OSI Model Routing Connection-oriented/Connectionless Network Services.

Slides:



Advertisements
Similar presentations
Cisco 2 - Routers Perrine. J Page 14/30/2015 Chapter 10 TCP/IP Protocol Suite The function of the TCP/IP protocol stack is to transfer information from.
Advertisements

IST 201 Chapter 9. TCP/IP Model Application Transport Internet Network Access.
© 2007 Cisco Systems, Inc. All rights reserved.Cisco Public 1 Version 4.0 Communicating over the Network Network Fundamentals – Chapter 2.
Chapter Three Network Protocols.
Chapter 15 – Part 2 Networks The Internal Operating System The Architecture of Computer Hardware and Systems Software: An Information Technology Approach.
Lesson 7 – THE BUSINESS OF NETWORKING. TCP/IP and UDP Other Internet protocols Important Internet protocols OVERVIEW.
OSI Model.
Understanding Networks. Objectives Compare client and network operating systems Learn about local area network technologies, including Ethernet, Token.
Introduction To Networking
Introduction to Management Information Systems Chapter 5 Data Communications and Internet Technology HTM 304 Fall 07.
Defining Network Protocols Application Protocols –Application Layer –Presentation Layer –Session Layer Transport Protocols –Transport Layer Network Protocols.
Lecturer: Tamanna Haque Nipa
Chapter Eleven An Introduction to TCP/IP. Objectives To compare TCP/IP’s layered structure to OSI To review the structure of an IP address To look at.
Internet Vulnerabilities & Criminal Activities 1.2 – 9/12/2011 Structure of Internet Communications 1.2 – 9/12/2011 Structure of Internet Communications.
Data Communications and Networks
CN2668 Routers and Switches Kemtis Kunanuraksapong MSIS with Distinction MCTS, MCDST, MCP, A+
Midterm Review - Network Layers. Computer 1Computer 2 2.
Networking Basics TCP/IP TRANSPORT and APPLICATION LAYER Version 3.0 Cisco Regional Networking Academy.
Network Protocols. Why Protocols?  Rules and procedures to govern communication Some for transferring data Some for transferring data Some for route.
NetworkProtocols. Objectives Identify characteristics of TCP/IP, IPX/SPX, NetBIOS, and AppleTalk Understand position of network protocols in OSI Model.
Chapter 1 Overview Review Overview of demonstration network
Chapter 9.
Lecture 2 TCP/IP Protocol Suite Reference: TCP/IP Protocol Suite, 4 th Edition (chapter 2) 1.
Computer Networks.  The OSI model is a framework containing seven layers that defines the protocols and devices used at each stage of the process when.
Characteristics of Communication Systems
Common Devices Used In Computer Networks
1 © 2004, Cisco Systems, Inc. All rights reserved. Chapter 4 Routing Fundamentals and Subnets/ TCP/IP Transport and Application Layers.
Operating Systems Lesson 10. Networking Communications protocol is the set of standard rules for ◦ Data representation ◦ Signaling ◦ Authentication ◦
Huda AL_Omairl - Network 71 Protocols and Network Software.
Internet Addresses. Universal Identifiers Universal Communication Service - Communication system which allows any host to communicate with any other host.
© McLean HIGHER COMPUTER NETWORKING Lesson 1 – Protocols and OSI What is a network protocol Description of the OSI model.
1 Version 3.0 Module 11 TCP Application and Transport.
Chapter Three Network Protocols By JD McGuire ARP Address Resolution Protocol Address Resolution Protocol The core protocol in the TCP/IP suite that.
Chap 9 TCP/IP Andres, Wen-Yuan Liao Department of Computer Science and Engineering De Lin Institute of Technology
1 LAN Protocols (Week 3, Wednesday 9/10/2003) © Abdou Illia, Fall 2003.
Transmission Control Protocol TCP. Transport layer function.
Fall 2005 By: H. Veisi Computer networks course Olum-fonoon Babol Chapter 6 The Transport Layer.
Addressing Through the Layers  Data Link Layer Address  Network Layer Address.
CCNA 1 v3.0 Module 11 TCP/IP Transport and Application Layers.
Chapter 15 – Part 2 Networks The Internal Operating System The Architecture of Computer Hardware and Systems Software: An Information Technology Approach.
TCP/IP Honolulu Community College Cisco Academy Training Center Semester 2 Version 2.1.
15.1 Chapter 15 Connecting LANs, Backbone Networks, and Virtual LANs Copyright © The McGraw-Hill Companies, Inc. Permission required for reproduction or.
Networking Fundamentals Network Protocols. Protocol Rule for how networks communicate Each OSI layer handled by one or more protocols Protocol Suites.
Networking Basics CCNA 1 Chapter 11.
S305 – Network Infrastructure Chapter 5 Network and Transport Layers.
Individual Project 1 Sarah Pritchard. Fran, a customer of your company, would like to visit your company’s website from her home computer… How does your.
1 Bus topology network. 2 Data is sent to all computers, but only the destination computer accepts 02608c
OSI means Open System Interconnect model. OSI means Open System Interconnect model. Developed by the International Organization for Standardization in.
1 12-Jan-16 OSI network layer CCNA Exploration Semester 1 Chapter 5.
ISDS 4120 Project 1 DWAYNE CARRAL JR 3/27/15. There are seven layers which make up the OSI (Open Systems Interconnection Model) which is the model for.
CTC 228 – Computer Networks Fall 2015 Instructor: Robert Spengler.
Page 12/9/2016 Chapter 10 Intermediate TCP : TCP and UDP segments, Transport Layer Ports CCNA2 Chapter 10.
The OSI Model A Framework for Communications David A. Abarca July 19, 2005.
Voice Over Internet Protocol (VoIP) Copyright © 2006 Heathkit Company, Inc. All Rights Reserved Presentation 5 – VoIP and the OSI Model.
Network Models. The OSI Model Open Systems Interconnection (OSI). Developed by the International Organization for Standardization (ISO). Model for understanding.
The OSI Model. Understanding the OSI Model In early 1980s, manufacturers began to standardize networking so that networks from different manufacturers.
CIS 173 Networking Week #9 OBJECTIVES Chapter #6 Network Communications Protocols.
Application Layer Functionality and Protocols Abdul Hadi Alaidi
Networking Using the OSI Model.
OSI LAYERS.
Chapter 5 Network and Transport Layers
What the OSI Protocol Layers Do
Chapter Three Network Protocols.
Computing Over Distance
Find the Critical Path and the Time Required
Networking Essentials For Firewall-1 Administrators
OSI Reference Model Kashif Ishaq.
OSI Model 7 Layers 7. Application Layer 6. Presentation Layer
Open System Interconnect (OSI).
Presentation transcript:

OSI Model Routing Connection-oriented/Connectionless Network Services

Source Destination Application Layer Presentation Layer Session Layer Transport Layer Network Layer Data Link Layer Physical Layer Application Layer Presentation Layer Session Layer Transport Layer Network LayerData Link Layer Physical Layer Network

7 - Application Layer 6 - Presentation Layer 5 - Session Layer 4 - Transport Layer 3- Network Layer 2 - Data Link Layer 1- Physical Layer Supports transmission from services Uses: ftp, NFS, telnet Unit: message Provides data translation Uses: encryption, compression Unit: message Maintains connectivity until task completion Uses: RPC, netBIOS Unit: message Partitions/reconstructs message Uses/standards: TCP, UDP Unit: segment Delivers from logical device to logical device Uses/standards: IP, IPX, Appletalk Unit: packet Delivers from physical device to device Uses/standards: Ethernet, FDDI, T1 Unit: frame Transmits raw data through net equipment Uses/standards: RS-232, Unit: bit IDS firewall router bridge switch repeater

 Source: receive frame from data link transmit as raw bits  Wires & connections  Signal levels  Repeaters and hubs (amplifiers/splitters)  Frame stupid

 Logical link control  Destination: checks frames for integrity reconstruct packet from frame(s)  Media Access Control (MAC) addresses  Bridges and switches (connect by MAC)  Source: wraps packet within a frame forward frame to physical layer

Frame preamble 8 bytes to establish start of communication header 14 bytes including source MAC, destination MAC, frame length, frame type data (payload) 46 to 1500 bytes CRC 4 byte cyclic redundancy check MAC address - 6 bytes this machine: 00:0d:93:87:80:10 broadcast:

 Packets find their way through the network  Destination: packets received only if the logical device address matches the packet strip away frame header & CRC  Routers select network path based on logical address of destination  Source: wraps segment into a packet packet must contain network (IP) address

Bridges vs. Routers An IPv4 address consists of 4 octets. The range of an octet is 0 through 255. Class1st OctetSubnet MaskAvailable Addresses A B C D reserved for broadcast

 Handles message partitioning/reconstructing  Destination: gathers together segments identified by their sequence numbers  Examples: TCP - Transport Control Protocol UDP - User Datagram Protocol SPX - for IPX ATP - for AppleTalk  Source: accepts message from session layer partitions message into sequence of segments (will fit into frame)

 Maintains the complete “conversation”  Destination: listens & directs from port to service maintains service integrity (e.g. directing to proper window of web browser)  Source: attaches proper port address  performs encryption/decryption if needed.  note: headers are added later so not encrypted  typical services: SNMP, FTP, telnet, SMTP

A router connects logical networks. Its purpose is to route packets between subnets. Routing is performed according to routing tables. Four types of routers  static  distance vector  link state  label switching

Static Routing The routing table is manually configured. simple efficient routing good security (if properly configured) requires the most maintenance Distance Vector Routing The table is built from Routing Information Protocol. oldest, most popular, routing tables rely upon “advertised” hop information distance vector used to determine “best” routes vulnerable to spoofing

Link State Routing The table is built from Link State Protocol. LSP sends actual hop data. LSP frames can be requested from other routers uses some authentication (password & MD) Label Switching Routing The table is built from Multiprotocol Label Switching MPLS faster by permitting by using MAC packets include label(s) of routing info route efficiency (not just hop count) is used standards?

An issue of transport layer “etiquette” Parties must “shake hands” before communicating. TCP handshake Connection-oriented source dest. syn =, ack = syn flood attack Q: How could a firewall block incoming traffic & still allow acks? A:

Port/protocolServicePurpose 20 / tcpftp datatransfers file content 21 / tcpftptransfers ftp commands 22 / tcpsshsecure shell (remote access) 23 / tcptelnetremote computer login 25 / tcpsmtp delivery 43 / tcpwhoisInternet domain lookup 80 / tcphttpweb browser 110 / tcppoppop service 119 / tcpnntpnetwork news 143 / tcpimapimap service 161 / udpsnmpremote system management 443 / tcpsslsecure socket layer (tunnel) 445 / tcpsmbMS network file system 593 /tcpMS- RPC MS remote procedure call 1433 / tcpMS-SQLMS SQL server 1521OracleOracle SQL server Ports statically assigned Ports upper ports can be dynamically assigned Vulnerability: dynamic port assignment A defense:

7 - Application Layer 6 - Presentation Layer 5 - Session Layer 4 - Transport Layer 3- Network Layer 2 - Data Link Layer 1- Physical Layer OSI Model TCP/IP Protocols HTTPFTPTelnet TCP UDP Ethernet radio packet point- to-point IP