SlideShare ist ein Scribd-Unternehmen logo
1 von 33
OSI Reference Model
And TCP/IP Reference Model
ENAM 2012/13
BWIRE SEDRICK
Network Model
 In order for a computer to send information to
another computer, and for that computer to
receive and understand the information, there
has to exist a set of rules or standards for this
communication process.
 These standards ensure that varying devices
and products can communicate with each
other over any network. This set of standards
is called Network protocols.
 The Network functions are separated in the
form of Layers.
2Sep-13 BBC & BIOM III
3
What is Layering?
r A technique to organize a networked
system into a succession of logically
distinct entities, such that the service
provided by one entity is solely based on
the service provided by the previous (lower
level) entity.
Application
Transport
Network
Datalink
Physical
Application
Transport
Network
Datalink
Physical
Network
Datalink
Physical
Physical medium
Sep-13 BBC & BIOM III
Layered Tasks Example
 Sender, Receiver and Carrier
Sep-13 4BBC & BIOM III
Why divide network into layers???
 Reduces complexity
 Provides compatibility - It standardizes
network components to allow multiple-
vendor development and support.
 It allows different types of network hardware
and software to communicate with each
other.
 Accelerates evolution of technology - It
prevents changes in one layer from affecting
the other layers, so that they can develop
more quickly. 5Sep-13 BBC & BIOM III
ISO (International Standards
Organization)
 It released a set fo specifications that describe
network architecture dissimilar devices.
 In 1984 the ISO released set of specifications
called Open Systems Interconnection (OSI)
reference model.
 The OSI model has become an international
standard for networking.
6Sep-13 BBC & BIOM III
OSI functions
 Mainly, it provides a way to understand how
an internetwork operates.
 It also serves as a guideline or framework for
creating and implementing network
standards, devices, and internetworking
schemes.
 Helps in troubleshooting network problems
7Sep-13 BBC & BIOM III
OSI Layers
 OSI model consists of 7 layers and each layer provides some
services to the layer above it.
 The principles that were applied to arrive at the seven layers
are as follows:
 A layer should be created where a different level of
abstraction (idea, concept) is needed.
 Each layer should provide some well defined functions.
 Each layer should work independently from other layers.
 Layer boundaries should minimize data flow across those
boundaries.
 The right number of layers should be there. Don't put too
many functions together in a layer, and not too many layers
either.
8Sep-13 BBC & BIOM III
OSI Layers cont’d…
 The three upper layers (Application Layers)
define how the applications within the end
stations will communicate with each other
and with users.
 The four lower layers (Data Flow Layers)
define ways for end stations to establish
connections to each other in order to
exchange data.
9Sep-13 BBC & BIOM III
OSI Layers cont’d…
10Sep-13 BBC & BIOM III
Description of each layer
Physical layer
 It is Layer 1, the bottom layer of the OSI model. It
specifies how data is processed into bits and
physically transferred over medium, such as cables.
 The physical layer defines the
electrical, mechanical, procedural, and functional
specifications for activating, maintaining, and
deactivating the physical link between
communicating network systems. Physical layer
specifications define characteristics such as voltage
levels, timing of voltage changes, physical data
rates, maximum transmission distances, and physical
connectors.
11Sep-13 BBC & BIOM III
Data Link Layer
 It is Layer 2, and sends data frames from the
Network layer to the Physical layer.
 On the receiving end, it packages raw bits from
the Physical layer into data frames.
 It combines bits into bytes and bytes into
frames.
 The data link layer is concerned with physical
(as opposed to logical) addressing, network
topology, network access, error notification
(acknowledgement) and retransmission, error
recovery (CRC check), ordered delivery of
frames, and flow control. 12Sep-13 BBC & BIOM III
Network Layer
 Layer 3, the Network layer, is responsible for providing
end-to-end delivery of Packets.
 To accomplish this the network layer defines logical
addresses to identify the endpoint of the network.
 It also determines the route from the source to the
destination computer.
 It determines which path the data should take based on
network conditions, priority of service, and other factors.
 It also manages traffic problems on the network, such as
packet switching, routing, and controlling the congestion of
data.
 If the destination computer cannot receive a data chunk as
large as the source computer sends, the Network layer on
the source compensates by breaking the large data chunk
into smaller units.
13Sep-13 BBC & BIOM III
Network Layer
 On the destination end, the Network layer reassembles the
data into the original large chunk.
 Internet Protocol (IP) and Internetwork Packet Exchange
(IPX) are examples of network layer protocols.
14Sep-13 BBC & BIOM III
Transport Layer
 Layer 4, the transport layer, is responsible for breaking the
data into segments and establishing an end-to-end logical
connection between machines.
 The transport layer ensures that packets are delivered error
free, in sequence, and without losses or duplications.
 At the sending computer, this layer repackages messages,
dividing long messages into several packets and collecting
small packets together in one package. This process ensures
that packets are transmitted efficiently over the network.
 At the receiving computer, the transport layer opens the
packets, reassembles the original messages, and, typically,
sends an acknowledgement that the message was received.
 If a duplicate packet arrives, this layer will recognize the
duplicate and discard it. Protocols include TCP n UDP
15Sep-13 BBC & BIOM III
Session Layer
 Layer 5, the Session layer defines how to start,
control and end the conversation (called session)
between two applications running on different
computers.
 It provides synchronization between user tasks by
placing checkpoints in the data stream.
 This way, if the network fails, only the data after
the last checkpoint has to be retransmitted.
 This layer also implements dialog control between
communicating processes by regulating which side
transmits, when, for how long, and so on.
16Sep-13 BBC & BIOM III
Presentation Layer
 The main purpose of this layer is defining the data formats.
It is concerned with how data is converted and formatted for
data transfer.
 The Presentation Layer provides a variety of coding and
conversion functions that are applied to the application layer
data. These functions ensure that information sent from the
application layer of one system will be readable by the
application layer of another system
 The Presentation layer is also responsible for protocol
conversion, encrypting the data, and managing data
compression.
 The presentation layer also manages data compression to
reduce the number of bits that need to be transmitted.
