SlideShare ist ein Scribd-Unternehmen logo
1 von 33
OSI Reference Model
And TCP/IP Reference Model
ENAM 2012/13
BWIRE SEDRICK
Network Model
 In order for a computer to send information to
another computer, and for that computer to
receive and understand the information, there
has to exist a set of rules or standards for this
communication process.
 These standards ensure that varying devices
and products can communicate with each
other over any network. This set of standards
is called Network protocols.
 The Network functions are separated in the
form of Layers.
2Sep-13 BBC & BIOM III
3
What is Layering?
r A technique to organize a networked
system into a succession of logically
distinct entities, such that the service
provided by one entity is solely based on
the service provided by the previous (lower
level) entity.
Application
Transport
Network
Datalink
Physical
Application
Transport
Network
Datalink
Physical
Network
Datalink
Physical
Physical medium
Sep-13 BBC & BIOM III
Layered Tasks Example
 Sender, Receiver and Carrier
Sep-13 4BBC & BIOM III
Why divide network into layers???
 Reduces complexity
 Provides compatibility - It standardizes
network components to allow multiple-
vendor development and support.
 It allows different types of network hardware
and software to communicate with each
other.
 Accelerates evolution of technology - It
prevents changes in one layer from affecting
the other layers, so that they can develop
more quickly. 5Sep-13 BBC & BIOM III
ISO (International Standards
Organization)
 It released a set fo specifications that describe
network architecture dissimilar devices.
 In 1984 the ISO released set of specifications
called Open Systems Interconnection (OSI)
reference model.
 The OSI model has become an international
standard for networking.
6Sep-13 BBC & BIOM III
OSI functions
 Mainly, it provides a way to understand how
an internetwork operates.
 It also serves as a guideline or framework for
creating and implementing network
standards, devices, and internetworking
schemes.
 Helps in troubleshooting network problems
7Sep-13 BBC & BIOM III
OSI Layers
 OSI model consists of 7 layers and each layer provides some
services to the layer above it.
 The principles that were applied to arrive at the seven layers
are as follows:
 A layer should be created where a different level of
abstraction (idea, concept) is needed.
 Each layer should provide some well defined functions.
 Each layer should work independently from other layers.
 Layer boundaries should minimize data flow across those
boundaries.
 The right number of layers should be there. Don't put too
many functions together in a layer, and not too many layers
either.
8Sep-13 BBC & BIOM III
OSI Layers cont’d…
 The three upper layers (Application Layers)
define how the applications within the end
stations will communicate with each other
and with users.
 The four lower layers (Data Flow Layers)
define ways for end stations to establish
connections to each other in order to
exchange data.
9Sep-13 BBC & BIOM III
OSI Layers cont’d…
10Sep-13 BBC & BIOM III
Description of each layer
Physical layer
 It is Layer 1, the bottom layer of the OSI model. It
specifies how data is processed into bits and
physically transferred over medium, such as cables.
 The physical layer defines the
electrical, mechanical, procedural, and functional
specifications for activating, maintaining, and
deactivating the physical link between
communicating network systems. Physical layer
specifications define characteristics such as voltage
levels, timing of voltage changes, physical data
rates, maximum transmission distances, and physical
connectors.
11Sep-13 BBC & BIOM III
Data Link Layer
 It is Layer 2, and sends data frames from the
Network layer to the Physical layer.
 On the receiving end, it packages raw bits from
the Physical layer into data frames.
 It combines bits into bytes and bytes into
frames.
 The data link layer is concerned with physical
(as opposed to logical) addressing, network
topology, network access, error notification
(acknowledgement) and retransmission, error
recovery (CRC check), ordered delivery of
frames, and flow control. 12Sep-13 BBC & BIOM III
Network Layer
 Layer 3, the Network layer, is responsible for providing
end-to-end delivery of Packets.
 To accomplish this the network layer defines logical
addresses to identify the endpoint of the network.
 It also determines the route from the source to the
destination computer.
 It determines which path the data should take based on
network conditions, priority of service, and other factors.
 It also manages traffic problems on the network, such as
packet switching, routing, and controlling the congestion of
data.
 If the destination computer cannot receive a data chunk as
large as the source computer sends, the Network layer on
the source compensates by breaking the large data chunk
into smaller units.
13Sep-13 BBC & BIOM III
Network Layer
 On the destination end, the Network layer reassembles the
data into the original large chunk.
 Internet Protocol (IP) and Internetwork Packet Exchange
(IPX) are examples of network layer protocols.
14Sep-13 BBC & BIOM III
Transport Layer
 Layer 4, the transport layer, is responsible for breaking the
data into segments and establishing an end-to-end logical
connection between machines.
 The transport layer ensures that packets are delivered error
free, in sequence, and without losses or duplications.
 At the sending computer, this layer repackages messages,
dividing long messages into several packets and collecting
small packets together in one package. This process ensures
that packets are transmitted efficiently over the network.
 At the receiving computer, the transport layer opens the
packets, reassembles the original messages, and, typically,
sends an acknowledgement that the message was received.
 If a duplicate packet arrives, this layer will recognize the
duplicate and discard it. Protocols include TCP n UDP
15Sep-13 BBC & BIOM III
Session Layer
 Layer 5, the Session layer defines how to start,
control and end the conversation (called session)
between two applications running on different
computers.
 It provides synchronization between user tasks by
placing checkpoints in the data stream.
 This way, if the network fails, only the data after
the last checkpoint has to be retransmitted.
 This layer also implements dialog control between
communicating processes by regulating which side
transmits, when, for how long, and so on.
16Sep-13 BBC & BIOM III
Presentation Layer
 The main purpose of this layer is defining the data formats.
It is concerned with how data is converted and formatted for
data transfer.
 The Presentation Layer provides a variety of coding and
conversion functions that are applied to the application layer
data. These functions ensure that information sent from the
application layer of one system will be readable by the
application layer of another system
 The Presentation layer is also responsible for protocol
conversion, encrypting the data, and managing data
compression.
 The presentation layer also manages data compression to
reduce the number of bits that need to be transmitted.
