SlideShare ist ein Scribd-Unternehmen logo
1 von 61
2

Tutun Juhana
Telecommunication Engineering
School of Electrical Engineering & Informatics
Institut Teknologi Bandung

The OSI Model
&
the TCP/IP Protocol Suite
Computer Networks
• Before 1990 everyone
believed that the OSI
model would become the
ultimate standard for
data communications but this did not happen
• The TCP/IP protocol suite became the dominant
commercial architecture because it was used
and tested extensively in the Internet
– the OSI model was never fully implemented
When Communication is simple
Example 1
• The communication is so simple that it can
occur in only one layer
(sign language)

Speak Spanish

Speak English
When Communication is not simple
Example 2
• Ann has to move to another town because of her job
• We need three layers

• It is hierarchical (the tasks must be done in the order given in the hierarchy)
• Each layer uses the services of the layer immediately below it
• Each layer gives the services to the layer immediately above it
THE OSI MODEL
• Established in 1947, the International
Standards Organization (ISO) is a
multinational body dedicated to worldwide
agreement on international standards
• An ISO standard that covers all aspects of
network communications is the Open
Systems Interconnection (OSI) model
– It was first introduced in the late 1970s
• An open system is a set of protocols that allows
any two different systems to communicate
regardless of their underlying architecture
• The OSI model is not a protocol; it is a model for
understanding and designing a network
architecture that is flexible, robust, and
interoperable
• The OSI model was intended to be the basis for
the creation of the protocols in the OSI stack
The OSI model
The user support layers; they
allow interoperability among
unrelated software systems;
They are almost always
implemented in software
the transport layer, links the two subgroups
and ensures that what the lower layers
have transmitted is in a form that the upper
layers can use

The network support layers; they deal with
the physical aspects of moving data from
one device to another (such as electrical
specifications, physical connections,
physical addressing, and transport timing
and reliability); They are a combination of
hardware and software, except for the
physical layer, which is mostly hardware
Layered Architecture
An exchange using the OSI model

Decapsulation
Encapsulation
Physical Layer

• Responsible for moving individual bits from one (node) to the next
• It coordinates the functions required to carry a bit stream over a
physical medium.
• It deals with the mechanical and electrical specifications of the
interface and transmission media
• It defines the procedures and functions that physical devices and
interfaces have to perform for transmission to occur
The physical layer is also concerned with the
following
•
•
•
•
•
•
•

Physical characteristics of interfaces and media
Representation of bits
Data rate
Synchronization of bits
Line configuration
Physical topology
Transmission mode
Data Link Layer

• The data link layer is responsible for moving frames from
one hop (node) to the next
• The data link layer transforms the physical layer, a raw
transmission facility, to a reliable link
– It makes the physical layer appear error-free to the upper layer
(network layer)
Other responsibilities of the data link layer
include the following
• Framing
• Physical addressing
• Flow control
• Error control
• Access control
Network Layer
• The network layer is responsible for the
source-to-destination delivery of a packet,
possibly across multiple networks (links)
• Whereas the data link layer oversees the
delivery of the packet between two
systems on the same network (link)
• The network layer ensures that each
packet gets from its point of origin to its
final destination
• If two systems are connected to the same
link, there is usually no need for a network
layer
• However, if the two systems are attached
to different networks (links) with
connecting devices between the networks
(links), there is often a need for the
network layer to accomplish source-todestination delivery
Other responsibilities of the network layer
include the following
• Logical addressing
• Routing
Transport Layer
• The transport layer is responsible for the
delivery of a message from one process to
another
• A process is an application program
running on the host
• Reliable process-to-process delivery of a message
• Differences with Network Layer
• Network layer oversees source-to-destination delivery
of individual packets
– It does not recognize any relationship between those
packets

• The transport layer ensures that the whole message
arrives intact and in order
– Overseeing both error control and flow control at the sourceto-destination level
• Other responsibilities of the transport layer
– Service-point addressing (port address)
– Segmentation and reassembly
– Connection control
• The transport layer can be either connectionless or
connection oriented

– Flow control
– Error control
Session Layer
• Session layer establishes, maintains, and
synchronizes the interaction between
communicating systems
• Responsibilities
– Dialog control
– Synchronization
Presentation Layer
• The presentation layer is concerned with
the syntax and semantics of the
information exchanged between two
systems
– Translation
– Encryption
– Compression
Application Layer
• The application layer enables the user, whether
human or software, to access the network
• It provides user interfaces and support for
services (email, remote file access etc.)
• Services provided :
–
–
–
–

Network virtual terminal
File transfer, access, and management (FTAM)
E-mail services
Directory services
Summary of OSI Layers
TCP/IP PROTOCOL SUITE
• The TCP/IP protocol suite was developed prior to the OSI model
TCP/IP versus OSI model
Layers in the TCP/IP Protocol Suite
• To discuss the purpose of each layer in
the TCP/IP protocol suite, we will study a
small private internet
• A link is a network that allows a set of computers
to communicate with each other
• A link can be a LAN (local area network) serving
a small area or a WAN (wide area network)
serving a larger area
• We assume that different links are connected
together by devices called routers or switches
that route the data to reach their final
destinations
Physical Layer
• TCP/IP does not define any specific
protocol for the physical layer
• It supports all of the standard and
proprietary protocols
• The communication is between two hops
or nodes, either a computer or router
• The unit of communication is a single bit
We assume that the
most efficient way to
communicate with each
other is via routers
R1, R3, and R4
if a node is connected to n links, it needs n
physical-layer protocols, one for
each link because links may use different
physical-layer protocols
• The responsibility of the physical layer, in
addition to delivery of bits, matches with
what mentioned for the physical layer of
the OSI model
• It mostly depends on the underlying
technologies that provide links
Data Link Layer
• TCP/IP does not define any specific
protocol for the data link layer either
• It supports all of the standard and
proprietary protocols
• The communication is also between two
hops or nodes
• The unit of communication however, is a
packet called a frame
• A frame is a packet that encapsulates the data received
from the network layer with an added header and
sometimes a trailer
• The header, among other communication information,
includes the source and destination of frame
• The destination address is needed to define the right
recipient of the frame because many nodes may have
been connected to the link
• The source address is needed for possible response or
acknowledgment as may be required by some protocols
These frames may be different
because link 1 and link 3 may be
using different protocols and
require frames of different
formats
Network Layer
• At the network layer (or, more accurately, the
internetwork layer), TCP/IP supports the Internet
Protocol (IP)
• IP is the transmission mechanism used by the TCP/IP
protocols
• IP transports data in packets called datagrams, each of
which is transported separately
• Datagrams can travel along different routes and can
arrive out of sequence or be duplicated
• IP does not keep track of the routes and has no facility
for reordering datagrams once they arrive at their
destination
Transport Layer
• Only the two end computers need to have the
transport layer
• The transport layer is responsible for delivering
the whole message, which is called a segment
from A to B
– A segment may consist of a few or tens of datagrams

