SlideShare a Scribd company logo
1 of 48
REFERENCE
MODELS
• Over the past couple of decades many of the networks
that were built used different hardware and software
implementations, as a result they were incompatible and it
became difficult for networks using different specifications
to communicate with each other.
• To address the problem of networks being incompatible
and unable to communicate with each other, the
International Organisation for Standardisation (ISO)
researched various network schemes.
• The ISO recognised there was a need to create a
NETWORK MODEL that would help vendors create
interoperable network implementations.
• A reference model is a conceptual layout that
describes how communication between devices
should occur. A reference model has many
advantages such as it defines standards for
building network components thereby permitting
multiple-vendor development and also defines
which functions should be performed at each
layer of the model thereby promoting the
standardization of network.
• In 1984 in order to aid network interconnection without
necessarily requiring complete redesign, the Open Systems
Interconnection (OSI) reference model was approved as an
international standard for communications architecture.
• The Open Systems Interconnection (OSI) reference model is a
descriptive network scheme. It ensures greater compatibility
and interoperability between various types of network
technologies.
• The OSI model describes how information or data makes its
way from application programmes (such as spreadsheets)
through a network medium (such as wire) to another
application programme located on another network.
• The OSI reference model divides the problem of moving
information between computers over a network medium into
SEVEN smaller and more manageable problems.
In 1983, Day and Zimmerman laid down certain principles that were
applied to arrive at the seven layers can be briefly summarized as
follows:
 A layer should be created where a different abstraction is needed.
 Each layer should perform a well-defined function.
 The function of each layer should be chosen with an eye toward
defining internationally standardized protocols.
 The layer boundaries should be chosen to minimize the information
flow across the interfaces.
 The number of layers should be large enough that distinct functions
need not be thrown together in the same layer out of necessity and
small enough that the architecture does not become unwieldy
8
Layer 5
Layer 6
Layer 7 Application
Presentation
Session
Application
DATADATA
Format
When to start
Signaling
9Mukesh Chinta, Asst Prof, CSE
Transport
Network
Data Link
PhysicalLayer 1
Layer 2
Layer 3
Layer 4 Reliability
0101
0101
Data transmission
at the node interval
Routing
Physical connection
11
Provides physical interface for transmission of
information.
Defines rules by which bits are passed from one
system to another on a physical communication
medium.
Covers all - mechanical, electrical, functional and
procedural - aspects for physical communication.
Such characteristics as voltage levels, timing of
voltage changes, physical data rates, maximum
transmission distances, physical connectors, and
other similar attributes are defined by physical layer
specifications.
The physical layer is responsible for movements of
individual bits from one hop (node) to the next.
12
Data link layer attempts to provide reliable
communication over the physical layer interface.
Breaks the outgoing data into frames and reassemble
the received frames.
Create and detect frame boundaries.
Handle errors by implementing an acknowledgement
and retransmission scheme.
Implement flow control.
Supports point-to-point as well as broadcast
communication.
A special sublayer Medium access control sublayer
deals with the problem of access control of shared
channel.
13
The data link layer is responsible for moving
frames from one hop (node) to the next.
14
15
16
Implements routing of frames (packets) through the
network.
Defines the most optimum path the packet should take
from the source to the destination
Defines logical addressing so that any endpoint can be
identified.
Handles congestion and Quality of service issues in the
network.
Facilitates interconnection between heterogeneous
networks (Internetworking).
The network layer also defines how to fragment a
packet into smaller packets to accommodate different
media.
In broadcast networks, the network layer is
thin(nonexistent)
The network layer is responsible for the
delivery of individual packets from
the source host to the destination host.
19
Purpose of this layer is to provide a reliable
mechanism for the exchange of data between two
processes in different computers.
Accepts data from above, split into smaller units in
needed
Ensures that the data units are delivered error free.
Ensures that data units are delivered in sequence.
Ensures that there is no loss or duplication of data
units.
Provides connectionless or connection oriented
service.
Provides for the connection management.
Multiplex multiple connection over a single channel.
The transport layer is responsible for the delivery
of a message from one process to another.
22
Session layer provides mechanism for controlling the dialogue
between the two end systems. It defines how to start, control
and end conversations (called sessions) between applications.
This layer requests for a logical connection to be established
on an end-user’s request. Responsible for maintenance and
termination of sessions.
Token Management: Prevents two parties from attempting the
same critical operation simulatenously.
This layer provides services like dialogue discipline which can
be full duplex or half duplex: dialog control
Session layer can also provide check-pointing mechanism
such that if a failure of some sort occurs between checkpoints,
all data can be retransmitted from the last checkpoint:
Synchronization.
The session layer is responsible for dialog
control and synchronization.
24
Presentation layer defines the format in which the data is to be
exchanged between the two communicating entities. It deals
with syntax and semantics of the information transmitted.
Also handles data compression and data encryption
(cryptography).
Responsible for protocol conversion, character conversions,
data encryption / decryption, expanding graphics commands
and data compression
• Used for applications specially written to run over the network
• Allows access to network services that support applications
• Directly represents the services that directly support user
applications (e.g., file transfer and email)
• What the user sees or does
• Contains a variety of protocols that are commonly needed by
users
25
The application layer is responsible for
providing services to the user.
End
System
Intermediate
Systems
29
30
31
32
Meet the Protocol Family in
the Internet
DNS
IP QoS
Winsock SMTP
NTCIP POP3
SLIP
tester
developer
administrator
OSPF
BGPRTP
WWW
 TCP/IP originated out of the investigative research into networking
protocols that the US Department of Defense (DoD) initiated in 1969.
In 1968, the DoD Advanced Research Projects Agency (ARPA) began
researching the network technology that is called packet switching.
 The network that was initially constructed as a result of this research
to provide a communication that could function in wartime., then
called ARPANET, gradually became known as the Internet. The TCP/IP
protocols played an important role in the development of the
Internet. In the early 1980s, the TCP/IP protocols were developed. In
1983, they became standard protocols for ARPANET.
 Because of the history of the TCP/IP protocol suite, it's often referred
to as the DoD protocol suite or the Internet protocol suite 34
35
The Internet Protocol Suite (commonly known
as TCP/IP) is the set of communications
protocols used for the Internet and other similar
networks.
It is named from two of the most important protocols
in it:
the Transmission Control Protocol (TCP)
