SlideShare a Scribd company logo
1 of 49
Computer Network and
Communication
SKR 3200

1
Learning Outcome
• Illustrate the layers involved in OSI model (C4)
• Illustrate the layers involved in the Internet (TCP/IP)
model (C4)
The OSI Model
•
•
•
•
•

Established in 1947, the ISO is a multinational body
dedicated to worldwide agreement on international
standard
ISO standard which covers all aspects of network
communications – Open Systems Interconnection (OSI)
model
Open System – a model that allows any two different
systems to communicate regardless of their underlying
architecture
OSI is not a protocol
Model for understanding and designing a network
architecture that is flexible, robust, and interoperable
3
Figure 2.2 Seven layers of the OSI model
The model
•
•
•
•

OSI – a layered framework for design of network
systems that allows for communication across all types
of computer system
7 layer architecture
Intermediate nodes – involve only the first three layers
Peer-to-Peer Process
– Layer n, use the services provided by layer n-1 and
provides services for layer n+1
– The process on each machine that communicate at a
given layer are called peer-to-peer process
– Use protocol
5
•

At sending machine:
– headers added to the message at L6,5,4,3,2
– Trailer is added at only L2

•

At receiving machine
– The message is unwrapped layer by layer, received
process and removing the data meant for it. (reverse
of sending machine)
Interfaces between layers – control the passing of the
data and network information down/up through the
layers of sending/receiving machine

•

6
•

•

The 7L can grouped into three subgroup
– L1,2,3 – the network support layer – deal with the
physical aspects of moving data from one device to
another
– L5,6,7 – the user support layer –allow interoperability
among unrelated software systems
– L4 – ensures end-to-end reliable data transmission
After pass through L1 of sending machine, the data unit
is changed into electromagnetic signal and transported
along a physical link
7
OSI REFERENCE MODEL

Application
Presentation
Session
Transport
Network
Data Link
Physical

Web Application, SMTP, FTP,Telnet,IRC,News dll
Translation, Encryption and Compression
Secure communication: Secure Socket Layer (SSL)
Connection/less, multiplex,flow dan error control
Packet transmission to destination
Network Protocols, Addressing, Error, flow control
FDDI,ATM, Ethernet, Token Ring, Dialup,wireless

8
The interaction Between Layers

9
12/06/13

An Exchange Using the OSI Model

10
Concept of Header in OSI model
Client

Server

Application
Presentation
Session
Transport
Network
Data Link
Physical

data

Application

segment
data

Presentation

TCP
header

Session

packet
data

Transport

TCP
header

IP
header

Network

frame
data

Data Link

TCP
header

Network card

IP
header

Ethernet
header

Physical
Function of Each Layer
•

Physical layer (L1)
– Coordinates the function required to transmit a bit
stream over a physical medium
– Deal with the mechanical/electrical spec of the
interface and transmission medium
– Defines the procedures and functions that physical
devices and interfaces have to perform for
transmission to occur

12
• Concerned with:
– Physical characteristics of interfaces and media
– Representation of bits
• Bits must be encoded into signals – electrical or
optic
– Data rate – the number of bits sent each second
– Synchronization of bits
– Line configuration – connection of devices to the
medium
12/06/13

•

Concerned with:
– Physical topology
• How devices are connected to form a network
– Transmission mode
• Direction of signal transmission between two
devices

14
Note:
The physical layer is responsible for
transmitting individual bits from one
node to the next.
15
Physical Layer

16
•

Data Link Layer (L2):
– Responsible for node-to-node delivery
– Makes appear error free to the network layer

17
• Responsibilities include:
– Framing – divides the stream data to manageable
data units – frame
– Physical addressing – adds a header to the frame – to
define the physical address of sender (source
address) and receiver (destination address)
– Flow control – to prevent overwhelming at the
receiver
– Error control – provides reliability – to detect and
retransmit damaged or lost frames, also prevent
duplication of frames –trailer
– Access control – require a protocol to determine
which device has control over the link at any given
time –> same link with two or more devices
connected.
Note:
The data link layer is responsible for
transmitting frames from
one node to the next.
19
Data Link Layer

20
Example 1
In the next figure, a node with physical address 10
sends a frame to a node with physical address 87. The
two nodes are connected by a link. At the data link level
this frame contains physical addresses in the header.
These are the only addresses needed. The rest of the
header contains other information needed at this level.
The trailer usually contains extra bits needed for error
detection

21
Data Link Layer Example

22
•

•

Network Layer (L3):
– Responsible for the source-to-destination delivery of
a packet possibly across multiple networks (links)
– If two systems are attached to different networks, we
need the network layer protocol to accomplish
source-to-destination delivery
Specific responsibility:
– Logical addressing – to distinguish the source and
destination systems when a packet passes the
network boundary – also known network address
– Routing – internetwork/large network – route the
packet to the final destination
23
12/06/13

Note:
The network layer is responsible for
the delivery of packets from the
original source to the
final destination.
24
Network Layer

25
Network Layer Example
Example 2
In the next figure, we want to send data from a node with
network address A and physical address 10, located on one
LAN, to a node with a network address P and physical
address 95, located on another LAN. Because the two
devices are located on different networks, we cannot use
physical addresses only; the physical addresses only have
local jurisdiction. What we need here are universal
addresses that can pass through the LAN boundaries. The
network (logical) addresses have this characteristic.

