SlideShare uma empresa Scribd logo
1 de 47
OSI MODELOSI MODEL
WITHWITH
NETWORKING OVERVIEWNETWORKING OVERVIEW
Networking
Network
“ ... communication system for connecting end-systems”
End-systems a.k.a. “hosts”
PCs, workstations
dedicated computers
network components
Multiaccess vs. Point-to-point
 Multiaccess means shared medium.
 many end-systems share the same physical communication resources (wire,
frequency, ...)
 There must be some arbitration mechanism.
 Point-to-point
 only 2 systems involved
 no doubt about where data came from !
MultiaccessMultiaccess Point-to-pointPoint-to-point
LAN - Local Area Network
 connects computers that are physically close together
( < 1 mile).
 high speed
 multi-access
 Technologies:
 Ethernet 10 Mbps, 100Mbps
 Token Ring16 Mbps
 FDDI 100 Mbps
WAN - Wide Area Network
 connects computers that are physically far apart.
“long-haul network”.
 typically slower than a LAN.
 typically less reliable than a LAN.
 point-to-point
 Technologies:
 telephone lines
 Satellite communications
MAN - Metropolitan Area Network
 Larger than a LAN and smaller than a WAN
- example: campus-wide network
- multi-access network
 Technologies:
 coaxial cable
 microwave
Internetwork
 Connection of 2 or more distinct (possibly dissimilar) networks.
 Requires some kind of network device to facilitate the
connection.
Net A Net B
OSI Reference Model
 Layered model:
7. Application
6. Presentation
5. Session
4. Transport
3. Network
2. Data Link
1. Physical
The Physical Layer
 Responsibility:
 transmission of raw bits over a communication channel.
 Issues:
 mechanical and electrical interfaces
 time per bit
 distances
Data Link Layer -
Data Link Control
 Responsibility:
 provide an error-free communication link
 Issues:
 framing (dividing data into chunks)
 header & trailer bits
 addressing
10110110101 01100010011 10110000001
Data Link Layer –
The MAC sub layer
 Medium Access Control - needed by mutiaccess networks.
 MAC provides DLC with “virtual wires” on multiaccess networks.
The Network Layer
 Responsibilities:
 path selection between end-systems (routing).
 subnet flow control.
 fragmentation & reassembly
 translation between different network types.
 Issues:
 packet headers
 virtual circuits
The Transport Layer
 Responsibilities:
 provides virtual end-to-end links between peer processes.
 end-to-end flow control
 Issues:
 headers
 error detection
 reliable communication
The Session Layer
 Responsibilities:
 establishes, manages, and terminates sessions between
applications.
 service location lookup
 Many protocol suites do not include a session layer.
The Presentation Layer
 Responsibilities:
 data encryption
 data compression
 data conversion
 Many protocol suites do not include a Presentation
Layer.
The Application Layer
 Responsibilities:
 anything not provided by any of the other layers
 Issues:
 application level protocols
 appropriate selection of “type of service”
Layering & Headers
 Each layer needs to add some control information to the data in
order to do it’s job.
 This information is typically prepended to the data before being
given to the lower layer.
 Once the lower layers deliver the the data and control
information - the peer layer uses the control information.
Headers
Process
Transport
Networ
k
Data
Link
Process
Transport
Network
Data Link
DATA
DATA
DATA
DATA
H
H
H
H
HH
What are the headers?
Physical: no header - just a bunch of bits.
Data Link:
 address of the receiving endpoints
 address of the sending endpoint
 length of the data
 checksum.
Network layer header - examples
 protocol suite version
 type of service
 length of the data
 packet identifier
 fragment number
 time to live
protocolprotocol
header checksumheader checksum
source networksource network
addressaddress
destination networkdestination network
addressaddress
Important Summary
 Data-Link: communication between machines on the
same network.
 Network: communication between machines on
possibly different networks.
 Transport: communication between processes
(running on machines on possibly different networks).
Connecting Networks
 Repeater: physical layer
 Bridge: data link layer
 Router: network layer
 Gateway: network layer and above.
Repeater
 Copies bits from one network to another
 Does not look at any bits
 Allows the extension of a network beyond physical length
limitations
REPEATER
Bridge
 Copies frames from one network to another
 Can operate selectively - does not copy all frames (must look at
data-link headers).
 Extends the network beyond physical length limitations.
BRIDGE
Router
 Copies packets from one network to another.
 Makes decisions about what route a packet should take (looks at
network headers).
ROUTERROUTER
Gateway
 Operates as a router
 Data conversions above the network layer.
 Conversions:
encapsulation - use an intermediate network
translation - connect different application protocols
encrpyption - could be done by a gateway
Encapsulation Example
 Provides service connectivity even though
intermediate network does not support protocols.
Gateway Gateway
Translation
 Translate from green protocol to brown protocol
Gateway
Encryption gateway
Encryption/Decryption
Gateways
Secure
Network
Secure
Network
GWGW ?
?
?
Insecure Network
Hardware vs. Software
 Repeaters are typically hardware devices.
 Bridges can be implemented in hardware or software.
 Routers & Gateways are typically implemented in software so that they
can be extended to handle new protocols.
 Many workstations can operate as routers or gateways.
Multiplexing
 “.. to combine many into one”.
 Many processes sharing a single network interface.
 A single process could use multiple protocols.
 More on this when we look at TCP/IP.
Modes of Service
 connection-oriented vs. connectionless
 sequencing
 error-control
 flow-control
 byte stream vs. message based
 full-duplex vs. half-duplex.
Connection-Oriented vs.
Connectionless Service
 A connection-oriented service includes the
establishment of a logical connection between 2
processes.
 establish logical connection
 transfer data
 terminate connection.
 Connectionless services involve sending of
independent messages.
Sequencing
 Sequencing provides support for an order to
communications.
 A service that includes sequencing requires that
messages (or bytes) are received in the same order
they are sent.
Error Control
 Some services require error detection (it is important to
know when a transmission error has occured).
 Checksums provide a simple error detection
mechanism.
 Error control sometimes involves notification and
retransmission.
Flow Control
 Flow control prevents the sending process from
overwhelming the receiving process.
 Flow control can be handled a variety of ways - this is
one of the major research issues in the development
of the next generation of networks (ATM).
Byte Stream vs. Message
 Byte stream implies an ordered sequence of bytes
with no message boundaries.
 Message oriented services provide communication
service to chunks of data called datagrams.
Full- vs. Half-Duplex
 Full-Duplex services support the transfer of data in both
directions.
 Half-Duplex services support the transfer of data in a
single direction.
End-to-End vs. Hop-toHop
 Many service modes/features such as flow control and
error control can be done either:
between endpoints of the communication.
-or-
between every 2 nodes on the path between the
endpoints.
End-to-End
Process A
Process B
Hop-by-Hop
Process A
Process B
Buffering
 Buffering can provide more efficient communications.
 Buffering is most useful for byte stream services.
Process A Process B
Send
Buffer
Recv.
Buffer
Addresses
 Each communication endpoint must have an address.
 Consider 2 processes communicating over an internet:
 the network must be specified
 the host (end-system) must be specified
 the process must be specified.
Addresses at Layers
 Physical Layer: no address necessary
 Data Link Layer - address must be able to select any
host on the network.
 Network Layer - address must be able to provide
information to enable routing.
 Transport Layer - address must identify the destination
process.
Broadcasts
 Many networks support the notion of sending a
message from one host to all other hosts on the
network.
 A special address called the “broadcast address” is
often used.
 Some popular network services are based on
broadcasting (YP/NIS, rup, rusers)