• Where as the network layer is responsible for
sending individual datagrams from computer A
to computer B
• The segments need to be broken into datagrams
and each datagram has to be delivered to the
network layer for transmission
• Since the Internet defines a different route for
each datagram, the datagrams may arrive out of
order and may be lost
• The transport layer at computer B needs to wait
until all of these datagrams to arrive, assemble
them and make a segment out of them
• The transport layer was represented in the
TCP/IP suite by two protocols:
– User Datagram Protocol (UDP)
– Transmission Control Protocol (TCP)

• A new protocol called Stream Control
Transmission Protocol (SCTP) has been
introduced in the last few years
Application Layer
• The application layer in TCP/IP is equivalent to
the combined session, presentation, and
application layers in the OSI model
• The application layer allows a user to access the
services of our private internet or the global
Internet
– electronic mail, file transfer, accessing the World
Wide Web, etc.

• The unit of communication at the application
layer is a message
Addressing
User-friendly addresses
that are designed for
specific application
To enable communication
between processes
Needed in which each host can
be identified uniquely, regardless
of the underlying physical network
• The address of a node as defined
by its LAN or WAN
• Have authority over the link
Physical Addresses
• Also known as the link address
• Destination physical addresses can be
either
– unicast  one single recipient
– multicast  a group of recipients
– broadcast  to be received by all systems in
the network
Logical Addresses
• Logical addresses are necessary for universal
communications that are independent of
underlying physical networks
• Physical addresses are not adequate in an
internetwork environment where different
networks can have different address formats
• A universal addressing system is needed in
which each host can be identified uniquely,
regardless of the underlying physical network
• The logical addresses are designed for this
purpose
• A logical address in the Internet is
currently a 32-bit address (IPv4) and a
128-bit address (IPv6), that can uniquely
define a host connected to the Internet
• No two publicly addressed and visible
hosts on the Internet can have the same
IP address
datagram with dst.
and src. logical
address

Frame with dst.
and src. physical
address

The physical addresses will change from
hop to hop, but the logical addresses
remain the same
Port Addresses
• Computers are devices that can run multiple processes
at the same time
• The end objective of Internet communication is a
process communicating with another process
• For example, computer A can communicate with
computer C by using TELNET, at the same time,
computer A communicates with computer B by using the
File Transfer Protocol (FTP)
• In the TCP/IP architecture, the label assigned to a
process is called a port address
• A port address in TCP/IP is 16 bits in length
(represented by one decimal number)
The physical addresses change from hop to hop, but the logical and
port addresses usually remain the same
Application-Specific Addresses
• User-friendly addresses that are designed
for specific application
• Examples include the e-mail address (for
example, tutun@stei.itb.ac.id) and the
• Universal Resource Locator (URL) (for
example, www.itb.ac.id)

Weitere ähnliche Inhalte

Was ist angesagt?

Computer network : models and topologies
Computer network : models and topologiesComputer network : models and topologies
Computer network : models and topologiesAnup Pandey
 
Internetworking.49
Internetworking.49Internetworking.49
Internetworking.49myrajendra
 
Unit 2 cnd_22634_pranoti doke
Unit 2 cnd_22634_pranoti dokeUnit 2 cnd_22634_pranoti doke
Unit 2 cnd_22634_pranoti dokePranoti Doke
 
Concept of OSI Model_KSMS_BCA_4th_6th_Sem_Priyanka Bhattacharya_20th March 2020
Concept of OSI Model_KSMS_BCA_4th_6th_Sem_Priyanka Bhattacharya_20th March  2020Concept of OSI Model_KSMS_BCA_4th_6th_Sem_Priyanka Bhattacharya_20th March  2020
Concept of OSI Model_KSMS_BCA_4th_6th_Sem_Priyanka Bhattacharya_20th March 2020PriyankaBhattacharya28
 
communication-protocols
 communication-protocols communication-protocols
communication-protocolsAli Kamil
 
Dc ch02 : protocol architecture
Dc ch02 : protocol architectureDc ch02 : protocol architecture
Dc ch02 : protocol architectureSyaiful Ahdan
 
ISO OSI Model (Infosec perspective)
ISO OSI Model (Infosec perspective)ISO OSI Model (Infosec perspective)
ISO OSI Model (Infosec perspective)AJINKYA PATIL
 
Internetworking Overview
Internetworking OverviewInternetworking Overview
Internetworking OverviewShisir123
 
CISSP - Chapter 4 - Network Topology
CISSP - Chapter 4 - Network TopologyCISSP - Chapter 4 - Network Topology
CISSP - Chapter 4 - Network TopologyKarthikeyan Dhayalan
 
Computer Network - OSI model
Computer Network - OSI modelComputer Network - OSI model
Computer Network - OSI modelManoj Kumar
 
Internetworking basics
Internetworking basicsInternetworking basics
Internetworking basicsRomeo Alonzo
 
Domain 4 - Communications and Network Security
Domain 4  - Communications and Network SecurityDomain 4  - Communications and Network Security
Domain 4 - Communications and Network SecurityMaganathin Veeraragaloo
 
POLITEKNIK MALAYSIA
POLITEKNIK MALAYSIA POLITEKNIK MALAYSIA
POLITEKNIK MALAYSIA Aiman Hud
 

Was ist angesagt? (20)

Computer network : models and topologies
Computer network : models and topologiesComputer network : models and topologies
Computer network : models and topologies
 
Internetworking.49
Internetworking.49Internetworking.49
Internetworking.49
 
02 network models
02  network models02  network models
02 network models
 
Iso osi
Iso osiIso osi
Iso osi
 
Unit 2 cnd_22634_pranoti doke
Unit 2 cnd_22634_pranoti dokeUnit 2 cnd_22634_pranoti doke
Unit 2 cnd_22634_pranoti doke
 
