1 OSI MODEL Maninder Kaur

Similar documents
The OSI Model and the TCP/IP Protocol Suite

The OSI Model and the TCP/IP Protocol Suite PROTOCOL LAYERS. Hierarchy. Services THE OSI MODEL

EITF25 Internet Techniques and Applications L5: Wide Area Networks (WAN) Stefan Höst

The OSI and TCP/IP Models. Lesson 2

Networking Test 4 Study Guide

Protocol Data Units and Encapsulation

524 Computer Networks

The OSI model has seven layers. The principles that were applied to arrive at the seven layers can be briefly summarized as follows:

Data Communication and Computer Network

THE OSI REFERENCE MODEL LES M C LELLAN DEAN WHITTAKER SANDY WORKMAN

CPS221 Lecture: Layered Network Architecture

How To Understand The Layered Architecture Of A Network

Module 1. Introduction. Version 2 CSE IIT, Kharagpur

Layered Architectures and Applications

Protocols and Architecture. Protocol Architecture.

The OSI Model: Understanding the Seven Layers of Computer Networks

Computer Networks. Definition of LAN. Connection of Network. Key Points of LAN. Lecture 06 Connecting Networks

Basic Networking Concepts. 1. Introduction 2. Protocols 3. Protocol Layers 4. Network Interconnection/Internet

Ethernet. Ethernet. Network Devices

DATA COMMUNICATION (Basics of data communication, OSI layers.)

Data Communication Networks

Computer Networks CS321

Objectives of Lecture. Network Architecture. Protocols. Contents

Mobile IP Network Layer Lesson 01 OSI (open systems interconnection) Seven Layer Model and Internet Protocol Layers

Transport Layer Protocols

OSI Seven Layers Model Explained with Examples

OSI Reference Model: An Overview

Zarządzanie sieciami telekomunikacyjnymi

Security (II) ISO : Security Architecture of OSI Reference Model. Outline. Course Outline: Fundamental Topics. EE5723/EE4723 Spring 2012

Mathatma Gandhi University

Protocol Architecture

EE4367 Telecom. Switching & Transmission. Prof. Murat Torlak

Computer Network. Interconnected collection of autonomous computers that are able to exchange information

COMMUNICATION NETWORKS WITH LAYERED ARCHITECTURES. Gene Robinson E.A.Robinsson Consulting

FIREWALLS & NETWORK SECURITY with Intrusion Detection and VPNs, 2 nd ed. Chapter 2 An Introduction to Networking

Communication Networks. MAP-TELE 2011/12 José Ruela

Chapter 5. Data Communication And Internet Technology

Computer Networks Vs. Distributed Systems

Understanding TCP/IP. Introduction. What is an Architectural Model? APPENDIX

Overview. Securing TCP/IP. Introduction to TCP/IP (cont d) Introduction to TCP/IP

Lecture 2: Protocols and Layering. CSE 123: Computer Networks Stefan Savage

Written examination in Computer Networks

Data Link Layer Overview

PART OF THE PICTURE: The TCP/IP Communications Architecture

Lecture 28: Internet Protocols

Based on Computer Networking, 4 th Edition by Kurose and Ross

Transport and Network Layer

The OSI & Internet layering models

IP Networking. Overview. Networks Impact Daily Life. IP Networking - Part 1. How Networks Impact Daily Life. How Networks Impact Daily Life

Chapter 2 - The TCP/IP and OSI Networking Models

How To Design A Layered Network In A Computer Network

Guide to TCP/IP, Third Edition. Chapter 3: Data Link and Network Layer TCP/IP Protocols

Internet Packets. Forwarding Datagrams

1 Which network type is a specifically designed configuration of computers and other devices located within a confined area? A Peer-to-peer network

Internet Control Protocols Reading: Chapter 3

Using MIS 3e Chapter 6A Appendix

Computer Networks. Chapter 5 Transport Protocols

Network Security TCP/IP Refresher

UPPER LAYER SWITCHING

ESSENTIALS. Understanding Ethernet Switches and Routers. April 2011 VOLUME 3 ISSUE 1 A TECHNICAL SUPPLEMENT TO CONTROL NETWORK

