Presentation is loading. Please wait.

Presentation is loading. Please wait.

Introduction to TCP/IP and OSI model

Similar presentations


Presentation on theme: "Introduction to TCP/IP and OSI model"— Presentation transcript:

1 Introduction to TCP/IP and OSI model
3/25/2017 Mr. Naresh Sharma,

2 Mr. Naresh Sharma, http:\\nareshsir.com
More OSI Info Who made up the OSI? It was created by the International Organization for Standardization (ISO) ISO 3/25/2017 Mr. Naresh Sharma,

3 The Open System Interconnection Model (OSI)
The International Standards Organization (ISO) has developed a universal architecture for computer communications. This standard, Known as the open Systems Interconnection model, or OSI model. The purpose of OSI is to permit communications among devices made by manufacturers. 3/25/2017 Mr. Naresh Sharma,

4 Mr. Naresh Sharma, http:\\nareshsir.com
OSI Layers OSI has seven layers. Each layer represents a particular function. It could be, each function is preformed by a separate piece of hardware or software. Sometimes, a single program may performed the functions of several layers. All layers are necessary for communications to occur. 3/25/2017 Mr. Naresh Sharma,

5 Mr. Naresh Sharma, http:\\nareshsir.com
OSI Layers The ISO-OSI model chooses to divided the function of computer communications into seven layers, though more or fewer could have been chosen. 3/25/2017 Mr. Naresh Sharma,

6 What is the OSI Reference Model?
It is a conceptual framework specifying the network functions that occur at each layer It is a way of picturing how information travels through networks. 3/25/2017 Mr. Naresh Sharma,

7 OSI Reference Model (standard)
Any application process should be able to communicate freely with any any application process in any other computer that supports the same standards… The OSI Reference Model shows how this takes place. 3/25/2017 Mr. Naresh Sharma,

8 Mr. Naresh Sharma, http:\\nareshsir.com
OSI Reference Model The OSI reference model describes how data makes its way from application programs through a network medium to another application located on another computer on a network 3/25/2017 Mr. Naresh Sharma,

9 Mr. Naresh Sharma, http:\\nareshsir.com
Computer A Computer B To accomplish this task data must travel from the application layer to the physical layer on one computer across the network media and from the physical layer to the application layer of another computer 3/25/2017 Mr. Naresh Sharma,

10 OSI Reference Model Layers
The Application Layer provides services to application processes (such as electronic mail, file transfer, and terminal emulation) that are outside of the OSI model. • The application layer identifies and establishes the availability of intended communication partners (and the resources required to connect with them), synchronizes cooperating applications, and establishes agreement on procedures for error recovery and control of data integrity. 3/25/2017 Mr. Naresh Sharma,

11 Mr. Naresh Sharma, http:\\nareshsir.com
OSI Reference Model The Presentation Layer ensures that information sent by the application layer will be readable by the application layer of the receiving system. The presentation layer is also concerned with the data structures used by programs and therefore negotiates data transfer syntax for the application layer. 3/25/2017 Mr. Naresh Sharma,

12 OSI Reference Model The Session Layer establishes, manages, and terminates sessions between applications and manages data exchange between presentation layer entities (Ensures Interhost communication) 3/25/2017 Mr. Naresh Sharma,

13 Mr. Naresh Sharma, http:\\nareshsir.com
OSI Reference Model The Transport Layer is responsible for reliable network communication between end nodes. The transport layer provides mechanisms for the establishment, maintenance, and termination of virtual circuits, transport fault detection and recover, and information flow control. 3/25/2017 Mr. Naresh Sharma,

14 Mr. Naresh Sharma, http:\\nareshsir.com
OSI Reference Model The Network Layer provides connectivity and path selection between two end systems. The network layer is the layer at which routing occurs. 3/25/2017 Mr. Naresh Sharma,

15 Mr. Naresh Sharma, http:\\nareshsir.com
OSI Reference Model The Data Link Layer provides reliable transit of data across a physical link. The data link layer is concerned with physical addressing, network topology, line discipline, error notification, ordered delivery of frames, flow control. 3/25/2017 Mr. Naresh Sharma,

16 Mr. Naresh Sharma, http:\\nareshsir.com
OSI Reference Model The physical layer defines the electrical, mechanical, procedural, and functional specifications for activating, maintaining, and deactivating the physical link between end systems 3/25/2017 Mr. Naresh Sharma,