Concept of OSI Model_KSMS_BCA_4th_6th_Sem_Priyanka Bhattacharya_20th March 2020
Concept of OSI Model_KSMS_BCA_4th_6th_Sem_Priyanka Bhattacharya_20th March  2020Concept of OSI Model_KSMS_BCA_4th_6th_Sem_Priyanka Bhattacharya_20th March  2020
Concept of OSI Model_KSMS_BCA_4th_6th_Sem_Priyanka Bhattacharya_20th March 2020
 
communication-protocols
 communication-protocols communication-protocols
communication-protocols
 
OSI layer (Network)
OSI layer (Network)OSI layer (Network)
OSI layer (Network)
 
Dc ch02 : protocol architecture
Dc ch02 : protocol architectureDc ch02 : protocol architecture
Dc ch02 : protocol architecture
 
ISO OSI Model (Infosec perspective)
ISO OSI Model (Infosec perspective)ISO OSI Model (Infosec perspective)
ISO OSI Model (Infosec perspective)
 
Internetworking Overview
Internetworking OverviewInternetworking Overview
Internetworking Overview
 
CISSP - Chapter 4 - Network Topology
CISSP - Chapter 4 - Network TopologyCISSP - Chapter 4 - Network Topology
CISSP - Chapter 4 - Network Topology
 
02 protocol architecture
02 protocol architecture02 protocol architecture
02 protocol architecture
 
Osi model 7 Layers
Osi model 7 LayersOsi model 7 Layers
Osi model 7 Layers
 
Computer Network - OSI model
Computer Network - OSI modelComputer Network - OSI model
Computer Network - OSI model
 
Osi model
Osi modelOsi model
Osi model
 
Internetworking
InternetworkingInternetworking
Internetworking
 
Internetworking basics
Internetworking basicsInternetworking basics
Internetworking basics
 
Domain 4 - Communications and Network Security
Domain 4  - Communications and Network SecurityDomain 4  - Communications and Network Security
Domain 4 - Communications and Network Security
 
POLITEKNIK MALAYSIA
POLITEKNIK MALAYSIA POLITEKNIK MALAYSIA
POLITEKNIK MALAYSIA
 

Andere mochten auch

Network telnet ssh
Network telnet sshNetwork telnet ssh
Network telnet sshStefan Fodor
 
Q1 On Ch11 Tcpip And Application Layer
Q1 On Ch11 Tcpip And Application LayerQ1 On Ch11 Tcpip And Application Layer
Q1 On Ch11 Tcpip And Application Layerjerometnewman
 
Q1 On Ch09 Tcpip Protocol Suite And Ip Addressing
Q1 On Ch09 Tcpip Protocol Suite And Ip AddressingQ1 On Ch09 Tcpip Protocol Suite And Ip Addressing
Q1 On Ch09 Tcpip Protocol Suite And Ip Addressingjerometnewman
 
Networking session-4-final by aravind.R
Networking session-4-final by aravind.RNetworking session-4-final by aravind.R
Networking session-4-final by aravind.RNavaneethan Naveen
 
Hearn and Baker 2 D transformations
Hearn and Baker 2 D transformations   Hearn and Baker 2 D transformations
Hearn and Baker 2 D transformations Taher Barodawala
 
TCP/IP Protocol Architeture
TCP/IP Protocol ArchitetureTCP/IP Protocol Architeture
TCP/IP Protocol ArchitetureManoj Kumar
 
Two dimensional geometric transformations
Two dimensional geometric transformationsTwo dimensional geometric transformations
Two dimensional geometric transformationsMohammad Sadiq
 
3d transformation computer graphics
3d transformation computer graphics 3d transformation computer graphics
3d transformation computer graphics University of Potsdam
 
3D Geometric Transformations
3D Geometric Transformations3D Geometric Transformations
3D Geometric TransformationsIshan Parekh
 
2 d transformations by amit kumar (maimt)
2 d transformations by amit kumar (maimt)2 d transformations by amit kumar (maimt)
2 d transformations by amit kumar (maimt)Amit Kapoor
 
2 d geometric transformations
2 d geometric transformations2 d geometric transformations
2 d geometric transformationsMohd Arif
 
Notes 2D-Transformation Unit 2 Computer graphics
Notes 2D-Transformation Unit 2 Computer graphicsNotes 2D-Transformation Unit 2 Computer graphics
Notes 2D-Transformation Unit 2 Computer graphicsNANDINI SHARMA
 
TCP/IP Model
TCP/IP ModelTCP/IP Model
TCP/IP Modelfarhan516
 
3D transformation in computer graphics
3D transformation in computer graphics3D transformation in computer graphics
3D transformation in computer graphicsSHIVANI SONI
 
TCP-IP Reference Model
TCP-IP Reference ModelTCP-IP Reference Model
TCP-IP Reference ModelMukesh Tekwani
 
TCP/IP Network ppt
TCP/IP Network pptTCP/IP Network ppt
TCP/IP Network pptextraganesh
 

Andere mochten auch (19)

Network telnet ssh
Network telnet sshNetwork telnet ssh
Network telnet ssh
 
Q1 On Ch11 Tcpip And Application Layer
Q1 On Ch11 Tcpip And Application LayerQ1 On Ch11 Tcpip And Application Layer
Q1 On Ch11 Tcpip And Application Layer
 
Q1 On Ch09 Tcpip Protocol Suite And Ip Addressing
Q1 On Ch09 Tcpip Protocol Suite And Ip AddressingQ1 On Ch09 Tcpip Protocol Suite And Ip Addressing
Q1 On Ch09 Tcpip Protocol Suite And Ip Addressing
 
Networking session-4-final by aravind.R
Networking session-4-final by aravind.RNetworking session-4-final by aravind.R
Networking session-4-final by aravind.R
 
Hearn and Baker 2 D transformations
Hearn and Baker 2 D transformations   Hearn and Baker 2 D transformations
Hearn and Baker 2 D transformations
 
TCP/IP Protocol Architeture
TCP/IP Protocol ArchitetureTCP/IP Protocol Architeture
TCP/IP Protocol Architeture
 
Two dimensional geometric transformations
Two dimensional geometric transformationsTwo dimensional geometric transformations
Two dimensional geometric transformations
 
3d transformation computer graphics
3d transformation computer graphics 3d transformation computer graphics
3d transformation computer graphics
 
3D Geometric Transformations
3D Geometric Transformations3D Geometric Transformations
3D Geometric Transformations
 
2 d transformations by amit kumar (maimt)
2 d transformations by amit kumar (maimt)2 d transformations by amit kumar (maimt)
2 d transformations by amit kumar (maimt)
 
2 d geometric transformations
2 d geometric transformations2 d geometric transformations
2 d geometric transformations
 
