SlideShare uma empresa Scribd logo
1 de 31
ISN 3244 - Network and
Computer Forensics
BY
ENGR. JOHNSON C. UBAH
B.ENG, M.ENG, HCNA, ASM
Open Systems Interconnect (OSI)
reference model
One of the most important networking concepts to understand
is the Open Systems Interconnect (OSI) reference model.
This conceptual model, created by the International
Organization for Standardization (ISO) in1978 and revised in
1984, describes a network architecture that enables data to be
passed between computer systems.
Open Systems Interconnect (OSI)
reference model
The TCP/IP model, which performs the same functions as
the OSI model, except in four layers instead of seven, is no
longer a Network+ objective.
Because this is the protocol suite predominantly in use
today, it is still important to know it to understand the
underlying principles of networking
TheOSI Seven-Layer Model
The OSI reference model is built, bottom to top, in the
following order: physical, data link, network, transport,
session, presentation, and application.
The physical layer is classified as Layer 1, and the top layer
of the model, the application layer, is Layer 7.
Layers of the OSI model
 Cram sentence:
All People Seem To Need Data Processing.
Physical Layer (Layer 1)
The physical layer handles the transmission of bits over a
communications channel
The physical layer of the OSI model identifies the network’s
physical characteristics, including the:
Hardware: The type of media used on the network, such as type of
cable, type of connector, and pinout format for cables.
Topology: The physical layer identifies the topology to be used in the
network. Common topologies include ring,mesh,star, bus, and
hybrid.
Physical Layer (Layer 1)
Protocols and technologies such as USB,
Ethernet, DSL, ISDN, T-carrier links (T1 and
T3), GSM, and SONET operate at the
physical layer .
Data Link Layer(Layer 2)
The data link layer is responsible for taking data from the
network layer and transforming it into a frame before sending it
to the entire network through the physical layer.
The data link layer is also responsible for error detection, error
correction, and hardware addressing.
Logical group of data in the data link layer is called a frame
Data Link Layer(Layer 2)
The data link layer has two distinct sublayers:
Media Access Control (MAC) layer: The MAC address is defined at this
layer. The MAC address is the physical or hardware address burned into
each network interface card (NIC). The MAC sublayer also controls access
to network media. The MAC layer specification is included in the IEEE
802.1 standard.
Logical Link Control (LLC) layer: The LLC layer is responsible for the error
and flow-control mechanisms of the data link layer. The LLC layer is
specified in the IEEE 802.2 standard.
Layer 2 protocols
Protocols and technologies such as High-Level Data Link
Control (HDLC), Layer 2 Tunneling Protocol (L2TP), Point-
to-Point Protocol (PPP), Point-to-Point Tunneling Protocol
(PPTP), Spanning Tree Protocol (STP), and virtual LANs
(VLANs)operate at the data link layer .
Network Layer (Layer 3)
The primary responsibility of the network layer is routing—providing
mechanisms by which data can be passed from one network system to
another.
It is responsible for getting the data packets from router to router
through the network.
Functionality of the router is provided by routing protocols, which are
software components
Layer 3 protocols
Static and dynamic routing protocol
Under dynamic routing protocols we have Routing information protocol
(RIP) and Open Shortest Path First (OSPF)
Other important network layer protocols include Internet Protocol (IP),
Address Resolution Protocol (ARP), Reverse Address Resolution Protocol
(RARP), Asynchronous Transfer Mode (ATM), Intermediate System-to-
Intermediate System (IS-IS), IP Security (IPsec), Internet Control Message
Protocol (ICMP), and Multi protocol Label Switching (MPLS).
Transport Layer (Layer 4)
The basic function of the transport layer is to provide
mechanisms to transport data between network devices. It does this
in three ways;
Error checking
Service addressing
Segmentation
Layer 4 protocol
Protocols that operate at the transport layer can either be
connectionless, such as User Datagram Protocol (UDP), or
connection oriented, such as Transmission Control Protocol
(TCP).
The transport layer is also responsible for data flow
control, which refers to how the receiving device can accept
data transmissions.
The two common flow control methods used are buffering
and windowing
SessionLayer (Layer 5)
The session layer is responsible for managing and controlling
the synchronization of data between applications on two
devices. It does this by establishing, maintaining, and breaking
sessions.
Whereas the transport layer is responsible for setting up and
maintaining the connection between the two nodes, the session
layer performs the same function on behalf of the application.
Layer 5 protocols
Protocols that operate at the session layer
include NetBIOS, Network File System (NFS),
and Server Message Block (SMB).
Presentation Layer (Layer 6)
The presentation layer’s basic function is to convert the data
intended for or received from the application layer into
another format. Such conversion is necessary because of