Mais conteúdo relacionado

Mais procurados

OSI MODEL
OSI MODELOSI MODEL
OSI MODELMousa_k
 
Networking- OSI Layer Protocol Functions
Networking- OSI Layer Protocol FunctionsNetworking- OSI Layer Protocol Functions
Networking- OSI Layer Protocol FunctionsGayathri Kesavan
 
Osi model vs TCP/IP
Osi model vs TCP/IPOsi model vs TCP/IP
Osi model vs TCP/IPMannu Khani
 
OSI model and TCP/IP model
OSI model and TCP/IP modelOSI model and TCP/IP model
OSI model and TCP/IP modelRubal Sagwal
 
Computer Networks - Layers in OSI Model
Computer Networks - Layers in OSI ModelComputer Networks - Layers in OSI Model
Computer Networks - Layers in OSI ModelShreyash Agarwal
 
Iso osi and tcp-ip reference models
Iso osi and tcp-ip reference modelsIso osi and tcp-ip reference models
Iso osi and tcp-ip reference modelsbhavanatmithun
 
OSI Model of Networking
OSI Model of NetworkingOSI Model of Networking
OSI Model of NetworkingMukesh Tekwani
 
Difference between OSI Layer & TCP/IP Layer
Difference between OSI Layer & TCP/IP LayerDifference between OSI Layer & TCP/IP Layer
Difference between OSI Layer & TCP/IP LayerNetwax Lab
 
OSI reference model
OSI reference modelOSI reference model
OSI reference modelIshan Udyoga
 
OSI MODEL AND ITS PROTOCOL
OSI MODEL AND ITS PROTOCOLOSI MODEL AND ITS PROTOCOL
OSI MODEL AND ITS PROTOCOLIkhlas Rahman
 
OSI Reference Model and TCP/IP (Lecture #3 ET3003 Sem1 2014/2015)
OSI Reference Model and TCP/IP (Lecture #3 ET3003 Sem1 2014/2015)OSI Reference Model and TCP/IP (Lecture #3 ET3003 Sem1 2014/2015)
OSI Reference Model and TCP/IP (Lecture #3 ET3003 Sem1 2014/2015)Tutun Juhana
 
Osi & ip presentation
Osi & ip presentationOsi & ip presentation
Osi & ip presentationMonika Vijay
 
Network protocols
Network protocolsNetwork protocols
Network protocolsHemnath R.
 