Notes 2D-Transformation Unit 2 Computer graphics
Notes 2D-Transformation Unit 2 Computer graphicsNotes 2D-Transformation Unit 2 Computer graphics
Notes 2D-Transformation Unit 2 Computer graphics
 
TCP/IP Model
TCP/IP ModelTCP/IP Model
TCP/IP Model
 
TCP/IP(networking)
TCP/IP(networking)TCP/IP(networking)
TCP/IP(networking)
 
3D transformation in computer graphics
3D transformation in computer graphics3D transformation in computer graphics
3D transformation in computer graphics
 
TCP-IP Reference Model
TCP-IP Reference ModelTCP-IP Reference Model
TCP-IP Reference Model
 
TCP/IP Presentation
TCP/IP PresentationTCP/IP Presentation
TCP/IP Presentation
 
TCP/IP Network ppt
TCP/IP Network pptTCP/IP Network ppt
TCP/IP Network ppt
 
TCP/IP Basics
TCP/IP BasicsTCP/IP Basics
TCP/IP Basics
 

Ähnlich wie ET3003-2 OSI-TCPIP (Semester II 2013-2014)

OSI Reference Model and TCP/IP (Lecture #3 ET3003 Sem1 2014/2015)
OSI Reference Model and TCP/IP (Lecture #3 ET3003 Sem1 2014/2015)OSI Reference Model and TCP/IP (Lecture #3 ET3003 Sem1 2014/2015)
OSI Reference Model and TCP/IP (Lecture #3 ET3003 Sem1 2014/2015)Tutun Juhana
 
Unit 2 ppt-idc
Unit 2 ppt-idcUnit 2 ppt-idc
Unit 2 ppt-idchiya123jes
 
Sargation university's open system interconnection
Sargation university's open system interconnectionSargation university's open system interconnection
Sargation university's open system interconnectionKingPinYT
 
unit1 network model osi and tcpip.pptx
unit1  network model osi and tcpip.pptxunit1  network model osi and tcpip.pptx
unit1 network model osi and tcpip.pptx183JAIDEEP
 
06 - OSI Model.ppt
06 - OSI Model.ppt06 - OSI Model.ppt
06 - OSI Model.pptssuserf7cd2b
 
06 - OSI Model.ppt
06 - OSI Model.ppt06 - OSI Model.ppt
06 - OSI Model.pptssuserf7cd2b
 
Iso osi and tcp-ip reference models
Iso osi and tcp-ip reference modelsIso osi and tcp-ip reference models
Iso osi and tcp-ip reference modelsbhavanatmithun
 
open system interconnection referencemodel.ppt
open system interconnection referencemodel.pptopen system interconnection referencemodel.ppt
open system interconnection referencemodel.pptAnkitaAggarwal68
 
Pwani notes-Network Essentials.pp for Internet Protocoltx
Pwani notes-Network Essentials.pp  for Internet ProtocoltxPwani notes-Network Essentials.pp  for Internet Protocoltx
Pwani notes-Network Essentials.pp for Internet ProtocoltxMosesOkumu4
 
osireferencemodel-170703104058 (1).pdf
osireferencemodel-170703104058 (1).pdfosireferencemodel-170703104058 (1).pdf
osireferencemodel-170703104058 (1).pdfFira253524
 
Osi reference model
Osi reference modelOsi reference model
Osi reference modelSagar Gor
 
Open system interference reference model.pptx
Open system interference reference model.pptxOpen system interference reference model.pptx
Open system interference reference model.pptxSwapnilGaikwad138578
 
Protocol layer,OSI model & POP3
Protocol layer,OSI model & POP3Protocol layer,OSI model & POP3
Protocol layer,OSI model & POP3Zakirul Islam
 
Network architecure (3).pptx
Network architecure (3).pptxNetwork architecure (3).pptx
Network architecure (3).pptxKaythry P
 

Ähnlich wie ET3003-2 OSI-TCPIP (Semester II 2013-2014) (20)

OSI Reference Model and TCP/IP (Lecture #3 ET3003 Sem1 2014/2015)
OSI Reference Model and TCP/IP (Lecture #3 ET3003 Sem1 2014/2015)OSI Reference Model and TCP/IP (Lecture #3 ET3003 Sem1 2014/2015)
OSI Reference Model and TCP/IP (Lecture #3 ET3003 Sem1 2014/2015)
 
Unit 2 ppt-idc
Unit 2 ppt-idcUnit 2 ppt-idc
Unit 2 ppt-idc
 
Sargation university's open system interconnection
Sargation university's open system interconnectionSargation university's open system interconnection
Sargation university's open system interconnection
 
OSI Model.ppt
OSI Model.pptOSI Model.ppt
OSI Model.ppt
 
unit1 network model osi and tcpip.pptx
unit1  network model osi and tcpip.pptxunit1  network model osi and tcpip.pptx
unit1 network model osi and tcpip.pptx
 
06 - OSI Model.ppt
06 - OSI Model.ppt06 - OSI Model.ppt
06 - OSI Model.ppt
 
06 - OSI Model.ppt
06 - OSI Model.ppt06 - OSI Model.ppt
06 - OSI Model.ppt
 
Iso osi and tcp-ip reference models
Iso osi and tcp-ip reference modelsIso osi and tcp-ip reference models
Iso osi and tcp-ip reference models
 
PC 106 PPT-06
PC 106 PPT-06PC 106 PPT-06
PC 106 PPT-06
 
lecture 4.pptx
lecture 4.pptxlecture 4.pptx
lecture 4.pptx
 
open system interconnection referencemodel.ppt
open system interconnection referencemodel.pptopen system interconnection referencemodel.ppt
open system interconnection referencemodel.ppt
 
Pwani notes-Network Essentials.pp for Internet Protocoltx
Pwani notes-Network Essentials.pp  for Internet ProtocoltxPwani notes-Network Essentials.pp  for Internet Protocoltx
Pwani notes-Network Essentials.pp for Internet Protocoltx
 
osireferencemodel-170703104058 (1).pdf
osireferencemodel-170703104058 (1).pdfosireferencemodel-170703104058 (1).pdf
osireferencemodel-170703104058 (1).pdf
 
Osi reference model
Osi reference modelOsi reference model
Osi reference model
 
ch5-osi.pdf
ch5-osi.pdfch5-osi.pdf
ch5-osi.pdf
 
Open system interference reference model.pptx
Open system interference reference model.pptxOpen system interference reference model.pptx
Open system interference reference model.pptx
 
