Comparison and Contrast between the OSI and TCP/IP Model
Introduction <ul><li>2 Main Protocol Models in Networking </li></ul><ul><li>Open System Interconnection Model (OSI) </li><...
Introduction <ul><li>The topics that we will be discussing would be based on the diagram below. </li></ul>  OSI TCP / IP A...
Outline <ul><li>Compare the protocol layers that correspond to each other.  </li></ul><ul><li>General Comparison </li></ul...
The Upper Layers   <ul><li>Session </li></ul><ul><li>Presentation </li></ul><ul><li>Application </li></ul>OSI TCP / IP App...
The Session Layer <ul><li>The Session layer  permits two parties to hold ongoing communications called a session across a ...
The Presentation Layer <ul><li>The Presentation Layer handles data format information for networked communications. This i...
The Application Layer <ul><li>The Application Layer is the top layer of the reference model. It provides a set of interfac...
Approaches use in constructing application entities <ul><li>The diagram below provides an overall view on the methods use ...
ISO Approach <ul><li>Sometime called  Horizontal Approach </li></ul><ul><li>OSI asserts that distributed applications oper...
TCP/IP Approach <ul><li>Sometime called  Vertical Approach </li></ul><ul><li>In TCP/IP, each application entity is compose...
Transport Layer <ul><li>The functionality of the transport layer is to provide “transparent transfer of data from a source...
Transport Layer <ul><li>Transport is responsible for creating and maintaining the basic end-to-end connection between comm...
OSI Transport Layer <ul><li>It takes the information to be sent and breaks it into individual packets that are sent and re...
OSI Transport Layer <ul><li>Transport Layer protocols include the capability to acknowledge the receipt of a packet; if no...
OSI Transport Layer <ul><li>Transport protocols can also mark packets with sequencing information so that the destination ...
OSI Transport Layer <ul><li>Transport protocols provide the capability for multiple application processes to access the ne...
TCP/IP Transport Layer <ul><li>Defines two standard transport protocols: TCP and UDP </li></ul><ul><li>TCP implements a re...
TCP/IP Transport Layer <ul><li>TCP provides reliable data transmission </li></ul><ul><li>UDP is useful in many application...
TCP/IP Transport Layer <ul><li>Many programs will use a separate TCP connection as well as a UDP connection </li></ul>
TCP/IP Transport Layer <ul><li>TCP is responsible for data recovery </li></ul><ul><ul><li>by providing a sequence number w...
TCP/IP Transport Layer <ul><li>Use of ACK </li></ul>
TCP/IP Transport Layer <ul><li>Flow control with  Window </li></ul><ul><ul><li>via specifying an acceptable range of seque...
TCP/IP Transport Layer <ul><li>TCP and UDP introduce the concept of  ports </li></ul><ul><li>Common ports and the services...
TCP/IP Transport Layer <ul><li>By specifying ports and including port numbers with TCP/UDP data,  multiplexing  is achieve...
Comparing Transport for both Models <ul><li>The features of UDP and TCP defined at TCP/IP Transport Layer correspond to ma...
Comparing Transport for both Models <ul><li>The TCP/IP and OSI architecture models both employ all connection and connecti...
Network vs. Internet <ul><li>Like all the other OSI Layers, the network layer provides both connectionless and connection-...
Network vs. Internet <ul><li>X.25 Packet Level Protocol – OSI’s Connection-oriented Network Protocol   </li></ul><ul><li>T...
Network vs. Internet <ul><li>Internet (IP) Addresses </li></ul><ul><ul><li>The lnternet network address is more commonly c...
Network vs. Internet <ul><li>OSI Network Layer Addressing </li></ul><ul><ul><li>ISO/IEC and CCITT jointly administer the g...
Network vs. Internet <ul><li>OSI Routing Architecture   </li></ul><ul><ul><li>End systems (ESs) and intermediate systems (...
Network vs. Internet <ul><li>TCP/IP Routing Architecture   </li></ul><ul><ul><li>The TCP/IP routing architecture looks ver...
Data link / Physical vs. Subnet <ul><li>Data link layer </li></ul><ul><ul><li>The function of the  Data Link Layer  is “pr...
Data link / Physical vs. Subnet <ul><li>Physical layer </li></ul><ul><ul><li>The function of the  Physical Layer  is to pr...
Data link / Physical vs. Subnet  <ul><li>Comparing to TCP/IP  </li></ul><ul><ul><li>These 2 layers of the OSI correspond  ...
Data link / Physical vs. Subnet <ul><li>Comparing to TCP/IP </li></ul><ul><ul><li>After much deliberation by organizations...
General Comparison <ul><li>Focus of Reliability Control </li></ul><ul><li>Roles of Host System </li></ul><ul><li>De-jure v...
Focus of Reliability Control <ul><li>Implementation of the OSI model places emphasis on providing a reliable data transfer...
Roles of Host System <ul><li>Hosts on OSI implementations do not handle network operations (simple terminal), but TCP/IP h...
De-jure vs. De-facto (OSI) <ul><li>OSI </li></ul><ul><ul><li>Standard legislated by official recognized body. (ISO) </li><...
De-jure vs. De-facto (TCP/IP) <ul><li>TCP/IP </li></ul><ul><ul><li>Standards adopted due to widespread use. (Internet) </l...
Upcoming SlideShare
Loading in...5
×

