SlideShare ist ein Scribd-Unternehmen logo
1 von 30
Internetworking
Internetworking Models
OSI (Open Systems Interconnection)
The Layered Approach
A reference model is a conceptual blueprint of how communications should take place. It
addresses all the processes required for effective communication and divides these processes
into logical groupings called layers. When a communication system is designed in this manner,
it’s known as layered architecture.
Advantages of Reference Models
The OSI model, like the Cisco three-layer model you will learn about later, is hierarchical, and the
same benefits and advantages can apply to any layered model. The primary purpose of all
models, and especially the OSI model, is to allow different vendors to interoperate. The benefits
of the OSI and Cisco models include, but are not limited to, the following:
1. Dividing the complex network operation into more manageable layers
2. Changing one layer without having to change all layers. This allows application developers to
specialize in design and development.
3. Defining the standard interface for the “plug-and-play” multivend or integration
The OSI Reference Model
The OSI reference model was created in the late 1970s to help facilitate data transfer between
network nodes. One of the greatest functions of the OSI specifications is to assist in data transfer
between disparate hosts. This means you can transfer data between a Unix host and a PC, for
example. The OSI is not physical; rather, it is a set of guidelines that application developers can
use to create and implement applications that run on a network. It also provides a framework
for creating and implementing networking standards, devices, and internetworking schemes.
The OSI has seven different layers, which are divided into two groups. The top three layers
define how the applications within the end stations will communicate with each other and with
users
The OSI Layers
The International Organization for Standardization (ISO) is the Emily Post of the network
protocol world. Just like Ms. Post, who wrote the book setting the standards—or protocols—for
human social interaction, the ISO developed the OSI reference model as the precedent and
guide for an open network protocol set. Defining the etiquette of communication models, it
remains today the most popular means of comparison for protocol suites. The OSI reference
model has seven layers:
1. The Application layer
2. The Presentation layer
3. The Session layer
4. The Transport layer
5. The Network layer
6. The Data Link layer
7. The Physical layer
The Application Layer
The Application layer of the OSI model is where users communicate to the computer. The
Application layer is responsible for identifying and establishing the availability of the intended
communication partner and determining if sufficient resources for the intended communication
exist.
Although computer applications sometimes require only desktop resources, applications may
unite communicating components from more than one network application; for example, file
transfers, e-mail, remote access, network management activities, client/server processes, and
Information location. Many network applications provide services for communication
over enterprise networks, but for present and future internetworking, the need is fast
developing to reach beyond their limits. Today, transactions and information exchanges between
organizations are broadening to require internetworking applications like the following:
1. World Wide Web (WWW)
2. E-mail gateways
3. Electronic Data Interchange (EDI)
4. Special interest bulletin boards
5. Internet navigation utilities
6. Financial transaction services
The Presentation Layer
The Presentation layer gets its name from its purpose: It presents data to the Application layer.
It’s essentially a translator and provides coding and conversion functions. A successful data
transfer technique is to adapt the data into a standard format before transmission. Computers
are configured to receive this generically formatted data and then convert the data back into its
native format for actual reading (for example, EBCDIC to ASCII).
The OSI has protocol standards that define how standard data should be formatted. Tasks like
data compression, decompression, encryption, and decryption are associated with this layer.
The Session Layer
The Session layer is responsible for setting up, managing, and then tearing down sessions
between Presentation layer entities. The Session layer also provides dialog control between
devices, or nodes. It coordinates communication between systems and serves to organize their
communication by offering three different modes: simplex, half-duplex, and full-duplex. The
Session layer basically keeps different applications’ data separate from other applications’
data
The following are some examples of Session-layer protocols and interfaces (according to Cisco):
Network File System (NFS) Was developed by Sun Microsystems and used with TCP/IP and Unix
workstations to allow transparent access to remote resources.
Structured Query Language (SQL) Was developed by IBM to provide users with a simpler way to
define their information requirements on both local and remote systems.
Remote Procedure Call (RPC) Is a broad client/server redirection tool used for disparate service
environments. Its procedures are created on clients and performed on servers.
X Window Is widely used by intelligent terminals for communicating with remote Unix
computers, allowing them to operate as though they were locally attached monitors.
AppleTalk Session Protocol (ASP) Is another client/server mechanism, which both establishes
and maintains sessions between AppleTalk client and server machines.
Digital Network Architecture Session Control Protocol (DNA SCP) Is a DECnet Session-layer
protocol.
The Transport Layer
Services located in the Transport layer both segment and reassemble data from upper-layer
applications and unite it onto the same data stream. They provide end-to-end data transport
services and can establish a logical connection between the sending host and destination host
on an internetwork.
The Transport layer is responsible for providing mechanisms for multiplexing upper-layer