26
Network Layer Example

27
•

Transport Layer (L4):
– Review of a network layer responsibility:
• Responsible for source-to-destination (end-to-end)
delivery of the entire message
• Individual packet – treats each packet
independently
• Ensures the whole (entire) message arrives intact
and in order
• Oversee both error control and flow control at
source-to-destination level
– To added security, transport layer create a
connection between the two end ports
• Connection - Single logical path between the
source and destination

28
•

•

Creating connection involves 3 steps:
– Connection establishment
– Data transfer
– Connection release
Has more control over sequencing, flow, error correction
and detection

29
•

Specific responsibilities:
– Service-point addressing
• Computers often run several programs at the
same time
• From a specific process (running program) on one
computer to a specific process (running program)
on the other
• TL header must include a service-point address or
port address
– Segmentation and reassembly
• Segment – add a sequence number into message
segment
30
– Connection control
• Can be either connectionless (independent packet)
or connection oriented
– Flow control
• End-to-end flow control (across multiple networks)
– Error control
• End-to-end error control (across multiple networks)
Note:
The transport layer is responsible for
delivery of a message from one process
to another.
32
Figure : Reliable process-to-process delivery of a message

33
Transport Layer

34
•

•

Session Layer (L5)
– The network dialog controller
– Establishes, maintains, and synchronizes the
Establishes
maintains
interaction between communicating systems
Responsibilities:
– Dialog control
• allows two systems to enter into a dialog
• communication between two process – half-duplex
or full-duplex
– Synchronization
• allows
a
process
to
add
checkpoints
(synchronization points) into a stream of data
• E.g.: sending a file..
35
Session Layer

36
•
•

Presentation Layer (L6)
– Concerned with the syntax and semantics of the
information exchanged between two systems.
Responsibilities:
– Translation
• The process (running programs) in two systems
are usually exchanging information
• Different computers use different encoding
systems
• Responsible for interoperability between different
encoding methods
• Sender machine change the information from its
sender-dependent format into a common format
• Receiver machine change the common format into
its receiver-dependent format
37
– Encryption
• Encryption - transform the original information to
another form and sends it over the network
• Decryption - reverse process at the receiver side
• assure privacy - to carry a sensitive data /
information
– Compression
• Reduces the number of bits to be transmitted
• multimedia data transmission – such as text, audio
and video
38
Presentation Layer

39
•

•

Application Layer (L7)
– Enables user , whether human or software to access
the network
– Provides user interfaces and support for services
such as email, remote file access, shared database
management etc
– No trailer or header are added here
Specific services
– Network virtual terminal
– File transfer, access, and management (FTAM) –
access/manage/control files in a remote computer
– Mail services - X.400 – store and forward email
– Directory services – X.500 – provides distributed
database sources
40
Application Layer

41
Note:
The application layer is responsible for
providing services to the user.

42
Summary of Layer Functions (OSI model)

43
3.3 TCP/IP Protocol Suite
•
•
•
•

Developed prior to the OSI model
5 layers – also known Internet model
The three topmost layers in the OSI model are
represented in TCP/IP by a single layer – application
layer
TCP/IP is a hierarchical protocol – the upper-level
protocol is supported by one or more lower-level
protocols

44
TCP/IP

• Physical layer
– Twisted pair, optical fibers, satellite
• Data link layer
– Ethernet, WiFi
• Network layer
– IP
• Transport layer
– TCP, UDP, SCTP
• Application Layer
– SMTP, FTP
45
Figure 2.16 TCP/IP and OSI model
Summary of Layer Functions (TCP/IP)

47
Example of using TCP/IP
Prior to the example, you need to know the following
terminologies in which will mapped to the TCP/IP model

Figure 2.17 Addresses in TCP/IP

2.
48
Figure 2.18 Relationship of layers and addresses in TCP/IP

More Related Content

What's hot

OSI Reference Model and TCP/IP (Lecture #3 ET3003 Sem1 2014/2015)
OSI Reference Model and TCP/IP (Lecture #3 ET3003 Sem1 2014/2015)OSI Reference Model and TCP/IP (Lecture #3 ET3003 Sem1 2014/2015)
OSI Reference Model and TCP/IP (Lecture #3 ET3003 Sem1 2014/2015)Tutun Juhana
 
