The OSI Model and the TCP/IP Protocol Suite

Similar documents
The OSI Model and the TCP/IP Protocol Suite PROTOCOL LAYERS. Hierarchy. Services THE OSI MODEL

524 Computer Networks

The OSI and TCP/IP Models. Lesson 2

EITF25 Internet Techniques and Applications L5: Wide Area Networks (WAN) Stefan Höst

Basic Networking Concepts. 1. Introduction 2. Protocols 3. Protocol Layers 4. Network Interconnection/Internet

Networking Test 4 Study Guide

Protocol Data Units and Encapsulation

Protocols and Architecture. Protocol Architecture.

Layered Architectures and Applications

CPS221 Lecture: Layered Network Architecture

Computer Networks CS321

DATA COMMUNICATION (Basics of data communication, OSI layers.)

Objectives of Lecture. Network Architecture. Protocols. Contents

ELEC3030 (EL336) Computer Networks. How Networks Differ. Differences that can occur at network layer, which makes internetworking difficult:

THE OSI REFERENCE MODEL LES M C LELLAN DEAN WHITTAKER SANDY WORKMAN

Mathatma Gandhi University

How To Design A Layered Network In A Computer Network

The OSI model has seven layers. The principles that were applied to arrive at the seven layers can be briefly summarized as follows:

How To Understand The Layered Architecture Of A Network

EE4367 Telecom. Switching & Transmission. Prof. Murat Torlak

Data Communication Networks and Converged Networks

Computer Network. Interconnected collection of autonomous computers that are able to exchange information

Indian Institute of Technology Kharagpur. TCP/IP Part I. Prof Indranil Sengupta Computer Science and Engineering Indian Institute of Technology

Transport and Network Layer

The OSI Model: Understanding the Seven Layers of Computer Networks

Data Communication Networks

Protocol Architecture

OSI Reference Model: An Overview

Lecture 28: Internet Protocols

IP Networking. Overview. Networks Impact Daily Life. IP Networking - Part 1. How Networks Impact Daily Life. How Networks Impact Daily Life

Module 1. Introduction. Version 2 CSE IIT, Kharagpur

Computer Networks Vs. Distributed Systems

Understanding TCP/IP. Introduction. What is an Architectural Model? APPENDIX

Overview of Computer Networks

Transport Layer Protocols

Mobile IP Network Layer Lesson 02 TCP/IP Suite and IP Protocol

Zarządzanie sieciami telekomunikacyjnymi

Overview. Securing TCP/IP. Introduction to TCP/IP (cont d) Introduction to TCP/IP

Ethernet. Ethernet. Network Devices

Internet Packets. Forwarding Datagrams

2. What is the maximum value of each octet in an IP address? A. 128 B. 255 C. 256 D. None of the above

Unit 1. Introduction to data communications and networking NETWORKING FUNDAMENTALS

THE TCP/IP PROTOCOL SUITE

Communications and Computer Networks

Communication Networks. MAP-TELE 2011/12 José Ruela

PART OF THE PICTURE: The TCP/IP Communications Architecture

Data Communication and Computer Network

NETWORK DRIVE MAPPING, SHARING,TESTING AND AN IMPLEMENTATION BY WRITING A PROGRAM TO RETRIEVE THE DATA FILE FROM A NETWORK DRIVE OF ANOTHER COMPUTER.

Note! The problem set consists of two parts: Part I: The problem specifications pages Part II: The answer pages

Security (II) ISO : Security Architecture of OSI Reference Model. Outline. Course Outline: Fundamental Topics. EE5723/EE4723 Spring 2012

Computer Networking: A Survey

ESSENTIALS. Understanding Ethernet Switches and Routers. April 2011 VOLUME 3 ISSUE 1 A TECHNICAL SUPPLEMENT TO CONTROL NETWORK

UPPER LAYER SWITCHING

FIREWALLS & NETWORK SECURITY with Intrusion Detection and VPNs, 2 nd ed. Chapter 2 An Introduction to Networking

SFWR 4C03: Computer Networks & Computer Security Jan 3-7, Lecturer: Kartik Krishnan Lecture 1-3