OSI(Open System Interconnection) model
OSI(Open System Interconnection) modelOSI(Open System Interconnection) model
OSI(Open System Interconnection) modelNamra Afzal
 
Introduction to the OSI 7 layer model and Data Link Layer
Introduction to the OSI 7 layer model and Data Link LayerIntroduction to the OSI 7 layer model and Data Link Layer
Introduction to the OSI 7 layer model and Data Link LayerVNIT-ACM Student Chapter
 

Mais procurados (20)

OSI MODEL
OSI MODELOSI MODEL
OSI MODEL
 
Networking- OSI Layer Protocol Functions
Networking- OSI Layer Protocol FunctionsNetworking- OSI Layer Protocol Functions
Networking- OSI Layer Protocol Functions
 
Osi model vs TCP/IP
Osi model vs TCP/IPOsi model vs TCP/IP
Osi model vs TCP/IP
 
OSI model and TCP/IP model
OSI model and TCP/IP modelOSI model and TCP/IP model
OSI model and TCP/IP model
 
Computer Networks - Layers in OSI Model
Computer Networks - Layers in OSI ModelComputer Networks - Layers in OSI Model
Computer Networks - Layers in OSI Model
 
Iso osi and tcp-ip reference models
Iso osi and tcp-ip reference modelsIso osi and tcp-ip reference models
Iso osi and tcp-ip reference models
 
Osi model
Osi modelOsi model
Osi model
 
OSI Model of Networking
OSI Model of NetworkingOSI Model of Networking
OSI Model of Networking
 
OSI Network Reference Model
OSI Network Reference ModelOSI Network Reference Model
OSI Network Reference Model
 
Difference between OSI Layer & TCP/IP Layer
Difference between OSI Layer & TCP/IP LayerDifference between OSI Layer & TCP/IP Layer
Difference between OSI Layer & TCP/IP Layer
 
OSI MODEL - A PROJECT
OSI MODEL - A PROJECTOSI MODEL - A PROJECT
OSI MODEL - A PROJECT
 
OSI reference model
OSI reference modelOSI reference model
OSI reference model
 
Protocols
ProtocolsProtocols
Protocols
 
OSI MODEL AND ITS PROTOCOL
OSI MODEL AND ITS PROTOCOLOSI MODEL AND ITS PROTOCOL
OSI MODEL AND ITS PROTOCOL
 
OSI Reference Model and TCP/IP (Lecture #3 ET3003 Sem1 2014/2015)
OSI Reference Model and TCP/IP (Lecture #3 ET3003 Sem1 2014/2015)OSI Reference Model and TCP/IP (Lecture #3 ET3003 Sem1 2014/2015)
OSI Reference Model and TCP/IP (Lecture #3 ET3003 Sem1 2014/2015)
 
Osi & ip presentation
Osi & ip presentationOsi & ip presentation
Osi & ip presentation
 
Network protocols
Network protocolsNetwork protocols
Network protocols
 
osi vs tcp/ip
osi vs tcp/iposi vs tcp/ip
osi vs tcp/ip
 
OSI(Open System Interconnection) model
OSI(Open System Interconnection) modelOSI(Open System Interconnection) model
OSI(Open System Interconnection) model
 
Introduction to the OSI 7 layer model and Data Link Layer
Introduction to the OSI 7 layer model and Data Link LayerIntroduction to the OSI 7 layer model and Data Link Layer
Introduction to the OSI 7 layer model and Data Link Layer
 

Destaque (16)

Tcp and introduction to protocol
Tcp and introduction to protocolTcp and introduction to protocol
Tcp and introduction to protocol
 
Subnetting
SubnettingSubnetting
Subnetting
 
A Complete Guide Cloud Computing
A Complete Guide Cloud ComputingA Complete Guide Cloud Computing
A Complete Guide Cloud Computing
 
INTEGRATED CIRCUIT
INTEGRATED CIRCUITINTEGRATED CIRCUIT
INTEGRATED CIRCUIT
 
ANALOG TO DIGITAL AND DIGITAL TO ANALOG CONVERTER
ANALOG TO DIGITAL AND DIGITAL TO ANALOG CONVERTERANALOG TO DIGITAL AND DIGITAL TO ANALOG CONVERTER
ANALOG TO DIGITAL AND DIGITAL TO ANALOG CONVERTER
 