application, session establishment, and teardown of virtual circuits. It also hides details of any
network-dependent information from the higher layers by providing transparent data transfer.
Flow Control
Data integrity is ensured at the Transport layer by maintaining flow control and allowing users
the option of requesting reliable data transport between systems. Flow control prevents a
sending host on one side of the connection from overflowing the buffers in the receiving host—
an event that can result in lost data. Reliable data transport employs a connection-oriented
Communications session between systems, and the protocols involved ensure the following
will be achieved:
The segments delivered are acknowledged back to the sender upon their reception.
Any segments not acknowledged are retransmitted.
Segments are sequenced back into their proper order upon arrival at their destination.
A manageable data flow is maintained in order to avoid congestion, overloading, and data loss.
Connection-Oriented Communication
In reliable transport operation, one device first establishes a connection oriented session with its
peer system.
Windowing:
Data throughput would be low if the transmitting machine had to wait for an acknowledgment
after sending each segment. Because there’s time available after the sender transmits the data
segment and before it finishes processing acknowledgments from the receiving machine, the
sender uses the break to transmit more data. The quantity of data segments the transmitting
machine is allowed to send without receiving an acknowledgment for them is called a window.
Acknowledgments
Reliable data delivery ensures the integrity of a stream of data sent from one machine to the
other through a fully functional data link. It guarantees the data won’t be duplicated or lost.
The method that achieves this is known as positive acknowledgment with retransmission
The Network Layer
The Network layer is responsible for routing through an internetwork and for network
addressing. This means that the Network layer is responsible for transporting traffic between
devices that are not locally attached. Routers, or other layer-3 devices, are specified at the
Network layer and provide the routing services in an internetwork.
When a packet is received on a router interface, the destination IP address is checked. If the
packet is not destined for the router, then the router will look up the destination network
address in the routing table
Two types of packets are used at the network layer:
1.data
2. route updates.
Data packets Are used to transport user data through the internetwork, and protocols used to
support data traffic are called routed protocols.
Route update packets Are used to update neighbor routers about networks connected to routers
in the internetwork. P
Routing table used in a router
The routing table used in a router includes the following information:
Network addresses Protocol-specific network addresses. A router must maintain a routing table
for individual routing protocols because each routing protocol keeps track of a network with a
different addressing Scheme. Think of it as a street sign in each of the different languages
spoken by the residents on a street.
Interface The exit interface a packet will take when destined for a specific network.
Metric The distance to the remote network. Different routing protocols use different methods of
computing this distance. Routing protocols are covered in Chapter 5, but you need to
understand that some routing protocols use hop count (the number of routers a packet passes
through when routing to a remote network), while others use bandwidth, delay of the line, or
even tick count (1/18 of a second).
Routers break up broadcast domains. This means, by default, that broadcasts are not forwarded
through a router. This is good. Routers also break up collision domains, but this can also
accomplished through layer-2 switches. Each interface in a router is a separate network and
must be assigned unique network identification numbers. Each host on the network connected
to that router must use that same network number.
The Data Link Layer
The Data Link layer ensures that messages are delivered to the proper device and translates
messages from the Network layer into bits for the Physical layer to transmit. It formats the
message into data frames and adds a customized header containing the hardware destination
and source address. This added information forms a sort of capsule that surrounds the original
message in much the same way that engines, navigational devices, and other tools were
attached to the lunar modules of the Apollo project
The IEEE Ethernet Data Link layer has two
sublayers:
Media Access Control (MAC) 802.3 This defines how packets are placed on the media.
Contention media access is first come, first served access where everyone shares the same
bandwidth. Physical addressing is defined here, as well as logical topologies.
Logical Link Control (LLC) 802.2 This sublayer is responsible for identifying Network layer
protocols and then encapsulating them. An LLC header tells the Data Link layer what to do with a
packet once a frame is received.
Switches and Bridges at the Data Link
Layer
Switches and bridges both work at the Data link layer and filter the network using hardware
(MAC) addresses. Layer-2 switching is considered hardware-based bridging because it uses a
specialized hardware called Application-Specific Integrated Circuits (ASICs). ASICs can run up to
Gigabit speeds with very low latency.
The Physical Layer
The Physical layer has two responsibilities: it sends bits and receives bits. Bits come only in
values of 1 or 0—a Morse code with numerical values. The Physical layer communicates directly
with the various types of actual communication media. Different kinds of media represent these
bit values in different ways. Some use audio tones, while others employ state transitions—
changes in voltage from high to low and low to high. Specific protocols are needed for each type
of media to describe the proper bit patterns to be used, how data is encoded into media signals,
and the various qualities of the physical media’s attachment interface.