17Sep-13 BBC & BIOM III
Application Layer
 Layer 7, the topmost layer of the OSI model, is the
application layer.
 The Application Layer is where the user interacts with the
computer
 This layer relates to the services that directly support
applications, such as software for file transfers, database
access, and E-mail.
 A message to be sent across the network enters the OSI
model at this point and exits the OSI model’s application
layer on the receiving computer.
 Protocols at this layer identify communication partners,
determine resource availability, and synchronize
communication. For example, a word processing
application is serviced by file transfer services at this layer.
 Application layer protocols; Http, telnet, SNMP,SMTP etc
18Sep-13 BBC & BIOM III
Figure 2.15 Summary of layers
Summary of Layers
Sep-13 19BBC & BIOM III
TCP/IP reference model
 Although the OSI reference model is universally
recognized, the historical and technical open standard
of the Internet is Transmission Control Protocol/Internet
Protocol (TCP/IP).
 The TCP/IP reference model and the TCP/IP protocol stack
make data communication possible between any two
computers, anywhere in the world, at nearly the speed
of light.
 The U.S. Department of Defense (DoD) created the
TCP/IP reference model because it wanted a network that
could survive any conditions, even a nuclear war.
20Sep-13 BBC & BIOM III
TCP/IP reference model layers
The TCP/IP model has four layers:
 a) Application layer,
 b) Transport layer,
 c) Internet layer, and
 d) Host to Network layer.
NB: It is important to note that some of the layers in
the TCP/IP model have the same name as layers in
the OSI model. Do not confuse the layers of the two
models, because the application layer has different
functions in each model. 21Sep-13 BBC & BIOM III
TCP/IP Application layer
 -Combines the functions of the OSI application,
presentation, and session layers.
 The TCP/IP combines all application related issues into one
layer, and assumes this data is properly packaged for the
next layer.
 Protocols involved in this layer: HTTP, FTP, SMTP, DNS,
POP3, TFTP etc.
22Sep-13 BBC & BIOM III
TCP/IP Transport layer
 This layer works almost similar to the Transport layer of
OSI model.
 Deals with the quality-of-service, issues of reliability, flow
control, and error correction.
 It has two major protocols TCP and UDP
 The transmission control protocol (TCP), provides excellent
and flexible ways to create reliable, well-flowing, low-error
network communications. TCP is a connection-oriented
protocol.
 Note: Connection-oriented does not mean that a circuit
exists between the communicating computers (that would
be circuit switching). It does mean that Layer 4 segments
travel back and forth between two hosts to acknowledge the
connection exists logically for some period.
23Sep-13 BBC & BIOM III
TCP/IP Transport layer cont’d……
 •The second protocol in this layer is
User Datagram Protocol (UDP), its an
unreliable, connectionless protocol for
the applications that do not want TCP’s
sequencing and flow control and where
quick delivery is more important than
accurate delivery like speech and video
transmission.
24Sep-13 BBC & BIOM III
TCP/IP Internet(Network) layer
 The purpose of the Internet layer is to send source
packets from any network on the internet work and
have them arrive at the destination independent of
the path and networks they took to get there.
 The specific protocol that governs this layer is
called the Internet protocol (IP).
 Best path determination and packet switching occur
at this layer.
 Think of it in terms of the postal system. When you
mail a letter, you do not know how it gets there
(there are various possible routes), but you do care
that it arrives.
25Sep-13 BBC & BIOM III
TCP/IP Network Access layer
 Provides the same functionality as the physical,
the data link and network layers in the OSI
model.
 It includes the LAN and WAN technology
details
 The OSI model is proven to be very useful for
understanding computer networks.
 However the OSI Protocols have not become
very popular. The opposite is the case for
TCP/IP reference model. The model is
practically non-existing, but two of its protocols
TCP and IP are widely used in the networks. 26Sep-13
BBC & BIOM III
Associated TCP/IP Protocols & Services
HTTP This protocol, the core of the World Wide Web, facilitates
retrieval and transfer of hypertext (mixed media) documents.
Stands for the HyperText Transfer protocol
Telnet A remote terminal emulation protocol that enables clients to
log on to remote hosts on the network.
SNMP Used to remotely manage network devices. Stands for the
Simple Network Management Protocol.
DNS Provides meaningful names like achilles.mycorp.com for
computers to replace numerical addresses like 123.45.67.89.
Stands for the Domain Name System.
SLIP/
PPP
SLIP (Serial Line Internet Protocol) and PPP (Point to Point
Protocol) encapsulate the IP packets so that they can be sent
over a dial up phone connection to an access provider’s
modem.
Sep-13 27BBC & BIOM III
Address Resolution Protocol (ARP)
 The first system knows that the
second is located somewhere
on the network but does not
know its exact location on the
network.
 The source will broadcast an
ARP request to find the MAC
address of the intended
destinations MAC address.
 The signal sent is a broadcast
message and all the devices in
the LAN will hear it.
 Only the destination device will
respond to the ARP request.
Sep-13 BBC & BIOM III 28
Other Protocols
 Simple Mail Transfer Protocol (SMTP) is a protocol for
sending e-mail messages between servers. The messages
can then be retrieved with an e-mail client using either Post
Office Protocol (POP) or Internet Message Access Protocol
(IMAP).
 Post Office Protocol version 3 (POP3) is a common mail
service protocol that is used by ISPs that provide Internet
and e-mail service to home customers.
 FTP is a general-purpose protocol that can be used to copy
all types of files from one computer to another. FTP makes
use of the TCP reliable transport services to establish a
logical connection between the systems. FTP is one of the
most heavily used protocols on the Internet.
Sep-13 BBC & BIOM III 29
Comparing the OSI Model and
TCP/IP Model
Sep-13 BBC & BIOM III 30
Similarities of the OSI and TCP/IP
models
 Both have layers.
 Both have application layers, though they
include very different services.
 Both have comparable transport and network
layers.
 Packet-switched, not circuit-switched,
technology is assumed.
 Networking professionals need to know both
models.
Sep-13 BBC & BIOM III 31
Differences of the OSI and TCP/IP
models
 TCP/IP combines the presentation and session
layer into its application layer.
 TCP/IP combines the OSI data link and physical
layers into one layer.
 TCP/IP appears simpler because it has fewer
layers.
 TCP/IP transport layer using UDP does not
always guarantee reliable delivery of packets as
the transport layer in the OSI model does.
Sep-13 BBC & BIOM III 32
 TCP/IP protocols are considered to be
standards around which the internet has
been developed
 The OSI model consists of 7 layers whereas
the TCP/IP only has 4 layers.
Sep-13 BBC & BIOM III 33