Osi

1,665

Published on

OSI Model

Published in: Education, Technology
0 Comments
2 Likes
Statistics
Notes
  • Be the first to comment

No Downloads
Views
Total Views
1,665
On Slideshare
0
From Embeds
0
Number of Embeds
0
Actions
Shares
0
Downloads
132
Comments
0
Likes
2
Embeds 0
No embeds

No notes for slide
  • There are two main models in the way we describe the transfer and the information flow between users on a network. They are the OSI model and the TCP/IP Stacks or protocol.
  • We will be going through the diagram or model shown here. As you can see the Osi model has 7 Layers while TCP/IP stacks only have 4 layers.
  • We will start by outlining the Layers of the OSI and TCP/IP Model. We will READ GENERAL COMPARISON&gt;&gt;&gt;&gt;
  • The Session Layer provides the mechanism for opening, closing and managing a session between end-user application processes, i.e. a semi-permanent dialogue. Communication sessions consist of requests and responses that occur between applications. In case of a connection loss this protocol may try to recover the connection. AppleTalk was actually a session level protocol, as well as netbios, which for the hackers among us is a wonderful entry point to old windows 2000, and 2003 servers.
  • The Presentation Layer is responsible for the delivery and formatting of information to the application layer for further processing or display. The Presentation Layer is the lowest layer at which application programmers consider data structure and presentation, instead of simply sending data in form of datagrams or packets between hosts. The idea is that the application layer should be able to point at the data to be moved, and the Presentation Layer will deal with the rest. Encryption is typically done at this level too, although it can be done on the Application , Session , Transport , or Network Layers; each having its own advantages and disadvantages.
  • In TCP/IP, the Application Layer contains all protocols and methods that fall into the realm of process-to-process communications across an Internet Protocol (IP) network. Application Layer methods use the underlying Transport Layer protocols to establish host-to-host connections.In the OSI model, the definition of its Application Layer is narrower in scope, explicitly distinguishing additional functionality above the Transport Layer at two additional levels, the Session Layer and the Presentation Layer . OSI specifies strict modular separation of functionality at these layers and provides protocol implementations for each layer. Telnet, FTP, DNS, and DHCP are all network protocols that operate at the Application Layer.
  • In computer networking , the Transport Layer provides end-to-end communication services for applications. Transport layers are contained in both the TCP/IP model ( RFC 1122 ), [2] which is the foundation of the Internet , and the Open Systems Interconnection (OSI) model of general networking.
  • The most well-known transport protocol is the Transmission Control Protocol (TCP). It lent its name to the title of the entire Internet Protocol Suite , TCP/IP . It is used for connection-oriented transmissions, whereas the connectionless User Datagram Protocol (UDP) is used for simpler messaging transmissions. TCP is the more complex protocol, due to its stateful design incorporating reliable transmission and data stream services.
  • Another port we use is 5405 whch is the connection point for NetSupport. Ports are essentially a place where a service is running and listening for traffic, how we handle these ports and the configuration on them help determine security, outside scope of this class.
  • All of our Routers use Layer3 or the Internet layer to operate. Routers function by using routing table and identifying the destination and routing it accordingly. This is just one step in the packing and unpacking of network packets
  • The data link layer devices such as the Switch operate there. Switches operate by making a connection to another device using the Mac address of said device. All network devices have a MAC Address. This is the unique physical identifier on a network. No two Mac addresses are supposed to be the same, however there are rare instances where they can be duplicated as each manufacturer gets a block of around 16 million. A hub operates at the physical layer. All a hub does is make a physical connection. It does not make any sort of connection between devices so all traffic is broadcasted to everyone on the network. This is extremely inefficient and hubs are for the most part phased out of networks as they create large amounts of congestion.
  • Osi