Weitere ähnliche Inhalte

Was ist angesagt?

Circuit and packet_switching
Circuit and packet_switchingCircuit and packet_switching
Circuit and packet_switching
hoanv
 
Chapter 2 - Network Models
Chapter 2 - Network ModelsChapter 2 - Network Models
Chapter 2 - Network Models
Wayne Jones Jnr
 
TCP/IP Network ppt
TCP/IP Network pptTCP/IP Network ppt
TCP/IP Network ppt
extraganesh
 

Was ist angesagt? (20)

Computer network switching
Computer network switchingComputer network switching
Computer network switching
 
Circuit Switching, Packet Switching, Virtual Circuit Networks and Datagram Ne...
Circuit Switching, Packet Switching, Virtual Circuit Networks and Datagram Ne...Circuit Switching, Packet Switching, Virtual Circuit Networks and Datagram Ne...
Circuit Switching, Packet Switching, Virtual Circuit Networks and Datagram Ne...
 
PPT on Basic of Gateway
PPT on Basic of GatewayPPT on Basic of Gateway
PPT on Basic of Gateway
 
Routing algorithm
Routing algorithmRouting algorithm
Routing algorithm
 
Circuit and packet_switching
Circuit and packet_switchingCircuit and packet_switching
Circuit and packet_switching
 
Computer Network - Network Layer
Computer Network - Network LayerComputer Network - Network Layer
Computer Network - Network Layer
 
TCP/ IP
TCP/ IP TCP/ IP
TCP/ IP
 
Tcp/ip model
Tcp/ip  modelTcp/ip  model
Tcp/ip model
 
OSI and TCPIP Model
OSI and TCPIP ModelOSI and TCPIP Model
OSI and TCPIP Model
 
iso osi model
 iso osi model iso osi model
iso osi model
 
Chapter 2 - Network Models
Chapter 2 - Network ModelsChapter 2 - Network Models
Chapter 2 - Network Models
 
Distance vector routing
Distance vector routingDistance vector routing
Distance vector routing
 
Osi model
Osi modelOsi model
Osi model
 
Network Layer
Network LayerNetwork Layer
Network Layer
 
Ethernet
EthernetEthernet
Ethernet
 
TCP/IP Network ppt
TCP/IP Network pptTCP/IP Network ppt
TCP/IP Network ppt
 
What is Ethernet
What is EthernetWhat is Ethernet
What is Ethernet
 
TCP/IP Protocols With All Layer Description
TCP/IP Protocols With All Layer DescriptionTCP/IP Protocols With All Layer Description
TCP/IP Protocols With All Layer Description
 
TCP/IP
TCP/IPTCP/IP
TCP/IP
 
Chapter 4 data link layer
Chapter 4 data link layerChapter 4 data link layer
Chapter 4 data link layer
 

Andere mochten auch

Chapter 3 networking and internetworking
Chapter 3 networking and internetworkingChapter 3 networking and internetworking
Chapter 3 networking and internetworking
AbDul ThaYyal
 
Internetworking devices(networking)
Internetworking devices(networking)Internetworking devices(networking)
Internetworking devices(networking)
welcometofacebook
 
Internetworking fundamentals(networking)
Internetworking fundamentals(networking)Internetworking fundamentals(networking)
Internetworking fundamentals(networking)
welcometofacebook
 

Andere mochten auch (20)

Internetworking
InternetworkingInternetworking
Internetworking
 
Internetworking Overview
Internetworking OverviewInternetworking Overview
Internetworking Overview
 
Chapter 3 networking and internetworking
Chapter 3 networking and internetworkingChapter 3 networking and internetworking
Chapter 3 networking and internetworking
 
Internetworking devices(networking)
Internetworking devices(networking)Internetworking devices(networking)
Internetworking devices(networking)
 
Networks 2
Networks 2Networks 2
Networks 2
 
Internet protocol v6
Internet protocol v6Internet protocol v6
Internet protocol v6
 
Internetworking fundamentals(networking)
Internetworking fundamentals(networking)Internetworking fundamentals(networking)
Internetworking fundamentals(networking)
 
Internetworking devices
Internetworking devicesInternetworking devices
Internetworking devices
 