Weitere ähnliche Inhalte

Was ist angesagt?

Chapter 2 - Network Models
Chapter 2 - Network ModelsChapter 2 - Network Models
Chapter 2 - Network Models
Wayne Jones Jnr
 
Ethernet and token ring
Ethernet and token ringEthernet and token ring
Ethernet and token ring
Abhijeet Shah
 

Was ist angesagt? (20)

Chapter 2 - Network Models
Chapter 2 - Network ModelsChapter 2 - Network Models
Chapter 2 - Network Models
 
Ethernet and token ring
Ethernet and token ringEthernet and token ring
Ethernet and token ring
 
Tcp/ip model
Tcp/ip  modelTcp/ip  model
Tcp/ip model
 
Switching concepts Data communication and networks
Switching concepts Data communication and networksSwitching concepts Data communication and networks
Switching concepts Data communication and networks
 
Osi reference model
Osi reference modelOsi reference model
Osi reference model
 
Computer networks unit iii
Computer networks    unit iiiComputer networks    unit iii
Computer networks unit iii
 
Osi Layer model provided by TopTechy.com
Osi Layer model provided by TopTechy.comOsi Layer model provided by TopTechy.com
Osi Layer model provided by TopTechy.com
 
osi vs tcp/ip
osi vs tcp/iposi vs tcp/ip
osi vs tcp/ip
 
Computer network switching
Computer network switchingComputer network switching
Computer network switching
 
Tcp IP Model
Tcp IP ModelTcp IP Model
Tcp IP Model
 
OSI model and TCP/IP model
OSI model and TCP/IP modelOSI model and TCP/IP model
OSI model and TCP/IP model
 
Protocols and the TCP/IP Protocol Suite
Protocols and the TCP/IP Protocol SuiteProtocols and the TCP/IP Protocol Suite
Protocols and the TCP/IP Protocol Suite
 
Osi reference model
Osi reference modelOsi reference model
Osi reference model
 
Ethernet
EthernetEthernet
Ethernet
 
computer network OSI layer
computer network OSI layercomputer network OSI layer
computer network OSI layer
 
Unit 3 Network Layer PPT
Unit 3 Network Layer PPTUnit 3 Network Layer PPT
Unit 3 Network Layer PPT
 
TCP/IP Introduction
TCP/IP IntroductionTCP/IP Introduction
TCP/IP Introduction
 
OSI and TCPIP Model
OSI and TCPIP ModelOSI and TCPIP Model
OSI and TCPIP Model
 
Computer Networks Lecture Notes
Computer Networks Lecture NotesComputer Networks Lecture Notes
Computer Networks Lecture Notes
 
Ethernet Computer network
Ethernet Computer networkEthernet Computer network
Ethernet Computer network
 

Andere mochten auch

Computer networks--osi model
Computer networks--osi modelComputer networks--osi model
Computer networks--osi model
Aditya Mehta
 
Osi model(open system interconnection)
Osi model(open system interconnection)Osi model(open system interconnection)
Osi model(open system interconnection)
Dipu Thomas joy
 
OSI Model - Every Detail Explained
OSI Model - Every Detail ExplainedOSI Model - Every Detail Explained
OSI Model - Every Detail Explained
Ashish Malik
 
TCP/IP Model
TCP/IP ModelTCP/IP Model
TCP/IP Model
farhan516
 
TCP/IP Network ppt
TCP/IP Network pptTCP/IP Network ppt
TCP/IP Network ppt
extraganesh
 
osi model
osi modelosi model
osi model
faizan
 

Andere mochten auch (20)

OSI Reference Model and TCP/IP (Lecture #3 ET3003 Sem1 2014/2015)
OSI Reference Model and TCP/IP (Lecture #3 ET3003 Sem1 2014/2015)OSI Reference Model and TCP/IP (Lecture #3 ET3003 Sem1 2014/2015)
OSI Reference Model and TCP/IP (Lecture #3 ET3003 Sem1 2014/2015)
 