The Internet Protocol (IP), which were the first two
networking protocols defined in this standard.
36
TCP/IP Network
Architecture
Application Layer
Transport Layer
Network Layer
Link Layer
operating-system/computer-architecture independent
LAN/MAN/WAN applicable
physical-medium independent
host host
network network
media media
process process
client-server model
TCP/IP Protocol Suite
Ethernet
ARP RARP
IPv4 IPv6
TCP UDP
ICMP
TelnetFTPping SNMP TFTP
Serial line
PPP
SMTP POP3
21 23 11025 69161
port
number
IP
address
TCPIP Protocol Suite
39
 The internet layer is the linchpin that holds the whole architecture
together. Its job is to permit hosts to inject packets into any network
and have them travel independently to the destination (potentially on
a different network).
 Internet Protocol (IP) is the most important protocol in this layer. It
is a connectionless protocol and does not provide reliability, flow
control, or error recovery. IP provides a routing function that
attempts to deliver transmitted messages to their destination.
 A message unit in an IP network is called an IP datagram. This is
the basic unit of information transmitted across TCP/IP networks.
 Other internetwork-layer protocols are ICMP {Internet Control
Message Protocol}, IGMP {Internet Group Management Protocol},
ARP {Address Resolution Protocol}, and RARP {Reverse ARP}.
40
 Transport layer (host-to-host) is designed to allow peer entities on the
source and destination hosts to carry on a conversation, just as in the OSI
transport layer. Two end-to-end transport protocols namely TCP
{Transmission Control Protocol} and UDP {User Datagram Protocol}
have been defined.
 TCP is a reliable connection-oriented protocol that permits a byte stream
originating on one machine to be transported without error on any
machine in the internet. It divides the incoming byte stream into discrete
message and passes each one onto the internet layer. It reassembles
these messages at the receiver. It also handles flow control.
 UDP is an unreliable, connectionless protocol for applications that do not
want TCP's sequencing or flow control and wish to provide their own. It is
also widely used for one-shot, client-server-type request-reply queries
and applications in which prompt delivery is more important than
accurate delivery, such as transmitting speech or video.
41
42
 The network interface layer, also called the link layer or the
data-link layer, is the interface to the actual network hardware. This
interface may or may not provide reliable delivery, and may be
packet or stream oriented. In fact, TCP/IP does not specify any
protocol here, but can use almost any network interface available,
which illustrates the flexibility of the IP layer.
 Examples are IEEE 802.2, X.25, ATM, FDDI, and even SNA.
 It varies from implementation to implementation with vendors
supplying their own version
• The Application layer is equivalent to the combined OSI session,
presentation and Application Layers.
• All the functions handled by these 3 layers in the OSI model are handled by
the Application layer in TCP/IP model.
• It provides a way for applications to have access to networked services.
• The Application Layer has the responsibility for authentication, data
compression, and end-user services such as terminal emulation, file transfer,
e-mail, web browsing/serving, and other network control and management
services. An application header and following data are packaged as a
message
• Application layer is present on the top of the Transport layer. It includes all
the higher-level protocols which are virtual terminal (TELNET), file
transfer (FTP), electronic mail (SMTP) & HTTP (Hyper Text Transfer
Protocol) 43
• IMAP4 - Internet Mail Access Protocol version 4 lets clients access an IMAP4 mail
server to download their e-mail to a local computer program. It works using TCP as
its transport protocol.
• FTP - File Transfer Protocol uses TCP as transport and allows the transfer of files
between two computer systems with login required by the requester.
• Telnet – Sometimes incorrectly called Terminal Emulation across a network, it is
used to remotely open a session on another computer acting as a server. It relies on
TCP for transport.
• SMTP - Simple Mail Transfer Protocol is a TCP-transported application layer
protocol used to send electronic mail.
• HTTP - Hypertext Transfer Protocol uses the TCP transport protocol to carry web
browsing requests to a web server, and web pages from web servers to web
browsers.
• POP3 - Post Office Protocol version 3 uses TCP as a way to offer clients access to a
POP3 mail server to transfer their e-mail to a local program on their computer.
• BGP4 - Border Gateway Protocol version 4 is a routing protocol most often used
between organizations. Two routers using BGP will establish a TCP connection to
send each other their BGP routing tables. In that exchange is information about
reachable networks including the full path to all BGP-known networks. 44
• DNS3 - Domain Names System provides the ability to refer to IP devices
using names instead of numerical IP addresses. It lets Domain Name Servers
resolve these names to their corresponding IP addresses.
• DHCP - Dynamic Host Configuration Protocol uses UDP as its transport
protocol to dynamically and automatically assign IP addresses and other
networking configuration information to computers starting up on a given
network.
• TFTP - Trivial File Transfer Protocol is a UDP-transported protocol that
allows file transfer between two computers with no login or user required for
its limited use.
• SNMP - Simple Network Management Protocol is used to manage all types of
network elements based on various data sent and received using UDP as its
transport protocol.
• RIP2 - Routing Information Protocol is an internal routing protocol used to
dynamically update router tables on internal organization networks. It uses
UDP as its transport protocol.
45
• ARP - Address Resolution Protocol supports the packaging of IP data into
Ethernet frames. It finds the local Ethernet (MAC) address that matches a
specific local IP address.
• ICMP4 - Internet Control Message Protocol provides diagnostics and logical
error reporting to help manage the sending of data between computers. Its
best-known function is ping.
• IGMP - Internet Group Management Protocol supports multicasting by
letting multicast routers track group memberships on each of its connected
networks.
• IPsec - Internet Protocol Security is an end-to-end security scheme for
securing Internet Protocol (IP) communications by authenticating and
encrypting each IP packet of a communication session.
46
• IP4 - Internet Protocol provides connectionless communication support
for all protocols’ data, except ARP, by packaging that data into an IP
datagram.
• OSPF - Open Shortest Path First is an internal routing protocol for use
inside an organization. It checks the function of its link to each of its
neighbor OSPF routers. Then, it sends the acquired routing information to
those neighbor routers.
• EIGRP - Enhanced Interior Gateway Routing Protocol is a local routing
protocol that is proprietary to Cisco. It is an advanced distance-vector
routing protocol that shares internal organizational routing information
found in three tables.
47
• The application layer in TCP/IP handles the responsibilities of multiple
layers in the OSI model.
• The OSI model numbers and names its layers, whereas the TCP/IP stack
only names the layers.
• Unlike the transport layer in OSI, TCP/IP only guarantees reliable delivery
of packets when TCP is the chosen protocol.
• OSI has much more complexity in its 7 layers than TCP/IP has in its 4
layers.
• In TCP/IP, protocols are deliberately designed to have more layer
flexibility than the strict layers of the OSI model.
• TCP/IP functions are implemented, then standardized. OSI is standardized
in concept only, though some functions work.
• OSI has more limited Network Management and Network Security.
48