Networking and Internetworking Devices
Networking and Internetworking DevicesNetworking and Internetworking Devices
Networking and Internetworking Devices
 
QoS (quality of service)
QoS (quality of service)QoS (quality of service)
QoS (quality of service)
 
IPv6
IPv6IPv6
IPv6
 
The Network Layer
The Network LayerThe Network Layer
The Network Layer
 
Ipv6
Ipv6Ipv6
Ipv6
 
Ip v4 & ip v6
Ip v4 & ip v6Ip v4 & ip v6
Ip v4 & ip v6
 
IPV6 ppt
IPV6 pptIPV6 ppt
IPV6 ppt
 
Network design
Network designNetwork design
Network design
 
Quality of Service
Quality of ServiceQuality of Service
Quality of Service
 
Ipv6
Ipv6Ipv6
Ipv6
 
Network Layer
Network LayerNetwork Layer
Network Layer
 
ipv6 ppt
ipv6 pptipv6 ppt
ipv6 ppt
 

Ähnlich wie Internetworking

Network Advantages And Disadvantages
Network Advantages And DisadvantagesNetwork Advantages And Disadvantages
Network Advantages And Disadvantages
Renee Jones
 
006 Osi Model
006 Osi Model006 Osi Model
006 Osi Model
BELKA08
 
Osi model
Osi modelOsi model
Osi model
ufaq kk
 
BAPANKAR15800121011 SOFT.pptx
BAPANKAR15800121011 SOFT.pptxBAPANKAR15800121011 SOFT.pptx
BAPANKAR15800121011 SOFT.pptx
BapanKar2
 

Ähnlich wie Internetworking (20)

Osi model and tcpip model.
Osi model and tcpip model.Osi model and tcpip model.
Osi model and tcpip model.
 
OSI Model and TCP/IP Model.
OSI Model and TCP/IP Model.OSI Model and TCP/IP Model.
OSI Model and TCP/IP Model.
 
Network Advantages And Disadvantages
Network Advantages And DisadvantagesNetwork Advantages And Disadvantages
Network Advantages And Disadvantages
 
OSI Model of Networking
OSI Model of NetworkingOSI Model of Networking
OSI Model of Networking
 
OSI MODEL
OSI MODELOSI MODEL
OSI MODEL
 
Lesson 7
Lesson 7Lesson 7
Lesson 7
 
006 Osi Model
006 Osi Model006 Osi Model
006 Osi Model
 
Osi model
Osi modelOsi model
Osi model
 
Lecture2
Lecture2Lecture2
Lecture2
 
Osi model 1
Osi model 1Osi model 1
Osi model 1
 
Ccna notes
Ccna notesCcna notes
Ccna notes
 
OSI &TCP/IP Model
OSI &TCP/IP ModelOSI &TCP/IP Model
OSI &TCP/IP Model
 
Presentation on osi layer
Presentation on osi layerPresentation on osi layer
Presentation on osi layer
 
Osi rp3
Osi rp3Osi rp3
Osi rp3
 
Lecture2
Lecture2Lecture2
Lecture2
 
BAPANKAR15800121011 SOFT.pptx
BAPANKAR15800121011 SOFT.pptxBAPANKAR15800121011 SOFT.pptx
BAPANKAR15800121011 SOFT.pptx
 
Assignment3
Assignment3Assignment3
Assignment3
 
Osi model
Osi modelOsi model
Osi model
 
unit-1fon (1).pptx
unit-1fon (1).pptxunit-1fon (1).pptx
unit-1fon (1).pptx
 
7 Layers Of The OSI Model
7 Layers Of The OSI Model7 Layers Of The OSI Model
7 Layers Of The OSI Model
 

Mehr von Raghu nath

Ftp (file transfer protocol)
Ftp (file transfer protocol)Ftp (file transfer protocol)
Ftp (file transfer protocol)
Raghu nath
 
Javascript part1
Javascript part1Javascript part1
Javascript part1
Raghu nath
 
Regular expressions
Regular expressionsRegular expressions
Regular expressions
Raghu nath
 
Selection sort
Selection sortSelection sort
Selection sort
Raghu nath
 
Binary search
Binary search Binary search
Binary search
Raghu nath
 
JSON(JavaScript Object Notation)
JSON(JavaScript Object Notation)JSON(JavaScript Object Notation)
JSON(JavaScript Object Notation)
Raghu nath
 
Stemming algorithms
Stemming algorithmsStemming algorithms
Stemming algorithms
Raghu nath
 