how data is formatted so that it can be transported across
the network.
Another important function of the presentation layer is
encryption, which is the scrambling of data so that it can’t
be read by anyone other than the intended recipient.
Layer 6 data format
Some common data formats handled by the presentation layer
include the following:
Graphics files: JPEG, TIFF, GIF, and so
Text and data: The presentation layer can translate data into
different formats, such as American Standard Code for Information
Inter change (ASCII) and Extended Binary Coded Decimal Interchange
Code (EBCDIC).
Sound/video: MPEG, MP3, and MIDI files all have their own data
formats to and from which data must be converted.
ApplicationLayer (Layer 7)
The function of the application layer is to take requests and data
from the users and pass them to the lower layers of the OSI
model. Incoming information is passed to the application layer,
which then displays the information to the users.
The application layer defines the processes that enable
applications to use network services.
Protocols defined at the application layer include Secure Shell (SSH), Border
Gateway Protocol (BGP), Dynamic Host Configuration Protocol (DHCP), Domain
Name System (DNS), Network Time Protocol (NTP), Real-time Transport Protocol
(RTP), Session Initiation Protocol (SIP), Simple Mail Transfer Protocol (SMTP),
Server Message Block (SMB), File Transfer Protocol (FTP), Hypertext Transfer
Protocol (HTTP), Hypertext Transfer Protocol Secure (HTTPS), Internet Message
Access Protocol (IMAP), and Post Office Protocol version3 (POP3).
Comparing OSI to the Four-Layer TCP/IP
Model
The OSI model does a fantastic job outlining how
networking should occur and the responsibility of
each layer. However, TCP/IP has also has a reference
model and has to perform the same functionality with
only four layers.
Comparing OSI to the Four-Layer TCP/IP
Model
Identifying the OSI Layers at Which
Various Network Components Operate
DEVICE OSI LAYER
HUB Physical (layer 1)
WIRELESS BRIDGE Data link (layer 2)
SWITCH Data link (layer 2) and Network
(layer 3)
ROUTER Network (layer 3)
NIC Data link (layer 2)
ACCESS POINT Data link (layer 2)
Connection-Oriented Protocols Versus
ConnectionlessProtocols
In a connection-oriented communication, data delivery is guaranteed.
Communication between the sending and receiving devices continues
until the transmission has been verified.
In contrast to connection-oriented communication, connectionless
protocols such as User Datagram Protocol (UDP) offer only a best-
effort delivery mechanism.
Basically, the information is just sent; there is no confirmation that
the data has been received.
Connectionless communication requires far less
overhead than connection-oriented communication,
so it is popular in applications such as streaming
audio and video, where a small number of dropped
packets might not represent a significant problem.
Internet Protocol (IP)
Internet Protocol (IP), is the protocol used to transport data
from one node on a network to another. IP is connectionless,
which means that it doesn’t guarantee the delivery of data; it
simply makes its best effort to do so.
To ensure that transmissions sent via IP are completed, a higher-
level protocol such as TCP is required.
Transmission control Protocol (TCP)
Transmission Control Protocol (TCP), which is defined in RFC 793, is a
connection-oriented transport layer protocol. Being connection
oriented means that TCP establishes a mutually acknowledged
session between two hosts before communication takes place.
TCP provides reliability to IP communications.
Specifically, TCP adds features such as flow control, sequencing, and
error detection and correction. For this reason, higher-level
applications that need guaranteed delivery use TCP rather than its
lightweight and connectionless brother, UDP .
TCP three-way handshake
When TCP wants to open a connection with another host, it follows
this procedure:
1. It sends a message called a SYN to the target host.
2. The target host opens a connection for the request and sends
back an acknowledgment message called an ACK (or SYN ACK).
3. The host that originated the request sends back another
acknowledgment, saying that it has received the ACK message and
that the session is ready to be used to transfer data.
User DatagramProtocol (UDP)
Like TCP, UDP is a transport protocol, but the big difference is that
UDP does not guarantee delivery like TCP does.
In a sense, UDP is a “fire-and-forget” protocol; it assumes that the
data sent will reach its destination intact.
The checking of whether data is delivered is left to upper-layer
protocols. UDP operates at the transport layer of the OSI model.
UDP versus TCP
Unlike TCP, with UDP no session is established between the sending
and receiving hosts, which is why UDP is called a connectionless
protocol.
The upshot of this is that UDP has much lower overhead than TCP. A
TCP packet header has 14 fields, whereas a UDP packet header has
only four fields.
Therefore, UDP is much more efficient than TCP. In applications that
don’t need the added features of TCP, UDP is much more
economical in terms of bandwidth and processing effort.
Next >>
IP addressing
Question!!!
Thanks!

