Presentation is loading. Please wait.

Presentation is loading. Please wait.

Introduction to Computer Networks Introduction to Computer Networks.

Similar presentations


Presentation on theme: "Introduction to Computer Networks Introduction to Computer Networks."— Presentation transcript:

1

2 Introduction to Computer Networks Introduction to Computer Networks

3 Introducing Network Standards This lesson describes the Open Systems Interconnection (OSI) reference model. The OSI reference model represents the seven layers of the process by which data is packaged and transmitted from a sending application through the physical wires to the receiving application. The OSI reference model represents the seven layers of the process by which data is packaged and transmitted from a sending application through the physical wires to the receiving application.

4 Network Communications Network activity involves sending data from one computer to another.Network activity involves sending data from one computer to another. This complex process can be broken into discrete, sequential tasks. The sending computer must:This complex process can be broken into discrete, sequential tasks. The sending computer must: 1. Recognize the data.1. Recognize the data. 2. Divide the data into manageable chunks.2. Divide the data into manageable chunks. 3. Add information to each chunk to determine the receiver.3. Add information to each chunk to determine the receiver. 4. Add timing and error-checking information.4. Add timing and error-checking information. 5. Put the data on the network and send it.5. Put the data on the network and send it.

5 Protocol Stack Network client software operates at many different levels within the sending and receiving computers.Network client software operates at many different levels within the sending and receiving computers. Each of these levels, or tasks, is governed by one or more protocols.Each of these levels, or tasks, is governed by one or more protocols. These protocols, or rules of behavior, are standard specifications for formatting and moving the data.These protocols, or rules of behavior, are standard specifications for formatting and moving the data. When the sending and receiving computers follow the same protocols, communication is assured.When the sending and receiving computers follow the same protocols, communication is assured. Because of this layered structure, this is often referred to as the protocol stack.Because of this layered structure, this is often referred to as the protocol stack.

6 OSI Reference Model & Project 802 With the rapid growth of networking hardware and software, a need arose for standard protocols that could allow hardware and software from different vendors to communicate.With the rapid growth of networking hardware and software, a need arose for standard protocols that could allow hardware and software from different vendors to communicate. In response, two primary sets of standards were developed: the OSI reference model and a modification of that standard called Project 802.In response, two primary sets of standards were developed: the OSI reference model and a modification of that standard called Project 802. Acquiring a clear understanding of these models is an important first step in understanding the technical aspects of how a network functions.Acquiring a clear understanding of these models is an important first step in understanding the technical aspects of how a network functions.

7 The OSI Reference Model In 1978, the International Organization for Standardization (ISO) released a set of specifications that described network architecture for connecting dissimilar devices.In 1978, the International Organization for Standardization (ISO) released a set of specifications that described network architecture for connecting dissimilar devices. In 1984, the ISO released a revision of this model and called it the Open Systems Interconnection (OSI) reference model.In 1984, the ISO released a revision of this model and called it the Open Systems Interconnection (OSI) reference model. The 1984 revision has become an international standard and serves as a guide for networking.The 1984 revision has become an international standard and serves as a guide for networking. It provides a description of how network hardware and software work together in a layered fashion to make communications possible.It provides a description of how network hardware and software work together in a layered fashion to make communications possible.

8 A Layered Architecture The OSI reference model architecture divides network communication into seven layers. The model defines how each layer communicates and works with the layers immediately above and below it.The OSI reference model architecture divides network communication into seven layers. The model defines how each layer communicates and works with the layers immediately above and below it. Each layer covers different network activities, equipment, or protocols. The layers are separated from each other by boundaries called interfaces.Each layer covers different network activities, equipment, or protocols. The layers are separated from each other by boundaries called interfaces.

9 Relationships among OSI layers Each layer provides services to the next-higher layer and shields the upper layer from the details of how the services below it are actually implemented.Each layer provides services to the next-higher layer and shields the upper layer from the details of how the services below it are actually implemented. At the same time, each layer appears to be in direct communication with its associated layer on the other computer.At the same time, each layer appears to be in direct communication with its associated layer on the other computer. This provides a logical, or virtual, communicati on between peer layers.This provides a logical, or virtual, communicati on between peer layers.

10 Application Layer Layer 7, the topmost layer of the OSI reference model, is the application layer.Layer 7, the topmost layer of the OSI reference model, is the application layer. This layer relates to the services that directly support user applications, such as software for file transfers, database access, and e-mail.This layer relates to the services that directly support user applications, such as software for file transfers, database access, and e-mail. In other words, it serves as a window, or user interface, through which application processes can access network services.In other words, it serves as a window, or user interface, through which application processes can access network services. Application-layer protocols can be programs in themselves, such as FTP; or they can be used by other programs, such as SMTP.Application-layer protocols can be programs in themselves, such as FTP; or they can be used by other programs, such as SMTP.