Step by step guide to install dhcp role
Step by step guide to install dhcp roleStep by step guide to install dhcp role
Step by step guide to install dhcp role
Raghu nath
 
Network essentials chapter 4
Network essentials  chapter 4Network essentials  chapter 4
Network essentials chapter 4
Raghu nath
 
Network essentials chapter 3
Network essentials  chapter 3Network essentials  chapter 3
Network essentials chapter 3
Raghu nath
 
Network essentials chapter 2
Network essentials  chapter 2Network essentials  chapter 2
Network essentials chapter 2
Raghu nath
 
Network essentials - chapter 1
Network essentials - chapter 1Network essentials - chapter 1
Network essentials - chapter 1
Raghu nath
 
Python chapter 2
Python chapter 2Python chapter 2
Python chapter 2
Raghu nath
 
python chapter 1
python chapter 1python chapter 1
python chapter 1
Raghu nath
 
Linux Shell Scripting
Linux Shell ScriptingLinux Shell Scripting
Linux Shell Scripting
Raghu nath
 

Mehr von Raghu nath (20)

Mongo db
Mongo dbMongo db
Mongo db
 
Ftp (file transfer protocol)
Ftp (file transfer protocol)Ftp (file transfer protocol)
Ftp (file transfer protocol)
 
MS WORD 2013
MS WORD 2013MS WORD 2013
MS WORD 2013
 
Msword
MswordMsword
Msword
 
Ms word
Ms wordMs word
Ms word
 
Javascript part1
Javascript part1Javascript part1
Javascript part1
 
Regular expressions
Regular expressionsRegular expressions
Regular expressions
 
Selection sort
Selection sortSelection sort
Selection sort
 
Binary search
Binary search Binary search
Binary search
 
JSON(JavaScript Object Notation)
JSON(JavaScript Object Notation)JSON(JavaScript Object Notation)
JSON(JavaScript Object Notation)
 
Stemming algorithms
Stemming algorithmsStemming algorithms
Stemming algorithms
 
Step by step guide to install dhcp role
Step by step guide to install dhcp roleStep by step guide to install dhcp role
Step by step guide to install dhcp role
 
Network essentials chapter 4
Network essentials  chapter 4Network essentials  chapter 4
Network essentials chapter 4
 
Network essentials chapter 3
Network essentials  chapter 3Network essentials  chapter 3
Network essentials chapter 3
 
Network essentials chapter 2
Network essentials  chapter 2Network essentials  chapter 2
Network essentials chapter 2
 
Network essentials - chapter 1
Network essentials - chapter 1Network essentials - chapter 1
Network essentials - chapter 1
 
Python chapter 2
Python chapter 2Python chapter 2
Python chapter 2
 
python chapter 1
python chapter 1python chapter 1
python chapter 1
 
Linux Shell Scripting
Linux Shell ScriptingLinux Shell Scripting
Linux Shell Scripting
 
Perl
PerlPerl
Perl
 

Kürzlich hochgeladen

Kürzlich hochgeladen (20)

Sociology 101 Demonstration of Learning Exhibit
Sociology 101 Demonstration of Learning ExhibitSociology 101 Demonstration of Learning Exhibit
Sociology 101 Demonstration of Learning Exhibit
 
Basic Civil Engineering first year Notes- Chapter 4 Building.pptx
Basic Civil Engineering first year Notes- Chapter 4 Building.pptxBasic Civil Engineering first year Notes- Chapter 4 Building.pptx
Basic Civil Engineering first year Notes- Chapter 4 Building.pptx
 
How to Add New Custom Addons Path in Odoo 17
How to Add New Custom Addons Path in Odoo 17How to Add New Custom Addons Path in Odoo 17
How to Add New Custom Addons Path in Odoo 17
 
ICT Role in 21st Century Education & its Challenges.pptx
ICT Role in 21st Century Education & its Challenges.pptxICT Role in 21st Century Education & its Challenges.pptx
ICT Role in 21st Century Education & its Challenges.pptx
 
COMMUNICATING NEGATIVE NEWS - APPROACHES .pptx
COMMUNICATING NEGATIVE NEWS - APPROACHES .pptxCOMMUNICATING NEGATIVE NEWS - APPROACHES .pptx
COMMUNICATING NEGATIVE NEWS - APPROACHES .pptx
 
Fostering Friendships - Enhancing Social Bonds in the Classroom
Fostering Friendships - Enhancing Social Bonds  in the ClassroomFostering Friendships - Enhancing Social Bonds  in the Classroom
Fostering Friendships - Enhancing Social Bonds in the Classroom
 