Three Key Design Considerations of IP Video Surveillance Systems

Data Communication Networks and Converged Networks

TCP/IP works on 3 types of services (cont.): TCP/IP protocols are divided into three categories:

ELEC3030 Computer Networks

Network Security. Chapter 9 Integrating Security Services into Communication Architectures

Overview of Computer Networks

2. What is the maximum value of each octet in an IP address? A. 128 B. 255 C. 256 D. None of the above

LMS. OSI Layers and the Learning Management System. Over view

Transport Layer. Chapter 3.4. Think about

Protocols. Packets. What's in an IP packet

CSE 3461 / 5461: Computer Networking & Internet Technologies

Tutorial.

Unit 1. Introduction to data communications and networking NETWORKING FUNDAMENTALS

DATA COMMUNICATION AND NETWORKS

First Semester Examinations 2011/12 INTERNET PRINCIPLES

Local-Area Network -LAN

COMPUTER NETWORKS SECOND EDITION. ANDREW S.fjANENBAUM. Vrije Universiteit Amsterdam, The Netherlands. Nachrichtentechnische Bib'iothek THD Inv.

Introduction to WAN Technologies

Note! The problem set consists of two parts: Part I: The problem specifications pages Part II: The answer pages

E-Commerce Security. The Client-Side Vulnerabilities. Securing the Data Transaction LECTURE 7 (SECURITY)

CCNA R&S: Introduction to Networks. Chapter 5: Ethernet

Introduction To Computer Networking

High-Level Data Link Control

SFWR 4C03: Computer Networks & Computer Security Jan 3-7, Lecturer: Kartik Krishnan Lecture 1-3

Introduction to Networking and the OSI Model

IT Data Communication and Networks (Optional)

ICS 153 Introduction to Computer Networks. Inst: Chris Davison

Module 5. Broadcast Communication Networks. Version 2 CSE IIT, Kharagpur

Overview of Routing between Virtual LANs

How do I get to

Lecture (02) Networking Model (TCP/IP) Networking Standard (OSI) (I)

WAN Data Link Protocols

IT4405 Computer Networks (Compulsory)

Communication Networks. MAP-TELE 2011/12 José Ruela

IP Network Layer. Datagram ID FLAG Fragment Offset. IP Datagrams. IP Addresses. IP Addresses. CSCE 515: Computer Network Programming TCP/IP

Final for ECE374 05/06/13 Solution!!

Local Area Networks transmission system private speedy and secure kilometres shared transmission medium hardware & software

20-CS X Network Security Spring, An Introduction To. Network Security. Week 1. January 7

Transcription:

1 OSI MODEL

Introduction to OSI Model OSI model is based on the proposal developed by the International Standards Organization (ISO). 2 This model is called ISO OSI (Open Systems Interconnection) Reference model because it deals with connecting open systems (systems that are open for communication with other systems) We call it as OSI Model.

Principles on which OSI model was designed: A layer should be created where different level of abstraction is needed. 3 Each layer should perform a well defined function. The function of each layer should be chosen according to the internationally standardized protocols. The number of layers should be large enough that distinct functions should not be put in the same layer and small enough that the architecture does not become very complex.

OSI Model 4

OSI Layers 5

An Exchange Using the OSI Model 6

Physical Layer 7

Physical Layer It is the bottom layer of OSI Model. 8 It is responsible for the actual physical connection between the devices. Such physical connection may be made by using twisted pair cable. It is concerned with transmitting bits over a communication channel.

Functions of Physical Layer Transforming bits into signals Provides synchronization of bits by a clock. Physical layer manages the way a device connects to network media. It defines the transmission rate. It defines the way in which the devices are connected to the medium. It provides physical topologies It can use different techniques of multiplexing. 9

Data Link Layer 10

Data Link Layer 11 It is responsible for node-to-node delivery of data. It receives the data from network layer and creates FRAMES, add physical address to these frames & pas them to physical layer It consist of 2 layers: Logical Link Layer (LLC) : Defines the methods and provides addressing information for communication between network devices. Medium Access Control (MAC): establishes and maintains links between communicating devices.