More Related Content

What's hot

IEEE standards 802.3.&802.11
IEEE standards 802.3.&802.11IEEE standards 802.3.&802.11
IEEE standards 802.3.&802.11Keshav Maheshwari
 
TCP/IP Protocols With All Layer Description
TCP/IP Protocols With All Layer DescriptionTCP/IP Protocols With All Layer Description
TCP/IP Protocols With All Layer DescriptionShubham Khedekar
 
TCP-IP Reference Model
TCP-IP Reference ModelTCP-IP Reference Model
TCP-IP Reference ModelMukesh Tekwani
 
Computer network switching
Computer network switchingComputer network switching
Computer network switchingShivani Godha
 
Physical layer OSI Model & Transmission Media
Physical layer OSI Model & Transmission MediaPhysical layer OSI Model & Transmission Media
Physical layer OSI Model & Transmission MediaMukesh Chinta
 
Transmission Control Protocol (TCP)
Transmission Control Protocol (TCP)Transmission Control Protocol (TCP)
Transmission Control Protocol (TCP)k33a
 
Application layer protocols
Application layer protocolsApplication layer protocols
Application layer protocolsFabMinds
 
Transmission media (data communication)
Transmission media (data communication)Transmission media (data communication)
Transmission media (data communication)Pritom Chaki
 
wireless network IEEE 802.11
 wireless network IEEE 802.11 wireless network IEEE 802.11
wireless network IEEE 802.11Shreejan Acharya
 
Computer Networks Unit 2 UNIT II DATA-LINK LAYER & MEDIA ACCESS
Computer Networks Unit 2 UNIT II DATA-LINK LAYER & MEDIA ACCESSComputer Networks Unit 2 UNIT II DATA-LINK LAYER & MEDIA ACCESS
Computer Networks Unit 2 UNIT II DATA-LINK LAYER & MEDIA ACCESSDr. SELVAGANESAN S
 

What's hot (20)

IEEE standards 802.3.&802.11
IEEE standards 802.3.&802.11IEEE standards 802.3.&802.11
IEEE standards 802.3.&802.11
 
TCP/IP Protocols With All Layer Description
TCP/IP Protocols With All Layer DescriptionTCP/IP Protocols With All Layer Description
TCP/IP Protocols With All Layer Description
 
Transport layer
Transport layer Transport layer
Transport layer
 
Network Layer
Network LayerNetwork Layer
Network Layer
 
TCP-IP Reference Model
TCP-IP Reference ModelTCP-IP Reference Model
TCP-IP Reference Model
 
Osi reference model
Osi reference modelOsi reference model
Osi reference model
 
Computer network switching
Computer network switchingComputer network switching
Computer network switching
 
Media Access Control
Media Access ControlMedia Access Control
Media Access Control
 
Osi model
Osi modelOsi model
Osi model
 
Physical layer OSI Model & Transmission Media
Physical layer OSI Model & Transmission MediaPhysical layer OSI Model & Transmission Media
Physical layer OSI Model & Transmission Media
 
Transmission Control Protocol (TCP)
Transmission Control Protocol (TCP)Transmission Control Protocol (TCP)
Transmission Control Protocol (TCP)
 
Transport layer protocol
Transport layer protocolTransport layer protocol
Transport layer protocol
 
TCP IP Model | Computer Science
TCP IP Model | Computer ScienceTCP IP Model | Computer Science
TCP IP Model | Computer Science
 
Application layer protocols
Application layer protocolsApplication layer protocols
Application layer protocols
 
Transmission media (data communication)
Transmission media (data communication)Transmission media (data communication)
Transmission media (data communication)
 
wireless network IEEE 802.11
 wireless network IEEE 802.11 wireless network IEEE 802.11
wireless network IEEE 802.11
 
Network software
Network softwareNetwork software
Network software
 
Physical layer ppt
Physical layer pptPhysical layer ppt
Physical layer ppt
 
Computer Networks Unit 2 UNIT II DATA-LINK LAYER & MEDIA ACCESS
Computer Networks Unit 2 UNIT II DATA-LINK LAYER & MEDIA ACCESSComputer Networks Unit 2 UNIT II DATA-LINK LAYER & MEDIA ACCESS
Computer Networks Unit 2 UNIT II DATA-LINK LAYER & MEDIA ACCESS
 
Application Layer
Application Layer Application Layer
Application Layer
 

Similar to The Seven Layers of the OSI Reference Model

Routers BY RAJIT(9816115641)
Routers BY RAJIT(9816115641)Routers BY RAJIT(9816115641)
Routers BY RAJIT(9816115641)C.U
 
CN-OSI-TCP-Models-001.pdf
CN-OSI-TCP-Models-001.pdfCN-OSI-TCP-Models-001.pdf
CN-OSI-TCP-Models-001.pdfskknowledge
 
pppppppppppppppppjjjjjjjjjjjpppppppp.pptx
pppppppppppppppppjjjjjjjjjjjpppppppp.pptxpppppppppppppppppjjjjjjjjjjjpppppppp.pptx
pppppppppppppppppjjjjjjjjjjjpppppppp.pptxzeyadosama505
 
Osi reference model and the tcp
Osi reference model and the tcpOsi reference model and the tcp
Osi reference model and the tcpAgrippa Mungazi
 
Overview of an OSI reference Model
Overview of an OSI reference ModelOverview of an OSI reference Model
Overview of an OSI reference ModelDarshan Bhatt
 
unit-1fon (1).pptx
unit-1fon (1).pptxunit-1fon (1).pptx
unit-1fon (1).pptxDeepVala5
 
Chapter 1.2 osi model
Chapter 1.2 osi modelChapter 1.2 osi model
Chapter 1.2 osi modelNaiyan Noor
 
Introduction to Networks_v0.2
Introduction to Networks_v0.2Introduction to Networks_v0.2
Introduction to Networks_v0.2Sohail Gohir
 
OSI and TCP/IP reference models in networking
OSI and TCP/IP reference models in networkingOSI and TCP/IP reference models in networking
OSI and TCP/IP reference models in networkingMeenakshiGupta233101
 
Automation Networking By Shivam Singh
Automation Networking By Shivam SinghAutomation Networking By Shivam Singh
Automation Networking By Shivam SinghShivam Singh
 
Networking fundamentals
Networking  fundamentalsNetworking  fundamentals
Networking fundamentalsThe Avi Sharma
 
Networking (osi model)
Networking (osi model)Networking (osi model)
Networking (osi model)Pooja Bhojwani
 
IMD 251 - Networking
IMD 251 - NetworkingIMD 251 - Networking
IMD 251 - Networkingisma ishak
 

Similar to The Seven Layers of the OSI Reference Model (20)

Routers BY RAJIT(9816115641)
Routers BY RAJIT(9816115641)Routers BY RAJIT(9816115641)
Routers BY RAJIT(9816115641)
 
Wp simoneau osi_model
Wp simoneau osi_modelWp simoneau osi_model
Wp simoneau osi_model
 
CN-OSI-TCP-Models-001.pdf
CN-OSI-TCP-Models-001.pdfCN-OSI-TCP-Models-001.pdf
CN-OSI-TCP-Models-001.pdf
 
pppppppppppppppppjjjjjjjjjjjpppppppp.pptx
pppppppppppppppppjjjjjjjjjjjpppppppp.pptxpppppppppppppppppjjjjjjjjjjjpppppppp.pptx
pppppppppppppppppjjjjjjjjjjjpppppppp.pptx
 
Osi reference model and the tcp
Osi reference model and the tcpOsi reference model and the tcp
Osi reference model and the tcp
 
Overview of an OSI reference Model
Overview of an OSI reference ModelOverview of an OSI reference Model
Overview of an OSI reference Model
 
section 4.3.pptx
section 4.3.pptxsection 4.3.pptx
section 4.3.pptx
 
unit-1fon (1).pptx
unit-1fon (1).pptxunit-1fon (1).pptx
unit-1fon (1).pptx
 
CCNA Report
CCNA ReportCCNA Report
CCNA Report
 
Chapter 1.2 osi model
Chapter 1.2 osi modelChapter 1.2 osi model
Chapter 1.2 osi model
 
Introduction to Networks_v0.2
Introduction to Networks_v0.2Introduction to Networks_v0.2
Introduction to Networks_v0.2
 
OSI and TCP/IP reference models in networking
OSI and TCP/IP reference models in networkingOSI and TCP/IP reference models in networking
OSI and TCP/IP reference models in networking
 