Mehran University Newsletter Vol-X, Issue-I, 2024
Mehran University Newsletter Vol-X, Issue-I, 2024Mehran University Newsletter Vol-X, Issue-I, 2024
Mehran University Newsletter Vol-X, Issue-I, 2024
 
Interdisciplinary_Insights_Data_Collection_Methods.pptx
Interdisciplinary_Insights_Data_Collection_Methods.pptxInterdisciplinary_Insights_Data_Collection_Methods.pptx
Interdisciplinary_Insights_Data_Collection_Methods.pptx
 
How to Create and Manage Wizard in Odoo 17
How to Create and Manage Wizard in Odoo 17How to Create and Manage Wizard in Odoo 17
How to Create and Manage Wizard in Odoo 17
 
Food safety_Challenges food safety laboratories_.pdf
Food safety_Challenges food safety laboratories_.pdfFood safety_Challenges food safety laboratories_.pdf
Food safety_Challenges food safety laboratories_.pdf
 
FSB Advising Checklist - Orientation 2024
FSB Advising Checklist - Orientation 2024FSB Advising Checklist - Orientation 2024
FSB Advising Checklist - Orientation 2024
 
Philosophy of china and it's charactistics
Philosophy of china and it's charactisticsPhilosophy of china and it's charactistics
Philosophy of china and it's charactistics
 
HMCS Max Bernays Pre-Deployment Brief (May 2024).pptx
HMCS Max Bernays Pre-Deployment Brief (May 2024).pptxHMCS Max Bernays Pre-Deployment Brief (May 2024).pptx
HMCS Max Bernays Pre-Deployment Brief (May 2024).pptx
 
80 ĐỀ THI THỬ TUYỂN SINH TIẾNG ANH VÀO 10 SỞ GD – ĐT THÀNH PHỐ HỒ CHÍ MINH NĂ...
80 ĐỀ THI THỬ TUYỂN SINH TIẾNG ANH VÀO 10 SỞ GD – ĐT THÀNH PHỐ HỒ CHÍ MINH NĂ...80 ĐỀ THI THỬ TUYỂN SINH TIẾNG ANH VÀO 10 SỞ GD – ĐT THÀNH PHỐ HỒ CHÍ MINH NĂ...
80 ĐỀ THI THỬ TUYỂN SINH TIẾNG ANH VÀO 10 SỞ GD – ĐT THÀNH PHỐ HỒ CHÍ MINH NĂ...
 
UGC NET Paper 1 Mathematical Reasoning & Aptitude.pdf
UGC NET Paper 1 Mathematical Reasoning & Aptitude.pdfUGC NET Paper 1 Mathematical Reasoning & Aptitude.pdf
UGC NET Paper 1 Mathematical Reasoning & Aptitude.pdf
 
General Principles of Intellectual Property: Concepts of Intellectual Proper...
General Principles of Intellectual Property: Concepts of Intellectual  Proper...General Principles of Intellectual Property: Concepts of Intellectual  Proper...
General Principles of Intellectual Property: Concepts of Intellectual Proper...
 
Single or Multiple melodic lines structure
Single or Multiple melodic lines structureSingle or Multiple melodic lines structure
Single or Multiple melodic lines structure
 
HMCS Vancouver Pre-Deployment Brief - May 2024 (Web Version).pptx
HMCS Vancouver Pre-Deployment Brief - May 2024 (Web Version).pptxHMCS Vancouver Pre-Deployment Brief - May 2024 (Web Version).pptx
HMCS Vancouver Pre-Deployment Brief - May 2024 (Web Version).pptx
 
Beyond_Borders_Understanding_Anime_and_Manga_Fandom_A_Comprehensive_Audience_...
Beyond_Borders_Understanding_Anime_and_Manga_Fandom_A_Comprehensive_Audience_...Beyond_Borders_Understanding_Anime_and_Manga_Fandom_A_Comprehensive_Audience_...
Beyond_Borders_Understanding_Anime_and_Manga_Fandom_A_Comprehensive_Audience_...
 