Chapter 9. IP Secure

DATA COMMUNICATION AND NETWORKS

Mobile IP Network Layer Lesson 01 OSI (open systems interconnection) Seven Layer Model and Internet Protocol Layers

Introduction To Computer Networking

Protocol Specification & Design. The Internet and its Protocols. Course Outline (trivia) Introduction to the Subject Teaching Methods

CSE 3461 / 5461: Computer Networking & Internet Technologies

CS335 Sample Questions for Exam #2

TCP/IP and the Internet

The OSI & Internet layering models

Guide to Network Defense and Countermeasures Third Edition. Chapter 2 TCP/IP

Network Models OSI vs. TCP/IP

Computer Networks/DV2 Lab

Communication Networks. MAP-TELE 2011/12 José Ruela

Lecture (02) Networking Model (TCP/IP) Networking Standard (OSI) (I)

ICS 153 Introduction to Computer Networks. Inst: Chris Davison

Oct 15, Internet : the vast collection of interconnected networks that all use the TCP/IP protocols

RARP: Reverse Address Resolution Protocol

Protocols. Packets. What's in an IP packet

Transport Layer. Chapter 3.4. Think about

Network Models and Protocols

A PPENDIX L TCP/IP and OSI

Final for ECE374 05/06/13 Solution!!

Data Link Protocols. TCP/IP Suite and OSI Reference Model

CSCI 362 Computer and Network Security

Chapter 11. User Datagram Protocol (UDP)

OSI Model. Application Presentation Session Transport Network Data Link Physical. EE156 Computer Network Architecture

CCNA R&S: Introduction to Networks. Chapter 5: Ethernet

Datagram-based network layer: forwarding; routing. Additional function of VCbased network layer: call setup.

First Semester Examinations 2011/12 INTERNET PRINCIPLES

Network Security 網 路 安 全. Lecture 1 February 20, 2012 洪 國 寶

Chapter 2 - The TCP/IP and OSI Networking Models

Course Overview: Learn the essential skills needed to set up, configure, support, and troubleshoot your TCP/IP-based network.

Internetworking and Internet-1. Global Addresses

CCNA 1: Networking Basics. Cisco Networking Academy Program Version 3.0

IP Addressing. -Internetworking (with TCP/IP) -Classful addressing -Subnetting and Supernetting -Classless addressing

IT Data Communication and Networks (Optional)

Chapter 5. Data Communication And Internet Technology

LESSON Networking Fundamentals. Understand TCP/IP

First Workshop on Open Source and Internet Technology for Scientific Environment: with case studies from Environmental Monitoring

Wide Area Networks. Learning Objectives. LAN and WAN. School of Business Eastern Illinois University. (Week 11, Thursday 3/22/2007)

Topics. Computer Networks. Let s Get Started! Computer Networks: Our Definition. How are Networks Used by Computers? Computer Network Components

E-Commerce Security. The Client-Side Vulnerabilities. Securing the Data Transaction LECTURE 7 (SECURITY)

Internetworking. Problem: There is more than one network (heterogeneity & scale)

MANAGEMENT INFORMATION SYSTEMS 8/E

Transcription:

The OSI Model and the TCP/IP Protocol Suite

To discuss the idea of multiple layering in data communication and networking and the interrelationship between layers. To discuss the OSI model and its layer architecture and to show the interface between the layers. To briefly discuss the functions of each layer in the OSI model. To introduce the TCP/IP protocol suite and compare its layers with the ones in the OSI model. To show the functionality of each layer in the TCP/IP protocol with some examples. To discuss the addressing mechanism used in some layers of the TCP/IP protocol suite for the delivery of a message from the source to the destination.

Example Assume Maria and Ann are neighbors with a lot of common ideas. However, Maria speaks only Spanish, and Ann speaks only English. Since both have learned the sign language in their childhood, they enjoy meeting in a cafe a couple of days per week and exchange their ideas using signs. Occasionally, they also use a bilingual dictionary. Communication is face to face and Happens in one layer as shown in Fig.

Example Now assume that Ann has to move to another town because of her job. Before she moves, the two meet for the last time in the same cafe. Although both are sad, Maria surprises Ann when she opens a packet that contains two small machines. The first machine can scan and transform a letter in English to a secret code or vice versa. The other machine can scan and translate a letter in Spanish to the same secret code or vice versa. Ann takes the first machine; Maria keeps the second one. The two friends can still communicate using the secret code, as shown in Fig.