Automation Networking By Shivam Singh
Automation Networking By Shivam SinghAutomation Networking By Shivam Singh
Automation Networking By Shivam Singh
 
Bhargava Presentation.ppt
Bhargava Presentation.pptBhargava Presentation.ppt
Bhargava Presentation.ppt
 
Bhargava Presentation.ppt
Bhargava Presentation.pptBhargava Presentation.ppt
Bhargava Presentation.ppt
 
Networking fundamentals
Networking  fundamentalsNetworking  fundamentals
Networking fundamentals
 
Assignment3
Assignment3Assignment3
Assignment3
 
Networking (osi model)
Networking (osi model)Networking (osi model)
Networking (osi model)
 
Osi model 7 Layers
Osi model 7 LayersOsi model 7 Layers
Osi model 7 Layers
 
IMD 251 - Networking
IMD 251 - NetworkingIMD 251 - Networking
IMD 251 - Networking
 

More from Mukesh Chinta

CCNA-2 SRWE Mod-10 LAN Security Concepts
CCNA-2 SRWE Mod-10 LAN Security ConceptsCCNA-2 SRWE Mod-10 LAN Security Concepts
CCNA-2 SRWE Mod-10 LAN Security ConceptsMukesh Chinta
 
CCNA-2 SRWE Mod-11 Switch Security Configuration
CCNA-2 SRWE Mod-11 Switch Security ConfigurationCCNA-2 SRWE Mod-11 Switch Security Configuration
CCNA-2 SRWE Mod-11 Switch Security ConfigurationMukesh Chinta
 
CCNA-2 SRWE Mod-12 WLAN Concepts
CCNA-2 SRWE Mod-12 WLAN ConceptsCCNA-2 SRWE Mod-12 WLAN Concepts
CCNA-2 SRWE Mod-12 WLAN ConceptsMukesh Chinta
 
CCNA-2 SRWE Mod-13 WLAN Configuration
CCNA-2 SRWE Mod-13 WLAN ConfigurationCCNA-2 SRWE Mod-13 WLAN Configuration
CCNA-2 SRWE Mod-13 WLAN ConfigurationMukesh Chinta
 
CCNA-2 SRWE Mod-15 Static IP Routing
CCNA-2 SRWE Mod-15 Static IP RoutingCCNA-2 SRWE Mod-15 Static IP Routing
CCNA-2 SRWE Mod-15 Static IP RoutingMukesh Chinta
 
CCNA-2 SRWE Mod-14 Routing Concepts
CCNA-2 SRWE Mod-14 Routing ConceptsCCNA-2 SRWE Mod-14 Routing Concepts
CCNA-2 SRWE Mod-14 Routing ConceptsMukesh Chinta
 
Protecting the Organization - Cisco: Intro to Cybersecurity Chap-4
Protecting the Organization - Cisco: Intro to Cybersecurity Chap-4Protecting the Organization - Cisco: Intro to Cybersecurity Chap-4
Protecting the Organization - Cisco: Intro to Cybersecurity Chap-4Mukesh Chinta
 
Protecting Your Data and Privacy- Cisco: Intro to Cybersecurity chap-3
Protecting Your Data and Privacy- Cisco: Intro to Cybersecurity chap-3Protecting Your Data and Privacy- Cisco: Intro to Cybersecurity chap-3
Protecting Your Data and Privacy- Cisco: Intro to Cybersecurity chap-3Mukesh Chinta
 
Attacks, Concepts and Techniques - Cisco: Intro to Cybersecurity Chap-2
Attacks, Concepts and Techniques - Cisco: Intro to Cybersecurity Chap-2Attacks, Concepts and Techniques - Cisco: Intro to Cybersecurity Chap-2
Attacks, Concepts and Techniques - Cisco: Intro to Cybersecurity Chap-2Mukesh Chinta
 
The need for Cybersecurity - Cisco Intro to Cybersec Chap-1
The need for Cybersecurity - Cisco Intro to Cybersec Chap-1The need for Cybersecurity - Cisco Intro to Cybersec Chap-1
The need for Cybersecurity - Cisco Intro to Cybersec Chap-1Mukesh Chinta
 
Cisco Cybersecurity Essentials Chapter- 7
Cisco Cybersecurity Essentials Chapter- 7Cisco Cybersecurity Essentials Chapter- 7
Cisco Cybersecurity Essentials Chapter- 7Mukesh Chinta
 
Protocols and Reference models CCNAv7-1
Protocols and Reference models  CCNAv7-1Protocols and Reference models  CCNAv7-1
Protocols and Reference models CCNAv7-1Mukesh Chinta
 
Basic Switch and End Device configuration CCNA7 Module 2
Basic Switch and End Device configuration   CCNA7 Module 2Basic Switch and End Device configuration   CCNA7 Module 2
Basic Switch and End Device configuration CCNA7 Module 2Mukesh Chinta
 
Introduction to networks CCNAv7 Module-1
Introduction to networks CCNAv7 Module-1Introduction to networks CCNAv7 Module-1
Introduction to networks CCNAv7 Module-1Mukesh Chinta
 
Process scheduling (CPU Scheduling)
Process scheduling (CPU Scheduling)Process scheduling (CPU Scheduling)
Process scheduling (CPU Scheduling)Mukesh Chinta
 
OS - Process Concepts
OS - Process ConceptsOS - Process Concepts
OS - Process ConceptsMukesh Chinta
 
Operating systems system structures
Operating systems   system structuresOperating systems   system structures
Operating systems system structuresMukesh Chinta
 
Introduction to Operating Systems
Introduction to Operating SystemsIntroduction to Operating Systems
Introduction to Operating SystemsMukesh Chinta
 
Cisco cybersecurity essentials chapter 8
Cisco cybersecurity essentials chapter 8Cisco cybersecurity essentials chapter 8
Cisco cybersecurity essentials chapter 8Mukesh Chinta
 
Cisco cybersecurity essentials chapter - 6
Cisco cybersecurity essentials chapter - 6Cisco cybersecurity essentials chapter - 6
Cisco cybersecurity essentials chapter - 6Mukesh Chinta
 

More from Mukesh Chinta (20)

CCNA-2 SRWE Mod-10 LAN Security Concepts
CCNA-2 SRWE Mod-10 LAN Security ConceptsCCNA-2 SRWE Mod-10 LAN Security Concepts
CCNA-2 SRWE Mod-10 LAN Security Concepts
 
CCNA-2 SRWE Mod-11 Switch Security Configuration
CCNA-2 SRWE Mod-11 Switch Security ConfigurationCCNA-2 SRWE Mod-11 Switch Security Configuration
CCNA-2 SRWE Mod-11 Switch Security Configuration
 
CCNA-2 SRWE Mod-12 WLAN Concepts
CCNA-2 SRWE Mod-12 WLAN ConceptsCCNA-2 SRWE Mod-12 WLAN Concepts
CCNA-2 SRWE Mod-12 WLAN Concepts
 
CCNA-2 SRWE Mod-13 WLAN Configuration
CCNA-2 SRWE Mod-13 WLAN ConfigurationCCNA-2 SRWE Mod-13 WLAN Configuration
CCNA-2 SRWE Mod-13 WLAN Configuration
 