Network protocol structure scope
Network protocol structure scopeNetwork protocol structure scope
Network protocol structure scopeSanat Maharjan
 
Computer network : models and topologies
Computer network : models and topologiesComputer network : models and topologies
Computer network : models and topologiesAnup Pandey
 
Introduction to Computer Networks
Introduction to Computer NetworksIntroduction to Computer Networks
Introduction to Computer NetworksVenkatesh Iyer
 
Report of TCP/IP
Report of TCP/IPReport of TCP/IP
Report of TCP/IPMannu Khani
 
ISO OSI Model (Infosec perspective)
ISO OSI Model (Infosec perspective)ISO OSI Model (Infosec perspective)
ISO OSI Model (Infosec perspective)AJINKYA PATIL
 
Slides for protocol layering and network applications
Slides for protocol layering and network applicationsSlides for protocol layering and network applications
Slides for protocol layering and network applicationsjajinekkanti
 
Computer Networks - Layers in OSI Model
Computer Networks - Layers in OSI ModelComputer Networks - Layers in OSI Model
Computer Networks - Layers in OSI ModelShreyash Agarwal
 
Reference models in Networks: OSI & TCP/IP
Reference models in Networks: OSI & TCP/IPReference models in Networks: OSI & TCP/IP
Reference models in Networks: OSI & TCP/IPMukesh Chinta
 
OSI model and TCP/IP model
OSI model and TCP/IP modelOSI model and TCP/IP model
OSI model and TCP/IP modelRubal Sagwal
 
Osi layer and network protocol
Osi layer and network protocolOsi layer and network protocol
Osi layer and network protocolNayan Sarma
 
Osi reference model and the tcp
Osi reference model and the tcpOsi reference model and the tcp
Osi reference model and the tcpAgrippa Mungazi
 

What's hot (20)

OSI Reference Model and TCP/IP (Lecture #3 ET3003 Sem1 2014/2015)
OSI Reference Model and TCP/IP (Lecture #3 ET3003 Sem1 2014/2015)OSI Reference Model and TCP/IP (Lecture #3 ET3003 Sem1 2014/2015)
OSI Reference Model and TCP/IP (Lecture #3 ET3003 Sem1 2014/2015)
 
Osi model
Osi modelOsi model
Osi model
 
Osi model
Osi modelOsi model
Osi model
 
Network protocol structure scope
Network protocol structure scopeNetwork protocol structure scope
Network protocol structure scope
 
Computer network : models and topologies
Computer network : models and topologiesComputer network : models and topologies
Computer network : models and topologies
 
Introduction to Computer Networks
Introduction to Computer NetworksIntroduction to Computer Networks
Introduction to Computer Networks
 
OSI 7 Layer Model
OSI 7 Layer ModelOSI 7 Layer Model
OSI 7 Layer Model
 
Iso osi
Iso osiIso osi
Iso osi
 
OSI layer by cisco
OSI layer by ciscoOSI layer by cisco
OSI layer by cisco
 
Report of TCP/IP
Report of TCP/IPReport of TCP/IP
Report of TCP/IP
 
ISO OSI Model (Infosec perspective)
ISO OSI Model (Infosec perspective)ISO OSI Model (Infosec perspective)
ISO OSI Model (Infosec perspective)
 
Slides for protocol layering and network applications
Slides for protocol layering and network applicationsSlides for protocol layering and network applications
Slides for protocol layering and network applications
 
Chap 2 network models
Chap 2 network modelsChap 2 network models
Chap 2 network models
 
Computer Networks - Layers in OSI Model
Computer Networks - Layers in OSI ModelComputer Networks - Layers in OSI Model
Computer Networks - Layers in OSI Model
 
Osi model
Osi modelOsi model
Osi model
 
Reference models in Networks: OSI & TCP/IP
Reference models in Networks: OSI & TCP/IPReference models in Networks: OSI & TCP/IP
Reference models in Networks: OSI & TCP/IP
 
OSI model and TCP/IP model
OSI model and TCP/IP modelOSI model and TCP/IP model
OSI model and TCP/IP model
 
Osi layer and network protocol
Osi layer and network protocolOsi layer and network protocol
Osi layer and network protocol
 
03. osi reference-layer
03. osi reference-layer03. osi reference-layer
03. osi reference-layer
 
Osi reference model and the tcp
Osi reference model and the tcpOsi reference model and the tcp
Osi reference model and the tcp
 