Processor
ProcessorProcessor
Processor
 
Storage device
Storage deviceStorage device
Storage device
 
configure IP address in command mode
configure IP address in command modeconfigure IP address in command mode
configure IP address in command mode
 
CCNA ALL IN ONE
CCNA ALL IN ONE CCNA ALL IN ONE
CCNA ALL IN ONE
 
Basics of computer
Basics of computerBasics of computer
Basics of computer
 
IEEE standards and Data Link Layer Protocol
IEEE standards and Data Link Layer ProtocolIEEE standards and Data Link Layer Protocol
IEEE standards and Data Link Layer Protocol
 
01.number systems
01.number systems01.number systems
01.number systems
 
Iso model
Iso modelIso model
Iso model
 
Raid Levels
Raid LevelsRaid Levels
Raid Levels
 
Network Security & Ethical Hacking
Network Security & Ethical HackingNetwork Security & Ethical Hacking
Network Security & Ethical Hacking
 
World Wide Web and Internet
World Wide Web and InternetWorld Wide Web and Internet
World Wide Web and Internet
 

Semelhante a Osi model with neworking overview

Data & comp. communication
Data & comp. communicationData & comp. communication
Data & comp. communicationAshwin Namewar
 
Networking Fundamentals
Networking FundamentalsNetworking Fundamentals
Networking FundamentalsRajet Veshin
 
Jaimin chp-1 - introduction - 2011 batch
Jaimin   chp-1  - introduction - 2011 batchJaimin   chp-1  - introduction - 2011 batch
Jaimin chp-1 - introduction - 2011 batchJaimin Jani
 
Introduction to Computer Networks
 Introduction to Computer Networks Introduction to Computer Networks
Introduction to Computer NetworksGhaffar Khan
 
Class_notes_InternetTechnology
Class_notes_InternetTechnologyClass_notes_InternetTechnology
Class_notes_InternetTechnologyGulrez Khan
 
Networking And Telecommunications
Networking And TelecommunicationsNetworking And Telecommunications
Networking And TelecommunicationsUMaine
 
Networks (Distributed computing)
Networks (Distributed computing)Networks (Distributed computing)
Networks (Distributed computing)Sri Prasanna
 
Networking
NetworkingNetworking
NetworkingSNancy
 
Computer Networks | Communication Networks
Computer Networks | Communication NetworksComputer Networks | Communication Networks
Computer Networks | Communication NetworksDr. Rahul Pandya
 

Semelhante a Osi model with neworking overview (20)

Data & comp. communication
Data & comp. communicationData & comp. communication
Data & comp. communication
 
Tcp ip
Tcp ipTcp ip
Tcp ip
 
Networking Fundamentals
Networking FundamentalsNetworking Fundamentals
Networking Fundamentals
 
Jaimin chp-1 - introduction - 2011 batch
Jaimin   chp-1  - introduction - 2011 batchJaimin   chp-1  - introduction - 2011 batch
Jaimin chp-1 - introduction - 2011 batch
 
Introduction to Computer Networks
 Introduction to Computer Networks Introduction to Computer Networks
Introduction to Computer Networks
 
Computer network basics
Computer network basicsComputer network basics
Computer network basics
 
Class_notes_InternetTechnology
Class_notes_InternetTechnologyClass_notes_InternetTechnology
Class_notes_InternetTechnology
 
Lecture 12
Lecture 12Lecture 12
Lecture 12
 
Networking And Telecommunications
Networking And TelecommunicationsNetworking And Telecommunications
Networking And Telecommunications
 
Networking
NetworkingNetworking
Networking
 
Networks (Distributed computing)
Networks (Distributed computing)Networks (Distributed computing)
Networks (Distributed computing)
 
nv.ppt
nv.pptnv.ppt
nv.ppt
 
Networking
NetworkingNetworking
Networking
 
COMPUTER NETWORKS
COMPUTER NETWORKSCOMPUTER NETWORKS
COMPUTER NETWORKS
 
Sem 1 Ch 5
Sem 1 Ch 5Sem 1 Ch 5
Sem 1 Ch 5
 
01 pengenalan
01 pengenalan01 pengenalan
01 pengenalan
 
Computer Networks | Communication Networks
Computer Networks | Communication NetworksComputer Networks | Communication Networks
Computer Networks | Communication Networks
 
computer network basics
computer network basicscomputer network basics
computer network basics
 