MVA slides lesson 2
MVA slides lesson 2MVA slides lesson 2
MVA slides lesson 2
 
lecture 2.pptx
lecture 2.pptxlecture 2.pptx
lecture 2.pptx
 
Protocol layer,OSI model & POP3
Protocol layer,OSI model & POP3Protocol layer,OSI model & POP3
Protocol layer,OSI model & POP3
 
Network architecure (3).pptx
Network architecure (3).pptxNetwork architecure (3).pptx
Network architecure (3).pptx
 

Mehr von Tutun Juhana

What should you prepare for industry 4.0 era
What should you prepare for industry 4.0 eraWhat should you prepare for industry 4.0 era
What should you prepare for industry 4.0 eraTutun Juhana
 
Internet of Things Security
Internet of Things SecurityInternet of Things Security
Internet of Things SecurityTutun Juhana
 
Et4045-3-attacks-2
Et4045-3-attacks-2Et4045-3-attacks-2
Et4045-3-attacks-2Tutun Juhana
 
ET4045-3-attacks-1
ET4045-3-attacks-1ET4045-3-attacks-1
ET4045-3-attacks-1Tutun Juhana
 
ET4045-2-cryptography-3
ET4045-2-cryptography-3ET4045-2-cryptography-3
ET4045-2-cryptography-3Tutun Juhana
 
ET4045-2-cryptography-2
ET4045-2-cryptography-2ET4045-2-cryptography-2
ET4045-2-cryptography-2Tutun Juhana
 
ET4045-2-cryptography-1-2014
ET4045-2-cryptography-1-2014ET4045-2-cryptography-1-2014
ET4045-2-cryptography-1-2014Tutun Juhana
 
ET4045-1-Introduction-2014
ET4045-1-Introduction-2014ET4045-1-Introduction-2014
ET4045-1-Introduction-2014Tutun Juhana
 
Underlying Technologies Part I (Lecture #4 ET3003 Sem1 2014/2015)
Underlying Technologies Part I (Lecture #4 ET3003 Sem1 2014/2015)Underlying Technologies Part I (Lecture #4 ET3003 Sem1 2014/2015)
Underlying Technologies Part I (Lecture #4 ET3003 Sem1 2014/2015)Tutun Juhana
 
Switching Techniques (Lecture #2 ET3003 Sem1 2014/2015)
Switching Techniques (Lecture #2 ET3003 Sem1 2014/2015)Switching Techniques (Lecture #2 ET3003 Sem1 2014/2015)
Switching Techniques (Lecture #2 ET3003 Sem1 2014/2015)Tutun Juhana
 
Et3003 sem2-1314-10 vlans
Et3003 sem2-1314-10 vlansEt3003 sem2-1314-10 vlans
Et3003 sem2-1314-10 vlansTutun Juhana
 
Et3003 sem2-1314-9 network layers vi (routing protocols)
Et3003 sem2-1314-9 network layers vi (routing protocols)Et3003 sem2-1314-9 network layers vi (routing protocols)
Et3003 sem2-1314-9 network layers vi (routing protocols)Tutun Juhana
 
Et3003 sem2-1314-8 network layers v (icmpv4)
Et3003 sem2-1314-8 network layers v (icmpv4)Et3003 sem2-1314-8 network layers v (icmpv4)
Et3003 sem2-1314-8 network layers v (icmpv4)Tutun Juhana
 
Et3003 sem2-1314-7 network layers iv (ipv4)
Et3003 sem2-1314-7 network layers iv (ipv4)Et3003 sem2-1314-7 network layers iv (ipv4)
Et3003 sem2-1314-7 network layers iv (ipv4)Tutun Juhana
 
Et3003 sem2-1314-6 network layers iii (arp)
Et3003 sem2-1314-6 network layers iii (arp)Et3003 sem2-1314-6 network layers iii (arp)
Et3003 sem2-1314-6 network layers iii (arp)Tutun Juhana
 
Et3003 sem2-1314-5 network layers ii (intro to routing)
Et3003 sem2-1314-5 network layers ii (intro to routing)Et3003 sem2-1314-5 network layers ii (intro to routing)
Et3003 sem2-1314-5 network layers ii (intro to routing)Tutun Juhana
 
Et3003 sem2-1314-4 network layers i (ipv4 addressing)
Et3003 sem2-1314-4 network layers i (ipv4 addressing)Et3003 sem2-1314-4 network layers i (ipv4 addressing)
Et3003 sem2-1314-4 network layers i (ipv4 addressing)Tutun Juhana
 
Et3003 sem2-1314-3 ethernets
Et3003 sem2-1314-3 ethernetsEt3003 sem2-1314-3 ethernets
Et3003 sem2-1314-3 ethernetsTutun Juhana
 
ET3003-1 introduction (Semester II 2013-2014)
ET3003-1 introduction (Semester II 2013-2014)ET3003-1 introduction (Semester II 2013-2014)
ET3003-1 introduction (Semester II 2013-2014)Tutun Juhana
 

Mehr von Tutun Juhana (20)

What should you prepare for industry 4.0 era
What should you prepare for industry 4.0 eraWhat should you prepare for industry 4.0 era
What should you prepare for industry 4.0 era
 
Internet of Things Security
Internet of Things SecurityInternet of Things Security
Internet of Things Security
 
Et4045-3-attacks-2
Et4045-3-attacks-2Et4045-3-attacks-2
Et4045-3-attacks-2
 
ET4045-3-attacks-1
ET4045-3-attacks-1ET4045-3-attacks-1
ET4045-3-attacks-1
 
ET4045-2-cryptography-3
ET4045-2-cryptography-3ET4045-2-cryptography-3
ET4045-2-cryptography-3
 
ET4045-2-cryptography-2
ET4045-2-cryptography-2ET4045-2-cryptography-2
ET4045-2-cryptography-2
 
ET4045-2-cryptography-1-2014
ET4045-2-cryptography-1-2014ET4045-2-cryptography-1-2014
ET4045-2-cryptography-1-2014
 
ET4045-1-Introduction-2014
ET4045-1-Introduction-2014ET4045-1-Introduction-2014
ET4045-1-Introduction-2014
 
Underlying Technologies Part I (Lecture #4 ET3003 Sem1 2014/2015)
Underlying Technologies Part I (Lecture #4 ET3003 Sem1 2014/2015)Underlying Technologies Part I (Lecture #4 ET3003 Sem1 2014/2015)
Underlying Technologies Part I (Lecture #4 ET3003 Sem1 2014/2015)
 