Similar to Skr+3200+chapter+2+(kweh)

Similar to Skr+3200+chapter+2+(kweh) (20)

Lecture 1 Network Reference Models Final.pptx
Lecture 1 Network Reference Models Final.pptxLecture 1 Network Reference Models Final.pptx
Lecture 1 Network Reference Models Final.pptx
 
Osi model 7 Layers
Osi model 7 LayersOsi model 7 Layers
Osi model 7 Layers
 
Dc2 t1
Dc2 t1Dc2 t1
Dc2 t1
 
PC 106 PPT-06
PC 106 PPT-06PC 106 PPT-06
PC 106 PPT-06
 
Osi model
Osi modelOsi model
Osi model
 
06 - OSI Model.ppt
06 - OSI Model.ppt06 - OSI Model.ppt
06 - OSI Model.ppt
 
06 - OSI Model.ppt
06 - OSI Model.ppt06 - OSI Model.ppt
06 - OSI Model.ppt
 
osireferencemodel-170703104058 (1).pdf
osireferencemodel-170703104058 (1).pdfosireferencemodel-170703104058 (1).pdf
osireferencemodel-170703104058 (1).pdf
 
Osi reference model
Osi reference modelOsi reference model
Osi reference model
 
unit-1fon (1).pptx
unit-1fon (1).pptxunit-1fon (1).pptx
unit-1fon (1).pptx
 
unit1 network model osi and tcpip.pptx
unit1  network model osi and tcpip.pptxunit1  network model osi and tcpip.pptx
unit1 network model osi and tcpip.pptx
 
Layering and Architecture
Layering and ArchitectureLayering and Architecture
Layering and Architecture
 
Unit 2 ppt-idc
Unit 2 ppt-idcUnit 2 ppt-idc
Unit 2 ppt-idc
 
Sargation university's open system interconnection
Sargation university's open system interconnectionSargation university's open system interconnection
Sargation university's open system interconnection
 
Concept of OSI Model_KSMS_BCA_4th_6th_Sem_Priyanka Bhattacharya_20th March 2020
Concept of OSI Model_KSMS_BCA_4th_6th_Sem_Priyanka Bhattacharya_20th March  2020Concept of OSI Model_KSMS_BCA_4th_6th_Sem_Priyanka Bhattacharya_20th March  2020
Concept of OSI Model_KSMS_BCA_4th_6th_Sem_Priyanka Bhattacharya_20th March 2020
 
OSI Model.ppt
OSI Model.pptOSI Model.ppt
OSI Model.ppt
 
MVA slides lesson 2
MVA slides lesson 2MVA slides lesson 2
MVA slides lesson 2
 
OSI TCP.pptx
OSI TCP.pptxOSI TCP.pptx
OSI TCP.pptx
 
Osi
OsiOsi
Osi
 
Protocol layer,OSI model & POP3
Protocol layer,OSI model & POP3Protocol layer,OSI model & POP3
Protocol layer,OSI model & POP3
 

More from Ammar Shafiq

50 strategi pemasaran Internet
50 strategi pemasaran Internet50 strategi pemasaran Internet
50 strategi pemasaran InternetAmmar Shafiq
 
Blueoceanstrategy | Youtube Strategy
Blueoceanstrategy | Youtube StrategyBlueoceanstrategy | Youtube Strategy
Blueoceanstrategy | Youtube StrategyAmmar Shafiq
 
Management+accounting+in+public+sector
Management+accounting+in+public+sectorManagement+accounting+in+public+sector
Management+accounting+in+public+sectorAmmar Shafiq
 
Skr+3200+chapter+3+(kweh)
Skr+3200+chapter+3+(kweh)Skr+3200+chapter+3+(kweh)
Skr+3200+chapter+3+(kweh)Ammar Shafiq
 
Skr+3200+chapter+1+(kweh)
Skr+3200+chapter+1+(kweh)Skr+3200+chapter+1+(kweh)
Skr+3200+chapter+1+(kweh)Ammar Shafiq
 
Software engineering lecture notes
Software engineering   lecture notesSoftware engineering   lecture notes
Software engineering lecture notesAmmar Shafiq
 

More from Ammar Shafiq (7)

50 strategi pemasaran Internet
50 strategi pemasaran Internet50 strategi pemasaran Internet
50 strategi pemasaran Internet
 
Blueoceanstrategy | Youtube Strategy
Blueoceanstrategy | Youtube StrategyBlueoceanstrategy | Youtube Strategy
Blueoceanstrategy | Youtube Strategy
 
Management+accounting+in+public+sector
Management+accounting+in+public+sectorManagement+accounting+in+public+sector
Management+accounting+in+public+sector
 
