Section 6: Upper Layers of the OSI Model CSIS 479R Fall 1999 “Network +” George D. Hickman, CNI, CNE.

Slides:



Advertisements
Similar presentations
Session Layer OSI Model.
Advertisements

Why to learn OSI reference Model? The answer is too simple that It tells us that how communication takes place between computers on internet but how??
CCNA – Network Fundamentals
OSI Model OSI MODEL.
OSI Model OSI LAYER / MODEL.
TCP/IP Protocol Suite 1 Chapter 18 Upon completion you will be able to: Remote Login: Telnet Understand how TELNET works Understand the role of NVT in.
Chapter Extension 7 How the Internet Works © 2008 Prentice Hall, Experiencing MIS, David Kroenke.
Chapter 15 – Part 2 Networks The Internal Operating System The Architecture of Computer Hardware and Systems Software: An Information Technology Approach.
Protocols and the TCP/IP Suite
OSI Model.
Network Architectures Week 3 – OSI and The Internet.
TCP: Software for Reliable Communication. Spring 2002Computer Networks Applications Internet: a Collection of Disparate Networks Different goals: Speed,
The OSI Model A layered framework for the design of network systems that allows communication across all types of computer systems regardless of their.
 The Open Systems Interconnection model (OSI model) is a product of the Open Systems Interconnection effort at the International Organization for Standardization.
Data Communications Network Models.
File Transfer Protocol (FTP)
OIS Model TCP/IP Model.
CHAPTER 3 1. THE OSI MODEL AND THE TCP/IP PROTOCOL SUITE  Outline: 1. Protocol Layers 2. OSI Model 3. TCP/IP Model 4. Addressing 2.
Communication Network Protocols Jaya Kalidindi CSC 8320(fall 2008)
The OSI Model and the TCP/IP Protocol Suite
CSCI-235 Micro-Computer in Science The Network. © Prentice-Hall, Inc Communications  Communication is the process of sending and receiving messages 
Protocol Architectures. Simple Protocol Architecture Not an actual architecture, but a model for how they work Similar to “pseudocode,” used for teaching.
Section 4 : The OSI Network Layer CSIS 479R Fall 1999 “Network +” George D. Hickman, CNI, CNE.
THE OSI MODEL AND THE TCP/IP PROTOCOL SUITE CS 1202 Lectur3 part2.
Chapter Nine The Session Layer. Objectives We’ll see how a new session is created, maintained, and dismantled. The process of logon authentication will.
Internet Addresses. Universal Identifiers Universal Communication Service - Communication system which allows any host to communicate with any other host.
© 2007 Cisco Systems, Inc. All rights reserved.Cisco Public ITE PC v4.0 Chapter 1 1 Application Layer Functionality and Protocols Network Fundamentals.
15 Semester 1 JEOPARDY IndirectnetworksupportDNSDNSNetworkApps.NetworkApps.MoreNetworkApps.Misc.Misc
Service Primitives Six service primitives that provide a simple connection-oriented service 4/23/2017
Open Systems and Data Link Protocols November 7, 2002.
Layer Architecture Layer architecture simplifies the network design. It is easy to debug network applications in a layered architecture network. The network.
The OSI Model An ISO (International standard Organization) that covers all aspects of network communications is the Open System Interconnection (OSI) model.
1 Version 3.0 Module 11 TCP Application and Transport.
COMPUTER NETWORKS Ms. Mrinmoyee Mukherjee Assistant Professor
Network Protocol Hierarchies
The OSI Model.
Chapter 15 – Part 2 Networks The Internal Operating System The Architecture of Computer Hardware and Systems Software: An Information Technology Approach.
Application Layer Honolulu Community College Cisco Academy Training Center Semester 1 Version
OSI Reference Model. Open Systems Interconnection (OSI) Model International standard organization (ISO) established a committee in 1977 to develop an.
Prepared by Engr.Jawad Ali BSc(Hons)Computer Systems Engineering University of Engineering and Technology Peshawar.
Network Protocols and Standards (Part 2). The OSI Model In 1984, the International Organization for Standardization (ISO) defined a standard, or set of.
Open System Interconnection Describe how information from a software application in one computer moves through a network medium to a software application.
Department of Computer Science Southern Illinois University Edwardsville Spring, 2008 Dr. Hiroshi Fujinoki FTP Protocol Programming.
Network Models.
Protocols Used for communications between entities in a system Used for communications between entities in a system Must speak the same language Must speak.
Protocol Suits and Layering Models OSI Model Dr. Abraham UTPA.
Overview of Data Communications and Networking
The OSI Model A Framework for Communications David A. Abarca July 19, 2005.
Computer Network Architecture Lecture 6: OSI Model Layers Examples 1 20/12/2012.
ENGS 112 Lecture 3 Packet Switching Chapter 3, Walrand WWW links, eg.
Data Communication Network Models
TCP/IP Protocol Suite Suresh Kr Sharma 1 The OSI Model and the TCP/IP Protocol Suite Established in 1947, the International Standards Organization (ISO)
Computer Engineering and Networks, College of Engineering, Majmaah University Protocols OSI reference MODEL TCp /ip model Mohammed Saleem Bhat
McGraw-Hill©The McGraw-Hill Companies, Inc., 2000 Lecture 3 : Network Architectures 1.
OSI Model OSI MODEL. Communication Architecture Strategy for connecting host computers and other communicating equipment. Defines necessary elements for.
OSI Model OSI MODEL.
THE OSI MODEL By: Omari Dasent.
The ISO OSI Reference Model
Layered Architectures
Lecturer, Department of Computer Application
DEPARTMENT OF COMPUTER SCIENCE
Net 323 D: Networks Protocols
File Transfer and access
Lec 5 Layers Computer Networks Al-Mustansiryah University
Chapter 2 (Handout 1– only sections 2.1, 2.2 and 2.3)
Chapter 3: Open Systems Interconnection (OSI) Model
Remote Login: Telnet Objectives Chapter 18
Net 323 D: Networks Protocols
Chapter 15 – Part 2 Networks The Internal Operating System
OSI Model OSI MODEL.
Presentation transcript:

Section 6: Upper Layers of the OSI Model CSIS 479R Fall 1999 “Network +” George D. Hickman, CNI, CNE

Objectives  Identify the purpose of the OSI Session Layer  Identify the characteristics of the three dialog control methods  Identify the elements of session administration

Objectives (con’t)  Identify the purpose of the OSI Presentation layer  Identify the characteristics of the translation methods that can be implemented at the Presentation layer

Objectives (con’t)  Identify the purpose of the OSI Application layer  Identify the characteristics of the two service advertisement methods used at the Application layer  Identify the characteristics of the service use methods used at the Application layer

Session layer  “The Session layer facilitates communications between service requesters and providers”

Processes and Methods--Session  Dialog Control –Simplex  one way –Half-Duplex   two way, one at a time –Full-Duplex  two way, concurrently  Session Administration –Connection establishment –Data transfer –Connection release

Connection Establishment  All subtasks needed for entities to recognize each other and agree to communicate –Verify login names and passwords –Establish connection ID numbers –Agreeing on which services are required, and for how long –Which entity begins the conversation –Coordinate acknowledgment numbering and retransmission procedures

Data Transfer  Maintains the connection, passes messages between entities –Transfer of data –Acknowledgement of data receipt (or NAK) –Resumption of interrupted communications

Connection Release  Ends communications session  Ended by agreement or loss of connection –If not ended by agreement, determined by lack of ACK/NAK

OSI Presentation Layer  Transforms data into a mutually agreed upon format (transfer syntax)  Computers and Network Applications can understand  Can also compress/expand, encrypt/decrypt data

Processes and Methods  Translation –Bit order –Byte order –Character code –File syntax  Encryption (Section 10) –Secret key –Public/private key

Translation methods  Bit Order –7, 8, 16, or 32 bits per “piece of data” –Order or reverse order  Byte Order –8 or 16 bits 2 bytes (16 bit) called a word –Intel processors are little-endian Reverse-byte ordering Least significant bit appears first –Motorola processors are big-endian Most significant bit appears first –Least significant bit is lowest binary value

Translation methods (con’t)  Character code –ASCII –EBCDIC –Shift-JIS  File syntax –PCs use a single entry file table (file name) –Macs use a double entry File name Application that created the file

OSI Application layer  NOT WordPerfect  “All processes and functions specific to each network service”  Lower 6 layers support network services, the Application layer provides the protocols to perform the functions or services

Processes and Methods  Network Services –Covered in section 1  Service Advertisement –Active –Passive  Service Use –OS call interception –Remote operation –Collaborative

Service Advertisement Methods  Active Service Advertisement –Periodic messages sent out to announce availability  Passive Service Advertisement –Servers register availability with a directory –Clients query directory for service location

Service Use Methods  OS Call Interception –Local OS is unaware a network exists  Remote operation –Client is aware of network, but server is unaware of client –Requests all appear internal  Collaborative computing –Network aware (Peer-to-peer networks) –Sharing processing abilities to accomplish a single task