Mais conteúdo relacionado

Mais procurados (20)

53426980 tcp-ip
53426980 tcp-ip53426980 tcp-ip
53426980 tcp-ip
 
Report of TCP/IP
Report of TCP/IPReport of TCP/IP
Report of TCP/IP
 
OSI model
OSI modelOSI model
OSI model
 
Osi and tcp ip model
Osi and tcp ip modelOsi and tcp ip model
Osi and tcp ip model
 
Comparison and Contrast between OSI and TCP/IP Model
Comparison and Contrast between OSI and TCP/IP ModelComparison and Contrast between OSI and TCP/IP Model
Comparison and Contrast between OSI and TCP/IP Model
 
OSI REFRENCE MODEL by- Mujmmil Shaikh
OSI REFRENCE MODEL by- Mujmmil ShaikhOSI REFRENCE MODEL by- Mujmmil Shaikh
OSI REFRENCE MODEL by- Mujmmil Shaikh
 
TCP/IP MODEL
TCP/IP MODEL TCP/IP MODEL
TCP/IP MODEL
 
Tcpip tutorial
Tcpip tutorialTcpip tutorial
Tcpip tutorial
 
03. osi reference-layer
03. osi reference-layer03. osi reference-layer
03. osi reference-layer
 
Osi reference model
Osi reference modelOsi reference model
Osi reference model
 
OSI model
OSI modelOSI model
OSI model
 
Networking- OSI Layer Protocol Functions
Networking- OSI Layer Protocol FunctionsNetworking- OSI Layer Protocol Functions
Networking- OSI Layer Protocol Functions
 
The OSI model and TCP/IP
The OSI model and TCP/IPThe OSI model and TCP/IP
The OSI model and TCP/IP
 
TCP IP Model | Computer Science
TCP IP Model | Computer ScienceTCP IP Model | Computer Science
TCP IP Model | Computer Science
 
Osi model
Osi model Osi model
Osi model
 
OSI Network Reference Model
OSI Network Reference ModelOSI Network Reference Model
OSI Network Reference Model
 
Cisco ccna certification knowledge to pass the exam
Cisco ccna certification knowledge to pass the examCisco ccna certification knowledge to pass the exam
Cisco ccna certification knowledge to pass the exam
 
four
fourfour
four
 
Iso osi and tcp-ip reference models
Iso osi and tcp-ip reference modelsIso osi and tcp-ip reference models
Iso osi and tcp-ip reference models
 
OSI layer by cisco
OSI layer by ciscoOSI layer by cisco
OSI layer by cisco
 

Semelhante a OSI reference Model

computer network and chapter 7 OSI layers.pptx
computer network and chapter 7 OSI layers.pptxcomputer network and chapter 7 OSI layers.pptx
computer network and chapter 7 OSI layers.pptxgadisaAdamu
 
OSI and TCP/IP Model
OSI and TCP/IP ModelOSI and TCP/IP Model
OSI and TCP/IP ModelNajmulIslam38
 
Computer Networks Notes Complete Syllabus
Computer Networks Notes Complete SyllabusComputer Networks Notes Complete Syllabus
Computer Networks Notes Complete SyllabusAnujashejwal
 
Network Fundamentals: OSI Model
Network Fundamentals: OSI Model Network Fundamentals: OSI Model
Network Fundamentals: OSI Model Diwash Sapkota
 
CCNA 200-301 Chapter 1-Introduction to TCP IP Networking.pptx
CCNA 200-301 Chapter 1-Introduction to TCP IP Networking.pptxCCNA 200-301 Chapter 1-Introduction to TCP IP Networking.pptx
CCNA 200-301 Chapter 1-Introduction to TCP IP Networking.pptxBabarYunus1
 
pppppppppppppppppjjjjjjjjjjjpppppppp.pptx
pppppppppppppppppjjjjjjjjjjjpppppppp.pptxpppppppppppppppppjjjjjjjjjjjpppppppp.pptx
pppppppppppppppppjjjjjjjjjjjpppppppp.pptxzeyadosama505
 