17 Mr. Naresh Sharma, http:\\nareshsir.com
OSI Reference Model Host Layers: } Provide accurate data delivery between computers Media Layers: } Control physical delivery of messages over a network 3/25/2017 Mr. Naresh Sharma,

18 Mr. Naresh Sharma, http:\\nareshsir.com
As data moves down through the layers of the OSI model, headers are added. Computer A 3/25/2017 Mr. Naresh Sharma,

19 Mr. Naresh Sharma, http:\\nareshsir.com
As data moves up through the layers of the OSI model, headers are removed. Computer B 3/25/2017 Mr. Naresh Sharma,

20 Mr. Naresh Sharma, http:\\nareshsir.com
OSI Reference Model There are other models by different vendors Most vendors use the OSI Model OSI is conceptual other than tangible Used to educate how networks function at each layer 3/25/2017 Mr. Naresh Sharma,

21 What does the OSI Model do?
It reduces complexity (from one big problem to 7 small ones) It standardizes interfaces It facilitates modular engineering It assures interoperable technology Accelerates evolution Simplifies teaching & learning 3/25/2017 Mr. Naresh Sharma,

22 Mr. Naresh Sharma, http:\\nareshsir.com
Review Time! Divide into two groups Play Jeopardy Bonus answer is the layer number 3/25/2017 Mr. Naresh Sharma,

23 Mr. Naresh Sharma, http:\\nareshsir.com
OSI Layers The Lowest layer, Known as physical Layer or Layer 1, is responsible for transmission of bits. Is always implemented by using hardware. Is encompasses the mechanical, electrical, and functional interface. Is the interface to the outside world using electronic signals as specified by interface standards. 3/25/2017 Mr. Naresh Sharma,

24 Mr. Naresh Sharma, http:\\nareshsir.com
OSI Layers The Data Link Layer, Or Layer 2, is responsible for ensuring error-free, reliable transmission of data. Scrutinizes the bits received to determine if errors occurred during transmission. Is able to request retransmission or correction of any errors using protocols. 3/25/2017 Mr. Naresh Sharma,

25 Mr. Naresh Sharma, http:\\nareshsir.com
OSI Layers The Network Layer, or Layer 3, is responsible for setting up the appropriate routing of messages throughout a network is concerned with he types of switching networks used to route the data Note: Physical, Data Link, and Network layers are usually referred to as the lower layers 3/25/2017 Mr. Naresh Sharma,

26 Mr. Naresh Sharma, http:\\nareshsir.com
OSI Layers The Transport Layer, or Layer 4, is responsible for isolating the function of the lower layers from the higher layers is responsible for monitoring the quality of the communication channel is responsible for selecting the most cost efficient communication service. accepts messages from higher layers, and breaks them down into messages that can be accepted by the lower layers 3/25/2017 Mr. Naresh Sharma,

27 Mr. Naresh Sharma, http:\\nareshsir.com
OSI Layers The Session Layer, or Layer 5, is responsible for terminating the connection requests a logical connection be established based on the end user’s request handles any necessary “log-on” and password procedures. 3/25/2017 Mr. Naresh Sharma,

28 Mr. Naresh Sharma, http:\\nareshsir.com
OSI Layers The Presentation Layer, or Layer 6, provides format and code conversion services handles any necessary conversion different character codes; example ASCII-to- EBCDIC 3/25/2017 Mr. Naresh Sharma,

29 Mr. Naresh Sharma, http:\\nareshsir.com
OSI Layers The Application Layer or Layer 7, provides access to the network for the end user determines the user’s capabilities on the network some Application Layer software, permit remote terminal to only access a host computer; other Application Layer software might also permit file transfers. 3/25/2017 Mr. Naresh Sharma,

30 The TCP/IP Protocol Suite
The TCP/IP Suite is a collection of protocols originally designed for use on an network connecting U.S. government agencies with universities performing research specifies protocols at various levels of the OSI model and covers a wide variety of tasks likely to be performed on an open network 3/25/2017 Mr. Naresh Sharma,

31 Comparison of ISO-OSI Model and the DOD (TCP/IP) Model
Source: Application Presentation Session Transport Host-to-Host Network Internet Data Link Network Access Physical 3/25/2017 Mr. Naresh Sharma,