THE OSI MODEL Established in 1947, the International Standards Organization (ISO) is a multinational body dedicated to worldwide agreement on international standards. Almost three-fourths of countries in the world are represented in the ISO. An ISO standard that covers all aspects of network communications is the Open Systems Interconnection (OSI) model. It was first introduced in the late 1970s.

Topics Discussed in the Section Layered Architecture Layer-to-layer Communication Encapsulation Layers in the OSI Model

Note ISO is the organization; OSI is the model.

The OSI model

OSI layers

An exchange using the OSI model

Note The physical layer is responsible for moving individual bits from one (node) to the next.

Summary of OSI Layers

A private internet

Communication at the physical layer Legend Source Destination Physical layer A R1 R3 R4 B Physical layer Link 1 Link 3 Link 5 Link 6 011... 101 011... 101 011... 101 011... 101

Note The unit of communication at the physical layer is a bit.

Communication at the data link layer Legend Source Destination D Data H Header A R1 R3 R4 B Data link Data link Physical Link 1 Link 3 Link 5 Link 6 Physical D2 H2 Frame D2 H2 Frame D2 H2 Frame D2 H2 Frame

Note The unit of communication at the data link layer is a frame.

Communication at the network layer Legend Source Destination D Data H Header A R1 R3 R4 B Network Network Data link Data link Physical Physical D3 H3 Datagram D3 H3 Datagram

Note The unit of communication at the network layer is a datagram.

Communication at transport layer Transport A Legend Source Destination D Data R1 R3 R4 H Header B Transport Network Network Data link Data link Physical Physical D4 H4 Segment D4 H4 Segment

Note The unit of communication at the transport layer is a segment, user datagram, or a packet, depending on the specific protocol used in this layer.

Communication at application layer A B Application Legend Source Destination D Data H Header Application Transport Network Data link Physical R1 R3 R4 Transport Network Data link Physical D5 D5 Message D5 D5 Message

Note The unit of communication at the application layer is a message.

Responsible for movement of data from one node to another node. Concerned with Physical Characteristics of the medium Representation of bits- Electrical, Electromagnetic, Optical Data rate Line Configuration Synchronization Physical Topology Transmission Mode- Simplex, Duplex, Half Duplex McGraw-Hill The McGraw-Hill Companies, Inc., 2000

Physical Layer

Responsible for moving frames from one node to the other- Next hop delivery Framing- divides the data from N/W layer into frames Physical Addressing- Sender and Rx if the Rx is within the N/W, otherwise next hop addressing. Data Flow Control on the sender Error detection/control with the use of trailer Access control- in case of Multi Link system

Data Link Layer

Source to Destination Delivery of Packets Not required in peer-to-peer delivery Adds Logical addresses of sender and Rx. Routing for internetwork communication.

Network Layer

A B 10 Medium 85 T2 DATA A P 10 20 99 F R 20 G RING N T2 DATA A P 99 33 45 33 R 66 P T2 DATA A P 66 95 M 95 Medium 77

Process to Process Delivery of message b/w Tx & Rx Create connection b/w two end ports for sake of security. Service Point or Port Addressing Yahoo Messenger Segmentation and Reassembly- Divide the message received from Session layer in to Segments and number them to make a sequence for reassembly at the receiving side Flow Control End to End rather than across a link. Controls duplication of message Connection Control Connection Oriented Transport Layer, like Telephone Connectionless Transport Layer, like E-Mail Error Control End to End rather than across a link. Sending transport layer makes ensure that the entire message arrives at the receiving transport layer without error.

A P DATA J K TL TL DATA J K DATA 2 J k A P DATA 1 J k A P NL NL DATA 1 J k A P DATA 2 J k A P T2 T2 DLL DATA 2 J k A P H2 DATA 1 J k A P H2 DLL T2 T2 DATA 1 J k A P H2 DATA 2 J k A P H2 INTERNET

Network dialog controller. Establishes, maintains and Synchronizes interaction b/w comm. systems Dialog Controlling Half Duplex or Full Duplex Synchronization Allows a process to add checkpoints to a stream of data

From PL L6 Data To PL L6 Data H5 H5 Session Layer Session Layer Syn Syn L5 Data To TL L5 Data From TL

Concerned with Syntax and Semantics of the information exchanged b/w the two communication systems Translation Encoding and Decoding Sender to Common format on Sending side Common to Receiving format on Rx side Encryption for security and privacy purpose Compression reducing the number of bits to sent over network.