OSI and TCPIP Model
OSI and TCPIP ModelOSI and TCPIP Model
OSI and TCPIP ModelTapan Khilar
 
Automation Networking By Shivam Singh
Automation Networking By Shivam SinghAutomation Networking By Shivam Singh
Automation Networking By Shivam SinghShivam Singh
 
Osi , tcp/ip protocol and Addressing
Osi , tcp/ip protocol and Addressing Osi , tcp/ip protocol and Addressing
Osi , tcp/ip protocol and Addressing marwan aldulaimy
 

Semelhante a OSI reference Model (20)

chapter 4.pptx
chapter 4.pptxchapter 4.pptx
chapter 4.pptx
 
computer network and chapter 7 OSI layers.pptx
computer network and chapter 7 OSI layers.pptxcomputer network and chapter 7 OSI layers.pptx
computer network and chapter 7 OSI layers.pptx
 
OSI and TCP/IP Model
OSI and TCP/IP ModelOSI and TCP/IP Model
OSI and TCP/IP Model
 
Computer Networks Notes Complete Syllabus
Computer Networks Notes Complete SyllabusComputer Networks Notes Complete Syllabus
Computer Networks Notes Complete Syllabus
 
Network Fundamentals: OSI Model
Network Fundamentals: OSI Model Network Fundamentals: OSI Model
Network Fundamentals: OSI Model
 
Osi model
Osi modelOsi model
Osi model
 
CCNA 200-301 Chapter 1-Introduction to TCP IP Networking.pptx
CCNA 200-301 Chapter 1-Introduction to TCP IP Networking.pptxCCNA 200-301 Chapter 1-Introduction to TCP IP Networking.pptx
CCNA 200-301 Chapter 1-Introduction to TCP IP Networking.pptx
 
osi and tcpip.ppt
osi and tcpip.pptosi and tcpip.ppt
osi and tcpip.ppt
 
Osi and tcpip
Osi and tcpipOsi and tcpip
Osi and tcpip
 
OSI model.pptx
OSI model.pptxOSI model.pptx
OSI model.pptx
 
Assignment3
Assignment3Assignment3
Assignment3
 
Protocols
ProtocolsProtocols
Protocols
 
pppppppppppppppppjjjjjjjjjjjpppppppp.pptx
pppppppppppppppppjjjjjjjjjjjpppppppp.pptxpppppppppppppppppjjjjjjjjjjjpppppppp.pptx
pppppppppppppppppjjjjjjjjjjjpppppppp.pptx
 
OSI Model
OSI ModelOSI Model
OSI Model
 
OSI and TCPIP Model
OSI and TCPIP ModelOSI and TCPIP Model
OSI and TCPIP Model
 
Automation Networking By Shivam Singh
Automation Networking By Shivam SinghAutomation Networking By Shivam Singh
Automation Networking By Shivam Singh
 
Bhargava Presentation.ppt
Bhargava Presentation.pptBhargava Presentation.ppt
Bhargava Presentation.ppt
 
Bhargava Presentation.ppt
Bhargava Presentation.pptBhargava Presentation.ppt
Bhargava Presentation.ppt
 
osi-tcp.ppt
osi-tcp.pptosi-tcp.ppt
osi-tcp.ppt
 
Osi , tcp/ip protocol and Addressing
Osi , tcp/ip protocol and Addressing Osi , tcp/ip protocol and Addressing
Osi , tcp/ip protocol and Addressing
 

Mais de Johnson Ubah

Supervised learning
Supervised learningSupervised learning
Supervised learningJohnson Ubah
 
Statistical inference with Python
Statistical inference with PythonStatistical inference with Python
Statistical inference with PythonJohnson Ubah
 
Lecture 3 intro2data
Lecture 3 intro2dataLecture 3 intro2data
Lecture 3 intro2dataJohnson Ubah
 
introduction to data science
introduction to data scienceintroduction to data science
introduction to data scienceJohnson Ubah
 
introduction to machine learning
introduction to machine learningintroduction to machine learning
introduction to machine learningJohnson Ubah
 
Network and computer forensics
Network and computer forensicsNetwork and computer forensics
Network and computer forensicsJohnson Ubah
 

Mais de Johnson Ubah (7)

Supervised learning
Supervised learningSupervised learning
Supervised learning
 
Statistical inference with Python
Statistical inference with PythonStatistical inference with Python
Statistical inference with Python
 