Osi model
Osi modelOsi model
Osi model
 
Computer networks--osi model
Computer networks--osi modelComputer networks--osi model
Computer networks--osi model
 
Osi model(open system interconnection)
Osi model(open system interconnection)Osi model(open system interconnection)
Osi model(open system interconnection)
 
Complete Osi Model Explained
Complete Osi Model ExplainedComplete Osi Model Explained
Complete Osi Model Explained
 
Osi model
Osi modelOsi model
Osi model
 
Physical Layer of ISO-OSI model and Devices
Physical Layer of ISO-OSI model and DevicesPhysical Layer of ISO-OSI model and Devices
Physical Layer of ISO-OSI model and Devices
 
OSI Model - Every Detail Explained
OSI Model - Every Detail ExplainedOSI Model - Every Detail Explained
OSI Model - Every Detail Explained
 
TCP/IP Model
TCP/IP ModelTCP/IP Model
TCP/IP Model
 
TCP/IP Network ppt
TCP/IP Network pptTCP/IP Network ppt
TCP/IP Network ppt
 
Osi
OsiOsi
Osi
 
osi model
osi modelosi model
osi model
 
Osi model
Osi modelOsi model
Osi model
 
OSI REFRENCE MODEL by- Mujmmil Shaikh
OSI REFRENCE MODEL by- Mujmmil ShaikhOSI REFRENCE MODEL by- Mujmmil Shaikh
OSI REFRENCE MODEL by- Mujmmil Shaikh
 
Osi model in networking
Osi model in networkingOsi model in networking
Osi model in networking
 
7 Layers OSI model description with 3 unofficial Layers.
7 Layers OSI model description with 3 unofficial Layers.7 Layers OSI model description with 3 unofficial Layers.
7 Layers OSI model description with 3 unofficial Layers.
 
Osi models
Osi modelsOsi models
Osi models
 
Computer Network - OSI model
Computer Network - OSI modelComputer Network - OSI model
Computer Network - OSI model
 
OSI Layering
OSI Layering OSI Layering
OSI Layering
 
OSI REFERENCE LAYERS
OSI REFERENCE LAYERSOSI REFERENCE LAYERS
OSI REFERENCE LAYERS
 

Ähnlich wie Osi model

BAPANKAR15800121011 SOFT.pptx
BAPANKAR15800121011 SOFT.pptxBAPANKAR15800121011 SOFT.pptx
BAPANKAR15800121011 SOFT.pptx
BapanKar2
 
006 Osi Model
006 Osi Model006 Osi Model
006 Osi Model
BELKA08
 
Chapter 2. vantage understanding sensor placement in networks
Chapter 2. vantage  understanding sensor placement in networksChapter 2. vantage  understanding sensor placement in networks
Chapter 2. vantage understanding sensor placement in networks
Phu Nguyen
 

Ähnlich wie Osi model (20)

chapter 4.pptx
chapter 4.pptxchapter 4.pptx
chapter 4.pptx
 
computer network and chapter 7 OSI layers.pptx
computer network and chapter 7 OSI layers.pptxcomputer network and chapter 7 OSI layers.pptx
computer network and chapter 7 OSI layers.pptx
 
Lec 02 - Network Models.pptx
Lec 02 - Network Models.pptxLec 02 - Network Models.pptx
Lec 02 - Network Models.pptx
 
COMPUTER NETWORK_OSI & TCP/IP
COMPUTER NETWORK_OSI & TCP/IPCOMPUTER NETWORK_OSI & TCP/IP
COMPUTER NETWORK_OSI & TCP/IP
 
BAPANKAR15800121011 SOFT.pptx
BAPANKAR15800121011 SOFT.pptxBAPANKAR15800121011 SOFT.pptx
BAPANKAR15800121011 SOFT.pptx
 
OSI Model and TCP/IP Model.
OSI Model and TCP/IP Model.OSI Model and TCP/IP Model.
OSI Model and TCP/IP Model.
 
Assignment3
Assignment3Assignment3
Assignment3
 
Osi model and tcpip model.
Osi model and tcpip model.Osi model and tcpip model.
Osi model and tcpip model.
 
OSI and TCP/IP Model
OSI and TCP/IP ModelOSI and TCP/IP Model
OSI and TCP/IP Model
 
OSI reference Model
OSI reference ModelOSI reference Model
OSI reference Model
 
Learn basics of ip addressing
Learn basics of  ip addressingLearn basics of  ip addressing
Learn basics of ip addressing
 
Topology Chapter 2.pptx
Topology Chapter 2.pptxTopology Chapter 2.pptx
Topology Chapter 2.pptx
 
Computer networks chapter1.
Computer networks chapter1.Computer networks chapter1.
Computer networks chapter1.
 
THE OSI MODEL
THE OSI MODELTHE OSI MODEL
THE OSI MODEL
 
006 Osi Model
006 Osi Model006 Osi Model
006 Osi Model
 
CN unit 1 part 2 2023.ppt
CN unit 1 part 2 2023.pptCN unit 1 part 2 2023.ppt
CN unit 1 part 2 2023.ppt
 
OSI Model
OSI ModelOSI Model
OSI Model
 
Chapter 2. vantage understanding sensor placement in networks
Chapter 2. vantage  understanding sensor placement in networksChapter 2. vantage  understanding sensor placement in networks
Chapter 2. vantage understanding sensor placement in networks
 
OSI &TCP/IP Model
OSI &TCP/IP ModelOSI &TCP/IP Model
OSI &TCP/IP Model
 
Assignment izaz sir
Assignment izaz sirAssignment izaz sir
Assignment izaz sir
 

Mehr von bwire sedrick

Lan access control methods
Lan access control methodsLan access control methods
Lan access control methods
bwire sedrick
 