17Sep-13 BBC & BIOM III
Application Layer
 Layer 7, the topmost layer of the OSI model, is the
application layer.
 The Application Layer is where the user interacts with the
computer
 This layer relates to the services that directly support
applications, such as software for file transfers, database
access, and E-mail.
 A message to be sent across the network enters the OSI
model at this point and exits the OSI model’s application
layer on the receiving computer.
 Protocols at this layer identify communication partners,
determine resource availability, and synchronize
communication. For example, a word processing
application is serviced by file transfer services at this layer.
 Application layer protocols; Http, telnet, SNMP,SMTP etc
18Sep-13 BBC & BIOM III
Figure 2.15 Summary of layers
Summary of Layers
Sep-13 19BBC & BIOM III
TCP/IP reference model
 Although the OSI reference model is universally
recognized, the historical and technical open standard
of the Internet is Transmission Control Protocol/Internet
Protocol (TCP/IP).
 The TCP/IP reference model and the TCP/IP protocol stack
make data communication possible between any two
computers, anywhere in the world, at nearly the speed
of light.
 The U.S. Department of Defense (DoD) created the
TCP/IP reference model because it wanted a network that
could survive any conditions, even a nuclear war.
20Sep-13 BBC & BIOM III
TCP/IP reference model layers
The TCP/IP model has four layers:
 a) Application layer,
 b) Transport layer,
 c) Internet layer, and
 d) Host to Network layer.
NB: It is important to note that some of the layers in
the TCP/IP model have the same name as layers in
the OSI model. Do not confuse the layers of the two
models, because the application layer has different
functions in each model. 21Sep-13 BBC & BIOM III
TCP/IP Application layer
 -Combines the functions of the OSI application,
presentation, and session layers.
 The TCP/IP combines all application related issues into one
layer, and assumes this data is properly packaged for the
next layer.
 Protocols involved in this layer: HTTP, FTP, SMTP, DNS,
POP3, TFTP etc.
22Sep-13 BBC & BIOM III
TCP/IP Transport layer
 This layer works almost similar to the Transport layer of
OSI model.
 Deals with the quality-of-service, issues of reliability, flow
control, and error correction.
 It has two major protocols TCP and UDP
 The transmission control protocol (TCP), provides excellent
and flexible ways to create reliable, well-flowing, low-error
network communications. TCP is a connection-oriented
protocol.
 Note: Connection-oriented does not mean that a circuit
exists between the communicating computers (that would
be circuit switching). It does mean that Layer 4 segments
travel back and forth between two hosts to acknowledge the
connection exists logically for some period.
23Sep-13 BBC & BIOM III
TCP/IP Transport layer cont’d……
 •The second protocol in this layer is
User Datagram Protocol (UDP), its an
unreliable, connectionless protocol for
the applications that do not want TCP’s
sequencing and flow control and where
quick delivery is more important than
accurate delivery like speech and video
transmission.
24Sep-13 BBC & BIOM III
TCP/IP Internet(Network) layer
 The purpose of the Internet layer is to send source
packets from any network on the internet work and
have them arrive at the destination independent of
the path and networks they took to get there.
 The specific protocol that governs this layer is
called the Internet protocol (IP).
 Best path determination and packet switching occur
at this layer.
 Think of it in terms of the postal system. When you
mail a letter, you do not know how it gets there
(there are various possible routes), but you do care
that it arrives.
25Sep-13 BBC & BIOM III
TCP/IP Network Access layer
 Provides the same functionality as the physical,
the data link and network layers in the OSI
model.
 It includes the LAN and WAN technology
details
 The OSI model is proven to be very useful for
understanding computer networks.
 However the OSI Protocols have not become
very popular. The opposite is the case for
TCP/IP reference model. The model is
practically non-existing, but two of its protocols
TCP and IP are widely used in the networks. 26Sep-13
BBC & BIOM III
Associated TCP/IP Protocols & Services
HTTP This protocol, the core of the World Wide Web, facilitates
retrieval and transfer of hypertext (mixed media) documents.
Stands for the HyperText Transfer protocol
Telnet A remote terminal emulation protocol that enables clients to
log on to remote hosts on the network.
SNMP Used to remotely manage network devices. Stands for the
Simple Network Management Protocol.
DNS Provides meaningful names like achilles.mycorp.com for
computers to replace numerical addresses like 123.45.67.89.
Stands for the Domain Name System.
SLIP/
PPP
SLIP (Serial Line Internet Protocol) and PPP (Point to Point
Protocol) encapsulate the IP packets so that they can be sent
over a dial up phone connection to an access provider’s
modem.
Sep-13 27BBC & BIOM III
Address Resolution Protocol (ARP)
 The first system knows that the
second is located somewhere
on the network but does not
know its exact location on the
network.
 The source will broadcast an
ARP request to find the MAC
address of the intended
destinations MAC address.
 The signal sent is a broadcast
message and all the devices in
the LAN will hear it.
 Only the destination device will
respond to the ARP request.
Sep-13 BBC & BIOM III 28
Other Protocols
 Simple Mail Transfer Protocol (SMTP) is a protocol for
sending e-mail messages between servers. The messages
can then be retrieved with an e-mail client using either Post
Office Protocol (POP) or Internet Message Access Protocol
(IMAP).
 Post Office Protocol version 3 (POP3) is a common mail
service protocol that is used by ISPs that provide Internet
and e-mail service to home customers.
 FTP is a general-purpose protocol that can be used to copy
all types of files from one computer to another. FTP makes
use of the TCP reliable transport services to establish a
logical connection between the systems. FTP is one of the
most heavily used protocols on the Internet.
Sep-13 BBC & BIOM III 29
Comparing the OSI Model and
TCP/IP Model
Sep-13 BBC & BIOM III 30
Similarities of the OSI and TCP/IP
models
 Both have layers.
 Both have application layers, though they
include very different services.
 Both have comparable transport and network
layers.
 Packet-switched, not circuit-switched,
technology is assumed.
 Networking professionals need to know both
models.
Sep-13 BBC & BIOM III 31
Differences of the OSI and TCP/IP
models
 TCP/IP combines the presentation and session
layer into its application layer.
 TCP/IP combines the OSI data link and physical
layers into one layer.
 TCP/IP appears simpler because it has fewer
layers.
 TCP/IP transport layer using UDP does not
always guarantee reliable delivery of packets as
the transport layer in the OSI model does.
Sep-13 BBC & BIOM III 32
 TCP/IP protocols are considered to be
standards around which the internet has
been developed
 The OSI model consists of 7 layers whereas
the TCP/IP only has 4 layers.
Sep-13 BBC & BIOM III 33