Lecture 3 intro2data
Lecture 3 intro2dataLecture 3 intro2data
Lecture 3 intro2data
 
IP Addressing
IP AddressingIP Addressing
IP Addressing
 
introduction to data science
introduction to data scienceintroduction to data science
introduction to data science
 
introduction to machine learning
introduction to machine learningintroduction to machine learning
introduction to machine learning
 
Network and computer forensics
Network and computer forensicsNetwork and computer forensics
Network and computer forensics
 

Último

FULL ENJOY 🔝 8264348440 🔝 Call Girls in Diplomatic Enclave | Delhi
FULL ENJOY 🔝 8264348440 🔝 Call Girls in Diplomatic Enclave | DelhiFULL ENJOY 🔝 8264348440 🔝 Call Girls in Diplomatic Enclave | Delhi
FULL ENJOY 🔝 8264348440 🔝 Call Girls in Diplomatic Enclave | Delhisoniya singh
 
How to convert PDF to text with Nanonets
How to convert PDF to text with NanonetsHow to convert PDF to text with Nanonets
How to convert PDF to text with Nanonetsnaman860154
 
08448380779 Call Girls In Civil Lines Women Seeking Men
08448380779 Call Girls In Civil Lines Women Seeking Men08448380779 Call Girls In Civil Lines Women Seeking Men
08448380779 Call Girls In Civil Lines Women Seeking MenDelhi Call girls
 
Maximizing Board Effectiveness 2024 Webinar.pptx
Maximizing Board Effectiveness 2024 Webinar.pptxMaximizing Board Effectiveness 2024 Webinar.pptx
Maximizing Board Effectiveness 2024 Webinar.pptxOnBoard
 
Slack Application Development 101 Slides
Slack Application Development 101 SlidesSlack Application Development 101 Slides
Slack Application Development 101 Slidespraypatel2
 
SQL Database Design For Developers at php[tek] 2024
SQL Database Design For Developers at php[tek] 2024SQL Database Design For Developers at php[tek] 2024
SQL Database Design For Developers at php[tek] 2024Scott Keck-Warren
 
Injustice - Developers Among Us (SciFiDevCon 2024)
Injustice - Developers Among Us (SciFiDevCon 2024)Injustice - Developers Among Us (SciFiDevCon 2024)
Injustice - Developers Among Us (SciFiDevCon 2024)Allon Mureinik
 
Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...
Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...
Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...shyamraj55
 
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdf
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdfThe Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdf
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdfEnterprise Knowledge
 
Finology Group – Insurtech Innovation Award 2024
Finology Group – Insurtech Innovation Award 2024Finology Group – Insurtech Innovation Award 2024
Finology Group – Insurtech Innovation Award 2024The Digital Insurer
 
My Hashitalk Indonesia April 2024 Presentation
My Hashitalk Indonesia April 2024 PresentationMy Hashitalk Indonesia April 2024 Presentation
My Hashitalk Indonesia April 2024 PresentationRidwan Fadjar
 
A Call to Action for Generative AI in 2024
A Call to Action for Generative AI in 2024A Call to Action for Generative AI in 2024
A Call to Action for Generative AI in 2024Results
 
Unblocking The Main Thread Solving ANRs and Frozen Frames
Unblocking The Main Thread Solving ANRs and Frozen FramesUnblocking The Main Thread Solving ANRs and Frozen Frames
Unblocking The Main Thread Solving ANRs and Frozen FramesSinan KOZAK
 
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...Miguel Araújo
 
Transcript: #StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
Transcript: #StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024Transcript: #StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
Transcript: #StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024BookNet Canada
 
Scaling API-first – The story of a global engineering organization
Scaling API-first – The story of a global engineering organizationScaling API-first – The story of a global engineering organization
Scaling API-first – The story of a global engineering organizationRadu Cotescu
 
Swan(sea) Song – personal research during my six years at Swansea ... and bey...
Swan(sea) Song – personal research during my six years at Swansea ... and bey...Swan(sea) Song – personal research during my six years at Swansea ... and bey...
Swan(sea) Song – personal research during my six years at Swansea ... and bey...Alan Dix
 
The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024Rafal Los
 
Data Cloud, More than a CDP by Matt Robison
Data Cloud, More than a CDP by Matt RobisonData Cloud, More than a CDP by Matt Robison
Data Cloud, More than a CDP by Matt RobisonAnna Loughnan Colquhoun
 