Switching Techniques (Lecture #2 ET3003 Sem1 2014/2015)
Switching Techniques (Lecture #2 ET3003 Sem1 2014/2015)Switching Techniques (Lecture #2 ET3003 Sem1 2014/2015)
Switching Techniques (Lecture #2 ET3003 Sem1 2014/2015)
 
Et3003 sem2-1314-10 vlans
Et3003 sem2-1314-10 vlansEt3003 sem2-1314-10 vlans
Et3003 sem2-1314-10 vlans
 
Et3003 sem2-1314-9 network layers vi (routing protocols)
Et3003 sem2-1314-9 network layers vi (routing protocols)Et3003 sem2-1314-9 network layers vi (routing protocols)
Et3003 sem2-1314-9 network layers vi (routing protocols)
 
Et3003 sem2-1314-8 network layers v (icmpv4)
Et3003 sem2-1314-8 network layers v (icmpv4)Et3003 sem2-1314-8 network layers v (icmpv4)
Et3003 sem2-1314-8 network layers v (icmpv4)
 
Et3003 sem2-1314-7 network layers iv (ipv4)
Et3003 sem2-1314-7 network layers iv (ipv4)Et3003 sem2-1314-7 network layers iv (ipv4)
Et3003 sem2-1314-7 network layers iv (ipv4)
 
Et3003 sem2-1314-6 network layers iii (arp)
Et3003 sem2-1314-6 network layers iii (arp)Et3003 sem2-1314-6 network layers iii (arp)
Et3003 sem2-1314-6 network layers iii (arp)
 
Et3003 sem2-1314-5 network layers ii (intro to routing)
Et3003 sem2-1314-5 network layers ii (intro to routing)Et3003 sem2-1314-5 network layers ii (intro to routing)
Et3003 sem2-1314-5 network layers ii (intro to routing)
 
Et3003 sem2-1314-4 network layers i (ipv4 addressing)
Et3003 sem2-1314-4 network layers i (ipv4 addressing)Et3003 sem2-1314-4 network layers i (ipv4 addressing)
Et3003 sem2-1314-4 network layers i (ipv4 addressing)
 
Et3003 sem2-1314-3 ethernets
Et3003 sem2-1314-3 ethernetsEt3003 sem2-1314-3 ethernets
Et3003 sem2-1314-3 ethernets
 
ET3003-1 introduction (Semester II 2013-2014)
ET3003-1 introduction (Semester II 2013-2014)ET3003-1 introduction (Semester II 2013-2014)
ET3003-1 introduction (Semester II 2013-2014)
 
IPv6 Introduction
IPv6 IntroductionIPv6 Introduction
IPv6 Introduction
 

Kürzlich hochgeladen

08448380779 Call Girls In Friends Colony Women Seeking Men
08448380779 Call Girls In Friends Colony Women Seeking Men08448380779 Call Girls In Friends Colony Women Seeking Men
08448380779 Call Girls In Friends Colony Women Seeking MenDelhi Call girls
 
Histor y of HAM Radio presentation slide
Histor y of HAM Radio presentation slideHistor y of HAM Radio presentation slide
Histor y of HAM Radio presentation slidevu2urc
 
Boost PC performance: How more available memory can improve productivity
Boost PC performance: How more available memory can improve productivityBoost PC performance: How more available memory can improve productivity
Boost PC performance: How more available memory can improve productivityPrincipled Technologies
 
Handwritten Text Recognition for manuscripts and early printed texts
Handwritten Text Recognition for manuscripts and early printed textsHandwritten Text Recognition for manuscripts and early printed texts
Handwritten Text Recognition for manuscripts and early printed textsMaria Levchenko
 
The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024Rafal Los
 
What Are The Drone Anti-jamming Systems Technology?
What Are The Drone Anti-jamming Systems Technology?What Are The Drone Anti-jamming Systems Technology?
What Are The Drone Anti-jamming Systems Technology?Antenna Manufacturer Coco
 
Factors to Consider When Choosing Accounts Payable Services Providers.pptx
Factors to Consider When Choosing Accounts Payable Services Providers.pptxFactors to Consider When Choosing Accounts Payable Services Providers.pptx
Factors to Consider When Choosing Accounts Payable Services Providers.pptxKatpro Technologies
 
A Year of the Servo Reboot: Where Are We Now?
A Year of the Servo Reboot: Where Are We Now?A Year of the Servo Reboot: Where Are We Now?
A Year of the Servo Reboot: Where Are We Now?Igalia
 
Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024
Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024
Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024The Digital Insurer
 
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
04-2024-HHUG-Sales-and-Marketing-Alignment.pptxHampshireHUG
 
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...Drew Madelung
 
GenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day PresentationGenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day PresentationMichael W. Hawkins
 
A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)Gabriella Davis
 
2024: Domino Containers - The Next Step. News from the Domino Container commu...
2024: Domino Containers - The Next Step. News from the Domino Container commu...2024: Domino Containers - The Next Step. News from the Domino Container commu...
2024: Domino Containers - The Next Step. News from the Domino Container commu...Martijn de Jong
 
Axa Assurance Maroc - Insurer Innovation Award 2024
Axa Assurance Maroc - Insurer Innovation Award 2024Axa Assurance Maroc - Insurer Innovation Award 2024
Axa Assurance Maroc - Insurer Innovation Award 2024The Digital Insurer
 
Advantages of Hiring UIUX Design Service Providers for Your Business
Advantages of Hiring UIUX Design Service Providers for Your BusinessAdvantages of Hiring UIUX Design Service Providers for Your Business
Advantages of Hiring UIUX Design Service Providers for Your BusinessPixlogix Infotech
 
08448380779 Call Girls In Greater Kailash - I Women Seeking Men
08448380779 Call Girls In Greater Kailash - I Women Seeking Men08448380779 Call Girls In Greater Kailash - I Women Seeking Men
08448380779 Call Girls In Greater Kailash - I Women Seeking MenDelhi Call girls
 
How to convert PDF to text with Nanonets
How to convert PDF to text with NanonetsHow to convert PDF to text with Nanonets
How to convert PDF to text with Nanonetsnaman860154
 
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdf
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdfThe Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdf
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdfEnterprise Knowledge
 
The Codex of Business Writing Software for Real-World Solutions 2.pptx
The Codex of Business Writing Software for Real-World Solutions 2.pptxThe Codex of Business Writing Software for Real-World Solutions 2.pptx
The Codex of Business Writing Software for Real-World Solutions 2.pptxMalak Abu Hammad
 