From AL To AL L7 Data L7 Data Encoded, Encrypted and compress Data H6 Decoded, Decrypted and Decompress Data H6 Presentation Layer Presentation Layer Syn L6 Data L6 Data To SL From SL

Provides User interfaces and support for Services, like e-mail, file transfer. Network Virtual terminal File Transfer Access, and Management(FATM) Mail Services Directory Services

User A User B X.500 FATM X.400 X.500 FATM X.400 Application Layer Application Layer L7 Data To PL L7 Data From PL

2-4 ADDRESSING Four levels of addresses are used in an internet employing the TCP/IP protocols: physical address, logical address, port address, and applicationspecific address. Each address is related to a one layer in the TCP/IP architecture, as shown in Figure 2.15.

Topics Discussed in the Section Physical Addresses Logical Addresses Port Addresses Application-Specific Addresses

Figure 2.15 Addresses in the TCP/IP protocol suite

Example 2.3 In Figure 2.16 a node with physical address 10 sends a frame to a node with physical address 87. The two nodes are connected by a link (a LAN). At the data link layer, this frame contains physical (link) addresses in the header. These are the only addresses needed. The rest of the header contains other information needed at this level. As the figure shows, the computer with physical address 10 is the sender, and the computer with physical address 87 is the receiver. The data link layer at the sender receives data from an upper layer. It encapsulates the data in a frame. The frame is propagated through the LAN. Each station with a physical address other than 87 drops the frame because the destination address in the frame does not match its own physical address. The intended destination computer, however, finds a match between the destination address in the frame and its own physical address.

Figure 2.16 Example 2.3: physical addresses 87 10 Data 1 packet accepted 87 10 Data 4

Example 2.4 As we will see in Chapter 3, most local area networks use a 48- bit (6-byte) physical address written as 12 hexadecimal digits; every byte (2 hexadecimal digits) is separated by a colon, as shown below: 07:01:02:01:2C:4B A 6-byte (12 hexadecimal digits) physical address

Example 2.5 Figure 2.17 shows a part of an internet with two routers connecting three LANs. Each device (computer or router) has a pair of addresses (logical and physical) for each connection. In this case, each computer is connected to only one link and therefore has only one pair of addresses. Each router, however, is connected to three networks. So each router has three pairs of addresses, one for each connection. Although it may be obvious that each router must have a separate physical address for each connection, it may not be obvious why it needs a logical address for each connection. We discuss these issues in Chapters 11 and 12 when we discuss routing. The computer with logical address A and physical address 10 needs to send a packet to the computer with logical address P and physical address 95. We use letters to show the logical addresses and numbers for physical addresses, but note that both are actually numbers, as we will see in later chapters.

Figure 2.17 Example 2.5: logical addresses 20 10 A P Data 20 10 A P Data 33 99 A P Data Physical addresses changed 95 66 A P Data 95 66 A P Data 33 99 A P Data Physical addresses changed

Note The physical addresses will change from hop to hop, but the logical addresses remain the same.

Example 2.6 Figure 2.18 shows two computers communicating via the Internet. The sending computer is running three processes at this time with port addresses a, b, and c. The receiving computer is running two processes at this time with port addresses j and k. Process a in the sending computer needs to communicate with process j in the receiving computer. Note that although both computers are using the same application, FTP, for example, the port addresses are different because one is a client program and the other is a server program, as we will see in Chapter 17.

Figure 2.18 Example 2.6: port numbers A Sender Receiver P Data Data a j Data a j Data A P a j Data A P a j Data H2 A P a j Data H2 A P a j Data Internet

Note The physical addresses change from hop to hop, but the logical and port addresses usually remain the same.

Example 2.7 As we will see in future chapters, a port address is a 16-bit address represented by one decimal number as shown. 753 A 16-bit port address represented as one single number