Presentation is loading. Please wait.

Presentation is loading. Please wait.

The OSI Model.

Similar presentations


Presentation on theme: "The OSI Model."— Presentation transcript:

1 The OSI Model

2 Topics What are Protocols ? Why we need Protocols and Standards
The OSI Reference Model The Seven Layers of the Model Responsibilities of Each Layer The Application Layer The Presentation Layer The Session Layer The Transport Layer The Network Layer The Data Link Layer The Physical Layer

3 Không biết thằng này đang nói cái gì nữa ?
What are Protocols ? Let’s look at what happen: Oh my God, what did he say ? Không biết thằng này đang nói cái gì nữa ? They do not understand each other because they are using different languages.

4 What are Protocols ? (cont)
Now, Let’s look at what happens next: They can understand each other because they are using the same language.

5 What are Protocols ? (cont)
So in order for two people to speak to each other, the first thing they should to agree on is the language, or protocols, to use. Communication between hosts on the network is the same. When hosts begin communicating with each other, they first must agree on what protocols to use.

6 What are Protocols ? (cont)

7 What are Protocols ? (cont)
A group of protocol is called a protocol suite or a protocol stack. When combined with other protocols, the protocol group that result is called a protocol suite. TCP/IP, for example, is a protocol suite.

8 Why We Need Protocols and Standards
Rules – or protocols and standards – are important to ensure compatibility between different kinds of things However, before a protocol is accepted and widely implemented, it has to pass rigorous testing. So a standard framework is used to help design, compare, test, and evaluate protocols. Developing protocols is an ongoings (việc đang phát triển liên lục), ever-changing (luôn luôn thay đổi) science. As the industry is increasing so dynamically (sôi nổi) and rapidly.

9 The OSI Reference Model
For network communications to take place, hundreds of questions must be answered by a set of protocol (how, when, what…). Evaluating and working with these hundreds of questions would be unmanageable.

10 The OSI Reference Model (cont)
So, in 1977, the International Standards Organization (ISO) adopted the Open Standard Interconnection (OSI) model. The OSI model breaks down the many tasks involved in moving data from one host to another. Vào năm 1977 ISO đã chấp nhận OSI model The hundreds of questions are divided into seven smaller. The seven groups are called layers.

11 The OSI Reference Model (cont)
The OSI reference model is exactly that; it is only a model. If we think of the model as a set of questions that have to be answered, then the protocols are the answers. Any one protocol may answer only a few of the questions, or in other words, address specific layers in the model. By combining multiple protocols into a protocol suite, we can answer all the questions posed by the model.(Mô hình OSI ó thể trả lời những câu hỏi đặt ra)

12 The Seven Layers of the OSI Model
The goal of the OSI model is to break down the task of data communication into simple steps. These steps are called layers. The OSI model is made up of seven distinct layers. Each layer has certain responsibilities.

13 The Seven Layers of the OSI Model

14 Responsibilities of Each Layer
The purpose of each layer in the OSI model is to provide services to the layer above it. The higher layers do not need to what happened at the lower layers. Following is the process of moving data from one host to another:

15 IP Header 1 IP Header 1 IP Header 1 IP Header 1 IP Header 1 Frame Header I Frame Header IP Header 1 IP Header 1 I IP Header 1 IP Header 1 Frame Header I

16 The Application Layer The Website is delivered to you…
Let’s look at what is happening: You are surfing on the Internet… You type an address of a Website… Web Browser Web Server

17 The Application Layer Web Browser Web Server The Application layer is the top layer of the OSI model. The purpose of the Application layer is to manage communications between applications.

18 The Application Layer Example of the Application layer: File transfer
Electronic mail Terminal access Word processing Web Browser

19 The Presentation Layer
Let’s look at what is happening:

20 The Presentation Layer
The Presentation layer is the layer below the Application layer and above the Session layer. The Presentation ensures that the information that the application layer of one system sends out is readable by the application layer of another system.

21 The Presentation Layer
Actions of the Presentation layer: Format of data Data structure Data conversion Data compression Data encryption Examples of the Presentation layer: PICT – This is picture format used by Macintosh MIDI – The Musical Instrument Digital Interface is used for digitized music. MPEG – The Moving Picture Experts Group’s standard for the compression and coding of motion video for CDs. RTF – Rich Text Format is a file format that lets you exchange text files between different word processors, even in different operating systems.

22 The Session Layer Let’s look at what is happening:
Agreement : thỏa thuận

23 The Session Layer The Session is below the Presentation layer.
The Session layer establishes, manages, and terminates sessions between two communicating hosts.