Kürzlich hochgeladen (20)

08448380779 Call Girls In Friends Colony Women Seeking Men
08448380779 Call Girls In Friends Colony Women Seeking Men08448380779 Call Girls In Friends Colony Women Seeking Men
08448380779 Call Girls In Friends Colony Women Seeking Men
 
Histor y of HAM Radio presentation slide
Histor y of HAM Radio presentation slideHistor y of HAM Radio presentation slide
Histor y of HAM Radio presentation slide
 
Boost PC performance: How more available memory can improve productivity
Boost PC performance: How more available memory can improve productivityBoost PC performance: How more available memory can improve productivity
Boost PC performance: How more available memory can improve productivity
 
Handwritten Text Recognition for manuscripts and early printed texts
Handwritten Text Recognition for manuscripts and early printed textsHandwritten Text Recognition for manuscripts and early printed texts
Handwritten Text Recognition for manuscripts and early printed texts
 
The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024
 
What Are The Drone Anti-jamming Systems Technology?
What Are The Drone Anti-jamming Systems Technology?What Are The Drone Anti-jamming Systems Technology?
What Are The Drone Anti-jamming Systems Technology?
 
Factors to Consider When Choosing Accounts Payable Services Providers.pptx
Factors to Consider When Choosing Accounts Payable Services Providers.pptxFactors to Consider When Choosing Accounts Payable Services Providers.pptx
Factors to Consider When Choosing Accounts Payable Services Providers.pptx
 
A Year of the Servo Reboot: Where Are We Now?
A Year of the Servo Reboot: Where Are We Now?A Year of the Servo Reboot: Where Are We Now?
A Year of the Servo Reboot: Where Are We Now?
 
Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024
Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024
Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024
 
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
 
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
 
GenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day PresentationGenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day Presentation
 
A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)
 
2024: Domino Containers - The Next Step. News from the Domino Container commu...
2024: Domino Containers - The Next Step. News from the Domino Container commu...2024: Domino Containers - The Next Step. News from the Domino Container commu...
2024: Domino Containers - The Next Step. News from the Domino Container commu...
 
Axa Assurance Maroc - Insurer Innovation Award 2024
Axa Assurance Maroc - Insurer Innovation Award 2024Axa Assurance Maroc - Insurer Innovation Award 2024
Axa Assurance Maroc - Insurer Innovation Award 2024
 
Advantages of Hiring UIUX Design Service Providers for Your Business
Advantages of Hiring UIUX Design Service Providers for Your BusinessAdvantages of Hiring UIUX Design Service Providers for Your Business
Advantages of Hiring UIUX Design Service Providers for Your Business
 
08448380779 Call Girls In Greater Kailash - I Women Seeking Men
08448380779 Call Girls In Greater Kailash - I Women Seeking Men08448380779 Call Girls In Greater Kailash - I Women Seeking Men
08448380779 Call Girls In Greater Kailash - I Women Seeking Men
 
How to convert PDF to text with Nanonets
How to convert PDF to text with NanonetsHow to convert PDF to text with Nanonets
How to convert PDF to text with Nanonets
 
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdf
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdfThe Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdf
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdf
 
The Codex of Business Writing Software for Real-World Solutions 2.pptx
The Codex of Business Writing Software for Real-World Solutions 2.pptxThe Codex of Business Writing Software for Real-World Solutions 2.pptx
The Codex of Business Writing Software for Real-World Solutions 2.pptx
 

ET3003-2 OSI-TCPIP (Semester II 2013-2014)