Networking.pptx
Networking.pptxNetworking.pptx
Networking.pptx
 
Networking.pptx
Networking.pptxNetworking.pptx
Networking.pptx
 

Último

Cyberprint. Dark Pink Apt Group [EN].pdf
Cyberprint. Dark Pink Apt Group [EN].pdfCyberprint. Dark Pink Apt Group [EN].pdf
Cyberprint. Dark Pink Apt Group [EN].pdfOverkill Security
 
EMPOWERMENT TECHNOLOGY GRADE 11 QUARTER 2 REVIEWER
EMPOWERMENT TECHNOLOGY GRADE 11 QUARTER 2 REVIEWEREMPOWERMENT TECHNOLOGY GRADE 11 QUARTER 2 REVIEWER
EMPOWERMENT TECHNOLOGY GRADE 11 QUARTER 2 REVIEWERMadyBayot
 
2024: Domino Containers - The Next Step. News from the Domino Container commu...
2024: Domino Containers - The Next Step. News from the Domino Container commu...2024: Domino Containers - The Next Step. News from the Domino Container commu...
2024: Domino Containers - The Next Step. News from the Domino Container commu...Martijn de Jong
 
Apidays New York 2024 - APIs in 2030: The Risk of Technological Sleepwalk by ...
Apidays New York 2024 - APIs in 2030: The Risk of Technological Sleepwalk by ...Apidays New York 2024 - APIs in 2030: The Risk of Technological Sleepwalk by ...
Apidays New York 2024 - APIs in 2030: The Risk of Technological Sleepwalk by ...apidays
 
Architecting Cloud Native Applications
Architecting Cloud Native ApplicationsArchitecting Cloud Native Applications
Architecting Cloud Native ApplicationsWSO2
 
DBX First Quarter 2024 Investor Presentation
DBX First Quarter 2024 Investor PresentationDBX First Quarter 2024 Investor Presentation
DBX First Quarter 2024 Investor PresentationDropbox
 
Web Form Automation for Bonterra Impact Management (fka Social Solutions Apri...
Web Form Automation for Bonterra Impact Management (fka Social Solutions Apri...Web Form Automation for Bonterra Impact Management (fka Social Solutions Apri...
Web Form Automation for Bonterra Impact Management (fka Social Solutions Apri...Jeffrey Haguewood
 
Navigating the Deluge_ Dubai Floods and the Resilience of Dubai International...
Navigating the Deluge_ Dubai Floods and the Resilience of Dubai International...Navigating the Deluge_ Dubai Floods and the Resilience of Dubai International...
Navigating the Deluge_ Dubai Floods and the Resilience of Dubai International...Orbitshub
 
AXA XL - Insurer Innovation Award Americas 2024
AXA XL - Insurer Innovation Award Americas 2024AXA XL - Insurer Innovation Award Americas 2024
AXA XL - Insurer Innovation Award Americas 2024The Digital Insurer
 
Biography Of Angeliki Cooney | Senior Vice President Life Sciences | Albany, ...
Biography Of Angeliki Cooney | Senior Vice President Life Sciences | Albany, ...Biography Of Angeliki Cooney | Senior Vice President Life Sciences | Albany, ...
Biography Of Angeliki Cooney | Senior Vice President Life Sciences | Albany, ...Angeliki Cooney
 
Cloud Frontiers: A Deep Dive into Serverless Spatial Data and FME
Cloud Frontiers:  A Deep Dive into Serverless Spatial Data and FMECloud Frontiers:  A Deep Dive into Serverless Spatial Data and FME
Cloud Frontiers: A Deep Dive into Serverless Spatial Data and FMESafe Software
 
presentation ICT roal in 21st century education
presentation ICT roal in 21st century educationpresentation ICT roal in 21st century education
presentation ICT roal in 21st century educationjfdjdjcjdnsjd
 
Strategize a Smooth Tenant-to-tenant Migration and Copilot Takeoff
Strategize a Smooth Tenant-to-tenant Migration and Copilot TakeoffStrategize a Smooth Tenant-to-tenant Migration and Copilot Takeoff
Strategize a Smooth Tenant-to-tenant Migration and Copilot Takeoffsammart93
 
[BuildWithAI] Introduction to Gemini.pdf
[BuildWithAI] Introduction to Gemini.pdf[BuildWithAI] Introduction to Gemini.pdf
[BuildWithAI] Introduction to Gemini.pdfSandro Moreira
 
Apidays New York 2024 - Passkeys: Developing APIs to enable passwordless auth...
Apidays New York 2024 - Passkeys: Developing APIs to enable passwordless auth...Apidays New York 2024 - Passkeys: Developing APIs to enable passwordless auth...
Apidays New York 2024 - Passkeys: Developing APIs to enable passwordless auth...apidays
 