32 Mr. Naresh Sharma, http:\\nareshsir.com
Layers How network hardware and software work together in layered fashion to make communication possible Each layer covers different network activities , equipment and protocols. 3/25/2017 Mr. Naresh Sharma,

33 Mr. Naresh Sharma, http:\\nareshsir.com
3/25/2017 Mr. Naresh Sharma,

34 Mr. Naresh Sharma, http:\\nareshsir.com
3/25/2017 Mr. Naresh Sharma,

35 Mr. Naresh Sharma, http:\\nareshsir.com
OSI Open Systems Interconnection developed by the International Organization for Standardization (ISO) has seven layers is a theoretical system delivered too late! TCP/IP is the de facto standard The Open Systems Interconnection (OSI) reference model was developed by the International Organization for Standardization (ISO - which is not an acronym but a word, derived from the Greek isos, meaning equal) as a model for a computer protocol architecture and as a framework for developing protocol standards. The OSI model consists of seven layers. The designers of OSI assumed that this model and the protocols developed within this model would come to dominate computer communications, eventually replacing proprietary protocol implementations and rival multivendor models such as TCP/IP. This has not happened. Although many useful protocols have been developed in the context of OSI, the overall seven-layer model has not flourished. Instead, the TCP/IP architecture has come to dominate. 3/25/2017 Mr. Naresh Sharma,

36 Mr. Naresh Sharma, http:\\nareshsir.com
OSI Layers Stallings DCC8e Figure 2.6 illustrates the OSI model and provides a brief definition of the functions performed at each layer. The intent of the OSI model is that protocols be developed to perform the functions of each layer. 3/25/2017 Mr. Naresh Sharma,

37 Mr. Naresh Sharma, http:\\nareshsir.com
Application Provides access to the OSI environment for users and also provides distributed information service Presentation Provides independence to the application process from difference in data representation (syntax) Session Provides the control structure for communication between application; establishes, manages ___ terminates connection (session) between cooperating applications. Transport Provides reliable, transparent transfer data between end points; provides end-to-end error recovery and flow control. network Provides upper layer with independence from the data transmission and switching technologies used to connect systems; responsible for establishing, maintaining, and terminating connections. Data Link Provides for the reliable transfer of information across the physical link; sends blocks of data (frames) with the necessary synchronization, error control ,and flow control Physical Concerned with transmission of unstructured bit stream over physical medium; deals with the mechanical, electrical, functional and procedural characteristics to access the physical 3/25/2017 Mr. Naresh Sharma,

38 Mr. Naresh Sharma, http:\\nareshsir.com
Physical Concerned with transmission of unstructured bit stream over physical medium Deals with the mechanical, electrical, functional and procedural characteristics to access the physical medium 0,1 – Volt, duration, transmission characteristic directions, connectors pins 3/25/2017 Mr. Naresh Sharma,

39 Mr. Naresh Sharma, http:\\nareshsir.com
Data Link Provides for the reliable transfer of information across the physical link Sends blocks of data (frames) with the necessary synchronization, error control and flow control Frame, acknowledgment from lost, duplicate Piggy backing 3/25/2017 Mr. Naresh Sharma,

40 Mr. Naresh Sharma, http:\\nareshsir.com
Network Provides upper layer with independence from the data transmission and switching technologies used to connect systems Responsible for establishing, maintaining, and terminating connections. Operations of subnet, Packet size Routing, congestion control network Addressing Accounting Broadcast networks 3/25/2017 Mr. Naresh Sharma,

41 Mr. Naresh Sharma, http:\\nareshsir.com
Transport Provides reliable, transparent transfer of data between end points Provides end-to-end error recovery and flow control. Addressing port, connection management Distinctive network connection, multiplexing 3/25/2017 Mr. Naresh Sharma,

42 Mr. Naresh Sharma, http:\\nareshsir.com
Session Provides the control structure for communication between applications Establishes, manages and terminates connections (sessions) between cooperating applications. Dialog management Token Management synchronization 3/25/2017 Mr. Naresh Sharma,

43 Mr. Naresh Sharma, http:\\nareshsir.com
Presentation Provides independence to the application processes from difference in data representation (syntax) ASCII , Unicode 3/25/2017 Mr. Naresh Sharma,

44 Mr. Naresh Sharma, http:\\nareshsir.com
Application Layer Provides access to the OSI environment for users Provides distributed information services. Web browsing (http) (smtp) 3/25/2017 Mr. Naresh Sharma,