Quality costing
Quality costingQuality costing
Quality costing
 
Skr+3200+chapter+3+(kweh)
Skr+3200+chapter+3+(kweh)Skr+3200+chapter+3+(kweh)
Skr+3200+chapter+3+(kweh)
 
Skr+3200+chapter+1+(kweh)
Skr+3200+chapter+1+(kweh)Skr+3200+chapter+1+(kweh)
Skr+3200+chapter+1+(kweh)
 
Software engineering lecture notes
Software engineering   lecture notesSoftware engineering   lecture notes
Software engineering lecture notes
 

Recently uploaded

The Codex of Business Writing Software for Real-World Solutions 2.pptx
The Codex of Business Writing Software for Real-World Solutions 2.pptxThe Codex of Business Writing Software for Real-World Solutions 2.pptx
The Codex of Business Writing Software for Real-World Solutions 2.pptxMalak Abu Hammad
 
Handwritten Text Recognition for manuscripts and early printed texts
Handwritten Text Recognition for manuscripts and early printed textsHandwritten Text Recognition for manuscripts and early printed texts
Handwritten Text Recognition for manuscripts and early printed textsMaria Levchenko
 
Slack Application Development 101 Slides
Slack Application Development 101 SlidesSlack Application Development 101 Slides
Slack Application Development 101 Slidespraypatel2
 
Maximizing Board Effectiveness 2024 Webinar.pptx
Maximizing Board Effectiveness 2024 Webinar.pptxMaximizing Board Effectiveness 2024 Webinar.pptx
Maximizing Board Effectiveness 2024 Webinar.pptxOnBoard
 
Presentation on how to chat with PDF using ChatGPT code interpreter
Presentation on how to chat with PDF using ChatGPT code interpreterPresentation on how to chat with PDF using ChatGPT code interpreter
Presentation on how to chat with PDF using ChatGPT code interpreternaman860154
 
Scaling API-first – The story of a global engineering organization
Scaling API-first – The story of a global engineering organizationScaling API-first – The story of a global engineering organization
Scaling API-first – The story of a global engineering organizationRadu Cotescu
 
Understanding the Laravel MVC Architecture
Understanding the Laravel MVC ArchitectureUnderstanding the Laravel MVC Architecture
Understanding the Laravel MVC ArchitecturePixlogix Infotech
 
WhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure service
WhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure serviceWhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure service
WhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure servicePooja Nehwal
 
SQL Database Design For Developers at php[tek] 2024
SQL Database Design For Developers at php[tek] 2024SQL Database Design For Developers at php[tek] 2024
SQL Database Design For Developers at php[tek] 2024Scott Keck-Warren
 
A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)Gabriella Davis
 
FULL ENJOY 🔝 8264348440 🔝 Call Girls in Diplomatic Enclave | Delhi
FULL ENJOY 🔝 8264348440 🔝 Call Girls in Diplomatic Enclave | DelhiFULL ENJOY 🔝 8264348440 🔝 Call Girls in Diplomatic Enclave | Delhi
FULL ENJOY 🔝 8264348440 🔝 Call Girls in Diplomatic Enclave | Delhisoniya singh
 
#StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
#StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024#StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
#StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024BookNet Canada
 
How to Remove Document Management Hurdles with X-Docs?
How to Remove Document Management Hurdles with X-Docs?How to Remove Document Management Hurdles with X-Docs?
How to Remove Document Management Hurdles with X-Docs?XfilesPro
 
Human Factors of XR: Using Human Factors to Design XR Systems
Human Factors of XR: Using Human Factors to Design XR SystemsHuman Factors of XR: Using Human Factors to Design XR Systems
Human Factors of XR: Using Human Factors to Design XR SystemsMark Billinghurst
 
My Hashitalk Indonesia April 2024 Presentation
My Hashitalk Indonesia April 2024 PresentationMy Hashitalk Indonesia April 2024 Presentation
My Hashitalk Indonesia April 2024 PresentationRidwan Fadjar
 
Swan(sea) Song – personal research during my six years at Swansea ... and bey...
Swan(sea) Song – personal research during my six years at Swansea ... and bey...Swan(sea) Song – personal research during my six years at Swansea ... and bey...
Swan(sea) Song – personal research during my six years at Swansea ... and bey...Alan Dix
 
Beyond Boundaries: Leveraging No-Code Solutions for Industry Innovation
Beyond Boundaries: Leveraging No-Code Solutions for Industry InnovationBeyond Boundaries: Leveraging No-Code Solutions for Industry Innovation
Beyond Boundaries: Leveraging No-Code Solutions for Industry InnovationSafe Software
 