CCNA-2 SRWE Mod-15 Static IP Routing
CCNA-2 SRWE Mod-15 Static IP RoutingCCNA-2 SRWE Mod-15 Static IP Routing
CCNA-2 SRWE Mod-15 Static IP Routing
 
CCNA-2 SRWE Mod-14 Routing Concepts
CCNA-2 SRWE Mod-14 Routing ConceptsCCNA-2 SRWE Mod-14 Routing Concepts
CCNA-2 SRWE Mod-14 Routing Concepts
 
Protecting the Organization - Cisco: Intro to Cybersecurity Chap-4
Protecting the Organization - Cisco: Intro to Cybersecurity Chap-4Protecting the Organization - Cisco: Intro to Cybersecurity Chap-4
Protecting the Organization - Cisco: Intro to Cybersecurity Chap-4
 
Protecting Your Data and Privacy- Cisco: Intro to Cybersecurity chap-3
Protecting Your Data and Privacy- Cisco: Intro to Cybersecurity chap-3Protecting Your Data and Privacy- Cisco: Intro to Cybersecurity chap-3
Protecting Your Data and Privacy- Cisco: Intro to Cybersecurity chap-3
 
Attacks, Concepts and Techniques - Cisco: Intro to Cybersecurity Chap-2
Attacks, Concepts and Techniques - Cisco: Intro to Cybersecurity Chap-2Attacks, Concepts and Techniques - Cisco: Intro to Cybersecurity Chap-2
Attacks, Concepts and Techniques - Cisco: Intro to Cybersecurity Chap-2
 
The need for Cybersecurity - Cisco Intro to Cybersec Chap-1
The need for Cybersecurity - Cisco Intro to Cybersec Chap-1The need for Cybersecurity - Cisco Intro to Cybersec Chap-1
The need for Cybersecurity - Cisco Intro to Cybersec Chap-1
 
Cisco Cybersecurity Essentials Chapter- 7
Cisco Cybersecurity Essentials Chapter- 7Cisco Cybersecurity Essentials Chapter- 7
Cisco Cybersecurity Essentials Chapter- 7
 
Protocols and Reference models CCNAv7-1
Protocols and Reference models  CCNAv7-1Protocols and Reference models  CCNAv7-1
Protocols and Reference models CCNAv7-1
 
Basic Switch and End Device configuration CCNA7 Module 2
Basic Switch and End Device configuration   CCNA7 Module 2Basic Switch and End Device configuration   CCNA7 Module 2
Basic Switch and End Device configuration CCNA7 Module 2
 
Introduction to networks CCNAv7 Module-1
Introduction to networks CCNAv7 Module-1Introduction to networks CCNAv7 Module-1
Introduction to networks CCNAv7 Module-1
 
Process scheduling (CPU Scheduling)
Process scheduling (CPU Scheduling)Process scheduling (CPU Scheduling)
Process scheduling (CPU Scheduling)
 
OS - Process Concepts
OS - Process ConceptsOS - Process Concepts
OS - Process Concepts
 
Operating systems system structures
Operating systems   system structuresOperating systems   system structures
Operating systems system structures
 
Introduction to Operating Systems
Introduction to Operating SystemsIntroduction to Operating Systems
Introduction to Operating Systems
 
Cisco cybersecurity essentials chapter 8
Cisco cybersecurity essentials chapter 8Cisco cybersecurity essentials chapter 8
Cisco cybersecurity essentials chapter 8
 
Cisco cybersecurity essentials chapter - 6
Cisco cybersecurity essentials chapter - 6Cisco cybersecurity essentials chapter - 6
Cisco cybersecurity essentials chapter - 6
 

Recently uploaded

Introduction to IEEE STANDARDS and its different types.pptx
Introduction to IEEE STANDARDS and its different types.pptxIntroduction to IEEE STANDARDS and its different types.pptx
Introduction to IEEE STANDARDS and its different types.pptxupamatechverse
 
(ANVI) Koregaon Park Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...
(ANVI) Koregaon Park Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...(ANVI) Koregaon Park Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...
(ANVI) Koregaon Park Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...ranjana rawat
 
(ANJALI) Dange Chowk Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...
(ANJALI) Dange Chowk Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...(ANJALI) Dange Chowk Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...
(ANJALI) Dange Chowk Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...ranjana rawat
 
UNIT-II FMM-Flow Through Circular Conduits
UNIT-II FMM-Flow Through Circular ConduitsUNIT-II FMM-Flow Through Circular Conduits
UNIT-II FMM-Flow Through Circular Conduitsrknatarajan
 
VIP Call Girls Service Kondapur Hyderabad Call +91-8250192130
VIP Call Girls Service Kondapur Hyderabad Call +91-8250192130VIP Call Girls Service Kondapur Hyderabad Call +91-8250192130
VIP Call Girls Service Kondapur Hyderabad Call +91-8250192130Suhani Kapoor
 
(MEERA) Dapodi Call Girls Just Call 7001035870 [ Cash on Delivery ] Pune Escorts
(MEERA) Dapodi Call Girls Just Call 7001035870 [ Cash on Delivery ] Pune Escorts(MEERA) Dapodi Call Girls Just Call 7001035870 [ Cash on Delivery ] Pune Escorts
(MEERA) Dapodi Call Girls Just Call 7001035870 [ Cash on Delivery ] Pune Escortsranjana rawat
 
Coefficient of Thermal Expansion and their Importance.pptx
Coefficient of Thermal Expansion and their Importance.pptxCoefficient of Thermal Expansion and their Importance.pptx
Coefficient of Thermal Expansion and their Importance.pptxAsutosh Ranjan
 
Porous Ceramics seminar and technical writing
Porous Ceramics seminar and technical writingPorous Ceramics seminar and technical writing
Porous Ceramics seminar and technical writingrakeshbaidya232001
 
Microscopic Analysis of Ceramic Materials.pptx
Microscopic Analysis of Ceramic Materials.pptxMicroscopic Analysis of Ceramic Materials.pptx
Microscopic Analysis of Ceramic Materials.pptxpurnimasatapathy1234
 
MANUFACTURING PROCESS-II UNIT-5 NC MACHINE TOOLS
MANUFACTURING PROCESS-II UNIT-5 NC MACHINE TOOLSMANUFACTURING PROCESS-II UNIT-5 NC MACHINE TOOLS
MANUFACTURING PROCESS-II UNIT-5 NC MACHINE TOOLSSIVASHANKAR N
 
UNIT-III FMM. DIMENSIONAL ANALYSIS
UNIT-III FMM.        DIMENSIONAL ANALYSISUNIT-III FMM.        DIMENSIONAL ANALYSIS
UNIT-III FMM. DIMENSIONAL ANALYSISrknatarajan
 
High Profile Call Girls Nagpur Isha Call 7001035870 Meet With Nagpur Escorts
High Profile Call Girls Nagpur Isha Call 7001035870 Meet With Nagpur EscortsHigh Profile Call Girls Nagpur Isha Call 7001035870 Meet With Nagpur Escorts
High Profile Call Girls Nagpur Isha Call 7001035870 Meet With Nagpur Escortsranjana rawat
 