"I see eyes in my soup": How Delivery Hero implemented the safety system for ...
"I see eyes in my soup": How Delivery Hero implemented the safety system for ..."I see eyes in my soup": How Delivery Hero implemented the safety system for ...
"I see eyes in my soup": How Delivery Hero implemented the safety system for ...Zilliz
 
MINDCTI Revenue Release Quarter One 2024
MINDCTI Revenue Release Quarter One 2024MINDCTI Revenue Release Quarter One 2024
MINDCTI Revenue Release Quarter One 2024MIND CTI
 
Emergent Methods: Multi-lingual narrative tracking in the news - real-time ex...
Emergent Methods: Multi-lingual narrative tracking in the news - real-time ex...Emergent Methods: Multi-lingual narrative tracking in the news - real-time ex...
Emergent Methods: Multi-lingual narrative tracking in the news - real-time ex...Zilliz
 
Apidays New York 2024 - The value of a flexible API Management solution for O...
Apidays New York 2024 - The value of a flexible API Management solution for O...Apidays New York 2024 - The value of a flexible API Management solution for O...
Apidays New York 2024 - The value of a flexible API Management solution for O...apidays
 
Exploring the Future Potential of AI-Enabled Smartphone Processors
Exploring the Future Potential of AI-Enabled Smartphone ProcessorsExploring the Future Potential of AI-Enabled Smartphone Processors
Exploring the Future Potential of AI-Enabled Smartphone Processorsdebabhi2
 

Último (20)

Cyberprint. Dark Pink Apt Group [EN].pdf
Cyberprint. Dark Pink Apt Group [EN].pdfCyberprint. Dark Pink Apt Group [EN].pdf
Cyberprint. Dark Pink Apt Group [EN].pdf
 
EMPOWERMENT TECHNOLOGY GRADE 11 QUARTER 2 REVIEWER
EMPOWERMENT TECHNOLOGY GRADE 11 QUARTER 2 REVIEWEREMPOWERMENT TECHNOLOGY GRADE 11 QUARTER 2 REVIEWER
EMPOWERMENT TECHNOLOGY GRADE 11 QUARTER 2 REVIEWER
 
2024: Domino Containers - The Next Step. News from the Domino Container commu...
2024: Domino Containers - The Next Step. News from the Domino Container commu...2024: Domino Containers - The Next Step. News from the Domino Container commu...
2024: Domino Containers - The Next Step. News from the Domino Container commu...
 
Apidays New York 2024 - APIs in 2030: The Risk of Technological Sleepwalk by ...
Apidays New York 2024 - APIs in 2030: The Risk of Technological Sleepwalk by ...Apidays New York 2024 - APIs in 2030: The Risk of Technological Sleepwalk by ...
Apidays New York 2024 - APIs in 2030: The Risk of Technological Sleepwalk by ...
 
Architecting Cloud Native Applications
Architecting Cloud Native ApplicationsArchitecting Cloud Native Applications
Architecting Cloud Native Applications
 
DBX First Quarter 2024 Investor Presentation
DBX First Quarter 2024 Investor PresentationDBX First Quarter 2024 Investor Presentation
DBX First Quarter 2024 Investor Presentation
 
Web Form Automation for Bonterra Impact Management (fka Social Solutions Apri...
Web Form Automation for Bonterra Impact Management (fka Social Solutions Apri...Web Form Automation for Bonterra Impact Management (fka Social Solutions Apri...
Web Form Automation for Bonterra Impact Management (fka Social Solutions Apri...
 
Navigating the Deluge_ Dubai Floods and the Resilience of Dubai International...
Navigating the Deluge_ Dubai Floods and the Resilience of Dubai International...Navigating the Deluge_ Dubai Floods and the Resilience of Dubai International...
Navigating the Deluge_ Dubai Floods and the Resilience of Dubai International...
 
AXA XL - Insurer Innovation Award Americas 2024
AXA XL - Insurer Innovation Award Americas 2024AXA XL - Insurer Innovation Award Americas 2024
AXA XL - Insurer Innovation Award Americas 2024
 
Biography Of Angeliki Cooney | Senior Vice President Life Sciences | Albany, ...
Biography Of Angeliki Cooney | Senior Vice President Life Sciences | Albany, ...Biography Of Angeliki Cooney | Senior Vice President Life Sciences | Albany, ...
Biography Of Angeliki Cooney | Senior Vice President Life Sciences | Albany, ...
 