08448380779 Call Girls In Civil Lines Women Seeking Men
08448380779 Call Girls In Civil Lines Women Seeking Men08448380779 Call Girls In Civil Lines Women Seeking Men
08448380779 Call Girls In Civil Lines Women Seeking MenDelhi Call girls
 
Injustice - Developers Among Us (SciFiDevCon 2024)
Injustice - Developers Among Us (SciFiDevCon 2024)Injustice - Developers Among Us (SciFiDevCon 2024)
Injustice - Developers Among Us (SciFiDevCon 2024)Allon Mureinik
 
Enhancing Worker Digital Experience: A Hands-on Workshop for Partners
Enhancing Worker Digital Experience: A Hands-on Workshop for PartnersEnhancing Worker Digital Experience: A Hands-on Workshop for Partners
Enhancing Worker Digital Experience: A Hands-on Workshop for PartnersThousandEyes
 

Recently uploaded (20)

The Codex of Business Writing Software for Real-World Solutions 2.pptx
The Codex of Business Writing Software for Real-World Solutions 2.pptxThe Codex of Business Writing Software for Real-World Solutions 2.pptx
The Codex of Business Writing Software for Real-World Solutions 2.pptx
 
Handwritten Text Recognition for manuscripts and early printed texts
Handwritten Text Recognition for manuscripts and early printed textsHandwritten Text Recognition for manuscripts and early printed texts
Handwritten Text Recognition for manuscripts and early printed texts
 
Slack Application Development 101 Slides
Slack Application Development 101 SlidesSlack Application Development 101 Slides
Slack Application Development 101 Slides
 
Maximizing Board Effectiveness 2024 Webinar.pptx
Maximizing Board Effectiveness 2024 Webinar.pptxMaximizing Board Effectiveness 2024 Webinar.pptx
Maximizing Board Effectiveness 2024 Webinar.pptx
 
Presentation on how to chat with PDF using ChatGPT code interpreter
Presentation on how to chat with PDF using ChatGPT code interpreterPresentation on how to chat with PDF using ChatGPT code interpreter
Presentation on how to chat with PDF using ChatGPT code interpreter
 
Scaling API-first – The story of a global engineering organization
Scaling API-first – The story of a global engineering organizationScaling API-first – The story of a global engineering organization
Scaling API-first – The story of a global engineering organization
 
Understanding the Laravel MVC Architecture
Understanding the Laravel MVC ArchitectureUnderstanding the Laravel MVC Architecture
Understanding the Laravel MVC Architecture
 
WhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure service
WhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure serviceWhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure service
WhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure service
 
SQL Database Design For Developers at php[tek] 2024
SQL Database Design For Developers at php[tek] 2024SQL Database Design For Developers at php[tek] 2024
SQL Database Design For Developers at php[tek] 2024
 
A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)
 
FULL ENJOY 🔝 8264348440 🔝 Call Girls in Diplomatic Enclave | Delhi
FULL ENJOY 🔝 8264348440 🔝 Call Girls in Diplomatic Enclave | DelhiFULL ENJOY 🔝 8264348440 🔝 Call Girls in Diplomatic Enclave | Delhi
FULL ENJOY 🔝 8264348440 🔝 Call Girls in Diplomatic Enclave | Delhi
 
#StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
#StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024#StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
#StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
 
How to Remove Document Management Hurdles with X-Docs?
How to Remove Document Management Hurdles with X-Docs?How to Remove Document Management Hurdles with X-Docs?
How to Remove Document Management Hurdles with X-Docs?
 
Human Factors of XR: Using Human Factors to Design XR Systems
Human Factors of XR: Using Human Factors to Design XR SystemsHuman Factors of XR: Using Human Factors to Design XR Systems
Human Factors of XR: Using Human Factors to Design XR Systems
 
My Hashitalk Indonesia April 2024 Presentation
My Hashitalk Indonesia April 2024 PresentationMy Hashitalk Indonesia April 2024 Presentation
My Hashitalk Indonesia April 2024 Presentation
 
Swan(sea) Song – personal research during my six years at Swansea ... and bey...
Swan(sea) Song – personal research during my six years at Swansea ... and bey...Swan(sea) Song – personal research during my six years at Swansea ... and bey...
Swan(sea) Song – personal research during my six years at Swansea ... and bey...
 