KubeKraft presentation @CloudNativeHooghly
KubeKraft presentation @CloudNativeHooghlyKubeKraft presentation @CloudNativeHooghly
KubeKraft presentation @CloudNativeHooghlysanyuktamishra911
 
Top Rated Pune Call Girls Budhwar Peth ⟟ 6297143586 ⟟ Call Me For Genuine Se...
Top Rated  Pune Call Girls Budhwar Peth ⟟ 6297143586 ⟟ Call Me For Genuine Se...Top Rated  Pune Call Girls Budhwar Peth ⟟ 6297143586 ⟟ Call Me For Genuine Se...
Top Rated Pune Call Girls Budhwar Peth ⟟ 6297143586 ⟟ Call Me For Genuine Se...Call Girls in Nagpur High Profile
 
Booking open Available Pune Call Girls Koregaon Park 6297143586 Call Hot Ind...
Booking open Available Pune Call Girls Koregaon Park  6297143586 Call Hot Ind...Booking open Available Pune Call Girls Koregaon Park  6297143586 Call Hot Ind...
Booking open Available Pune Call Girls Koregaon Park 6297143586 Call Hot Ind...Call Girls in Nagpur High Profile
 
Sheet Pile Wall Design and Construction: A Practical Guide for Civil Engineer...
Sheet Pile Wall Design and Construction: A Practical Guide for Civil Engineer...Sheet Pile Wall Design and Construction: A Practical Guide for Civil Engineer...
Sheet Pile Wall Design and Construction: A Practical Guide for Civil Engineer...Dr.Costas Sachpazis
 
Call Girls Service Nagpur Tanvi Call 7001035870 Meet With Nagpur Escorts
Call Girls Service Nagpur Tanvi Call 7001035870 Meet With Nagpur EscortsCall Girls Service Nagpur Tanvi Call 7001035870 Meet With Nagpur Escorts
Call Girls Service Nagpur Tanvi Call 7001035870 Meet With Nagpur EscortsCall Girls in Nagpur High Profile
 
SPICE PARK APR2024 ( 6,793 SPICE Models )
SPICE PARK APR2024 ( 6,793 SPICE Models )SPICE PARK APR2024 ( 6,793 SPICE Models )
SPICE PARK APR2024 ( 6,793 SPICE Models )Tsuyoshi Horigome
 
Call for Papers - Educational Administration: Theory and Practice, E-ISSN: 21...
Call for Papers - Educational Administration: Theory and Practice, E-ISSN: 21...Call for Papers - Educational Administration: Theory and Practice, E-ISSN: 21...
Call for Papers - Educational Administration: Theory and Practice, E-ISSN: 21...Christo Ananth
 

Recently uploaded (20)

Introduction to IEEE STANDARDS and its different types.pptx
Introduction to IEEE STANDARDS and its different types.pptxIntroduction to IEEE STANDARDS and its different types.pptx
Introduction to IEEE STANDARDS and its different types.pptx
 
(ANVI) Koregaon Park Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...
(ANVI) Koregaon Park Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...(ANVI) Koregaon Park Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...
(ANVI) Koregaon Park Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...
 
(ANJALI) Dange Chowk Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...
(ANJALI) Dange Chowk Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...(ANJALI) Dange Chowk Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...
(ANJALI) Dange Chowk Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...
 
UNIT-II FMM-Flow Through Circular Conduits
UNIT-II FMM-Flow Through Circular ConduitsUNIT-II FMM-Flow Through Circular Conduits
UNIT-II FMM-Flow Through Circular Conduits
 
VIP Call Girls Service Kondapur Hyderabad Call +91-8250192130
VIP Call Girls Service Kondapur Hyderabad Call +91-8250192130VIP Call Girls Service Kondapur Hyderabad Call +91-8250192130
VIP Call Girls Service Kondapur Hyderabad Call +91-8250192130
 
(MEERA) Dapodi Call Girls Just Call 7001035870 [ Cash on Delivery ] Pune Escorts
(MEERA) Dapodi Call Girls Just Call 7001035870 [ Cash on Delivery ] Pune Escorts(MEERA) Dapodi Call Girls Just Call 7001035870 [ Cash on Delivery ] Pune Escorts
(MEERA) Dapodi Call Girls Just Call 7001035870 [ Cash on Delivery ] Pune Escorts
 
Coefficient of Thermal Expansion and their Importance.pptx
Coefficient of Thermal Expansion and their Importance.pptxCoefficient of Thermal Expansion and their Importance.pptx
Coefficient of Thermal Expansion and their Importance.pptx
 
Porous Ceramics seminar and technical writing
Porous Ceramics seminar and technical writingPorous Ceramics seminar and technical writing
Porous Ceramics seminar and technical writing
 
DJARUM4D - SLOT GACOR ONLINE | SLOT DEMO ONLINE
DJARUM4D - SLOT GACOR ONLINE | SLOT DEMO ONLINEDJARUM4D - SLOT GACOR ONLINE | SLOT DEMO ONLINE
DJARUM4D - SLOT GACOR ONLINE | SLOT DEMO ONLINE
 
Microscopic Analysis of Ceramic Materials.pptx
Microscopic Analysis of Ceramic Materials.pptxMicroscopic Analysis of Ceramic Materials.pptx
Microscopic Analysis of Ceramic Materials.pptx
 
MANUFACTURING PROCESS-II UNIT-5 NC MACHINE TOOLS
MANUFACTURING PROCESS-II UNIT-5 NC MACHINE TOOLSMANUFACTURING PROCESS-II UNIT-5 NC MACHINE TOOLS
MANUFACTURING PROCESS-II UNIT-5 NC MACHINE TOOLS
 
UNIT-III FMM. DIMENSIONAL ANALYSIS
UNIT-III FMM.        DIMENSIONAL ANALYSISUNIT-III FMM.        DIMENSIONAL ANALYSIS
UNIT-III FMM. DIMENSIONAL ANALYSIS
 
High Profile Call Girls Nagpur Isha Call 7001035870 Meet With Nagpur Escorts
High Profile Call Girls Nagpur Isha Call 7001035870 Meet With Nagpur EscortsHigh Profile Call Girls Nagpur Isha Call 7001035870 Meet With Nagpur Escorts
High Profile Call Girls Nagpur Isha Call 7001035870 Meet With Nagpur Escorts
 
KubeKraft presentation @CloudNativeHooghly
KubeKraft presentation @CloudNativeHooghlyKubeKraft presentation @CloudNativeHooghly
KubeKraft presentation @CloudNativeHooghly
 
Top Rated Pune Call Girls Budhwar Peth ⟟ 6297143586 ⟟ Call Me For Genuine Se...
Top Rated  Pune Call Girls Budhwar Peth ⟟ 6297143586 ⟟ Call Me For Genuine Se...Top Rated  Pune Call Girls Budhwar Peth ⟟ 6297143586 ⟟ Call Me For Genuine Se...
Top Rated Pune Call Girls Budhwar Peth ⟟ 6297143586 ⟟ Call Me For Genuine Se...
 
Booking open Available Pune Call Girls Koregaon Park 6297143586 Call Hot Ind...
Booking open Available Pune Call Girls Koregaon Park  6297143586 Call Hot Ind...Booking open Available Pune Call Girls Koregaon Park  6297143586 Call Hot Ind...
Booking open Available Pune Call Girls Koregaon Park 6297143586 Call Hot Ind...
 