Weitere ähnliche Inhalte

Was ist angesagt? (20)

Presentation on TCP/IP Model
Presentation on TCP/IP ModelPresentation on TCP/IP Model
Presentation on TCP/IP Model
 
TCP/IP Protocols With All Layer Description
TCP/IP Protocols With All Layer DescriptionTCP/IP Protocols With All Layer Description
TCP/IP Protocols With All Layer Description
 
TCP/IP – Transmission Control Protocol/ Internet Protocol
TCP/IP – Transmission Control Protocol/ Internet ProtocolTCP/IP – Transmission Control Protocol/ Internet Protocol
TCP/IP – Transmission Control Protocol/ Internet Protocol
 
Ccna PPT
Ccna PPTCcna PPT
Ccna PPT
 
OSI Network model ppt
OSI Network model pptOSI Network model ppt
OSI Network model ppt
 
OSI MODEL
    OSI MODEL    OSI MODEL
OSI MODEL
 
Osi model
Osi modelOsi model
Osi model
 
THE COMPLETE OSI MODEL
THE COMPLETE OSI MODEL THE COMPLETE OSI MODEL
THE COMPLETE OSI MODEL
 
TCP/IP Introduction
TCP/IP IntroductionTCP/IP Introduction
TCP/IP Introduction
 
TCP-IP Reference Model
TCP-IP Reference ModelTCP-IP Reference Model
TCP-IP Reference Model
 
OSI Model
OSI ModelOSI Model
OSI Model
 
OSI Layers
OSI LayersOSI Layers
OSI Layers
 
Circuit and packet_switching
Circuit and packet_switchingCircuit and packet_switching
Circuit and packet_switching
 
Tcp IP Model
Tcp IP ModelTcp IP Model
Tcp IP Model
 
Osi and tcp ip model
Osi and tcp ip modelOsi and tcp ip model
Osi and tcp ip model
 
CCCNA R&S-02-The TCP-IP and OSI Networking Models
CCCNA R&S-02-The TCP-IP and OSI Networking ModelsCCCNA R&S-02-The TCP-IP and OSI Networking Models
CCCNA R&S-02-The TCP-IP and OSI Networking Models
 
Osi model
Osi modelOsi model
Osi model
 
OSI reference model
OSI reference modelOSI reference model
OSI reference model
 
Osi reference model in Networking
Osi reference model in NetworkingOsi reference model in Networking
Osi reference model in Networking
 
Viloria osi layer4-7
Viloria osi layer4-7Viloria osi layer4-7
Viloria osi layer4-7
 

Andere mochten auch

OSI Reference Model and TCP/IP (Lecture #3 ET3003 Sem1 2014/2015)
OSI Reference Model and TCP/IP (Lecture #3 ET3003 Sem1 2014/2015)OSI Reference Model and TCP/IP (Lecture #3 ET3003 Sem1 2014/2015)
OSI Reference Model and TCP/IP (Lecture #3 ET3003 Sem1 2014/2015)Tutun Juhana
 
Osi model vs TCP/IP
Osi model vs TCP/IPOsi model vs TCP/IP
Osi model vs TCP/IPMannu Khani
 
Computer networks--osi model
Computer networks--osi modelComputer networks--osi model
Computer networks--osi modelAditya Mehta
 
Osi model(open system interconnection)
Osi model(open system interconnection)Osi model(open system interconnection)
Osi model(open system interconnection)Dipu Thomas joy
 
Complete Osi Model Explained
Complete Osi Model ExplainedComplete Osi Model Explained
Complete Osi Model ExplainedVivek chan
 
Physical Layer of ISO-OSI model and Devices
Physical Layer of ISO-OSI model and DevicesPhysical Layer of ISO-OSI model and Devices
Physical Layer of ISO-OSI model and DevicesShahid Khan
 
OSI Model - Every Detail Explained
OSI Model - Every Detail ExplainedOSI Model - Every Detail Explained
OSI Model - Every Detail ExplainedAshish Malik
 
TCP/IP Model
TCP/IP ModelTCP/IP Model
TCP/IP Modelfarhan516
 
TCP/IP Network ppt
TCP/IP Network pptTCP/IP Network ppt
TCP/IP Network pptextraganesh
 
osi model
osi modelosi model
osi modelfaizan
 
OSI REFRENCE MODEL by- Mujmmil Shaikh
OSI REFRENCE MODEL by- Mujmmil ShaikhOSI REFRENCE MODEL by- Mujmmil Shaikh
OSI REFRENCE MODEL by- Mujmmil ShaikhMujmmil Shaikh
 
7 Layers OSI model description with 3 unofficial Layers.
7 Layers OSI model description with 3 unofficial Layers.7 Layers OSI model description with 3 unofficial Layers.
7 Layers OSI model description with 3 unofficial Layers.Kanishk Raj
 
Computer Network - OSI model
Computer Network - OSI modelComputer Network - OSI model
Computer Network - OSI modelManoj Kumar
 
OSI REFERENCE LAYERS
OSI REFERENCE LAYERSOSI REFERENCE LAYERS
OSI REFERENCE LAYERSAshok Virath
 

Andere mochten auch (20)

OSI Reference Model and TCP/IP (Lecture #3 ET3003 Sem1 2014/2015)
OSI Reference Model and TCP/IP (Lecture #3 ET3003 Sem1 2014/2015)OSI Reference Model and TCP/IP (Lecture #3 ET3003 Sem1 2014/2015)
OSI Reference Model and TCP/IP (Lecture #3 ET3003 Sem1 2014/2015)
 