ENTERPRISE NETWORKING
ENTERPRISE NETWORKINGENTERPRISE NETWORKING
ENTERPRISE NETWORKING
bwire sedrick
 
Strategy implementation
Strategy implementationStrategy implementation
Strategy implementation
bwire sedrick
 
Strategic management process
Strategic management processStrategic management process
Strategic management process
bwire sedrick
 
Strategic management overview
Strategic management   overviewStrategic management   overview
Strategic management overview
bwire sedrick
 
Industry analysis, swot & portfolio analysis
Industry analysis, swot & portfolio analysisIndustry analysis, swot & portfolio analysis
Industry analysis, swot & portfolio analysis
bwire sedrick
 
Industry analysis, swot & portfolio analysis spare
Industry analysis, swot & portfolio analysis   spareIndustry analysis, swot & portfolio analysis   spare
Industry analysis, swot & portfolio analysis spare
bwire sedrick
 
Establishing sustainable markets for ugandan products
Establishing sustainable markets for ugandan productsEstablishing sustainable markets for ugandan products
Establishing sustainable markets for ugandan products
bwire sedrick
 

Mehr von bwire sedrick (20)

Effect of poor customer care on the image of police a case study of uganda po...
Effect of poor customer care on the image of police a case study of uganda po...Effect of poor customer care on the image of police a case study of uganda po...
Effect of poor customer care on the image of police a case study of uganda po...
 
Planning for a good presentation
Planning for a good presentationPlanning for a good presentation
Planning for a good presentation
 
Marketing channels
Marketing channelsMarketing channels
Marketing channels
 
Principles of ict concepts and data processing
Principles of ict   concepts and data processingPrinciples of ict   concepts and data processing
Principles of ict concepts and data processing
 
Computer systems
Computer systemsComputer systems
Computer systems
 
Ura taxation handbook
Ura  taxation handbookUra  taxation handbook
Ura taxation handbook
 
E learning slide
E learning slideE learning slide
E learning slide
 
INTRODUCTION TO HTML
INTRODUCTION TO HTMLINTRODUCTION TO HTML
INTRODUCTION TO HTML
 
NETWORK COMPONENTS
NETWORK COMPONENTSNETWORK COMPONENTS
NETWORK COMPONENTS
 
Lan access control methods
Lan access control methodsLan access control methods
Lan access control methods
 
ENTERPRISE NETWORKING
ENTERPRISE NETWORKINGENTERPRISE NETWORKING
ENTERPRISE NETWORKING
 
Strategy implementation
Strategy implementationStrategy implementation
Strategy implementation
 
Strategic management process
Strategic management processStrategic management process
Strategic management process
 
Strategic management overview
Strategic management   overviewStrategic management   overview
Strategic management overview
 
Strategic choice
Strategic choiceStrategic choice
Strategic choice
 
Industry analysis, swot & portfolio analysis
Industry analysis, swot & portfolio analysisIndustry analysis, swot & portfolio analysis
Industry analysis, swot & portfolio analysis
 
Industry analysis, swot & portfolio analysis spare
Industry analysis, swot & portfolio analysis   spareIndustry analysis, swot & portfolio analysis   spare
Industry analysis, swot & portfolio analysis spare
 
Establishing sustainable markets for ugandan products
Establishing sustainable markets for ugandan productsEstablishing sustainable markets for ugandan products
Establishing sustainable markets for ugandan products
 
Course outline
Course outlineCourse outline
Course outline
 
Busgrowth
BusgrowthBusgrowth
Busgrowth
 

Kürzlich hochgeladen

Modular Monolith - a Practical Alternative to Microservices @ Devoxx UK 2024
Modular Monolith - a Practical Alternative to Microservices @ Devoxx UK 2024Modular Monolith - a Practical Alternative to Microservices @ Devoxx UK 2024
Modular Monolith - a Practical Alternative to Microservices @ Devoxx UK 2024
Victor Rentea
 
+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...
+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...
+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...
?#DUbAI#??##{{(☎️+971_581248768%)**%*]'#abortion pills for sale in dubai@
 
Cloud Frontiers: A Deep Dive into Serverless Spatial Data and FME
Cloud Frontiers:  A Deep Dive into Serverless Spatial Data and FMECloud Frontiers:  A Deep Dive into Serverless Spatial Data and FME
Cloud Frontiers: A Deep Dive into Serverless Spatial Data and FME
Safe Software
 
Finding Java's Hidden Performance Traps @ DevoxxUK 2024
Finding Java's Hidden Performance Traps @ DevoxxUK 2024Finding Java's Hidden Performance Traps @ DevoxxUK 2024
Finding Java's Hidden Performance Traps @ DevoxxUK 2024
Victor Rentea
 
Architecting Cloud Native Applications
Architecting Cloud Native ApplicationsArchitecting Cloud Native Applications
Architecting Cloud Native Applications
WSO2
 

Kürzlich hochgeladen (20)

Apidays New York 2024 - The value of a flexible API Management solution for O...
Apidays New York 2024 - The value of a flexible API Management solution for O...Apidays New York 2024 - The value of a flexible API Management solution for O...
Apidays New York 2024 - The value of a flexible API Management solution for O...
 