Sheet Pile Wall Design and Construction: A Practical Guide for Civil Engineer...
Sheet Pile Wall Design and Construction: A Practical Guide for Civil Engineer...Sheet Pile Wall Design and Construction: A Practical Guide for Civil Engineer...
Sheet Pile Wall Design and Construction: A Practical Guide for Civil Engineer...
 
Call Girls Service Nagpur Tanvi Call 7001035870 Meet With Nagpur Escorts
Call Girls Service Nagpur Tanvi Call 7001035870 Meet With Nagpur EscortsCall Girls Service Nagpur Tanvi Call 7001035870 Meet With Nagpur Escorts
Call Girls Service Nagpur Tanvi Call 7001035870 Meet With Nagpur Escorts
 
SPICE PARK APR2024 ( 6,793 SPICE Models )
SPICE PARK APR2024 ( 6,793 SPICE Models )SPICE PARK APR2024 ( 6,793 SPICE Models )
SPICE PARK APR2024 ( 6,793 SPICE Models )
 
Call for Papers - Educational Administration: Theory and Practice, E-ISSN: 21...
Call for Papers - Educational Administration: Theory and Practice, E-ISSN: 21...Call for Papers - Educational Administration: Theory and Practice, E-ISSN: 21...
Call for Papers - Educational Administration: Theory and Practice, E-ISSN: 21...
 