Beyond Boundaries: Leveraging No-Code Solutions for Industry Innovation
Beyond Boundaries: Leveraging No-Code Solutions for Industry InnovationBeyond Boundaries: Leveraging No-Code Solutions for Industry Innovation
Beyond Boundaries: Leveraging No-Code Solutions for Industry Innovation
 
08448380779 Call Girls In Civil Lines Women Seeking Men
08448380779 Call Girls In Civil Lines Women Seeking Men08448380779 Call Girls In Civil Lines Women Seeking Men
08448380779 Call Girls In Civil Lines Women Seeking Men
 
Injustice - Developers Among Us (SciFiDevCon 2024)
Injustice - Developers Among Us (SciFiDevCon 2024)Injustice - Developers Among Us (SciFiDevCon 2024)
Injustice - Developers Among Us (SciFiDevCon 2024)
 
Enhancing Worker Digital Experience: A Hands-on Workshop for Partners
Enhancing Worker Digital Experience: A Hands-on Workshop for PartnersEnhancing Worker Digital Experience: A Hands-on Workshop for Partners
Enhancing Worker Digital Experience: A Hands-on Workshop for Partners
 

Skr+3200+chapter+2+(kweh)

  • 2. Learning Outcome • Illustrate the layers involved in OSI model (C4) • Illustrate the layers involved in the Internet (TCP/IP) model (C4)
  • 3. The OSI Model • • • • • Established in 1947, the ISO is a multinational body dedicated to worldwide agreement on international standard ISO standard which covers all aspects of network communications – Open Systems Interconnection (OSI) model Open System – a model that allows any two different systems to communicate regardless of their underlying architecture OSI is not a protocol Model for understanding and designing a network architecture that is flexible, robust, and interoperable 3
  • 4. Figure 2.2 Seven layers of the OSI model
  • 5. The model • • • • OSI – a layered framework for design of network systems that allows for communication across all types of computer system 7 layer architecture Intermediate nodes – involve only the first three layers Peer-to-Peer Process – Layer n, use the services provided by layer n-1 and provides services for layer n+1 – The process on each machine that communicate at a given layer are called peer-to-peer process – Use protocol 5
  • 6. • At sending machine: – headers added to the message at L6,5,4,3,2 – Trailer is added at only L2 • At receiving machine – The message is unwrapped layer by layer, received process and removing the data meant for it. (reverse of sending machine) Interfaces between layers – control the passing of the data and network information down/up through the layers of sending/receiving machine • 6
  • 7. • • The 7L can grouped into three subgroup – L1,2,3 – the network support layer – deal with the physical aspects of moving data from one device to another – L5,6,7 – the user support layer –allow interoperability among unrelated software systems – L4 – ensures end-to-end reliable data transmission After pass through L1 of sending machine, the data unit is changed into electromagnetic signal and transported along a physical link 7
  • 8. OSI REFERENCE MODEL Application Presentation Session Transport Network Data Link Physical Web Application, SMTP, FTP,Telnet,IRC,News dll Translation, Encryption and Compression Secure communication: Secure Socket Layer (SSL) Connection/less, multiplex,flow dan error control Packet transmission to destination Network Protocols, Addressing, Error, flow control FDDI,ATM, Ethernet, Token Ring, Dialup,wireless 8
  • 10. 12/06/13 An Exchange Using the OSI Model 10
  • 11. Concept of Header in OSI model Client Server Application Presentation Session Transport Network Data Link Physical data Application segment data Presentation TCP header Session packet data Transport TCP header IP header Network frame data Data Link TCP header Network card IP header Ethernet header Physical
  • 12. Function of Each Layer • Physical layer (L1) – Coordinates the function required to transmit a bit stream over a physical medium – Deal with the mechanical/electrical spec of the interface and transmission medium – Defines the procedures and functions that physical devices and interfaces have to perform for transmission to occur 12
  • 13. • Concerned with: – Physical characteristics of interfaces and media – Representation of bits • Bits must be encoded into signals – electrical or optic – Data rate – the number of bits sent each second – Synchronization of bits – Line configuration – connection of devices to the medium
  • 14. 12/06/13 • Concerned with: – Physical topology • How devices are connected to form a network – Transmission mode • Direction of signal transmission between two devices 14
  • 15. Note: The physical layer is responsible for transmitting individual bits from one node to the next. 15
  • 17. • Data Link Layer (L2): – Responsible for node-to-node delivery – Makes appear error free to the network layer 17
  • 18. • Responsibilities include: – Framing – divides the stream data to manageable data units – frame – Physical addressing – adds a header to the frame – to define the physical address of sender (source address) and receiver (destination address) – Flow control – to prevent overwhelming at the receiver – Error control – provides reliability – to detect and retransmit damaged or lost frames, also prevent duplication of frames –trailer – Access control – require a protocol to determine which device has control over the link at any given time –> same link with two or more devices connected.
  • 19. Note: The data link layer is responsible for transmitting frames from one node to the next. 19
  • 21. Example 1 In the next figure, a node with physical address 10 sends a frame to a node with physical address 87. The two nodes are connected by a link. At the data link level this frame contains physical addresses in the header. These are the only addresses needed. The rest of the header contains other information needed at this level. The trailer usually contains extra bits needed for error detection 21