Cloud Frontiers: A Deep Dive into Serverless Spatial Data and FME
Cloud Frontiers:  A Deep Dive into Serverless Spatial Data and FMECloud Frontiers:  A Deep Dive into Serverless Spatial Data and FME
Cloud Frontiers: A Deep Dive into Serverless Spatial Data and FME
 
presentation ICT roal in 21st century education
presentation ICT roal in 21st century educationpresentation ICT roal in 21st century education
presentation ICT roal in 21st century education
 
Strategize a Smooth Tenant-to-tenant Migration and Copilot Takeoff
Strategize a Smooth Tenant-to-tenant Migration and Copilot TakeoffStrategize a Smooth Tenant-to-tenant Migration and Copilot Takeoff
Strategize a Smooth Tenant-to-tenant Migration and Copilot Takeoff
 
[BuildWithAI] Introduction to Gemini.pdf
[BuildWithAI] Introduction to Gemini.pdf[BuildWithAI] Introduction to Gemini.pdf
[BuildWithAI] Introduction to Gemini.pdf
 
Apidays New York 2024 - Passkeys: Developing APIs to enable passwordless auth...
Apidays New York 2024 - Passkeys: Developing APIs to enable passwordless auth...Apidays New York 2024 - Passkeys: Developing APIs to enable passwordless auth...
Apidays New York 2024 - Passkeys: Developing APIs to enable passwordless auth...
 
"I see eyes in my soup": How Delivery Hero implemented the safety system for ...
"I see eyes in my soup": How Delivery Hero implemented the safety system for ..."I see eyes in my soup": How Delivery Hero implemented the safety system for ...
"I see eyes in my soup": How Delivery Hero implemented the safety system for ...
 
MINDCTI Revenue Release Quarter One 2024
MINDCTI Revenue Release Quarter One 2024MINDCTI Revenue Release Quarter One 2024
MINDCTI Revenue Release Quarter One 2024
 
Emergent Methods: Multi-lingual narrative tracking in the news - real-time ex...
Emergent Methods: Multi-lingual narrative tracking in the news - real-time ex...Emergent Methods: Multi-lingual narrative tracking in the news - real-time ex...
Emergent Methods: Multi-lingual narrative tracking in the news - real-time ex...
 
Apidays New York 2024 - The value of a flexible API Management solution for O...
Apidays New York 2024 - The value of a flexible API Management solution for O...Apidays New York 2024 - The value of a flexible API Management solution for O...
Apidays New York 2024 - The value of a flexible API Management solution for O...
 
Exploring the Future Potential of AI-Enabled Smartphone Processors
Exploring the Future Potential of AI-Enabled Smartphone ProcessorsExploring the Future Potential of AI-Enabled Smartphone Processors
Exploring the Future Potential of AI-Enabled Smartphone Processors
 

