate the layers involved in OSI model (C4) • Illustrate the layers involved in the Internet (TCP/IP) model (C4)
  • 3. The OSI Model • • • • • Established in 1947, the ISO is a multinational body dedicated to worldwide agreement on international standard ISO standard which covers all aspects of network communications – Open Systems Interconnection (OSI) model Open System – a model that allows any two different systems to communicate regardless of their underlying architecture OSI is not a protocol Model for understanding and designing a network architecture that is flexible, robust, and interoperable 3
  • 4. Figure 2.2 Seven layers of the OSI model
  • 5. The model • • • • OSI – a layered framework for design of network systems that allows for communication across all types of computer system 7 layer architecture Intermediate nodes – involve only the first three layers Peer-to-Peer Process – Layer n, use the services provided by layer n-1 and provides services for layer n+1 – The process on each machine that communicate at a given layer are called peer-to-peer process – Use protocol 5
  • 6. • At sending machine: – headers added to the message at L6,5,4,3,2 – Trailer is added at only L2 • At receiving machine – The message is unwrapped layer by layer, received process and removing the data meant for it. (reverse of sending machine) Interfaces between layers – control the passing of the data and network information down/up through the layers of sending/receiving machine • 6
  • 7. • • The 7L can grouped into three subgroup – L1,2,3 – the network support layer – deal with the physical aspects of moving data from one device to another – L5,6,7 – the user support layer –allow interoperability among unrelated software systems – L4 – ensures end-to-end reliable data transmission After pass through L1 of sending machine, the data unit is changed into electromagnetic signal and transported along a physical link 7
  • 8. OSI REFERENCE MODEL Application Presentation Session Transport Network Data Link Physical Web Application, SMTP, FTP,Telnet,IRC,News dll Translation, Encryption and Compression Secure communication: Secure Socket Layer (SSL) Connection/less, multiplex,flow dan error control Packet transmission to destination Network Protocols, Addressing, Error, flow control FDDI,ATM, Ethernet, Token Ring, Dialup,wireless 8
  • 10. 12/06/13 An Exchange Using the OSI Model 10
  • 11. Concept of Header in OSI model Client Server Application Presentation Session Transport Network Data Link Physical data Application segment data Presentation TCP header Session packet data Transport TCP header IP header Network frame data Data Link TCP header Network card IP header Ethernet header Physical
  • 12. Function of Each Layer • Physical layer (L1) – Coordinates the function required to transmit a bit stream over a physical medium – Deal with the mechanical/electrical spec of the interface and transmission medium – Defines the procedures and functions that physical devices and interfaces have to perform for transmission to occur 12
  • 13. • Concerned with: – Physical characteristics of interfaces and media – Representation of bits • Bits must be encoded into signals – electrical or optic – Data rate – the number of bits sent each second – Synchronization of bits – Line configuration – connection of devices to the medium
  • 14. 12/06/13 • Concerned with: – Physical topology • How devices are connected to form a network – Transmission mode • Direction of signal transmission between two devices 14
  • 15. Note: The physical layer is responsible for transmitting individual bits from one node to the next. 15
  • 17. • Data Link Layer (L2): – Responsible for node-to-node delivery – Makes appear error free to the network layer 17
  • 18. • Responsibilities include: – Framing – divides the stream data to manageable data units – frame – Physical addressing – adds a header to the frame – to define the physical address of sender (source address) and receiver (destination address) – Flow control – to prevent overwhelming at the receiver – Error control – provides reliability – to detect and retransmit damaged or lost frames, also prevent duplication of frames –trailer – Access control – require a protocol to determine which device has control over the link at any given time –> same link with two or more devices connected.