CNIC Information System with Pakdata Cf In Pakistan
CNIC Information System with Pakdata Cf In PakistanCNIC Information System with Pakdata Cf In Pakistan
CNIC Information System with Pakdata Cf In Pakistan
 
Platformless Horizons for Digital Adaptability
Platformless Horizons for Digital AdaptabilityPlatformless Horizons for Digital Adaptability
Platformless Horizons for Digital Adaptability
 
Modular Monolith - a Practical Alternative to Microservices @ Devoxx UK 2024
Modular Monolith - a Practical Alternative to Microservices @ Devoxx UK 2024Modular Monolith - a Practical Alternative to Microservices @ Devoxx UK 2024
Modular Monolith - a Practical Alternative to Microservices @ Devoxx UK 2024
 
"I see eyes in my soup": How Delivery Hero implemented the safety system for ...
"I see eyes in my soup": How Delivery Hero implemented the safety system for ..."I see eyes in my soup": How Delivery Hero implemented the safety system for ...
"I see eyes in my soup": How Delivery Hero implemented the safety system for ...
 
Boost Fertility New Invention Ups Success Rates.pdf
Boost Fertility New Invention Ups Success Rates.pdfBoost Fertility New Invention Ups Success Rates.pdf
Boost Fertility New Invention Ups Success Rates.pdf
 
Web Form Automation for Bonterra Impact Management (fka Social Solutions Apri...
Web Form Automation for Bonterra Impact Management (fka Social Solutions Apri...Web Form Automation for Bonterra Impact Management (fka Social Solutions Apri...
Web Form Automation for Bonterra Impact Management (fka Social Solutions Apri...
 
ICT role in 21st century education and its challenges
ICT role in 21st century education and its challengesICT role in 21st century education and its challenges
ICT role in 21st century education and its challenges
 
+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...
+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...
+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...
 
Repurposing LNG terminals for Hydrogen Ammonia: Feasibility and Cost Saving
Repurposing LNG terminals for Hydrogen Ammonia: Feasibility and Cost SavingRepurposing LNG terminals for Hydrogen Ammonia: Feasibility and Cost Saving
Repurposing LNG terminals for Hydrogen Ammonia: Feasibility and Cost Saving
 
Cloud Frontiers: A Deep Dive into Serverless Spatial Data and FME
Cloud Frontiers:  A Deep Dive into Serverless Spatial Data and FMECloud Frontiers:  A Deep Dive into Serverless Spatial Data and FME
Cloud Frontiers: A Deep Dive into Serverless Spatial Data and FME
 
Apidays New York 2024 - Passkeys: Developing APIs to enable passwordless auth...
Apidays New York 2024 - Passkeys: Developing APIs to enable passwordless auth...Apidays New York 2024 - Passkeys: Developing APIs to enable passwordless auth...
Apidays New York 2024 - Passkeys: Developing APIs to enable passwordless auth...
 
MINDCTI Revenue Release Quarter One 2024
MINDCTI Revenue Release Quarter One 2024MINDCTI Revenue Release Quarter One 2024
MINDCTI Revenue Release Quarter One 2024
 
Finding Java's Hidden Performance Traps @ DevoxxUK 2024
Finding Java's Hidden Performance Traps @ DevoxxUK 2024Finding Java's Hidden Performance Traps @ DevoxxUK 2024
Finding Java's Hidden Performance Traps @ DevoxxUK 2024
 
Six Myths about Ontologies: The Basics of Formal Ontology
Six Myths about Ontologies: The Basics of Formal OntologySix Myths about Ontologies: The Basics of Formal Ontology
Six Myths about Ontologies: The Basics of Formal Ontology
 
DBX First Quarter 2024 Investor Presentation
DBX First Quarter 2024 Investor PresentationDBX First Quarter 2024 Investor Presentation
DBX First Quarter 2024 Investor Presentation
 
Architecting Cloud Native Applications
Architecting Cloud Native ApplicationsArchitecting Cloud Native Applications
Architecting Cloud Native Applications
 
Exploring Multimodal Embeddings with Milvus
Exploring Multimodal Embeddings with MilvusExploring Multimodal Embeddings with Milvus
Exploring Multimodal Embeddings with Milvus
 
DEV meet-up UiPath Document Understanding May 7 2024 Amsterdam
DEV meet-up UiPath Document Understanding May 7 2024 AmsterdamDEV meet-up UiPath Document Understanding May 7 2024 Amsterdam
DEV meet-up UiPath Document Understanding May 7 2024 Amsterdam
 
Navigating the Deluge_ Dubai Floods and the Resilience of Dubai International...
Navigating the Deluge_ Dubai Floods and the Resilience of Dubai International...Navigating the Deluge_ Dubai Floods and the Resilience of Dubai International...
Navigating the Deluge_ Dubai Floods and the Resilience of Dubai International...
 