11 Presentation Layer Layer 6, the presentation layer, defines the format used to exchange data among networked computers.Layer 6, the presentation layer, defines the format used to exchange data among networked computers. Within the sending computer, the presentation layer translates data from the format sent down from the application layer into a commonly recognized, intermediary format.Within the sending computer, the presentation layer translates data from the format sent down from the application layer into a commonly recognized, intermediary format. At the receiving computer, this layer translates the intermediary format into a format that can be useful to that computer's application layer.At the receiving computer, this layer translates the intermediary format into a format that can be useful to that computer's application layer. Other tasks include protocols converting, data encrypting, and data compressing.Other tasks include protocols converting, data encrypting, and data compressing.

12 Session Layer Layer 5, the session layer, allows two applications on different computers to open, use, and close a connection called a session.Layer 5, the session layer, allows two applications on different computers to open, use, and close a connection called a session. This layer is responsible for managing this dialog.This layer is responsible for managing this dialog. It performs name-recognition and other functions, such as security, that are needed to allow two applications to communicate over the network.It performs name-recognition and other functions, such as security, that are needed to allow two applications to communicate over the network. The session layer synchronizes user tasks by placing checkpoints in the data stream. The checkpoints break the data into smaller groups for error detection.The session layer synchronizes user tasks by placing checkpoints in the data stream. The checkpoints break the data into smaller groups for error detection.

13 Transport Layer Layer 4, the transport layer, ensures that packets are delivered error free, in sequence, and without losses or duplications.Layer 4, the transport layer, ensures that packets are delivered error free, in sequence, and without losses or duplications. This layer provides message repackaging, acknowledgment, retransmission, flow control and error handling.This layer provides message repackaging, acknowledgment, retransmission, flow control and error handling. Transmission Control Protocol (TCP) and Sequenced Packet Exchange (SPX) are examples of transport-layer protocols.Transmission Control Protocol (TCP) and Sequenced Packet Exchange (SPX) are examples of transport-layer protocols.

14 Network Layer Layer 3, the network layer, is responsible for addressing messages and translating logical addresses and names into physical addresses.Layer 3, the network layer, is responsible for addressing messages and translating logical addresses and names into physical addresses. This layer also determines the route from the source to the destination computer.This layer also determines the route from the source to the destination computer. It also manages traffic problems on the network, such as switching and routing of packets and controlling the congestion of data. It also manages traffic problems on the network, such as switching and routing of packets and controlling the congestion of data. This layer layer breaks data into packets for routing and reassembles at destination. IP and IPX are examples of network-layer protocols. This layer layer breaks data into packets for routing and reassembles at destination. IP and IPX are examples of network-layer protocols.

15 Data-Link Layer Layer 2, the data-link layer, sends data frames from the network layer to the physical layer.Layer 2, the data-link layer, sends data frames from the network layer to the physical layer. This layer packages raw bits from the physical layer into data frames in the receiving end, and do the bits error checking.This layer packages raw bits from the physical layer into data frames in the receiving end, and do the bits error checking.

16 Physical Layer Layer 1, the bottom layer of the OSI reference model, is the physical layer.Layer 1, the bottom layer of the OSI reference model, is the physical layer. This layer transmits the unstructured, raw bit stream over a physical medium.This layer transmits the unstructured, raw bit stream over a physical medium. This layer is totally hardware-oriented and deals with all aspects of establishing and maintaining a physical link between communicating computers. This layer is totally hardware-oriented and deals with all aspects of establishing and maintaining a physical link between communicating computers. This layer defines how the cable is attached to the NIC; and provides data encoding and bit synchronization. This layer defines how the cable is attached to the NIC; and provides data encoding and bit synchronization.

17 Data Packets Data packets are assembled and disassemble d according to the OSI reference model.Data packets are assembled and disassemble d according to the OSI reference model.

18 OSI Layers and Windows Windows compresses the seven layers into three layers: file system drivers, transport protocols, and NIC driversWindows compresses the seven layers into three layers: file system drivers, transport protocols, and NIC drivers

19 Software and Protocols This figure shows how software and protocols relate to the OSI reference model and the Windows model.This figure shows how software and protocols relate to the OSI reference model and the Windows model.


Download ppt "Introduction to Computer Networks Introduction to Computer Networks."

Similar presentations


Ads by Google