[2024]Digital Global Overview Report 2024 Meltwater.pdf
[2024]Digital Global Overview Report 2024 Meltwater.pdf[2024]Digital Global Overview Report 2024 Meltwater.pdf
[2024]Digital Global Overview Report 2024 Meltwater.pdfhans926745
 

Último (20)

FULL ENJOY 🔝 8264348440 🔝 Call Girls in Diplomatic Enclave | Delhi
FULL ENJOY 🔝 8264348440 🔝 Call Girls in Diplomatic Enclave | DelhiFULL ENJOY 🔝 8264348440 🔝 Call Girls in Diplomatic Enclave | Delhi
FULL ENJOY 🔝 8264348440 🔝 Call Girls in Diplomatic Enclave | Delhi
 
How to convert PDF to text with Nanonets
How to convert PDF to text with NanonetsHow to convert PDF to text with Nanonets
How to convert PDF to text with Nanonets
 
08448380779 Call Girls In Civil Lines Women Seeking Men
08448380779 Call Girls In Civil Lines Women Seeking Men08448380779 Call Girls In Civil Lines Women Seeking Men
08448380779 Call Girls In Civil Lines Women Seeking Men
 
Maximizing Board Effectiveness 2024 Webinar.pptx
Maximizing Board Effectiveness 2024 Webinar.pptxMaximizing Board Effectiveness 2024 Webinar.pptx
Maximizing Board Effectiveness 2024 Webinar.pptx
 
Slack Application Development 101 Slides
Slack Application Development 101 SlidesSlack Application Development 101 Slides
Slack Application Development 101 Slides
 
SQL Database Design For Developers at php[tek] 2024
SQL Database Design For Developers at php[tek] 2024SQL Database Design For Developers at php[tek] 2024
SQL Database Design For Developers at php[tek] 2024
 
Injustice - Developers Among Us (SciFiDevCon 2024)
Injustice - Developers Among Us (SciFiDevCon 2024)Injustice - Developers Among Us (SciFiDevCon 2024)
Injustice - Developers Among Us (SciFiDevCon 2024)
 
Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...
Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...
Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...
 
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdf
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdfThe Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdf
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdf
 
Finology Group – Insurtech Innovation Award 2024
Finology Group – Insurtech Innovation Award 2024Finology Group – Insurtech Innovation Award 2024
Finology Group – Insurtech Innovation Award 2024
 
My Hashitalk Indonesia April 2024 Presentation
My Hashitalk Indonesia April 2024 PresentationMy Hashitalk Indonesia April 2024 Presentation
My Hashitalk Indonesia April 2024 Presentation
 
A Call to Action for Generative AI in 2024
A Call to Action for Generative AI in 2024A Call to Action for Generative AI in 2024
A Call to Action for Generative AI in 2024
 
Unblocking The Main Thread Solving ANRs and Frozen Frames
Unblocking The Main Thread Solving ANRs and Frozen FramesUnblocking The Main Thread Solving ANRs and Frozen Frames
Unblocking The Main Thread Solving ANRs and Frozen Frames
 
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
 
Transcript: #StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
Transcript: #StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024Transcript: #StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
Transcript: #StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
 
Scaling API-first – The story of a global engineering organization
Scaling API-first – The story of a global engineering organizationScaling API-first – The story of a global engineering organization
Scaling API-first – The story of a global engineering organization
 
Swan(sea) Song – personal research during my six years at Swansea ... and bey...
Swan(sea) Song – personal research during my six years at Swansea ... and bey...Swan(sea) Song – personal research during my six years at Swansea ... and bey...
Swan(sea) Song – personal research during my six years at Swansea ... and bey...
 
The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024
 
Data Cloud, More than a CDP by Matt Robison
Data Cloud, More than a CDP by Matt RobisonData Cloud, More than a CDP by Matt Robison
Data Cloud, More than a CDP by Matt Robison
 
[2024]Digital Global Overview Report 2024 Meltwater.pdf
[2024]Digital Global Overview Report 2024 Meltwater.pdf[2024]Digital Global Overview Report 2024 Meltwater.pdf
[2024]Digital Global Overview Report 2024 Meltwater.pdf
 