Osi model vs TCP/IP
Osi model vs TCP/IPOsi model vs TCP/IP
Osi model vs TCP/IP
 
Computer networks--osi model
Computer networks--osi modelComputer networks--osi model
Computer networks--osi model
 
Osi model(open system interconnection)
Osi model(open system interconnection)Osi model(open system interconnection)
Osi model(open system interconnection)
 
Complete Osi Model Explained
Complete Osi Model ExplainedComplete Osi Model Explained
Complete Osi Model Explained
 
Osi model
Osi modelOsi model
Osi model
 
Physical Layer of ISO-OSI model and Devices
Physical Layer of ISO-OSI model and DevicesPhysical Layer of ISO-OSI model and Devices
Physical Layer of ISO-OSI model and Devices
 
OSI Model - Every Detail Explained
OSI Model - Every Detail ExplainedOSI Model - Every Detail Explained
OSI Model - Every Detail Explained
 
TCP/IP Model
TCP/IP ModelTCP/IP Model
TCP/IP Model
 
TCP/IP Network ppt
TCP/IP Network pptTCP/IP Network ppt
TCP/IP Network ppt
 
Osi
OsiOsi
Osi
 
osi model
osi modelosi model
osi model
 
Osi model
Osi modelOsi model
Osi model
 
OSI REFRENCE MODEL by- Mujmmil Shaikh
OSI REFRENCE MODEL by- Mujmmil ShaikhOSI REFRENCE MODEL by- Mujmmil Shaikh
OSI REFRENCE MODEL by- Mujmmil Shaikh
 
Osi model in networking
Osi model in networkingOsi model in networking
Osi model in networking
 
7 Layers OSI model description with 3 unofficial Layers.
7 Layers OSI model description with 3 unofficial Layers.7 Layers OSI model description with 3 unofficial Layers.
7 Layers OSI model description with 3 unofficial Layers.
 
Osi models
Osi modelsOsi models
Osi models
 
Computer Network - OSI model
Computer Network - OSI modelComputer Network - OSI model
Computer Network - OSI model
 
OSI Layering
OSI Layering OSI Layering
OSI Layering
 
OSI REFERENCE LAYERS
OSI REFERENCE LAYERSOSI REFERENCE LAYERS
OSI REFERENCE LAYERS
 

Ähnlich wie Osi model

computer network and chapter 7 OSI layers.pptx
computer network and chapter 7 OSI layers.pptxcomputer network and chapter 7 OSI layers.pptx
computer network and chapter 7 OSI layers.pptxgadisaAdamu
 
OSI and TCPIP Model
OSI and TCPIP ModelOSI and TCPIP Model
OSI and TCPIP ModelTapan Khilar
 
BAPANKAR15800121011 SOFT.pptx
BAPANKAR15800121011 SOFT.pptxBAPANKAR15800121011 SOFT.pptx
BAPANKAR15800121011 SOFT.pptxBapanKar2
 
Osi model and tcpip model.
Osi model and tcpip model.Osi model and tcpip model.
Osi model and tcpip model.kona paul
 
OSI and TCP/IP Model
OSI and TCP/IP ModelOSI and TCP/IP Model
OSI and TCP/IP ModelNajmulIslam38
 
OSI reference Model
OSI reference ModelOSI reference Model
OSI reference ModelJohnson Ubah
 
Topology Chapter 2.pptx
Topology Chapter 2.pptxTopology Chapter 2.pptx
Topology Chapter 2.pptxTadeseBeyene
 
THE OSI MODEL
THE OSI MODELTHE OSI MODEL
THE OSI MODELMd Saylab
 
006 Osi Model
006 Osi Model006 Osi Model
006 Osi ModelBELKA08
 
CN unit 1 part 2 2023.ppt
CN unit 1 part 2 2023.pptCN unit 1 part 2 2023.ppt
CN unit 1 part 2 2023.pptmohanravi1986
 
Chapter 2. vantage understanding sensor placement in networks
Chapter 2. vantage  understanding sensor placement in networksChapter 2. vantage  understanding sensor placement in networks
Chapter 2. vantage understanding sensor placement in networksPhu Nguyen
 

Ähnlich wie Osi model (20)

chapter 4.pptx
chapter 4.pptxchapter 4.pptx
chapter 4.pptx
 
computer network and chapter 7 OSI layers.pptx
computer network and chapter 7 OSI layers.pptxcomputer network and chapter 7 OSI layers.pptx
computer network and chapter 7 OSI layers.pptx
 
Lec 02 - Network Models.pptx
Lec 02 - Network Models.pptxLec 02 - Network Models.pptx
Lec 02 - Network Models.pptx
 
COMPUTER NETWORK_OSI & TCP/IP
COMPUTER NETWORK_OSI & TCP/IPCOMPUTER NETWORK_OSI & TCP/IP
COMPUTER NETWORK_OSI & TCP/IP
 
OSI and TCPIP Model
OSI and TCPIP ModelOSI and TCPIP Model
OSI and TCPIP Model
 
BAPANKAR15800121011 SOFT.pptx
BAPANKAR15800121011 SOFT.pptxBAPANKAR15800121011 SOFT.pptx
BAPANKAR15800121011 SOFT.pptx
 
OSI Model and TCP/IP Model.
OSI Model and TCP/IP Model.OSI Model and TCP/IP Model.
OSI Model and TCP/IP Model.
 
Assignment3
Assignment3Assignment3
Assignment3
 
Osi model and tcpip model.
Osi model and tcpip model.Osi model and tcpip model.
Osi model and tcpip model.
 
OSI and TCP/IP Model
OSI and TCP/IP ModelOSI and TCP/IP Model
OSI and TCP/IP Model
 
OSI reference Model
OSI reference ModelOSI reference Model
OSI reference Model
 
Learn basics of ip addressing
Learn basics of  ip addressingLearn basics of  ip addressing
Learn basics of ip addressing
 
Topology Chapter 2.pptx
Topology Chapter 2.pptxTopology Chapter 2.pptx
Topology Chapter 2.pptx
 
Computer networks chapter1.
Computer networks chapter1.Computer networks chapter1.
Computer networks chapter1.
 