45 Need For Protocol Architecture
data exchange can involve complex procedures, cf. file transfer example better if task broken into subtasks implemented separately in layers in stack each layer provides functions needed to perform comms for layers above using functions provided by layers below peer layers communicate with a protocol When computers, terminals, and/or other data processing devices exchange data, the procedures involved can be quite complex. eg. file transfer. There must be a data path between the two computers. But also need: Source to activate communications Path or inform network of destination Source must check destination is prepared to receive File transfer application on source must check destination file management system will accept and store file for his user May need file format translation Instead of implementing the complex logic for this as a single module, the task is broken up into subtasks, implemented separately. In a protocol architecture, the modules are arranged in a vertical stack, each layer in the stack performs a related subset of the functions. It relies on the next lower layer to perform more primitive functions. It provides services to the next higher layer. The peer layers communicate using a set of rules or conventions known as a protocol. 3/25/2017 Mr. Naresh Sharma,

46 Key Elements of a Protocol
syntax - data format semantics - control info & error handling timing - speed matching & sequencing Communication is achieved by having the corresponding, or peer, layers in two systems communicate. The peer layers communicate by means of formatted blocks of data that obey a set of rules or conventions known as a protocol. The key features of a protocol are: • Syntax: Concerns the format of the data blocks • Semantics: Includes control information for coordination and error handling • Timing: Includes speed matching and sequencing 3/25/2017 Mr. Naresh Sharma,

47 TCP/IP Protocol Architecture
developed by US Defense Advanced Research Project Agency (DARPA) for ARPANET packet switched network used by the global Internet protocol suite comprises a large collection of standardized protocols The TCP/IP protocol architecture is a result of protocol research and development conducted on the experimental packet-switched network, ARPANET, funded by the Defense Advanced Research Projects Agency (DARPA), and is generally referred to as the TCP/IP protocol suite. This protocol suite consists of a large collection of protocols that have been issued as Internet standards by the Internet Activities Board (IAB). 3/25/2017 Mr. Naresh Sharma,

48 Simplified Network Architecture
In general terms, communications can be said to involve three agents: applications (eg. file transfer), computers (eg. PCs & servers), and networks. These applications, and others, execute on computers that can often support multiple simultaneous applications. Computers are connected to networks, and the data to be exchanged are transferred by the network from one computer to another. Thus, data transfer involves first getting the data to the computer in which the application resides and then getting the data to the intended application within the computer. Can think of partitioning these tasks into 3 layers as shown. 3/25/2017 Mr. Naresh Sharma,

49 Mr. Naresh Sharma, http:\\nareshsir.com
TCP/IP Layers no official model but a working one Application layer Host-to-host, or transport layer Internet layer Network access layer Physical layer TCP/IP doesn’t have an “official” layer model (& it predates the OSI Reference Model we’ll introduce later), but it does have a “working” layer model, as shown. 3/25/2017 Mr. Naresh Sharma,

50 Mr. Naresh Sharma, http:\\nareshsir.com
Physical Layer concerned with physical interface between computer and network concerned with issues like: characteristics of transmission medium signal levels data rates other related matters The physical layer covers the physical interface between a data transmission device (e.g., workstation, computer) and a transmission medium or network. This layer is concerned with specifying the characteristics of the transmission medium, the nature of the signals, the data rate, and related matters. 3/25/2017 Mr. Naresh Sharma,

51 Mr. Naresh Sharma, http:\\nareshsir.com
Network Access Layer exchange of data between an end system and attached network concerned with issues like : destination address provision invoking specific services like priority access to & routing data across a network link between two attached systems allows layers above to ignore link specifics The network access layer is concerned with the exchange of data between an end system (server, workstation, etc.) and the network to which it is attached. The sending computer must provide the network with the address of the destination computer, so that the network may route the data to the appropriate destination. The sending computer may wish to invoke certain services, such as priority, that might be provided by the network. The specific software used at this layer depends on the type of network to be used; different standards have been developed for circuit switching, packet switching (e.g., frame relay), LANs (e.g., Ethernet), and others. Thus it makes sense to separate those functions having to do with network access into a separate layer. 3/25/2017 Mr. Naresh Sharma,