  • 22. Data Link Layer Example 22
  • 23. • • Network Layer (L3): – Responsible for the source-to-destination delivery of a packet possibly across multiple networks (links) – If two systems are attached to different networks, we need the network layer protocol to accomplish source-to-destination delivery Specific responsibility: – Logical addressing – to distinguish the source and destination systems when a packet passes the network boundary – also known network address – Routing – internetwork/large network – route the packet to the final destination 23
  • 24. 12/06/13 Note: The network layer is responsible for the delivery of packets from the original source to the final destination. 24
  • 26. Network Layer Example Example 2 In the next figure, we want to send data from a node with network address A and physical address 10, located on one LAN, to a node with a network address P and physical address 95, located on another LAN. Because the two devices are located on different networks, we cannot use physical addresses only; the physical addresses only have local jurisdiction. What we need here are universal addresses that can pass through the LAN boundaries. The network (logical) addresses have this characteristic. 26
  • 28. • Transport Layer (L4): – Review of a network layer responsibility: • Responsible for source-to-destination (end-to-end) delivery of the entire message • Individual packet – treats each packet independently • Ensures the whole (entire) message arrives intact and in order • Oversee both error control and flow control at source-to-destination level – To added security, transport layer create a connection between the two end ports • Connection - Single logical path between the source and destination 28
  • 29. • • Creating connection involves 3 steps: – Connection establishment – Data transfer – Connection release Has more control over sequencing, flow, error correction and detection 29
  • 30. • Specific responsibilities: – Service-point addressing • Computers often run several programs at the same time • From a specific process (running program) on one computer to a specific process (running program) on the other • TL header must include a service-point address or port address – Segmentation and reassembly • Segment – add a sequence number into message segment 30
  • 31. – Connection control • Can be either connectionless (independent packet) or connection oriented – Flow control • End-to-end flow control (across multiple networks) – Error control • End-to-end error control (across multiple networks)
  • 32. Note: The transport layer is responsible for delivery of a message from one process to another. 32
  • 33. Figure : Reliable process-to-process delivery of a message 33
  • 35. • • Session Layer (L5) – The network dialog controller – Establishes, maintains, and synchronizes the Establishes maintains interaction between communicating systems Responsibilities: – Dialog control • allows two systems to enter into a dialog • communication between two process – half-duplex or full-duplex – Synchronization • allows a process to add checkpoints (synchronization points) into a stream of data • E.g.: sending a file.. 35
  • 37. • • Presentation Layer (L6) – Concerned with the syntax and semantics of the information exchanged between two systems. Responsibilities: – Translation • The process (running programs) in two systems are usually exchanging information • Different computers use different encoding systems • Responsible for interoperability between different encoding methods • Sender machine change the information from its sender-dependent format into a common format • Receiver machine change the common format into its receiver-dependent format 37
  • 38. – Encryption • Encryption - transform the original information to another form and sends it over the network • Decryption - reverse process at the receiver side • assure privacy - to carry a sensitive data / information – Compression • Reduces the number of bits to be transmitted • multimedia data transmission – such as text, audio and video 38
  • 40. • • Application Layer (L7) – Enables user , whether human or software to access the network – Provides user interfaces and support for services such as email, remote file access, shared database management etc – No trailer or header are added here Specific services – Network virtual terminal – File transfer, access, and management (FTAM) – access/manage/control files in a remote computer – Mail services - X.400 – store and forward email – Directory services – X.500 – provides distributed database sources 40
  • 42. Note: The application layer is responsible for providing services to the user. 42
  • 43. Summary of Layer Functions (OSI model) 43
  • 44. 3.3 TCP/IP Protocol Suite • • • • Developed prior to the OSI model 5 layers – also known Internet model The three topmost layers in the OSI model are represented in TCP/IP by a single layer – application layer TCP/IP is a hierarchical protocol – the upper-level protocol is supported by one or more lower-level protocols 44
  • 45. TCP/IP • Physical layer – Twisted pair, optical fibers, satellite • Data link layer – Ethernet, WiFi • Network layer – IP • Transport layer – TCP, UDP, SCTP • Application Layer – SMTP, FTP 45
  • 46. Figure 2.16 TCP/IP and OSI model
  • 47. Summary of Layer Functions (TCP/IP) 47
  • 48. Example of using TCP/IP Prior to the example, you need to know the following terminologies in which will mapped to the TCP/IP model Figure 2.17 Addresses in TCP/IP 2. 48
  • 49. Figure 2.18 Relationship of layers and addresses in TCP/IP