THE OSI MODEL
THE OSI MODELTHE OSI MODEL
THE OSI MODEL
 
006 Osi Model
006 Osi Model006 Osi Model
006 Osi Model
 
CN unit 1 part 2 2023.ppt
CN unit 1 part 2 2023.pptCN unit 1 part 2 2023.ppt
CN unit 1 part 2 2023.ppt
 
OSI Model
OSI ModelOSI Model
OSI Model
 
Chapter 2. vantage understanding sensor placement in networks
Chapter 2. vantage  understanding sensor placement in networksChapter 2. vantage  understanding sensor placement in networks
Chapter 2. vantage understanding sensor placement in networks
 
OSI &TCP/IP Model
OSI &TCP/IP ModelOSI &TCP/IP Model
OSI &TCP/IP Model
 

Mehr von bwire sedrick

Effect of poor customer care on the image of police a case study of uganda po...
Effect of poor customer care on the image of police a case study of uganda po...Effect of poor customer care on the image of police a case study of uganda po...
Effect of poor customer care on the image of police a case study of uganda po...bwire sedrick
 
Planning for a good presentation
Planning for a good presentationPlanning for a good presentation
Planning for a good presentationbwire sedrick
 
Principles of ict concepts and data processing
Principles of ict   concepts and data processingPrinciples of ict   concepts and data processing
Principles of ict concepts and data processingbwire sedrick
 
Ura taxation handbook
Ura  taxation handbookUra  taxation handbook
Ura taxation handbookbwire sedrick
 
INTRODUCTION TO HTML
INTRODUCTION TO HTMLINTRODUCTION TO HTML
INTRODUCTION TO HTMLbwire sedrick
 
Lan access control methods
Lan access control methodsLan access control methods
Lan access control methodsbwire sedrick
 
ENTERPRISE NETWORKING
ENTERPRISE NETWORKINGENTERPRISE NETWORKING
ENTERPRISE NETWORKINGbwire sedrick
 
Strategy implementation
Strategy implementationStrategy implementation
Strategy implementationbwire sedrick
 
Strategic management process
Strategic management processStrategic management process
Strategic management processbwire sedrick
 
Strategic management overview
Strategic management   overviewStrategic management   overview
Strategic management overviewbwire sedrick
 
Industry analysis, swot & portfolio analysis
Industry analysis, swot & portfolio analysisIndustry analysis, swot & portfolio analysis
Industry analysis, swot & portfolio analysisbwire sedrick
 
Industry analysis, swot & portfolio analysis spare
Industry analysis, swot & portfolio analysis   spareIndustry analysis, swot & portfolio analysis   spare
Industry analysis, swot & portfolio analysis sparebwire sedrick
 
Establishing sustainable markets for ugandan products
Establishing sustainable markets for ugandan productsEstablishing sustainable markets for ugandan products
Establishing sustainable markets for ugandan productsbwire sedrick
 

Mehr von bwire sedrick (20)

Effect of poor customer care on the image of police a case study of uganda po...
Effect of poor customer care on the image of police a case study of uganda po...Effect of poor customer care on the image of police a case study of uganda po...
Effect of poor customer care on the image of police a case study of uganda po...
 
Planning for a good presentation
Planning for a good presentationPlanning for a good presentation
Planning for a good presentation
 
Marketing channels
Marketing channelsMarketing channels
Marketing channels
 
Principles of ict concepts and data processing
Principles of ict   concepts and data processingPrinciples of ict   concepts and data processing
Principles of ict concepts and data processing
 
Computer systems
Computer systemsComputer systems
Computer systems
 
Ura taxation handbook
Ura  taxation handbookUra  taxation handbook
Ura taxation handbook
 
E learning slide
E learning slideE learning slide
E learning slide
 
INTRODUCTION TO HTML
INTRODUCTION TO HTMLINTRODUCTION TO HTML
INTRODUCTION TO HTML
 
NETWORK COMPONENTS
NETWORK COMPONENTSNETWORK COMPONENTS
NETWORK COMPONENTS
 
Lan access control methods
Lan access control methodsLan access control methods
Lan access control methods
 
ENTERPRISE NETWORKING
ENTERPRISE NETWORKINGENTERPRISE NETWORKING
ENTERPRISE NETWORKING
 
Strategy implementation
Strategy implementationStrategy implementation
Strategy implementation
 
Strategic management process
Strategic management processStrategic management process
Strategic management process
 
Strategic management overview
Strategic management   overviewStrategic management   overview
Strategic management overview
 
Strategic choice
Strategic choiceStrategic choice
Strategic choice
 
Industry analysis, swot & portfolio analysis
Industry analysis, swot & portfolio analysisIndustry analysis, swot & portfolio analysis
Industry analysis, swot & portfolio analysis
 
Industry analysis, swot & portfolio analysis spare
Industry analysis, swot & portfolio analysis   spareIndustry analysis, swot & portfolio analysis   spare
Industry analysis, swot & portfolio analysis spare
 
Establishing sustainable markets for ugandan products
Establishing sustainable markets for ugandan productsEstablishing sustainable markets for ugandan products
Establishing sustainable markets for ugandan products
 
Course outline
Course outlineCourse outline
Course outline
 
Busgrowth
BusgrowthBusgrowth
Busgrowth
 

Kürzlich hochgeladen

Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...Drew Madelung
 
Slack Application Development 101 Slides
Slack Application Development 101 SlidesSlack Application Development 101 Slides
Slack Application Development 101 Slidespraypatel2
 
Understanding Discord NSFW Servers A Guide for Responsible Users.pdf
Understanding Discord NSFW Servers A Guide for Responsible Users.pdfUnderstanding Discord NSFW Servers A Guide for Responsible Users.pdf
Understanding Discord NSFW Servers A Guide for Responsible Users.pdfUK Journal
 
08448380779 Call Girls In Greater Kailash - I Women Seeking Men
08448380779 Call Girls In Greater Kailash - I Women Seeking Men08448380779 Call Girls In Greater Kailash - I Women Seeking Men
08448380779 Call Girls In Greater Kailash - I Women Seeking MenDelhi Call girls
 