REMIFENTANIL: An Ultra short acting opioid.pptx
REMIFENTANIL: An Ultra short acting opioid.pptxREMIFENTANIL: An Ultra short acting opioid.pptx
REMIFENTANIL: An Ultra short acting opioid.pptx
 

Internetworking

  • 2. Internetworking Models OSI (Open Systems Interconnection) The Layered Approach A reference model is a conceptual blueprint of how communications should take place. It addresses all the processes required for effective communication and divides these processes into logical groupings called layers. When a communication system is designed in this manner, it’s known as layered architecture.
  • 3. Advantages of Reference Models The OSI model, like the Cisco three-layer model you will learn about later, is hierarchical, and the same benefits and advantages can apply to any layered model. The primary purpose of all models, and especially the OSI model, is to allow different vendors to interoperate. The benefits of the OSI and Cisco models include, but are not limited to, the following:
  • 4. 1. Dividing the complex network operation into more manageable layers 2. Changing one layer without having to change all layers. This allows application developers to specialize in design and development. 3. Defining the standard interface for the “plug-and-play” multivend or integration
  • 5. The OSI Reference Model The OSI reference model was created in the late 1970s to help facilitate data transfer between network nodes. One of the greatest functions of the OSI specifications is to assist in data transfer between disparate hosts. This means you can transfer data between a Unix host and a PC, for example. The OSI is not physical; rather, it is a set of guidelines that application developers can use to create and implement applications that run on a network. It also provides a framework for creating and implementing networking standards, devices, and internetworking schemes.
  • 6. The OSI has seven different layers, which are divided into two groups. The top three layers define how the applications within the end stations will communicate with each other and with users
  • 7. The OSI Layers The International Organization for Standardization (ISO) is the Emily Post of the network protocol world. Just like Ms. Post, who wrote the book setting the standards—or protocols—for human social interaction, the ISO developed the OSI reference model as the precedent and guide for an open network protocol set. Defining the etiquette of communication models, it remains today the most popular means of comparison for protocol suites. The OSI reference model has seven layers:
  • 8. 1. The Application layer 2. The Presentation layer 3. The Session layer 4. The Transport layer 5. The Network layer 6. The Data Link layer 7. The Physical layer
  • 9. The Application Layer The Application layer of the OSI model is where users communicate to the computer. The Application layer is responsible for identifying and establishing the availability of the intended communication partner and determining if sufficient resources for the intended communication exist.
  • 10. Although computer applications sometimes require only desktop resources, applications may unite communicating components from more than one network application; for example, file transfers, e-mail, remote access, network management activities, client/server processes, and Information location. Many network applications provide services for communication over enterprise networks, but for present and future internetworking, the need is fast developing to reach beyond their limits. Today, transactions and information exchanges between organizations are broadening to require internetworking applications like the following:
  • 11. 1. World Wide Web (WWW) 2. E-mail gateways 3. Electronic Data Interchange (EDI) 4. Special interest bulletin boards 5. Internet navigation utilities 6. Financial transaction services
  • 12. The Presentation Layer The Presentation layer gets its name from its purpose: It presents data to the Application layer. It’s essentially a translator and provides coding and conversion functions. A successful data transfer technique is to adapt the data into a standard format before transmission. Computers are configured to receive this generically formatted data and then convert the data back into its native format for actual reading (for example, EBCDIC to ASCII).
  • 13. The OSI has protocol standards that define how standard data should be formatted. Tasks like data compression, decompression, encryption, and decryption are associated with this layer.
  • 14. The Session Layer The Session layer is responsible for setting up, managing, and then tearing down sessions between Presentation layer entities. The Session layer also provides dialog control between devices, or nodes. It coordinates communication between systems and serves to organize their communication by offering three different modes: simplex, half-duplex, and full-duplex. The Session layer basically keeps different applications’ data separate from other applications’ data
  • 15. The following are some examples of Session-layer protocols and interfaces (according to Cisco): Network File System (NFS) Was developed by Sun Microsystems and used with TCP/IP and Unix workstations to allow transparent access to remote resources. Structured Query Language (SQL) Was developed by IBM to provide users with a simpler way to define their information requirements on both local and remote systems. Remote Procedure Call (RPC) Is a broad client/server redirection tool used for disparate service environments. Its procedures are created on clients and performed on servers. X Window Is widely used by intelligent terminals for communicating with remote Unix computers, allowing them to operate as though they were locally attached monitors.
  • 16. AppleTalk Session Protocol (ASP) Is another client/server mechanism, which both establishes and maintains sessions between AppleTalk client and server machines. Digital Network Architecture Session Control Protocol (DNA SCP) Is a DECnet Session-layer protocol.
  • 17. The Transport Layer Services located in the Transport layer both segment and reassemble data from upper-layer applications and unite it onto the same data stream. They provide end-to-end data transport services and can establish a logical connection between the sending host and destination host on an internetwork. The Transport layer is responsible for providing mechanisms for multiplexing upper-layer application, session establishment, and teardown of virtual circuits. It also hides details of any network-dependent information from the higher layers by providing transparent data transfer.