Osi model with neworking overview

  • 1. OSI MODELOSI MODEL WITHWITH NETWORKING OVERVIEWNETWORKING OVERVIEW
  • 3. Network “ ... communication system for connecting end-systems” End-systems a.k.a. “hosts” PCs, workstations dedicated computers network components
  • 4. Multiaccess vs. Point-to-point  Multiaccess means shared medium.  many end-systems share the same physical communication resources (wire, frequency, ...)  There must be some arbitration mechanism.  Point-to-point  only 2 systems involved  no doubt about where data came from !
  • 6. LAN - Local Area Network  connects computers that are physically close together ( < 1 mile).  high speed  multi-access  Technologies:  Ethernet 10 Mbps, 100Mbps  Token Ring16 Mbps  FDDI 100 Mbps
  • 7. WAN - Wide Area Network  connects computers that are physically far apart. “long-haul network”.  typically slower than a LAN.  typically less reliable than a LAN.  point-to-point  Technologies:  telephone lines  Satellite communications
  • 8. MAN - Metropolitan Area Network  Larger than a LAN and smaller than a WAN - example: campus-wide network - multi-access network  Technologies:  coaxial cable  microwave
  • 9. Internetwork  Connection of 2 or more distinct (possibly dissimilar) networks.  Requires some kind of network device to facilitate the connection. Net A Net B
  • 10. OSI Reference Model  Layered model: 7. Application 6. Presentation 5. Session 4. Transport 3. Network 2. Data Link 1. Physical
  • 11. The Physical Layer  Responsibility:  transmission of raw bits over a communication channel.  Issues:  mechanical and electrical interfaces  time per bit  distances
  • 12. Data Link Layer - Data Link Control  Responsibility:  provide an error-free communication link  Issues:  framing (dividing data into chunks)  header & trailer bits  addressing 10110110101 01100010011 10110000001
  • 13. Data Link Layer – The MAC sub layer  Medium Access Control - needed by mutiaccess networks.  MAC provides DLC with “virtual wires” on multiaccess networks.
  • 14. The Network Layer  Responsibilities:  path selection between end-systems (routing).  subnet flow control.  fragmentation & reassembly  translation between different network types.  Issues:  packet headers  virtual circuits
  • 15. The Transport Layer  Responsibilities:  provides virtual end-to-end links between peer processes.  end-to-end flow control  Issues:  headers  error detection  reliable communication
  • 16. The Session Layer  Responsibilities:  establishes, manages, and terminates sessions between applications.  service location lookup  Many protocol suites do not include a session layer.
  • 17. The Presentation Layer  Responsibilities:  data encryption  data compression  data conversion  Many protocol suites do not include a Presentation Layer.
  • 18. The Application Layer  Responsibilities:  anything not provided by any of the other layers  Issues:  application level protocols  appropriate selection of “type of service”
  • 19. Layering & Headers  Each layer needs to add some control information to the data in order to do it’s job.  This information is typically prepended to the data before being given to the lower layer.  Once the lower layers deliver the the data and control information - the peer layer uses the control information.
  • 21. What are the headers? Physical: no header - just a bunch of bits. Data Link:  address of the receiving endpoints  address of the sending endpoint  length of the data  checksum.
  • 22. Network layer header - examples  protocol suite version  type of service  length of the data  packet identifier  fragment number  time to live protocolprotocol header checksumheader checksum source networksource network addressaddress destination networkdestination network addressaddress
  • 23. Important Summary  Data-Link: communication between machines on the same network.  Network: communication between machines on possibly different networks.  Transport: communication between processes (running on machines on possibly different networks).
  • 24. Connecting Networks  Repeater: physical layer  Bridge: data link layer  Router: network layer  Gateway: network layer and above.
  • 25. Repeater  Copies bits from one network to another  Does not look at any bits  Allows the extension of a network beyond physical length limitations REPEATER
  • 26. Bridge  Copies frames from one network to another  Can operate selectively - does not copy all frames (must look at data-link headers).  Extends the network beyond physical length limitations. BRIDGE
  • 27. Router  Copies packets from one network to another.  Makes decisions about what route a packet should take (looks at network headers). ROUTERROUTER
  • 28. Gateway  Operates as a router  Data conversions above the network layer.  Conversions: encapsulation - use an intermediate network translation - connect different application protocols encrpyption - could be done by a gateway
  • 29. Encapsulation Example  Provides service connectivity even though intermediate network does not support protocols. Gateway Gateway
  • 30. Translation  Translate from green protocol to brown protocol Gateway
  • 32. Hardware vs. Software  Repeaters are typically hardware devices.  Bridges can be implemented in hardware or software.  Routers & Gateways are typically implemented in software so that they can be extended to handle new protocols.  Many workstations can operate as routers or gateways.
  • 33. Multiplexing  “.. to combine many into one”.  Many processes sharing a single network interface.  A single process could use multiple protocols.  More on this when we look at TCP/IP.
  • 34. Modes of Service  connection-oriented vs. connectionless  sequencing  error-control  flow-control  byte stream vs. message based  full-duplex vs. half-duplex.
  • 35. Connection-Oriented vs. Connectionless Service  A connection-oriented service includes the establishment of a logical connection between 2 processes.  establish logical connection  transfer data  terminate connection.  Connectionless services involve sending of independent messages.
  • 36. Sequencing  Sequencing provides support for an order to communications.  A service that includes sequencing requires that messages (or bytes) are received in the same order they are sent.
  • 37. Error Control  Some services require error detection (it is important to know when a transmission error has occured).  Checksums provide a simple error detection mechanism.  Error control sometimes involves notification and retransmission.
  • 38. Flow Control  Flow control prevents the sending process from overwhelming the receiving process.  Flow control can be handled a variety of ways - this is one of the major research issues in the development of the next generation of networks (ATM).
  • 39. Byte Stream vs. Message  Byte stream implies an ordered sequence of bytes with no message boundaries.  Message oriented services provide communication service to chunks of data called datagrams.
  • 40. Full- vs. Half-Duplex  Full-Duplex services support the transfer of data in both directions.  Half-Duplex services support the transfer of data in a single direction.
  • 41. End-to-End vs. Hop-toHop  Many service modes/features such as flow control and error control can be done either: between endpoints of the communication. -or- between every 2 nodes on the path between the endpoints.
  • 44. Buffering  Buffering can provide more efficient communications.  Buffering is most useful for byte stream services. Process A Process B Send Buffer Recv. Buffer
  • 45. Addresses  Each communication endpoint must have an address.  Consider 2 processes communicating over an internet:  the network must be specified  the host (end-system) must be specified  the process must be specified.
  • 46. Addresses at Layers  Physical Layer: no address necessary  Data Link Layer - address must be able to select any host on the network.  Network Layer - address must be able to provide information to enable routing.  Transport Layer - address must identify the destination process.
  • 47. Broadcasts  Many networks support the notion of sending a message from one host to all other hosts on the network.  A special address called the “broadcast address” is often used.  Some popular network services are based on broadcasting (YP/NIS, rup, rusers)