🐬 The future of MySQL is Postgres 🐘
🐬  The future of MySQL is Postgres   🐘🐬  The future of MySQL is Postgres   🐘
🐬 The future of MySQL is Postgres 🐘RTylerCroy
 
EIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptx
EIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptxEIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptx
EIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptxEarley Information Science
 
From Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time AutomationFrom Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time AutomationSafe Software
 
08448380779 Call Girls In Civil Lines Women Seeking Men
08448380779 Call Girls In Civil Lines Women Seeking Men08448380779 Call Girls In Civil Lines Women Seeking Men
08448380779 Call Girls In Civil Lines Women Seeking MenDelhi Call girls
 
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
04-2024-HHUG-Sales-and-Marketing-Alignment.pptxHampshireHUG
 
Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...
Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...
Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...Igalia
 
Factors to Consider When Choosing Accounts Payable Services Providers.pptx
Factors to Consider When Choosing Accounts Payable Services Providers.pptxFactors to Consider When Choosing Accounts Payable Services Providers.pptx
Factors to Consider When Choosing Accounts Payable Services Providers.pptxKatpro Technologies
 
Presentation on how to chat with PDF using ChatGPT code interpreter
Presentation on how to chat with PDF using ChatGPT code interpreterPresentation on how to chat with PDF using ChatGPT code interpreter
Presentation on how to chat with PDF using ChatGPT code interpreternaman860154
 
Breaking the Kubernetes Kill Chain: Host Path Mount
Breaking the Kubernetes Kill Chain: Host Path MountBreaking the Kubernetes Kill Chain: Host Path Mount
Breaking the Kubernetes Kill Chain: Host Path MountPuma Security, LLC
 
How to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerHow to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerThousandEyes
 
The Codex of Business Writing Software for Real-World Solutions 2.pptx
The Codex of Business Writing Software for Real-World Solutions 2.pptxThe Codex of Business Writing Software for Real-World Solutions 2.pptx
The Codex of Business Writing Software for Real-World Solutions 2.pptxMalak Abu Hammad
 
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...Miguel Araújo
 
Artificial Intelligence: Facts and Myths
Artificial Intelligence: Facts and MythsArtificial Intelligence: Facts and Myths
Artificial Intelligence: Facts and MythsJoaquim Jorge
 
[2024]Digital Global Overview Report 2024 Meltwater.pdf
[2024]Digital Global Overview Report 2024 Meltwater.pdf[2024]Digital Global Overview Report 2024 Meltwater.pdf
[2024]Digital Global Overview Report 2024 Meltwater.pdfhans926745
 
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdf
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdfThe Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdf
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdfEnterprise Knowledge
 
2024: Domino Containers - The Next Step. News from the Domino Container commu...
2024: Domino Containers - The Next Step. News from the Domino Container commu...2024: Domino Containers - The Next Step. News from the Domino Container commu...
2024: Domino Containers - The Next Step. News from the Domino Container commu...Martijn de Jong
 

Kürzlich hochgeladen (20)

Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
 
Slack Application Development 101 Slides
Slack Application Development 101 SlidesSlack Application Development 101 Slides
Slack Application Development 101 Slides
 
Understanding Discord NSFW Servers A Guide for Responsible Users.pdf
Understanding Discord NSFW Servers A Guide for Responsible Users.pdfUnderstanding Discord NSFW Servers A Guide for Responsible Users.pdf
Understanding Discord NSFW Servers A Guide for Responsible Users.pdf
 
08448380779 Call Girls In Greater Kailash - I Women Seeking Men
08448380779 Call Girls In Greater Kailash - I Women Seeking Men08448380779 Call Girls In Greater Kailash - I Women Seeking Men
08448380779 Call Girls In Greater Kailash - I Women Seeking Men
 
🐬 The future of MySQL is Postgres 🐘
🐬  The future of MySQL is Postgres   🐘🐬  The future of MySQL is Postgres   🐘
🐬 The future of MySQL is Postgres 🐘
 
EIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptx
EIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptxEIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptx
EIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptx
 
From Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time AutomationFrom Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time Automation
 
08448380779 Call Girls In Civil Lines Women Seeking Men
08448380779 Call Girls In Civil Lines Women Seeking Men08448380779 Call Girls In Civil Lines Women Seeking Men
08448380779 Call Girls In Civil Lines Women Seeking Men
 
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
 
Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...
Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...
Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...
 
Factors to Consider When Choosing Accounts Payable Services Providers.pptx
Factors to Consider When Choosing Accounts Payable Services Providers.pptxFactors to Consider When Choosing Accounts Payable Services Providers.pptx
Factors to Consider When Choosing Accounts Payable Services Providers.pptx
 
Presentation on how to chat with PDF using ChatGPT code interpreter
Presentation on how to chat with PDF using ChatGPT code interpreterPresentation on how to chat with PDF using ChatGPT code interpreter
Presentation on how to chat with PDF using ChatGPT code interpreter
 
Breaking the Kubernetes Kill Chain: Host Path Mount
Breaking the Kubernetes Kill Chain: Host Path MountBreaking the Kubernetes Kill Chain: Host Path Mount
Breaking the Kubernetes Kill Chain: Host Path Mount
 
How to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerHow to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected Worker
 
The Codex of Business Writing Software for Real-World Solutions 2.pptx
The Codex of Business Writing Software for Real-World Solutions 2.pptxThe Codex of Business Writing Software for Real-World Solutions 2.pptx
The Codex of Business Writing Software for Real-World Solutions 2.pptx
 
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
 
Artificial Intelligence: Facts and Myths
Artificial Intelligence: Facts and MythsArtificial Intelligence: Facts and Myths
Artificial Intelligence: Facts and Myths
 
[2024]Digital Global Overview Report 2024 Meltwater.pdf
[2024]Digital Global Overview Report 2024 Meltwater.pdf[2024]Digital Global Overview Report 2024 Meltwater.pdf
[2024]Digital Global Overview Report 2024 Meltwater.pdf
 
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdf
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdfThe Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdf
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdf
 
2024: Domino Containers - The Next Step. News from the Domino Container commu...
2024: Domino Containers - The Next Step. News from the Domino Container commu...2024: Domino Containers - The Next Step. News from the Domino Container commu...
2024: Domino Containers - The Next Step. News from the Domino Container commu...
 