24 The session layer Actions of the Session layer: Sessions Dialog
Conversations Data exchange Examples of the Session layer: Network File System (NFS) – Developed by Sun Microsystems and used with TCP/IP and Unix workstation to allow transparent access to remote resources. AppleTalk Session Protocol (ASP) – client/server mechanism, which both establishes and maintains sessions between AppleTalk client and server machines.

25 The Transport Layer The Transport layer is below the Session layer.
The Transport layer can guarantee that packets are received.

26 The Transport Layer The Transport layers segments and reassembles data into a data stream

27 The Transport Layer Connectionless transmission
Connection-oriented transmission The three-way handshake Flow control Acknowledgement Windowing

28 The Transport Layer The primary function of the Transport layer is to ensure that the data packets it receives from the Session layer arrive reliably. The Transport layer does this by using two types of transmissions: connectionless and connection oriented. The Transport layer also has the job of managing the speed of communication between devices. This is known as flow control.

29 The Transport Layer Connectionless transmissions
Let’s look at what happens: So he goes to the local Post Office and left the letter there Harry want to send mail to Wilson That’s OK. The letter is not important, it is just a friendly letter. The letter then delivered from the local Post Office through the Post Office system arrive at the Destination Post Office then delivered to Wilson But the letter may be lost on the way and never come to the destination.

30 The Transport Layer Connectionless transmissions (cont)
The second reason is that it’s OK if there is a good and reliable connection between the source and the destination (lease line) Working in the same way, with connectionless transmission using connectionless protocol, when Host A want to send data to Host B, it only put the packet onto the network and hope that it will be arrive at the destination. The advantage of connectionless transmission using connectionless protocol is that it is very fast. The first reason is that’s the data is not important The packets may be lost on the way (internet). But that’s OK.

31 The Transport Layer Connectionless transmissions (cont)
User Datagram Protocol (UDP) is an example of connectionless protocol Applications that use UDP to send their data information is DNS, TFTP….

32 The Transport Layer Connection-oriented transmissions
He then goes to the Local Post Office and send the letter in a certified form. It means that the Post Office guarantee the letter will arrive at the right destination. But this time, it is an important business letter. So he want Wilson phone him to acknowledge when Wilson receive the letter. Harry want to send mail to Wilson again. Let’s look at what happens: The letter then sent and when Wilson receives the letter and see that it is an important business letter, so he then phone Harry to acknowledge (báo cho biết) that he had received the letter. When Harry receive an acknowledge phone from Wilson, he is now stop worrying about the letter.

33 The Transport Layer Connection-oriented transmissions (cont)
When Host A receive an acknowledgement packet, it then stop worrying about the packet. Because Host A and Host B both use connection-oriented protocol to send and receive packets. So when Host B receive packet from A, it will send an acknowledge packet to specify that it has received. Working in the same way, with connection-oriented transmission using connection-oriented protocol, when Host A want to send data to Host B, it put the packet onto the network and wait for the destination to acknowledge of receiving packet. The advantage of connection-oriented transmission using connection-oriented protocol is that it is reliable although it has higher latency than connectionless protocol. But after waiting for a predefined time, Host A does not receive an acknowledgement packet from Host B, Host A will resend the packet and wait. The process happens until Host A receive an acknowledgement packet from Host B.

34 The Transport Layer Connectionless transmissions (cont)
Transmission Control Protocol (TCP) is an example of connection-oriented protocol Applications that use TCP to send their data information is DNS, FTP, HTTP, SMTP,…

35 The Transport Layer the three-way handshake
In connection-oriented transmission, both the sender and receiver have to join to the session. The receiver must know that the sender is sending packets in order to answer (acknowledgment) So, the sender must first establish a connection-oriented session with the receiver, which is called a call setup, or three-way handshake

36 The Transport Layer the three-way handshake (cont)
Let’s look at what happens: In the three-way handshake process, when Host A (sender) want to establish a session with Host B (receiver), it first send to the receiver a synchronize segment. Host A after receives the synchronize segment from Host B, it will send an acknowledgement segment to Host B to acknowledge to connection. Host B (receiver) after examine the synchronize packet from Host A, if agree, it will send acknowledgement synchronize segment to Host A. Synchronize (Can I talk to you ?) Connection Established Ack (Yes), Synchronize ( Can I talk to you ?) Data Transfer (send segments) Ack (Yes)

37 The Transport layer Flow Control
Once data transfer is in progress, congestion can occur for two reasons.

38 The Transport layer Flow Control (cont)
First, the sending device might be able to generate traffic faster than the network can transfer it.