Osi model

  • 1. OSI Reference Model And TCP/IP Reference Model ENAM 2012/13 BWIRE SEDRICK
  • 2. Network Model  In order for a computer to send information to another computer, and for that computer to receive and understand the information, there has to exist a set of rules or standards for this communication process.  These standards ensure that varying devices and products can communicate with each other over any network. This set of standards is called Network protocols.  The Network functions are separated in the form of Layers. 2Sep-13 BBC & BIOM III
  • 3. 3 What is Layering? r A technique to organize a networked system into a succession of logically distinct entities, such that the service provided by one entity is solely based on the service provided by the previous (lower level) entity. Application Transport Network Datalink Physical Application Transport Network Datalink Physical Network Datalink Physical Physical medium Sep-13 BBC & BIOM III
  • 4. Layered Tasks Example  Sender, Receiver and Carrier Sep-13 4BBC & BIOM III
  • 5. Why divide network into layers???  Reduces complexity  Provides compatibility - It standardizes network components to allow multiple- vendor development and support.  It allows different types of network hardware and software to communicate with each other.  Accelerates evolution of technology - It prevents changes in one layer from affecting the other layers, so that they can develop more quickly. 5Sep-13 BBC & BIOM III
  • 6. ISO (International Standards Organization)  It released a set fo specifications that describe network architecture dissimilar devices.  In 1984 the ISO released set of specifications called Open Systems Interconnection (OSI) reference model.  The OSI model has become an international standard for networking. 6Sep-13 BBC & BIOM III
  • 7. OSI functions  Mainly, it provides a way to understand how an internetwork operates.  It also serves as a guideline or framework for creating and implementing network standards, devices, and internetworking schemes.  Helps in troubleshooting network problems 7Sep-13 BBC & BIOM III
  • 8. OSI Layers  OSI model consists of 7 layers and each layer provides some services to the layer above it.  The principles that were applied to arrive at the seven layers are as follows:  A layer should be created where a different level of abstraction (idea, concept) is needed.  Each layer should provide some well defined functions.  Each layer should work independently from other layers.  Layer boundaries should minimize data flow across those boundaries.  The right number of layers should be there. Don't put too many functions together in a layer, and not too many layers either. 8Sep-13 BBC & BIOM III
  • 9. OSI Layers cont’d…  The three upper layers (Application Layers) define how the applications within the end stations will communicate with each other and with users.  The four lower layers (Data Flow Layers) define ways for end stations to establish connections to each other in order to exchange data. 9Sep-13 BBC & BIOM III
  • 11. Description of each layer Physical layer  It is Layer 1, the bottom layer of the OSI model. It specifies how data is processed into bits and physically transferred over medium, such as cables.  The physical layer defines the electrical, mechanical, procedural, and functional specifications for activating, maintaining, and deactivating the physical link between communicating network systems. Physical layer specifications define characteristics such as voltage levels, timing of voltage changes, physical data rates, maximum transmission distances, and physical connectors. 11Sep-13 BBC & BIOM III
  • 12. Data Link Layer  It is Layer 2, and sends data frames from the Network layer to the Physical layer.  On the receiving end, it packages raw bits from the Physical layer into data frames.  It combines bits into bytes and bytes into frames.  The data link layer is concerned with physical (as opposed to logical) addressing, network topology, network access, error notification (acknowledgement) and retransmission, error recovery (CRC check), ordered delivery of frames, and flow control. 12Sep-13 BBC & BIOM III
  • 13. Network Layer  Layer 3, the Network layer, is responsible for providing end-to-end delivery of Packets.  To accomplish this the network layer defines logical addresses to identify the endpoint of the network.  It also determines the route from the source to the destination computer.  It determines which path the data should take based on network conditions, priority of service, and other factors.  It also manages traffic problems on the network, such as packet switching, routing, and controlling the congestion of data.  If the destination computer cannot receive a data chunk as large as the source computer sends, the Network layer on the source compensates by breaking the large data chunk into smaller units. 13Sep-13 BBC & BIOM III
  • 14. Network Layer  On the destination end, the Network layer reassembles the data into the original large chunk.  Internet Protocol (IP) and Internetwork Packet Exchange (IPX) are examples of network layer protocols. 14Sep-13 BBC & BIOM III
  • 15. Transport Layer  Layer 4, the transport layer, is responsible for breaking the data into segments and establishing an end-to-end logical connection between machines.  The transport layer ensures that packets are delivered error free, in sequence, and without losses or duplications.  At the sending computer, this layer repackages messages, dividing long messages into several packets and collecting small packets together in one package. This process ensures that packets are transmitted efficiently over the network.  At the receiving computer, the transport layer opens the packets, reassembles the original messages, and, typically, sends an acknowledgement that the message was received.  If a duplicate packet arrives, this layer will recognize the duplicate and discard it. Protocols include TCP n UDP 15Sep-13 BBC & BIOM III
  • 16. Session Layer  Layer 5, the Session layer defines how to start, control and end the conversation (called session) between two applications running on different computers.  It provides synchronization between user tasks by placing checkpoints in the data stream.  This way, if the network fails, only the data after the last checkpoint has to be retransmitted.  This layer also implements dialog control between communicating processes by regulating which side transmits, when, for how long, and so on. 16Sep-13 BBC & BIOM III
  • 17. Presentation Layer  The main purpose of this layer is defining the data formats. It is concerned with how data is converted and formatted for data transfer.  The Presentation Layer provides a variety of coding and conversion functions that are applied to the application layer data. These functions ensure that information sent from the application layer of one system will be readable by the application layer of another system  The Presentation layer is also responsible for protocol conversion, encrypting the data, and managing data compression.  The presentation layer also manages data compression to reduce the number of bits that need to be transmitted. 17Sep-13 BBC & BIOM III