Osi model

  • 1. OSI Reference Model And TCP/IP Reference Model ENAM 2012/13 BWIRE SEDRICK
  • 2. Network Model  In order for a computer to send information to another computer, and for that computer to receive and understand the information, there has to exist a set of rules or standards for this communication process.  These standards ensure that varying devices and products can communicate with each other over any network. This set of standards is called Network protocols.  The Network functions are separated in the form of Layers. 2Sep-13 BBC & BIOM III
  • 3. 3 What is Layering? r A technique to organize a networked system into a succession of logically distinct entities, such that the service provided by one entity is solely based on the service provided by the previous (lower level) entity. Application Transport Network Datalink Physical Application Transport Network Datalink Physical Network Datalink Physical Physical medium Sep-13 BBC & BIOM III
  • 4. Layered Tasks Example  Sender, Receiver and Carrier Sep-13 4BBC & BIOM III
  • 5. Why divide network into layers???  Reduces complexity  Provides compatibility - It standardizes network components to allow multiple- vendor development and support.  It allows different types of network hardware and software to communicate with each other.  Accelerates evolution of technology - It prevents changes in one layer from affecting the other layers, so that they can develop more quickly. 5Sep-13 BBC & BIOM III
  • 6. ISO (International Standards Organization)  It released a set fo specifications that describe network architecture dissimilar devices.  In 1984 the ISO released set of specifications called Open Systems Interconnection (OSI) reference model.  The OSI model has become an international standard for networking. 6Sep-13 BBC & BIOM III
  • 7. OSI functions  Mainly, it provides a way to understand how an internetwork operates.  It also serves as a guideline or framework for creating and implementing network standards, devices, and internetworking schemes.  Helps in troubleshooting network problems 7Sep-13 BBC & BIOM III
  • 8. OSI Layers  OSI model consists of 7 layers and each layer provides some services to the layer above it.  The principles that were applied to arrive at the seven layers are as follows:  A layer should be created where a different level of abstraction (idea, concept) is needed.  Each layer should provide some well defined functions.  Each layer should work independently from other layers.  Layer boundaries should minimize data flow across those boundaries.  The right number of layers should be there. Don't put too many functions together in a layer, and not too many layers either. 8Sep-13 BBC & BIOM III
  • 9. OSI Layers cont’d…  The three upper layers (Application Layers) define how the applications within the end stations will communicate with each other and with users.  The four lower layers (Data Flow Layers) define ways for end stations to establish connections to each other in order to exchange data. 9Sep-13 BBC & BIOM III
  • 11. Description of each layer Physical layer  It is Layer 1, the bottom layer of the OSI model. It specifies how data is processed into bits and physically transferred over medium, such as cables.  The physical layer defines the electrical, mechanical, procedural, and functional specifications for activating, maintaining, and deactivating the physical link between communicating network systems. Physical layer specifications define characteristics such as voltage levels, timing of voltage changes, physical data rates, maximum transmission distances, and physical connectors. 11Sep-13 BBC & BIOM III
  • 12. Data Link Layer  It is Layer 2, and sends data frames from the Network layer to the Physical layer.  On the receiving end, it packages raw bits from the Physical layer into data frames.  It combines bits into bytes and bytes into frames.  The data link layer is concerned with physical (as opposed to logical) addressing, network topology, network access, error notification (acknowledgement) and retransmission, error recovery (CRC check), ordered delivery of frames, and flow control. 12Sep-13 BBC & BIOM III
  • 13. Network Layer  Layer 3, the Network layer, is responsible for providing end-to-end delivery of Packets.  To accomplish this the network layer defines logical addresses to identify the endpoint of the network.  It also determines the route from the source to the destination computer.  It determines which path the data should take based on network conditions, priority of service, and other factors.  It also manages traffic problems on the network, such as packet switching, routing, and controlling the congestion of data.  If the destination computer cannot receive a data chunk as large as the source computer sends, the Network layer on the source compensates by breaking the large data chunk into smaller units. 13Sep-13 BBC & BIOM III
  • 14. Network Layer  On the destination end, the Network layer reassembles the data into the original large chunk.  Internet Protocol (IP) and Internetwork Packet Exchange (IPX) are examples of network layer protocols. 14Sep-13 BBC & BIOM III
  • 15. Transport Layer  Layer 4, the transport layer, is responsible for breaking the data into segments and establishing an end-to-end logical connection between machines.  The transport layer ensures that packets are delivered error free, in sequence, and without losses or duplications.  At the sending computer, this layer repackages messages, dividing long messages into several packets and collecting small packets together in one package. This process ensures that packets are transmitted efficiently over the network.  At the receiving computer, the transport layer opens the packets, reassembles the original messages, and, typically, sends an acknowledgement that the message was received.  If a duplicate packet arrives, this layer will recognize the duplicate and discard it. Protocols include TCP n UDP 15Sep-13 BBC & BIOM III
  • 16. Session Layer  Layer 5, the Session layer defines how to start, control and end the conversation (called session) between two applications running on different computers.  It provides synchronization between user tasks by placing checkpoints in the data stream.  This way, if the network fails, only the data after the last checkpoint has to be retransmitted.  This layer also implements dialog control between communicating processes by regulating which side transmits, when, for how long, and so on. 16Sep-13 BBC & BIOM III
  • 17. Presentation Layer  The main purpose of this layer is defining the data formats. It is concerned with how data is converted and formatted for data transfer.  The Presentation Layer provides a variety of coding and conversion functions that are applied to the application layer data. These functions ensure that information sent from the application layer of one system will be readable by the application layer of another system  The Presentation layer is also responsible for protocol conversion, encrypting the data, and managing data compression.  The presentation layer also manages data compression to reduce the number of bits that need to be transmitted. 17Sep-13 BBC & BIOM III