  • 18. Flow Control Data integrity is ensured at the Transport layer by maintaining flow control and allowing users the option of requesting reliable data transport between systems. Flow control prevents a sending host on one side of the connection from overflowing the buffers in the receiving host— an event that can result in lost data. Reliable data transport employs a connection-oriented Communications session between systems, and the protocols involved ensure the following will be achieved:
  • 19. The segments delivered are acknowledged back to the sender upon their reception. Any segments not acknowledged are retransmitted. Segments are sequenced back into their proper order upon arrival at their destination. A manageable data flow is maintained in order to avoid congestion, overloading, and data loss.
  • 20. Connection-Oriented Communication In reliable transport operation, one device first establishes a connection oriented session with its peer system. Windowing: Data throughput would be low if the transmitting machine had to wait for an acknowledgment after sending each segment. Because there’s time available after the sender transmits the data segment and before it finishes processing acknowledgments from the receiving machine, the sender uses the break to transmit more data. The quantity of data segments the transmitting machine is allowed to send without receiving an acknowledgment for them is called a window.
  • 21. Acknowledgments Reliable data delivery ensures the integrity of a stream of data sent from one machine to the other through a fully functional data link. It guarantees the data won’t be duplicated or lost. The method that achieves this is known as positive acknowledgment with retransmission
  • 22. The Network Layer The Network layer is responsible for routing through an internetwork and for network addressing. This means that the Network layer is responsible for transporting traffic between devices that are not locally attached. Routers, or other layer-3 devices, are specified at the Network layer and provide the routing services in an internetwork. When a packet is received on a router interface, the destination IP address is checked. If the packet is not destined for the router, then the router will look up the destination network address in the routing table
  • 23. Two types of packets are used at the network layer: 1.data 2. route updates.
  • 24. Data packets Are used to transport user data through the internetwork, and protocols used to support data traffic are called routed protocols. Route update packets Are used to update neighbor routers about networks connected to routers in the internetwork. P
  • 25. Routing table used in a router The routing table used in a router includes the following information: Network addresses Protocol-specific network addresses. A router must maintain a routing table for individual routing protocols because each routing protocol keeps track of a network with a different addressing Scheme. Think of it as a street sign in each of the different languages spoken by the residents on a street. Interface The exit interface a packet will take when destined for a specific network. Metric The distance to the remote network. Different routing protocols use different methods of computing this distance. Routing protocols are covered in Chapter 5, but you need to understand that some routing protocols use hop count (the number of routers a packet passes through when routing to a remote network), while others use bandwidth, delay of the line, or even tick count (1/18 of a second).
  • 26. Routers break up broadcast domains. This means, by default, that broadcasts are not forwarded through a router. This is good. Routers also break up collision domains, but this can also accomplished through layer-2 switches. Each interface in a router is a separate network and must be assigned unique network identification numbers. Each host on the network connected to that router must use that same network number.
  • 27. The Data Link Layer The Data Link layer ensures that messages are delivered to the proper device and translates messages from the Network layer into bits for the Physical layer to transmit. It formats the message into data frames and adds a customized header containing the hardware destination and source address. This added information forms a sort of capsule that surrounds the original message in much the same way that engines, navigational devices, and other tools were attached to the lunar modules of the Apollo project
  • 28. The IEEE Ethernet Data Link layer has two sublayers: Media Access Control (MAC) 802.3 This defines how packets are placed on the media. Contention media access is first come, first served access where everyone shares the same bandwidth. Physical addressing is defined here, as well as logical topologies. Logical Link Control (LLC) 802.2 This sublayer is responsible for identifying Network layer protocols and then encapsulating them. An LLC header tells the Data Link layer what to do with a packet once a frame is received.
  • 29. Switches and Bridges at the Data Link Layer Switches and bridges both work at the Data link layer and filter the network using hardware (MAC) addresses. Layer-2 switching is considered hardware-based bridging because it uses a specialized hardware called Application-Specific Integrated Circuits (ASICs). ASICs can run up to Gigabit speeds with very low latency.
  • 30. The Physical Layer The Physical layer has two responsibilities: it sends bits and receives bits. Bits come only in values of 1 or 0—a Morse code with numerical values. The Physical layer communicates directly with the various types of actual communication media. Different kinds of media represent these bit values in different ways. Some use audio tones, while others employ state transitions— changes in voltage from high to low and low to high. Specific protocols are needed for each type of media to describe the proper bit patterns to be used, how data is encoded into media signals, and the various qualities of the physical media’s attachment interface.