Functions of Data Link Layer Framing : DLL divides the bits received from N/W layer into frames. (Frame contains all the addressing information necessary to travel from S to D). 12 Physical addressing: After creating frames, DLL adds physical address of sender/receiver (MAC address) in the header of each frame. Flow Control: DLL prevents the fast sender from drowning the slow receiver.

Data Link Layer Example 13

Functions of Data Link Layer Error Control: It provides the mechanism of error control in which it detects & retransmits damaged or lost frames. 14 Access Control: When single comm. Channel is shared by multiple devices, MAC layer of DLL provides help to determine which device has control over the channel.

Network Layer 15

Network Layer 16 It is responsible for the source to destination delivery of a packet across multiple networks. If two systems are attached to different networks with devices like routers, then N/W layer is used. Thus DLL overseas the delivery of the packet between the two systems on same network and the network layer ensures that the packet gets its point of origin to its final destination.

Functions of Network Layer Internetworking: It provides Internetworking. Logical Addressing: When packet is sent outside the network, N/W layer adds Logical (network) address of the sender & receiver to each packet. Network addresses are assigned to local devices by n/w administrator and assigned dynamically by special server called DHCP (Dynamic Host Configuration Protocol) Routing: When independent n/w are connected to create internetwork several routes are available to send the data from S to D. These n/w are interconnected by routers & gateways that route the packet to final destination. 17

Transport Layer 18

Transport Layer It is responsible for process-to-process delivery of the entire message. TL looks after the delivery of entire message considering all its packets & make sure that all packets are in order. On the other hand n/w layer treated each packet independently. At the receiver side, TL provides services to application layer & takes services form n/w layer. At the source side, TL receives message from upper layer into packets and reassembles these packets again into message at the destination. 19

Transport Layer Transport Layer provides two types of services: 20 Connection Oriented Transmission: In this type of transmission the receiving devices sends an acknowledge back to the source after a packet or group of packet is received. It is slower transmission method. Connectionless Transmission: In this type of transmission the receiving devices does not sends an acknowledge back to the source. It is faster transmission method.

Functions of Transport Layer Segmentation of message into packet & reassembly of packets into message. Port addressing: Computers run several processes. TL header include a port address with each process. Flow Control: Flow control facility prevents the source form sending data packets faster than the destination can handle. Error control: TL ensures that the entire message arrives at the receiving TL without error. 21

Session Layer 22

Session Layer Session layer is the fifth layer of OSI Model 23 It has the responsibility of beginning, maintaining and ending the communication between two devices, called session. It also provides for orderly communication between devices by regulating the flow of data.

Functions of Session Layer Establishing, Maintaining and ending a session: When sending device first contact with receiving device, it sends syn (synchronization) packet to establish a connection & determines the order in which information will be sent. Receiver sends ack (acknowledgement). So the session can be set & end. Dialog Control: This function determines that which device will communicate first and the amount of data that will be sent. Dialog separation: Process of adding checkpoints & markers to the stream of data is called dialog separation. 24

Presentation Layer 25

Presentation Layer Presentation layer is the sixth layer of OSI Model. 26 It is concerned with the syntax & semantics of the information exchanged between the two devices. It was designed for data encryption, decryption and compression.

Functions of Presentation Layer Data Presentation or Translation: Because different computers use different encoding systems. It ensures that the data being sent is in the format that the recipient can process. 27 Data Encryption: PL provides this facility by which hides the information from everyone except the person who originally sent the information & the intended recipient. When encrypted data arrives at destination, PL decrypts the message. Data Compression: PL shrinks large amount of data into smaller pieces i.e. it reduces the size of data.

Application Layer 28

Application Layer It is the topmost i.e. seventh layer of OSI Model. 29 It enables the user to access the network. It provides user interface & supports for services such as e-mail, file transfer, access to the world wide web. So it provides services to different user applications.

Functions of Application Layer Mail Services: This application provides various e- mail services. File transfer & Access: It allows users to access files in a remote host, to retrieve files from remote computer for use etc. Remote log-in: A user can log into a remote computer and access the resources of that computer. 30 Accessing the World Wide Web: Most common application today is the access of the World Wide Web.