  • 18. Application Layer  Layer 7, the topmost layer of the OSI model, is the application layer.  The Application Layer is where the user interacts with the computer  This layer relates to the services that directly support applications, such as software for file transfers, database access, and E-mail.  A message to be sent across the network enters the OSI model at this point and exits the OSI model’s application layer on the receiving computer.  Protocols at this layer identify communication partners, determine resource availability, and synchronize communication. For example, a word processing application is serviced by file transfer services at this layer.  Application layer protocols; Http, telnet, SNMP,SMTP etc 18Sep-13 BBC & BIOM III
  • 19. Figure 2.15 Summary of layers Summary of Layers Sep-13 19BBC & BIOM III
  • 20. TCP/IP reference model  Although the OSI reference model is universally recognized, the historical and technical open standard of the Internet is Transmission Control Protocol/Internet Protocol (TCP/IP).  The TCP/IP reference model and the TCP/IP protocol stack make data communication possible between any two computers, anywhere in the world, at nearly the speed of light.  The U.S. Department of Defense (DoD) created the TCP/IP reference model because it wanted a network that could survive any conditions, even a nuclear war. 20Sep-13 BBC & BIOM III
  • 21. TCP/IP reference model layers The TCP/IP model has four layers:  a) Application layer,  b) Transport layer,  c) Internet layer, and  d) Host to Network layer. NB: It is important to note that some of the layers in the TCP/IP model have the same name as layers in the OSI model. Do not confuse the layers of the two models, because the application layer has different functions in each model. 21Sep-13 BBC & BIOM III
  • 22. TCP/IP Application layer  -Combines the functions of the OSI application, presentation, and session layers.  The TCP/IP combines all application related issues into one layer, and assumes this data is properly packaged for the next layer.  Protocols involved in this layer: HTTP, FTP, SMTP, DNS, POP3, TFTP etc. 22Sep-13 BBC & BIOM III
  • 23. TCP/IP Transport layer  This layer works almost similar to the Transport layer of OSI model.  Deals with the quality-of-service, issues of reliability, flow control, and error correction.  It has two major protocols TCP and UDP  The transmission control protocol (TCP), provides excellent and flexible ways to create reliable, well-flowing, low-error network communications. TCP is a connection-oriented protocol.  Note: Connection-oriented does not mean that a circuit exists between the communicating computers (that would be circuit switching). It does mean that Layer 4 segments travel back and forth between two hosts to acknowledge the connection exists logically for some period. 23Sep-13 BBC & BIOM III
  • 24. TCP/IP Transport layer cont’d……  •The second protocol in this layer is User Datagram Protocol (UDP), its an unreliable, connectionless protocol for the applications that do not want TCP’s sequencing and flow control and where quick delivery is more important than accurate delivery like speech and video transmission. 24Sep-13 BBC & BIOM III
  • 25. TCP/IP Internet(Network) layer  The purpose of the Internet layer is to send source packets from any network on the internet work and have them arrive at the destination independent of the path and networks they took to get there.  The specific protocol that governs this layer is called the Internet protocol (IP).  Best path determination and packet switching occur at this layer.  Think of it in terms of the postal system. When you mail a letter, you do not know how it gets there (there are various possible routes), but you do care that it arrives. 25Sep-13 BBC & BIOM III
  • 26. TCP/IP Network Access layer  Provides the same functionality as the physical, the data link and network layers in the OSI model.  It includes the LAN and WAN technology details  The OSI model is proven to be very useful for understanding computer networks.  However the OSI Protocols have not become very popular. The opposite is the case for TCP/IP reference model. The model is practically non-existing, but two of its protocols TCP and IP are widely used in the networks. 26Sep-13 BBC & BIOM III
  • 27. Associated TCP/IP Protocols & Services HTTP This protocol, the core of the World Wide Web, facilitates retrieval and transfer of hypertext (mixed media) documents. Stands for the HyperText Transfer protocol Telnet A remote terminal emulation protocol that enables clients to log on to remote hosts on the network. SNMP Used to remotely manage network devices. Stands for the Simple Network Management Protocol. DNS Provides meaningful names like achilles.mycorp.com for computers to replace numerical addresses like 123.45.67.89. Stands for the Domain Name System. SLIP/ PPP SLIP (Serial Line Internet Protocol) and PPP (Point to Point Protocol) encapsulate the IP packets so that they can be sent over a dial up phone connection to an access provider’s modem. Sep-13 27BBC & BIOM III
  • 28. Address Resolution Protocol (ARP)  The first system knows that the second is located somewhere on the network but does not know its exact location on the network.  The source will broadcast an ARP request to find the MAC address of the intended destinations MAC address.  The signal sent is a broadcast message and all the devices in the LAN will hear it.  Only the destination device will respond to the ARP request. Sep-13 BBC & BIOM III 28
  • 29. Other Protocols  Simple Mail Transfer Protocol (SMTP) is a protocol for sending e-mail messages between servers. The messages can then be retrieved with an e-mail client using either Post Office Protocol (POP) or Internet Message Access Protocol (IMAP).  Post Office Protocol version 3 (POP3) is a common mail service protocol that is used by ISPs that provide Internet and e-mail service to home customers.  FTP is a general-purpose protocol that can be used to copy all types of files from one computer to another. FTP makes use of the TCP reliable transport services to establish a logical connection between the systems. FTP is one of the most heavily used protocols on the Internet. Sep-13 BBC & BIOM III 29
  • 30. Comparing the OSI Model and TCP/IP Model Sep-13 BBC & BIOM III 30
  • 31. Similarities of the OSI and TCP/IP models  Both have layers.  Both have application layers, though they include very different services.  Both have comparable transport and network layers.  Packet-switched, not circuit-switched, technology is assumed.  Networking professionals need to know both models. Sep-13 BBC & BIOM III 31
  • 32. Differences of the OSI and TCP/IP models  TCP/IP combines the presentation and session layer into its application layer.  TCP/IP combines the OSI data link and physical layers into one layer.  TCP/IP appears simpler because it has fewer layers.  TCP/IP transport layer using UDP does not always guarantee reliable delivery of packets as the transport layer in the OSI model does. Sep-13 BBC & BIOM III 32
  • 33.  TCP/IP protocols are considered to be standards around which the internet has been developed  The OSI model consists of 7 layers whereas the TCP/IP only has 4 layers. Sep-13 BBC & BIOM III 33