39 The Transport layer Flow Control (cont)
The second reason is that multiple devices need to send data to the same destination.

40 The Transport layer Flow Control (cont)
When datagram arrive too quickly for a device to process, it temporarily stores them in memory.

41 The Transport layer Flow Control (cont)
If the datagrams are part of a small burst, this buffering solves the problem.

42 The Transport layer Flow Control (cont)
However, if the traffic continues at this rate, the device eventually exhausts its memory and must discard additional datagrams that arrive.

43 The Transport layer Flow Control (cont)
Instead of losing the data, the transport function can issue a “not ready” indicator to the sender.

44 The Transport layer Flow Control (cont)
This acts like a stop sign and signal the sender to discontinue sending segment traffic to the receiver.

45 The Transport layer Flow Control (cont)
After the receiving device has processed sufficient segments to free space in its buffer, the receiver sends a “ready transport “ indicator – which is like a go signal.

46 The Transport layer Flow Control (cont)
When they receives this indicator, the senders can resume segment transmission.

47 The Transport Layer Acknowledgement
The transport layer provide a reliable service regardless of the quality of the underlying network

48 The Transport Layer Acknowledgement (cont)
One technique that is used to guarantee reliable delivery is called positive acknowledgement (Thông báo xác thực) with retransmission. This requires the receiver to issue an acknowledgement message to the sender when it receivers data.

49 The Transport Layer Acknowledgement (cont)
The sender also start a timer when it sent a packet. If the timer expires before an acknowledgement is received, it retransmits the packet.

50 The Transport Layer Windowing
Acknowledging every data segment, however, has its drawback (điều trở ngại). If the sender has to wait for an acknowledgement of each data segment, the throughput will be very low.

51 The Transport Layer Windowing (cont)
The quantity of data segments (measured in bytes) that the transmitting machine is allowed to send without receiving an acknowledgment for them is called a window. the size of the window controls how much information is transferred from one end to the other You and I will use window size of 1 ? I agree

52 The Transport Layer Windowing (cont)
Now let’s examine an example with windows size of 3. You and I will use window size of 3 ? I agree

53 172.16.1.1 is in network attached to E2. So……
The Network Layer is in network attached to E2. So…… Let’s look at what is happening: E0 E1 E2

54 The Network Layer The Network layer, which is below the Transport layer. It is responsible for routing the packet based on its logical address. E0 E1 E2

55 The Network Layer Actions that the Network layer have to deal : (xử lý) with: Packets Route, routing table, routing protocol Logical address Fragmentation Examples of the Network layer protocols: Internet Protocol (IP) Internetwork Packet Exchange (IPX)

56 The Data Link Layer Let’s look at what is happening: So
But the network attached to S0 is a Frame Relay network So I have to re-encapsulate this packet into Frame Relay frame. Yeah, host is located in network attached to S0. Let’s look at what is happening: So This packet is destined for that is in network attached to my E0 interface. And my E0 is an Ethernet interface.

57 The Data Link Layer The Data Link layer is below the Network layer.
The Data Link layer is concerned with physical addressing. The Data Link layer provides the physical transmission of the data. MAC address B-02-EF-05

58 The Data Link Layer The Data Link layer is made up of 2 sublayers:
The Logical Link Control (LLC) sublayer. The Media Access Control (MAC) sublayer

59 The Data Link Layer Logical Link Control (LLC) sublayer
Logical Link Control (LLC) sublayer is responsible for identifying Network layer protocols and then encapsulating into frame But if the Network layer give me an IPX packet, I will encapsulate it into frame like If the Network layer give me an IP packet, I will encapsulate it into a frame like this

60 The Data Link Layer Media Access Control (MAC) sublayer
Media Access Control (MAC) sublayer defines how packets are placed on the media. If the network interface card (NIC) has RJ45 port and connected to crossover cable. I will transfer frame on pin 2 and receive frame on pin 3 But if the network interface card (NIC) has BNC port, I will transfer frame in another way.

61 The physical layer Transmission of an unstructured bit stream over a physical link between end systems. Electrical, mechanical, procedural and functional specifications Physical data rate Distances Physical connector

62 The physical layer For Example: UTP, STP, coaxial, Fiber cable
RJ45, RJ11 connector DB9, DB25 connector 10base2, 10base5, 100baseT, 1000baseTx


Download ppt "The OSI Model."

Similar presentations


Ads by Google