ISDS 4120 Project 1 DWAYNE CARRAL JR 3/27/15. There are seven layers which make up the OSI (Open Systems Interconnection Model) which is the model for.

Slides:



Advertisements
Similar presentations
Click to continue Network Protocols. Click to continue Networking Protocols A protocol defines the rules of procedures, which computers must obey when.
Advertisements

Why to learn OSI reference Model? The answer is too simple that It tells us that how communication takes place between computers on internet but how??
OSI MODEL Maninder Kaur
Networking Theory (Part 1). Introduction Overview of the basic concepts of networking Also discusses essential topics of networking theory.
Jacob Boston Josh Pfeifer. Definition of HyperText Transfer Protocol How HTTP works How Websites work GoDaddy.com OSI Model Networking.
OSI Model.
Open System Interconnection (OSI) Model
Introduction To Networking
Understanding Networks. Objectives Compare client and network operating systems Learn about local area network technologies, including Ethernet, Token.
OSI Model 7 Layers 7. Application Layer 6. Presentation Layer
Data Networking Fundamentals Unit 7 7/2/ Modified by: Brierley.
Network+ Guide to Networks, Fourth Edition
Protocol Reference Model of OSI
Gursharan Singh Tatla Transport Layer 16-May
Lecturer: Tamanna Haque Nipa
THE OSI REFERENCE MODEL Open Systems Interconnection Reference Model.
OSI Model. Open Systems Interconnection (OSI) is a set of internationally recognized, non-proprietary standards for networking and for operating system.
Data Communications and Networks
Presentation on Osi & TCP/IP MODEL
Computer Networks.  The OSI model is a framework containing seven layers that defines the protocols and devices used at each stage of the process when.
Characteristics of Communication Systems
Protocol Architectures. Simple Protocol Architecture Not an actual architecture, but a model for how they work Similar to “pseudocode,” used for teaching.
© 2007 Cisco Systems, Inc. All rights reserved.Cisco Public ITE PC v4.0 Chapter 1 1 Connecting to the Network Networking for Home and Small Businesses.
SEED Infotech Pvt. Ltd. 1 Networking in Java. SEED Infotech Pvt. Ltd. 2 Objectives of This Session Describe issues related to any type of network using.
Internet Addresses. Universal Identifiers Universal Communication Service - Communication system which allows any host to communicate with any other host.
© 2007 Cisco Systems, Inc. All rights reserved.Cisco Public 1 Version 4.0 Network Services Networking for Home and Small Businesses – Chapter 6.
Department of Electronic Engineering City University of Hong Kong EE3900 Computer Networks Introduction Slide 1 A Communications Model Source: generates.
Okay, here’s a scenario… You’re sitting at a computer…. Type in www. yourcompany.com As soon as you click on search your browser will ask your Operation.
OV Copyright © 2011 Element K Content LLC. All rights reserved. Networking Models  The OSI Model  The TCP/IP Model.
Protocols Rules governing the communication process, the language of the deal between the devices, must reflect Layers protocols define format, order of.
Information Flow Across the Internet. What is the Internet? A large group of computers that link together to form the Worldwide Area Network (WAN)
Chapter 15 – Part 2 Networks The Internal Operating System The Architecture of Computer Hardware and Systems Software: An Information Technology Approach.
Network+ Guide to Networks 5 th Edition Chapter 2 Networking Standards and the OSI Model.
Data Networking Fundamentals Chapter 7. Objectives In this chapter, you will learn to: Discuss basic networking concepts, including the elements common.
William Stallings Data and Computer Communications
INTRANETS MR ROSS UNIT 3 IT APPLICATIONS. DEFINITION An intranet is an internal, secured environment that has a similar look and feel to the Internet,
1 OSI and TCP/IP Models. 2 TCP/IP Encapsulation (Packet) (Frame)
Network Protocols and Standards (Part 2). The OSI Model In 1984, the International Organization for Standardization (ISO) defined a standard, or set of.
Individual Project 1 Sarah Pritchard. Fran, a customer of your company, would like to visit your company’s website from her home computer… How does your.
Net 221D:Computer Networks Fundamentals
SYSTEM ADMINISTRATION Chapter 2 The OSI Model. The OSI Model was designed by the International Standards Organization (ISO) as a structural framework.
The OSI Model A Framework for Communications David A. Abarca July 19, 2005.
OSI Model. Open Systems Interconnection (OSI) is a set of internationally recognized, non proprietary standards for networking and for operating system.
N ETWORKING Standards and Protocols. S TANDARDS AND P ROTOCOLS The OSI Model.
Voice Over Internet Protocol (VoIP) Copyright © 2006 Heathkit Company, Inc. All Rights Reserved Presentation 5 – VoIP and the OSI Model.
Internet Flow By: Terry Hernandez. Getting from the customers computer onto the internet Internet Browser
Data Communication Network Models
How Information Flows via the Internet By: Lee Farrell.
TCP/IP Protocol Suite Suresh Kr Sharma 1 The OSI Model and the TCP/IP Protocol Suite Established in 1947, the International Standards Organization (ISO)
Week #8 OBJECTIVES Chapter #5. CHAPTER 5 Making Networks Work Two Networking Models –OSI OPEN SYSTEMS INTERCONNECTION PROPOSED BY ISO –INTERNATIONAL STANDARDS.
Network Models. The OSI Model Open Systems Interconnection (OSI). Developed by the International Organization for Standardization (ISO). Model for understanding.
Mr. Sathish Kumar. M Department of Electronics and Communication Engineering I’ve learned that people will forget what you said, people will forget what.
The OSI Model. Understanding the OSI Model In early 1980s, manufacturers began to standardize networking so that networks from different manufacturers.
Networking Using the OSI Model.
The OSI Model Prof. Choong Seon HONG.
Distributed Systems.
Click to edit Master subtitle style
The OSI Model and the TCP/IP Protocol Suite
Layered Architectures
Understanding the OSI Reference Model
Data Networking Fundamentals
How Data Flows through the Internet
The OSI Model and the TCP/IP Protocol Suite
Chapter 3: Open Systems Interconnection (OSI) Model
OSI Model The Seven Layers
TCP/IP Protocol Suite: Review
The OSI 7 Layer Model Ben, Stuart, Charles.
The OSI Model and the TCP/IP Protocol Suite
OSI Reference Model Unit II
OSI Model 7 Layers 7. Application Layer 6. Presentation Layer
Presentation transcript:

ISDS 4120 Project 1 DWAYNE CARRAL JR 3/27/15

There are seven layers which make up the OSI (Open Systems Interconnection Model) which is the model for understanding and developing computer to computer communications. I'm explaining the process using these layers because the protocols and devices used in network connectivity are used throughout these processes.

In the application layer the customer types in the company's url ( into their internet browser and presses enter. If the customer is using Internet Explorer as their web browser Explorers API(application program interface) will transfer their request to the HTTP protocol. HTTP prompts lower-layer protocols to establish a connection between their computer and the webserver. Next, HTTP formats your request and sends “GET” request to tell the server which page they want to retrieve.

The Presentation Layer This layer often serves as a translator between data formats, such as various graphics file formats. It formats the data so that it can be read by different applications and hosts. It also performs coding and compression. The presentation layer is responsible for encryption and decryption in network communication. Basically in this layer it takes the data which is on the website that the customer views or receives and formats it so that it is viewable to them. Everything on the internet has a code which are represented by 1s ands 0s this is the computers language. It translates that language into our language so that we can see and view information. Encrypted message Binary Code Data Conversion Message Is decrypted

The session layer establishes the connection between two nodes for communication. One node will contact the other node to establish the connection. This would be the customer requesting access to our site. The receiving node will read the credentials and establish the connection. This is our site going through its authentication process. Once the session is open the customer can access everything we have available to them as the two nodes transfer information back and forth. The session layer keeps the session secure, synchronized and makes sure that only authorized nodes are connected to the session. Once the communication is finished, the session layer protocols will terminate the session. Node

The Transport layer protocols are responsible for delivering and verifying that the data arrives reliably, in the correct sequence and without errors. The transport Layer uses a protocol named TCP (Transmission Control Protocol) which is a connection oriented protocol that operates in the transport layer. Establishes a connection before sending data The customers computer sends a SYN packet to request a connection to the Web server. The Web server responds back with a SYN-ACK packet, or confirmation, to indicate that it is willing to make the connection. Then the customers computer replies back with it’s own ACK. A way to look at this process is when using a middleman to communicate and they ‘re going back and for the between parties. Once this connection is made, then the HTTP can request the Web page. To ensure integrity, connection oriented protocols, such as TCP, use a checksum. A checksum is a unique character string that allows the receiving node to determine if an arriving data unit exactly matches the data unit sent by the source. I think of this as the clerk at a dry cleaners checking to make sure that the customers receive the correct items of dry cleaning. Checksum

The Network Layer The primary function of the protocols in the Network layer is to translate network addresses into their physical counterparts and decide how to route data from the sender to the receiver. Each node on has two types of addresses. Network address – follow hierarchical addressing scheme and can be assigned through operating system software. Network addresses are also called network layer addresses, logical addresses or virtual addresses. Also known as an IP address (IPv4 or Ipv6) A network address is also a required component for connecting to the Internet. The IP address is what is used for communication. Without this its impossible for the customer to connect to the internet or for us to have how website available. Physical address – a fixed number associated with the device’s NIC; it is initially assigned by the manufacturer and stored on the NIC’s on-board memory. The NIC devices that enable a workstation, server, printer, or other node to receive and transmit data over the network media. The Physical Address is sometimes referred to as the Mac Address. The Mac address is the physical address located on the NIC which makes it unique to that NIC. Network layer protocols accept Transport layer segments and add logical addressing information in a network header. At this point, the data unit becomes a packet. Network layer protocols also determine the path from point A on one network to point B on another network by factoring in Delivery protocols, Network congestion, Quality of Service, Cost of alternative routes. Network CustomerServer

Data Link layer protocols divide data into distinct frames that can be transmitted by the Physical layer. It includes the raw data, or “payload”, as well as the network addresses of the sender and receiver and error checking and control information, which ensures the frame arrives without any problems. At the data link layer is where a switch operates which is a connectivity device that logically subdivides a network into smaller, individual collision domains. Switches can use the MAC addresses to transmit the data directly from our server to the customers Network without having to broadcast it to every computer attached to it. Server Switch Customers Network

The Physical Layer consists of the transmission medium (cables or wireless signals) that move the bits of data along the network. So in order for the customer to connect to our site its required for them to have some type of hub, switch, or router which is what connects everyone to the internet. An Ethernet connection is more than likely connected to one where as a wireless connection can connect multiple devices as long as they are within its range Ethernet Cable Router Hub

Referencing Dean, Tamara. Network Guide to Networks. 5th ed. Boston: Course Technology Cengage Learning, Print.