OSI reference Model

  • 1. ISN 3244 - Network and Computer Forensics BY ENGR. JOHNSON C. UBAH B.ENG, M.ENG, HCNA, ASM
  • 2. Open Systems Interconnect (OSI) reference model One of the most important networking concepts to understand is the Open Systems Interconnect (OSI) reference model. This conceptual model, created by the International Organization for Standardization (ISO) in1978 and revised in 1984, describes a network architecture that enables data to be passed between computer systems.
  • 3. Open Systems Interconnect (OSI) reference model The TCP/IP model, which performs the same functions as the OSI model, except in four layers instead of seven, is no longer a Network+ objective. Because this is the protocol suite predominantly in use today, it is still important to know it to understand the underlying principles of networking
  • 4. TheOSI Seven-Layer Model The OSI reference model is built, bottom to top, in the following order: physical, data link, network, transport, session, presentation, and application. The physical layer is classified as Layer 1, and the top layer of the model, the application layer, is Layer 7.
  • 5. Layers of the OSI model  Cram sentence: All People Seem To Need Data Processing.
  • 6. Physical Layer (Layer 1) The physical layer handles the transmission of bits over a communications channel The physical layer of the OSI model identifies the network’s physical characteristics, including the: Hardware: The type of media used on the network, such as type of cable, type of connector, and pinout format for cables. Topology: The physical layer identifies the topology to be used in the network. Common topologies include ring,mesh,star, bus, and hybrid.
  • 7. Physical Layer (Layer 1) Protocols and technologies such as USB, Ethernet, DSL, ISDN, T-carrier links (T1 and T3), GSM, and SONET operate at the physical layer .
  • 8. Data Link Layer(Layer 2) The data link layer is responsible for taking data from the network layer and transforming it into a frame before sending it to the entire network through the physical layer. The data link layer is also responsible for error detection, error correction, and hardware addressing. Logical group of data in the data link layer is called a frame
  • 9. Data Link Layer(Layer 2) The data link layer has two distinct sublayers: Media Access Control (MAC) layer: The MAC address is defined at this layer. The MAC address is the physical or hardware address burned into each network interface card (NIC). The MAC sublayer also controls access to network media. The MAC layer specification is included in the IEEE 802.1 standard. Logical Link Control (LLC) layer: The LLC layer is responsible for the error and flow-control mechanisms of the data link layer. The LLC layer is specified in the IEEE 802.2 standard.
  • 10. Layer 2 protocols Protocols and technologies such as High-Level Data Link Control (HDLC), Layer 2 Tunneling Protocol (L2TP), Point- to-Point Protocol (PPP), Point-to-Point Tunneling Protocol (PPTP), Spanning Tree Protocol (STP), and virtual LANs (VLANs)operate at the data link layer .
  • 11. Network Layer (Layer 3) The primary responsibility of the network layer is routing—providing mechanisms by which data can be passed from one network system to another. It is responsible for getting the data packets from router to router through the network. Functionality of the router is provided by routing protocols, which are software components
  • 12. Layer 3 protocols Static and dynamic routing protocol Under dynamic routing protocols we have Routing information protocol (RIP) and Open Shortest Path First (OSPF) Other important network layer protocols include Internet Protocol (IP), Address Resolution Protocol (ARP), Reverse Address Resolution Protocol (RARP), Asynchronous Transfer Mode (ATM), Intermediate System-to- Intermediate System (IS-IS), IP Security (IPsec), Internet Control Message Protocol (ICMP), and Multi protocol Label Switching (MPLS).
  • 13. Transport Layer (Layer 4) The basic function of the transport layer is to provide mechanisms to transport data between network devices. It does this in three ways; Error checking Service addressing Segmentation
  • 14. Layer 4 protocol Protocols that operate at the transport layer can either be connectionless, such as User Datagram Protocol (UDP), or connection oriented, such as Transmission Control Protocol (TCP). The transport layer is also responsible for data flow control, which refers to how the receiving device can accept data transmissions. The two common flow control methods used are buffering and windowing
  • 15. SessionLayer (Layer 5) The session layer is responsible for managing and controlling the synchronization of data between applications on two devices. It does this by establishing, maintaining, and breaking sessions. Whereas the transport layer is responsible for setting up and maintaining the connection between the two nodes, the session layer performs the same function on behalf of the application.
  • 16. Layer 5 protocols Protocols that operate at the session layer include NetBIOS, Network File System (NFS), and Server Message Block (SMB).