The Seven Layers of the OSI Reference Model

  • 2. • Over the past couple of decades many of the networks that were built used different hardware and software implementations, as a result they were incompatible and it became difficult for networks using different specifications to communicate with each other. • To address the problem of networks being incompatible and unable to communicate with each other, the International Organisation for Standardisation (ISO) researched various network schemes. • The ISO recognised there was a need to create a NETWORK MODEL that would help vendors create interoperable network implementations.
  • 3. • A reference model is a conceptual layout that describes how communication between devices should occur. A reference model has many advantages such as it defines standards for building network components thereby permitting multiple-vendor development and also defines which functions should be performed at each layer of the model thereby promoting the standardization of network.
  • 4. • In 1984 in order to aid network interconnection without necessarily requiring complete redesign, the Open Systems Interconnection (OSI) reference model was approved as an international standard for communications architecture. • The Open Systems Interconnection (OSI) reference model is a descriptive network scheme. It ensures greater compatibility and interoperability between various types of network technologies. • The OSI model describes how information or data makes its way from application programmes (such as spreadsheets) through a network medium (such as wire) to another application programme located on another network. • The OSI reference model divides the problem of moving information between computers over a network medium into SEVEN smaller and more manageable problems.
  • 5. In 1983, Day and Zimmerman laid down certain principles that were applied to arrive at the seven layers can be briefly summarized as follows:  A layer should be created where a different abstraction is needed.  Each layer should perform a well-defined function.  The function of each layer should be chosen with an eye toward defining internationally standardized protocols.  The layer boundaries should be chosen to minimize the information flow across the interfaces.  The number of layers should be large enough that distinct functions need not be thrown together in the same layer out of necessity and small enough that the architecture does not become unwieldy
  • 6.
  • 7.
  • 8. 8
  • 9. Layer 5 Layer 6 Layer 7 Application Presentation Session Application DATADATA Format When to start Signaling 9Mukesh Chinta, Asst Prof, CSE
  • 10. Transport Network Data Link PhysicalLayer 1 Layer 2 Layer 3 Layer 4 Reliability 0101 0101 Data transmission at the node interval Routing Physical connection
  • 11. 11 Provides physical interface for transmission of information. Defines rules by which bits are passed from one system to another on a physical communication medium. Covers all - mechanical, electrical, functional and procedural - aspects for physical communication. Such characteristics as voltage levels, timing of voltage changes, physical data rates, maximum transmission distances, physical connectors, and other similar attributes are defined by physical layer specifications.
  • 12. The physical layer is responsible for movements of individual bits from one hop (node) to the next. 12
  • 13. Data link layer attempts to provide reliable communication over the physical layer interface. Breaks the outgoing data into frames and reassemble the received frames. Create and detect frame boundaries. Handle errors by implementing an acknowledgement and retransmission scheme. Implement flow control. Supports point-to-point as well as broadcast communication. A special sublayer Medium access control sublayer deals with the problem of access control of shared channel. 13
  • 14. The data link layer is responsible for moving frames from one hop (node) to the next. 14
  • 15. 15
  • 16. 16 Implements routing of frames (packets) through the network. Defines the most optimum path the packet should take from the source to the destination Defines logical addressing so that any endpoint can be identified. Handles congestion and Quality of service issues in the network. Facilitates interconnection between heterogeneous networks (Internetworking). The network layer also defines how to fragment a packet into smaller packets to accommodate different media. In broadcast networks, the network layer is thin(nonexistent)
  • 17. The network layer is responsible for the delivery of individual packets from the source host to the destination host.
  • 18.
  • 19. 19 Purpose of this layer is to provide a reliable mechanism for the exchange of data between two processes in different computers. Accepts data from above, split into smaller units in needed Ensures that the data units are delivered error free. Ensures that data units are delivered in sequence. Ensures that there is no loss or duplication of data units. Provides connectionless or connection oriented service. Provides for the connection management. Multiplex multiple connection over a single channel.
  • 20. The transport layer is responsible for the delivery of a message from one process to another.
  • 21.
  • 22. 22 Session layer provides mechanism for controlling the dialogue between the two end systems. It defines how to start, control and end conversations (called sessions) between applications. This layer requests for a logical connection to be established on an end-user’s request. Responsible for maintenance and termination of sessions. Token Management: Prevents two parties from attempting the same critical operation simulatenously. This layer provides services like dialogue discipline which can be full duplex or half duplex: dialog control Session layer can also provide check-pointing mechanism such that if a failure of some sort occurs between checkpoints, all data can be retransmitted from the last checkpoint: Synchronization.
  • 23. The session layer is responsible for dialog control and synchronization.
  • 24. 24 Presentation layer defines the format in which the data is to be exchanged between the two communicating entities. It deals with syntax and semantics of the information transmitted. Also handles data compression and data encryption (cryptography). Responsible for protocol conversion, character conversions, data encryption / decryption, expanding graphics commands and data compression
  • 25. • Used for applications specially written to run over the network • Allows access to network services that support applications • Directly represents the services that directly support user applications (e.g., file transfer and email) • What the user sees or does • Contains a variety of protocols that are commonly needed by users 25
  • 26. The application layer is responsible for providing services to the user.
  • 28.
  • 29. 29
  • 30. 30
  • 31. 31
  • 32. 32
  • 33. Meet the Protocol Family in the Internet DNS IP QoS Winsock SMTP NTCIP POP3 SLIP tester developer administrator OSPF BGPRTP WWW
  • 34.  TCP/IP originated out of the investigative research into networking protocols that the US Department of Defense (DoD) initiated in 1969. In 1968, the DoD Advanced Research Projects Agency (ARPA) began researching the network technology that is called packet switching.  The network that was initially constructed as a result of this research to provide a communication that could function in wartime., then called ARPANET, gradually became known as the Internet. The TCP/IP protocols played an important role in the development of the Internet. In the early 1980s, the TCP/IP protocols were developed. In 1983, they became standard protocols for ARPANET.  Because of the history of the TCP/IP protocol suite, it's often referred to as the DoD protocol suite or the Internet protocol suite 34
  • 35. 35 The Internet Protocol Suite (commonly known as TCP/IP) is the set of communications protocols used for the Internet and other similar networks. It is named from two of the most important protocols in it: the Transmission Control Protocol (TCP) The Internet Protocol (IP), which were the first two networking protocols defined in this standard.
  • 36. 36
  • 37. TCP/IP Network Architecture Application Layer Transport Layer Network Layer Link Layer operating-system/computer-architecture independent LAN/MAN/WAN applicable physical-medium independent host host network network media media process process client-server model
  • 38. TCP/IP Protocol Suite Ethernet ARP RARP IPv4 IPv6 TCP UDP ICMP TelnetFTPping SNMP TFTP Serial line PPP SMTP POP3 21 23 11025 69161 port number IP address
  • 40.  The internet layer is the linchpin that holds the whole architecture together. Its job is to permit hosts to inject packets into any network and have them travel independently to the destination (potentially on a different network).  Internet Protocol (IP) is the most important protocol in this layer. It is a connectionless protocol and does not provide reliability, flow control, or error recovery. IP provides a routing function that attempts to deliver transmitted messages to their destination.  A message unit in an IP network is called an IP datagram. This is the basic unit of information transmitted across TCP/IP networks.  Other internetwork-layer protocols are ICMP {Internet Control Message Protocol}, IGMP {Internet Group Management Protocol}, ARP {Address Resolution Protocol}, and RARP {Reverse ARP}. 40
  • 41.  Transport layer (host-to-host) is designed to allow peer entities on the source and destination hosts to carry on a conversation, just as in the OSI transport layer. Two end-to-end transport protocols namely TCP {Transmission Control Protocol} and UDP {User Datagram Protocol} have been defined.  TCP is a reliable connection-oriented protocol that permits a byte stream originating on one machine to be transported without error on any machine in the internet. It divides the incoming byte stream into discrete message and passes each one onto the internet layer. It reassembles these messages at the receiver. It also handles flow control.  UDP is an unreliable, connectionless protocol for applications that do not want TCP's sequencing or flow control and wish to provide their own. It is also widely used for one-shot, client-server-type request-reply queries and applications in which prompt delivery is more important than accurate delivery, such as transmitting speech or video. 41
  • 42. 42  The network interface layer, also called the link layer or the data-link layer, is the interface to the actual network hardware. This interface may or may not provide reliable delivery, and may be packet or stream oriented. In fact, TCP/IP does not specify any protocol here, but can use almost any network interface available, which illustrates the flexibility of the IP layer.  Examples are IEEE 802.2, X.25, ATM, FDDI, and even SNA.  It varies from implementation to implementation with vendors supplying their own version
  • 43. • The Application layer is equivalent to the combined OSI session, presentation and Application Layers. • All the functions handled by these 3 layers in the OSI model are handled by the Application layer in TCP/IP model. • It provides a way for applications to have access to networked services. • The Application Layer has the responsibility for authentication, data compression, and end-user services such as terminal emulation, file transfer, e-mail, web browsing/serving, and other network control and management services. An application header and following data are packaged as a message • Application layer is present on the top of the Transport layer. It includes all the higher-level protocols which are virtual terminal (TELNET), file transfer (FTP), electronic mail (SMTP) & HTTP (Hyper Text Transfer Protocol) 43
  • 44. • IMAP4 - Internet Mail Access Protocol version 4 lets clients access an IMAP4 mail server to download their e-mail to a local computer program. It works using TCP as its transport protocol. • FTP - File Transfer Protocol uses TCP as transport and allows the transfer of files between two computer systems with login required by the requester. • Telnet – Sometimes incorrectly called Terminal Emulation across a network, it is used to remotely open a session on another computer acting as a server. It relies on TCP for transport. • SMTP - Simple Mail Transfer Protocol is a TCP-transported application layer protocol used to send electronic mail. • HTTP - Hypertext Transfer Protocol uses the TCP transport protocol to carry web browsing requests to a web server, and web pages from web servers to web browsers. • POP3 - Post Office Protocol version 3 uses TCP as a way to offer clients access to a POP3 mail server to transfer their e-mail to a local program on their computer. • BGP4 - Border Gateway Protocol version 4 is a routing protocol most often used between organizations. Two routers using BGP will establish a TCP connection to send each other their BGP routing tables. In that exchange is information about reachable networks including the full path to all BGP-known networks. 44
  • 45. • DNS3 - Domain Names System provides the ability to refer to IP devices using names instead of numerical IP addresses. It lets Domain Name Servers resolve these names to their corresponding IP addresses. • DHCP - Dynamic Host Configuration Protocol uses UDP as its transport protocol to dynamically and automatically assign IP addresses and other networking configuration information to computers starting up on a given network. • TFTP - Trivial File Transfer Protocol is a UDP-transported protocol that allows file transfer between two computers with no login or user required for its limited use. • SNMP - Simple Network Management Protocol is used to manage all types of network elements based on various data sent and received using UDP as its transport protocol. • RIP2 - Routing Information Protocol is an internal routing protocol used to dynamically update router tables on internal organization networks. It uses UDP as its transport protocol. 45
  • 46. • ARP - Address Resolution Protocol supports the packaging of IP data into Ethernet frames. It finds the local Ethernet (MAC) address that matches a specific local IP address. • ICMP4 - Internet Control Message Protocol provides diagnostics and logical error reporting to help manage the sending of data between computers. Its best-known function is ping. • IGMP - Internet Group Management Protocol supports multicasting by letting multicast routers track group memberships on each of its connected networks. • IPsec - Internet Protocol Security is an end-to-end security scheme for securing Internet Protocol (IP) communications by authenticating and encrypting each IP packet of a communication session. 46
  • 47. • IP4 - Internet Protocol provides connectionless communication support for all protocols’ data, except ARP, by packaging that data into an IP datagram. • OSPF - Open Shortest Path First is an internal routing protocol for use inside an organization. It checks the function of its link to each of its neighbor OSPF routers. Then, it sends the acquired routing information to those neighbor routers. • EIGRP - Enhanced Interior Gateway Routing Protocol is a local routing protocol that is proprietary to Cisco. It is an advanced distance-vector routing protocol that shares internal organizational routing information found in three tables. 47
  • 48. • The application layer in TCP/IP handles the responsibilities of multiple layers in the OSI model. • The OSI model numbers and names its layers, whereas the TCP/IP stack only names the layers. • Unlike the transport layer in OSI, TCP/IP only guarantees reliable delivery of packets when TCP is the chosen protocol. • OSI has much more complexity in its 7 layers than TCP/IP has in its 4 layers. • In TCP/IP, protocols are deliberately designed to have more layer flexibility than the strict layers of the OSI model. • TCP/IP functions are implemented, then standardized. OSI is standardized in concept only, though some functions work. • OSI has more limited Network Management and Network Security. 48