  • 1. 2 Tutun Juhana Telecommunication Engineering School of Electrical Engineering & Informatics Institut Teknologi Bandung The OSI Model & the TCP/IP Protocol Suite Computer Networks
  • 2. • Before 1990 everyone believed that the OSI model would become the ultimate standard for data communications but this did not happen
  • 3. • The TCP/IP protocol suite became the dominant commercial architecture because it was used and tested extensively in the Internet – the OSI model was never fully implemented
  • 4. When Communication is simple Example 1 • The communication is so simple that it can occur in only one layer (sign language) Speak Spanish Speak English
  • 5. When Communication is not simple Example 2 • Ann has to move to another town because of her job • We need three layers • It is hierarchical (the tasks must be done in the order given in the hierarchy) • Each layer uses the services of the layer immediately below it • Each layer gives the services to the layer immediately above it
  • 7. • Established in 1947, the International Standards Organization (ISO) is a multinational body dedicated to worldwide agreement on international standards • An ISO standard that covers all aspects of network communications is the Open Systems Interconnection (OSI) model – It was first introduced in the late 1970s
  • 8. • An open system is a set of protocols that allows any two different systems to communicate regardless of their underlying architecture • The OSI model is not a protocol; it is a model for understanding and designing a network architecture that is flexible, robust, and interoperable • The OSI model was intended to be the basis for the creation of the protocols in the OSI stack
  • 9. The OSI model The user support layers; they allow interoperability among unrelated software systems; They are almost always implemented in software the transport layer, links the two subgroups and ensures that what the lower layers have transmitted is in a form that the upper layers can use The network support layers; they deal with the physical aspects of moving data from one device to another (such as electrical specifications, physical connections, physical addressing, and transport timing and reliability); They are a combination of hardware and software, except for the physical layer, which is mostly hardware
  • 11. An exchange using the OSI model Decapsulation Encapsulation
  • 12. Physical Layer • Responsible for moving individual bits from one (node) to the next • It coordinates the functions required to carry a bit stream over a physical medium. • It deals with the mechanical and electrical specifications of the interface and transmission media • It defines the procedures and functions that physical devices and interfaces have to perform for transmission to occur
  • 13. The physical layer is also concerned with the following • • • • • • • Physical characteristics of interfaces and media Representation of bits Data rate Synchronization of bits Line configuration Physical topology Transmission mode
  • 14. Data Link Layer • The data link layer is responsible for moving frames from one hop (node) to the next • The data link layer transforms the physical layer, a raw transmission facility, to a reliable link – It makes the physical layer appear error-free to the upper layer (network layer)
  • 15.
  • 16. Other responsibilities of the data link layer include the following • Framing • Physical addressing • Flow control • Error control • Access control
  • 17. Network Layer • The network layer is responsible for the source-to-destination delivery of a packet, possibly across multiple networks (links) • Whereas the data link layer oversees the delivery of the packet between two systems on the same network (link) • The network layer ensures that each packet gets from its point of origin to its final destination
  • 18. • If two systems are connected to the same link, there is usually no need for a network layer • However, if the two systems are attached to different networks (links) with connecting devices between the networks (links), there is often a need for the network layer to accomplish source-todestination delivery
  • 19.
  • 20.
  • 21. Other responsibilities of the network layer include the following • Logical addressing • Routing
  • 22. Transport Layer • The transport layer is responsible for the delivery of a message from one process to another • A process is an application program running on the host
  • 23. • Reliable process-to-process delivery of a message
  • 24. • Differences with Network Layer • Network layer oversees source-to-destination delivery of individual packets – It does not recognize any relationship between those packets • The transport layer ensures that the whole message arrives intact and in order – Overseeing both error control and flow control at the sourceto-destination level
  • 25. • Other responsibilities of the transport layer – Service-point addressing (port address) – Segmentation and reassembly – Connection control • The transport layer can be either connectionless or connection oriented – Flow control – Error control
  • 26. Session Layer • Session layer establishes, maintains, and synchronizes the interaction between communicating systems • Responsibilities – Dialog control – Synchronization
  • 27.
  • 28. Presentation Layer • The presentation layer is concerned with the syntax and semantics of the information exchanged between two systems – Translation – Encryption – Compression
  • 29.
  • 30. Application Layer • The application layer enables the user, whether human or software, to access the network • It provides user interfaces and support for services (email, remote file access etc.) • Services provided : – – – – Network virtual terminal File transfer, access, and management (FTAM) E-mail services Directory services
  • 31.
  • 32. Summary of OSI Layers
  • 34. • The TCP/IP protocol suite was developed prior to the OSI model
  • 36. Layers in the TCP/IP Protocol Suite • To discuss the purpose of each layer in the TCP/IP protocol suite, we will study a small private internet
  • 37. • A link is a network that allows a set of computers to communicate with each other • A link can be a LAN (local area network) serving a small area or a WAN (wide area network) serving a larger area • We assume that different links are connected together by devices called routers or switches that route the data to reach their final destinations
  • 38.
  • 39. Physical Layer • TCP/IP does not define any specific protocol for the physical layer • It supports all of the standard and proprietary protocols • The communication is between two hops or nodes, either a computer or router • The unit of communication is a single bit
  • 40. We assume that the most efficient way to communicate with each other is via routers R1, R3, and R4 if a node is connected to n links, it needs n physical-layer protocols, one for each link because links may use different physical-layer protocols
  • 41. • The responsibility of the physical layer, in addition to delivery of bits, matches with what mentioned for the physical layer of the OSI model • It mostly depends on the underlying technologies that provide links
  • 42. Data Link Layer • TCP/IP does not define any specific protocol for the data link layer either • It supports all of the standard and proprietary protocols • The communication is also between two hops or nodes • The unit of communication however, is a packet called a frame
  • 43. • A frame is a packet that encapsulates the data received from the network layer with an added header and sometimes a trailer • The header, among other communication information, includes the source and destination of frame • The destination address is needed to define the right recipient of the frame because many nodes may have been connected to the link • The source address is needed for possible response or acknowledgment as may be required by some protocols
  • 44. These frames may be different because link 1 and link 3 may be using different protocols and require frames of different formats
  • 45. Network Layer • At the network layer (or, more accurately, the internetwork layer), TCP/IP supports the Internet Protocol (IP) • IP is the transmission mechanism used by the TCP/IP protocols • IP transports data in packets called datagrams, each of which is transported separately • Datagrams can travel along different routes and can arrive out of sequence or be duplicated • IP does not keep track of the routes and has no facility for reordering datagrams once they arrive at their destination
  • 46.
  • 47. Transport Layer • Only the two end computers need to have the transport layer • The transport layer is responsible for delivering the whole message, which is called a segment from A to B – A segment may consist of a few or tens of datagrams • Where as the network layer is responsible for sending individual datagrams from computer A to computer B
  • 48. • The segments need to be broken into datagrams and each datagram has to be delivered to the network layer for transmission • Since the Internet defines a different route for each datagram, the datagrams may arrive out of order and may be lost • The transport layer at computer B needs to wait until all of these datagrams to arrive, assemble them and make a segment out of them
  • 49. • The transport layer was represented in the TCP/IP suite by two protocols: – User Datagram Protocol (UDP) – Transmission Control Protocol (TCP) • A new protocol called Stream Control Transmission Protocol (SCTP) has been introduced in the last few years
  • 50.
  • 51. Application Layer • The application layer in TCP/IP is equivalent to the combined session, presentation, and application layers in the OSI model • The application layer allows a user to access the services of our private internet or the global Internet – electronic mail, file transfer, accessing the World Wide Web, etc. • The unit of communication at the application layer is a message
  • 52.
  • 53. Addressing User-friendly addresses that are designed for specific application To enable communication between processes Needed in which each host can be identified uniquely, regardless of the underlying physical network • The address of a node as defined by its LAN or WAN • Have authority over the link
  • 54. Physical Addresses • Also known as the link address
  • 55. • Destination physical addresses can be either – unicast  one single recipient – multicast  a group of recipients – broadcast  to be received by all systems in the network
  • 56. Logical Addresses • Logical addresses are necessary for universal communications that are independent of underlying physical networks • Physical addresses are not adequate in an internetwork environment where different networks can have different address formats • A universal addressing system is needed in which each host can be identified uniquely, regardless of the underlying physical network • The logical addresses are designed for this purpose
  • 57. • A logical address in the Internet is currently a 32-bit address (IPv4) and a 128-bit address (IPv6), that can uniquely define a host connected to the Internet • No two publicly addressed and visible hosts on the Internet can have the same IP address
  • 58. datagram with dst. and src. logical address Frame with dst. and src. physical address The physical addresses will change from hop to hop, but the logical addresses remain the same
  • 59. Port Addresses • Computers are devices that can run multiple processes at the same time • The end objective of Internet communication is a process communicating with another process • For example, computer A can communicate with computer C by using TELNET, at the same time, computer A communicates with computer B by using the File Transfer Protocol (FTP) • In the TCP/IP architecture, the label assigned to a process is called a port address • A port address in TCP/IP is 16 bits in length (represented by one decimal number)
  • 60. The physical addresses change from hop to hop, but the logical and port addresses usually remain the same
  • 61. Application-Specific Addresses • User-friendly addresses that are designed for specific application • Examples include the e-mail address (for example, tutun@stei.itb.ac.id) and the • Universal Resource Locator (URL) (for example, www.itb.ac.id)