52 Mr. Naresh Sharma, http:\\nareshsir.com
Internet Layer (IP) routing functions across multiple networks for systems attached to different networks using IP protocol implemented in end systems and routers routers connect two networks and relays data between them The internet layer provides procedures used to allow data to traverse multiple interconnected networks, to provide communications between devices are attached to different networks. The Internet Protocol (IP) is used at this layer to provide the routing function across multiple networks. This protocol is implemented not only in the end systems but also in routers. A router is a processor that connects two networks and whose primary function is to relay data from one network to the other on its route from the source to the destination end system. 3/25/2017 Mr. Naresh Sharma,

53 Mr. Naresh Sharma, http:\\nareshsir.com
Transport Layer (TCP) common layer shared by all applications provides reliable delivery of data in same order as sent commonly uses TCP The host-to-host layer, or transport layer, collects mechanisms in a common layer shared by all applications to provide reliable delivery of data. Regardless of the nature of the applications, there is usually a requirement that data be exchanged reliably, ensuring that all of the data arrives at the destination application and that the data arrives in the same order in which they were sent. These mechanisms for providing reliability are essentially independent of the nature of the applications. The Transmission Control Protocol (TCP) is the most commonly used protocol to provide this functionality. 3/25/2017 Mr. Naresh Sharma,

54 Mr. Naresh Sharma, http:\\nareshsir.com
Application Layer provide support for user applications need a separate module for each type of application Finally, the application layer contains the logic needed to support the various user applications. For each different type of application, such as file transfer, a separate module is needed that is peculiar to that application. 3/25/2017 Mr. Naresh Sharma,

55 Mr. Naresh Sharma, http:\\nareshsir.com
OSI v TCP/IP There are a number of reasons why the TCP/IP architecture has come to dominate. Perhaps the most important is that the key TCP/IP protocols were mature and well tested at a time when similar OSI protocols were in the development stage. When businesses began to recognize the need for interoperability across networks, only TCP/IP was available and ready to go. Another reason is that the OSI model is unnecessarily complex, with seven layers to accomplish what TCP/IP does with fewer layers. Stallings DCC8e Figure 2.7 illustrates the layers of the TCP/IP and OSI architectures, showing roughly the correspondence in functionality between the two. 3/25/2017 Mr. Naresh Sharma,

56 Mr. Naresh Sharma, http:\\nareshsir.com
3/25/2017 Mr. Naresh Sharma,

57 Mr. Naresh Sharma, http:\\nareshsir.com
TCP/IP Applications have a number of standard TCP/IP applications such as Simple Mail Transfer Protocol (SMTP) File Transfer Protocol (FTP) Telnet A number of applications have been standardized to operate on top of TCP. We mention three of the most common here. The Simple Mail Transfer Protocol (SMTP) provides a basic electronic mail transport facility for transferring messages among separate hosts. The SMTP protocol does not specify the way in which messages are to be created; some local editing or native electronic mail facility is required. The target SMTP module will store the incoming message in a user's mailbox. The File Transfer Protocol (FTP) is used to send files from one system to another under user command. Both text and binary files are accommodated. FTP sets up a TCP connection to the target system for the exchange of control messages. Once a file transfer is approved, a second TCP data connection is set up for the data transfer, without the overhead of any headers or control information at the application level. When the transfer is complete, the control connection is used to signal the completion and to accept new file transfer commands. TELNET provides a remote logon capability, which enables a user at a terminal or personal computer to logon to a remote computer and function as if directly connected to that computer. The protocol was designed to work with simple scroll-mode terminals. Terminal traffic between User and Server TELNET is carried on a TCP connection. 3/25/2017 Mr. Naresh Sharma,

58 Mr. Naresh Sharma, http:\\nareshsir.com
Some TCP/IP Protocols Each layer in the TCP/IP protocol suite interacts with its immediate adjacent layers. This use of each individual layer is not required by the architecture. As Stallings DCC8e Figure 2.5 suggests, it is possible to develop applications that directly invoke the services of any one of the layers. Most applications require a reliable end-to-end protocol and thus make use of TCP. Some special-purpose applications do not need the services of TCP. Some of these applications, such as the Simple Network Management Protocol (SNMP), use an alternative end-to-end protocol known as the User Datagram Protocol (UDP); others may make use of IP directly. Applications that do not involve internetworking and that do not need TCP have been developed to invoke the network access layer directly. 3/25/2017 Mr. Naresh Sharma,


Download ppt "Introduction to TCP/IP and OSI model"

Similar presentations


Ads by Google