  • 18. Application Layer  Layer 7, the topmost layer of the OSI model, is the application layer.  The Application Layer is where the user interacts with the computer  This layer relates to the services that directly support applications, such as software for file transfers, database access, and E-mail.  A message to be sent across the network enters the OSI model at this point and exits the OSI model’s application layer on the receiving computer.  Protocols at this layer identify communication partners, determine resource availability, and synchronize communication. For example, a word processing application is serviced by file transfer services at this layer.  Application layer protocols; Http, telnet, SNMP,SMTP etc 18Sep-13 BBC & BIOM III
  • 19. Figure 2.15 Summary of layers Summary of Layers Sep-13 19BBC & BIOM III
  • 20. TCP/IP reference model  Although the OSI reference model is universally recognized, the historical and technical open standard of the Internet is Transmission Control Protocol/Internet Protocol (TCP/IP).  The TCP/IP reference model and the TCP/IP protocol stack make data communication possible between any two computers, anywhere in the world, at nearly the speed of light.  The U.S. Department of Defense (DoD) created the TCP/IP reference model because it wanted a network that could survive any conditions, even a nuclear war. 20Sep-13 BBC & BIOM III
  • 21. TCP/IP reference model layers The TCP/IP model has four layers:  a) Application layer,  b) Transport layer,  c) Internet layer, and  d) Host to Network layer. NB: It is important to note that some of the layers in the TCP/IP model have the same name as layers in the OSI model. Do not confuse the layers of the two models, because the application layer has different functions in each model. 21Sep-13 BBC & BIOM III
  • 22. TCP/IP Application layer  -Combines the functions of the OSI application, presentation, and session layers.  The TCP/IP combines all application related issues into one layer, and assumes this data is properly packaged for the next layer.  Protocols involved in this layer: HTTP, FTP, SMTP, DNS, POP3, TFTP etc. 22Sep-13 BBC & BIOM III
  • 23. TCP/IP Transport layer  This layer works almost similar to the Transport layer of OSI model.  Deals with the quality-of-service, issues of reliability, flow control, and error correction.  It has two major protocols TCP and UDP  The transmission control protocol (TCP), provides excellent and flexible ways to create reliable, well-flowing, low-error network communications. TCP is a connection-oriented protocol.  Note: Connection-oriented does not mean that a circuit exists between the communicating computers (that would be circuit switching). It does mean that Layer 4 segments travel back and forth between two hosts to acknowledge the connection exists logically for some period. 23Sep-13 BBC & BIOM III
  • 24. TCP/IP Transport layer cont’d……  •The second protocol in this layer is User Datagram Protocol (UDP), its an unreliable, connectionless protocol for the applications that do not want TCP’s sequencing and flow control and where quick delivery is more important than accurate delivery like speech and video transmission. 24Sep-13 BBC & BIOM III
  • 25. TCP/IP Internet(Network) layer  The purpose of the Internet layer is to send source packets from any network on the internet work and have them arrive at the destination independent of the path and networks they took to get there.  The specific protocol that governs this layer is called the Internet protocol (IP).  Best path determination and packet switching occur at this layer.  Think of it in terms of the postal system. When you mail a letter, you do not know how it gets there (there are various possible routes), but you do care that it arrives. 25Sep-13 BBC & BIOM III
  • 26. TCP/IP Network Access layer  Provides the same functionality as the physical, the data link and network layers in the OSI model.  It includes the LAN and WAN technology details  The OSI model is proven to be very useful for understanding computer networks.  However the OSI Protocols have not become very popular. The opposite is the case for TCP/IP reference model. The model is practically non-existing, but two of its protocols TCP and IP are widely used in the networks. 26Sep-13 BBC & BIOM III
  • 27. Associated TCP/IP Protocols & Services HTTP This protocol, the core of the World Wide Web, facilitates retrieval and transfer of hypertext (mixed media) documents. Stands for the HyperText Transfer protocol Telnet A remote terminal emulation protocol that enables clients to log on to remote hosts on the network. SNMP Used to remotely manage network devices. Stands for the Simple Network Management Protocol. DNS Provides meaningful names like achilles.mycorp.com for computers to replace numerical addresses like 123.45.67.89. Stands for the Domain Name System. SLIP/ PPP SLIP (Serial Line Internet Protocol) and PPP (Point to Point Protocol) encapsulate the IP packets so that they can be sent over a dial up phone connection to an access provider’s modem. Sep-13 27BBC & BIOM III
  • 28. Address Resolution Protocol (ARP)  The first system knows that the second is located somewhere on the network but does not know its exact location on the network.  The source will broadcast an ARP request to find the MAC address of the intended destinations MAC address.  The signal sent is a broadcast message and all the devices in the LAN will hear it.  Only the destination device will respond to the ARP request. Sep-13 BBC & BIOM III 28
  • 29. Other Protocols  Simple Mail Transfer Protocol (SMTP) is a protocol for sending e-mail messages between servers. The messages can then be retrieved with an e-mail client using either Post Office Protocol (POP) or Internet Message Access Protocol (IMAP).  Post Office Protocol version 3 (POP3) is a common mail service protocol that is used by ISPs that provide Internet and e-mail service to home customers.  FTP is a general-purpose protocol that can be used to copy all types of files from one computer to another. FTP makes use of the TCP reliable transport services to establish a logical connection between the systems. FTP is one of the most heavily used protocols on the Internet. Sep-13 BBC & BIOM III 29
  • 30. Comparing the OSI Model and TCP/IP Model Sep-13 BBC & BIOM III 30
  • 31. Similarities of the OSI and TCP/IP models  Both have layers.  Both have application layers, though they include very different services.  Both have comparable transport and network layers.  Packet-switched, not circuit-switched, technology is assumed.  Networking professionals need to know both models. Sep-13 BBC & BIOM III 31
  • 32. Differences of the OSI and TCP/IP models  TCP/IP combines the presentation and session layer into its application layer.  TCP/IP combines the OSI data link and physical layers into one layer.  TCP/IP appears simpler because it has fewer layers.  TCP/IP transport layer using UDP does not always guarantee reliable delivery of packets as the transport layer in the OSI model does. Sep-13 BBC & BIOM III 32
  • 33.  TCP/IP protocols are considered to be standards around which the internet has been developed  The OSI model consists of 7 layers whereas the TCP/IP only has 4 layers. Sep-13 BBC & BIOM III 33