  • 19. Note: The data link layer is responsible for transmitting frames from one node to the next. 19
  • 21. Example 1 In the next figure, a node with physical address 10 sends a frame to a node with physical address 87. The two nodes are connected by a link. At the data link level this frame contains physical addresses in the header. These are the only addresses needed. The rest of the header contains other information needed at this level. The trailer usually contains extra bits needed for error detection 21
  • 22. Data Link Layer Example 22
  • 23. • • Network Layer (L3): – Responsible for the source-to-destination delivery of a packet possibly across multiple networks (links) – If two systems are attached to different networks, we need the network layer protocol to accomplish source-to-destination delivery Specific responsibility: – Logical addressing – to distinguish the source and destination systems when a packet passes the network boundary – also known network address – Routing – internetwork/large network – route the packet to the final destination 23
  • 24. 12/06/13 Note: The network layer is responsible for the delivery of packets from the original source to the final destination. 24
  • 26. Network Layer Example Example 2 In the next figure, we want to send data from a node with network address A and physical address 10, located on one LAN, to a node with a network address P and physical address 95, located on another LAN. Because the two devices are located on different networks, we cannot use physical addresses only; the physical addresses only have local jurisdiction. What we need here are universal addresses that can pass through the LAN boundaries. The network (logical) addresses have this characteristic. 26
  • 28. • Transport Layer (L4): – Review of a network layer responsibility: • Responsible for source-to-destination (end-to-end) delivery of the entire message • Individual packet – treats each packet independently • Ensures the whole (entire) message arrives intact and in order • Oversee both error control and flow control at source-to-destination level – To added security, transport layer create a connection between the two end ports • Connection - Single logical path between the source and destination 28
  • 29. • • Creating connection involves 3 steps: – Connection establishment – Data transfer – Connection release Has more control over sequencing, flow, error correction and detection 29
  • 30. • Specific responsibilities: – Service-point addressing • Computers often run several programs at the same time • From a specific process (running program) on one computer to a specific process (running program) on the other • TL header must include a service-point address or port address – Segmentation and reassembly • Segment – add a sequence number into message segment 30
  • 31. – Connection control • Can be either connectionless (independent packet) or connection oriented – Flow control • End-to-end flow control (across multiple networks) – Error control • End-to-end error control (across multiple networks)
  • 32. Note: The transport layer is responsible for delivery of a message from one process to another. 32
  • 33. Figure : Reliable process-to-process delivery of a message 33
  • 35. • • Session Layer (L5) – The network dialog controller – Establishes, maintains, and synchronizes the Establishes maintains interaction between communicating systems Responsibilities: – Dialog control • allows two systems to enter into a dialog • communication between two process – half-duplex or full-duplex – Synchronization • allows a process to add checkpoints (synchronization points) into a stream of data • E.g.: sending a file.. 35
  • 37. • • Presentation Layer (L6) – Concerned with the syntax and semantics of the information exchanged between two systems. Responsibilities: – Translation • The process (running programs) in two systems are usually exchanging information • Different computers use different encoding systems • Responsible for interoperability between different encoding methods • Sender machine change the information from its sender-dependent format into a common format • Receiver machine change the common format into its receiver-dependent format 37
  • 38. – Encryption • Encryption - transform the original information to another form and sends it over the network • Decryption - reverse process at the receiver side • assure privacy - to carry a sensitive data / information – Compression • Reduces the number of bits to be transmitted • multimedia data transmission – such as text, audio and video 38
  • 40. • • Application Layer (L7) – Enables user , whether human or software to access the network – Provides user interfaces and support for services such as email, remote file access, shared database management etc – No trailer or header are added here Specific services – Network virtual terminal – File transfer, access, and management (FTAM) – access/manage/control files in a remote computer – Mail services - X.400 – store and forward email – Directory services – X.500 – provides distributed database sources 40
  • 42. Note: The application layer is responsible for providing services to the user. 42
  • 43. Summary of Layer Functions (OSI model) 43
  • 44. 3.3 TCP/IP Protocol Suite • • • • Developed prior to the OSI model 5 layers – also known Internet model The three topmost layers in the OSI model are represented in TCP/IP by a single layer – application layer TCP/IP is a hierarchical protocol – the upper-level protocol is supported by one or more lower-level protocols 44
  • 45. TCP/IP • Physical layer – Twisted pair, optical fibers, satellite • Data link layer – Ethernet, WiFi • Network layer – IP • Transport layer – TCP, UDP, SCTP • Application Layer – SMTP, FTP 45
  • 46. Figure 2.16 TCP/IP and OSI model
  • 47. Summary of Layer Functions (TCP/IP) 47
  • 48. Example of using TCP/IP Prior to the example, you need to know the following terminologies in which will mapped to the TCP/IP model Figure 2.17 Addresses in TCP/IP 2. 48
  • 49. Figure 2.18 Relationship of layers and addresses in TCP/IP