  • 17. Presentation Layer (Layer 6) The presentation layer’s basic function is to convert the data intended for or received from the application layer into another format. Such conversion is necessary because of how data is formatted so that it can be transported across the network. Another important function of the presentation layer is encryption, which is the scrambling of data so that it can’t be read by anyone other than the intended recipient.
  • 18. Layer 6 data format Some common data formats handled by the presentation layer include the following: Graphics files: JPEG, TIFF, GIF, and so Text and data: The presentation layer can translate data into different formats, such as American Standard Code for Information Inter change (ASCII) and Extended Binary Coded Decimal Interchange Code (EBCDIC). Sound/video: MPEG, MP3, and MIDI files all have their own data formats to and from which data must be converted.
  • 19. ApplicationLayer (Layer 7) The function of the application layer is to take requests and data from the users and pass them to the lower layers of the OSI model. Incoming information is passed to the application layer, which then displays the information to the users. The application layer defines the processes that enable applications to use network services.
  • 20. Protocols defined at the application layer include Secure Shell (SSH), Border Gateway Protocol (BGP), Dynamic Host Configuration Protocol (DHCP), Domain Name System (DNS), Network Time Protocol (NTP), Real-time Transport Protocol (RTP), Session Initiation Protocol (SIP), Simple Mail Transfer Protocol (SMTP), Server Message Block (SMB), File Transfer Protocol (FTP), Hypertext Transfer Protocol (HTTP), Hypertext Transfer Protocol Secure (HTTPS), Internet Message Access Protocol (IMAP), and Post Office Protocol version3 (POP3).
  • 21. Comparing OSI to the Four-Layer TCP/IP Model The OSI model does a fantastic job outlining how networking should occur and the responsibility of each layer. However, TCP/IP has also has a reference model and has to perform the same functionality with only four layers.
  • 22. Comparing OSI to the Four-Layer TCP/IP Model
  • 23. Identifying the OSI Layers at Which Various Network Components Operate DEVICE OSI LAYER HUB Physical (layer 1) WIRELESS BRIDGE Data link (layer 2) SWITCH Data link (layer 2) and Network (layer 3) ROUTER Network (layer 3) NIC Data link (layer 2) ACCESS POINT Data link (layer 2)
  • 24. Connection-Oriented Protocols Versus ConnectionlessProtocols In a connection-oriented communication, data delivery is guaranteed. Communication between the sending and receiving devices continues until the transmission has been verified. In contrast to connection-oriented communication, connectionless protocols such as User Datagram Protocol (UDP) offer only a best- effort delivery mechanism. Basically, the information is just sent; there is no confirmation that the data has been received.
  • 25. Connectionless communication requires far less overhead than connection-oriented communication, so it is popular in applications such as streaming audio and video, where a small number of dropped packets might not represent a significant problem.
  • 26. Internet Protocol (IP) Internet Protocol (IP), is the protocol used to transport data from one node on a network to another. IP is connectionless, which means that it doesn’t guarantee the delivery of data; it simply makes its best effort to do so. To ensure that transmissions sent via IP are completed, a higher- level protocol such as TCP is required.
  • 27. Transmission control Protocol (TCP) Transmission Control Protocol (TCP), which is defined in RFC 793, is a connection-oriented transport layer protocol. Being connection oriented means that TCP establishes a mutually acknowledged session between two hosts before communication takes place. TCP provides reliability to IP communications. Specifically, TCP adds features such as flow control, sequencing, and error detection and correction. For this reason, higher-level applications that need guaranteed delivery use TCP rather than its lightweight and connectionless brother, UDP .
  • 28. TCP three-way handshake When TCP wants to open a connection with another host, it follows this procedure: 1. It sends a message called a SYN to the target host. 2. The target host opens a connection for the request and sends back an acknowledgment message called an ACK (or SYN ACK). 3. The host that originated the request sends back another acknowledgment, saying that it has received the ACK message and that the session is ready to be used to transfer data.
  • 29. User DatagramProtocol (UDP) Like TCP, UDP is a transport protocol, but the big difference is that UDP does not guarantee delivery like TCP does. In a sense, UDP is a “fire-and-forget” protocol; it assumes that the data sent will reach its destination intact. The checking of whether data is delivered is left to upper-layer protocols. UDP operates at the transport layer of the OSI model.
  • 30. UDP versus TCP Unlike TCP, with UDP no session is established between the sending and receiving hosts, which is why UDP is called a connectionless protocol. The upshot of this is that UDP has much lower overhead than TCP. A TCP packet header has 14 fields, whereas a UDP packet header has only four fields. Therefore, UDP is much more efficient than TCP. In applications that don’t need the added features of TCP, UDP is much more economical in terms of bandwidth and processing effort.