    1. 1. Comparison and Contrast between the OSI and TCP/IP Model
    2. 2. Introduction <ul><li>2 Main Protocol Models in Networking </li></ul><ul><li>Open System Interconnection Model (OSI) </li></ul><ul><li>Transport Control Protocol /Internet Protocol (TCP/IP) </li></ul>
    3. 3. Introduction <ul><li>The topics that we will be discussing would be based on the diagram below. </li></ul>  OSI TCP / IP Application (Layer7) Application Presentation (Layer6) Session (Layer 5) Transport (Layer 4) Transport Network (Layer 3) Internet Data Link (Layer 2) Subnet Physical (Layer 1)
    4. 4. Outline <ul><li>Compare the protocol layers that correspond to each other. </li></ul><ul><li>General Comparison </li></ul><ul><ul><li>Focus of Reliability Control </li></ul></ul><ul><ul><li>Roles of Host system </li></ul></ul><ul><ul><li>De-jure vs. De-facto </li></ul></ul>
    5. 5. The Upper Layers   <ul><li>Session </li></ul><ul><li>Presentation </li></ul><ul><li>Application </li></ul>OSI TCP / IP Application (Layer7) Application Presentation (Layer6) Session (Layer 5)
    6. 6. The Session Layer <ul><li>The Session layer permits two parties to hold ongoing communications called a session across a network . </li></ul><ul><li>Not found in TCP/IP model </li></ul><ul><li>In TCP/IP,its characteristics are provided by the TCP protocol. </li></ul><ul><li>(Transport Layer) </li></ul>
    7. 7. The Presentation Layer <ul><li>The Presentation Layer handles data format information for networked communications. This is done by converting data into a generic format that could be understood by both sides. </li></ul><ul><li>Not found in TCP/IP model </li></ul><ul><li>In TCP/IP, this function is provided by the Application Layer. </li></ul><ul><li>e.g. External Data Representation Standard (XDR) </li></ul><ul><li> Multipurpose Internet Mail Extensions (MIME) </li></ul>
    8. 8. The Application Layer <ul><li>The Application Layer is the top layer of the reference model. It provides a set of interfaces for applications to obtain access to networked services as well as access to the kinds of network services that support applications directly. </li></ul><ul><li>OSI - FTAM,VT,MHS,DS,CMIP </li></ul><ul><li>TCP/IP - FTP,SMTP,TELNET,DNS,SNMP </li></ul><ul><li>Although the notion of an application process is common to both, their approaches to constructing application entities is different. </li></ul>
    9. 9. Approaches use in constructing application entities <ul><li>The diagram below provides an overall view on the methods use by both the OSI and TCP/IP model. </li></ul>
    10. 10. ISO Approach <ul><li>Sometime called Horizontal Approach </li></ul><ul><li>OSI asserts that distributed applications operate over a strict hierarchy of layers and are constructed from a common tool kit of standardized application service elements. </li></ul><ul><li>In OSI, each distributed application service selects functions from a large common “toolbox” of application service element (ASEs) and complements these with application service elements that perform functions specific to given end-user service . </li></ul>
    11. 11. TCP/IP Approach <ul><li>Sometime called Vertical Approach </li></ul><ul><li>In TCP/IP, each application entity is composed of whatever set of function it needs beyond end to end transport to support a distributed communications service. </li></ul><ul><li>Most of these application processes builds on what it needs and assumes only that an underlying transport mechanism (datagram or connection) will be provided. </li></ul>
    12. 12. Transport Layer <ul><li>The functionality of the transport layer is to provide “transparent transfer of data from a source end open system to a destination end open system” (ISO / IEC 7498: 1984). </li></ul>OSI TCP / IP Transport (Layer 4) Transport (TCP/UDP)
    13. 13. Transport Layer <ul><li>Transport is responsible for creating and maintaining the basic end-to-end connection between communicating open systems, ensuring that the bits delivered to the receiver are the same as the bits transmitted by the sender; in the same order and without modification, loss or duplication </li></ul>
    14. 14. OSI Transport Layer <ul><li>It takes the information to be sent and breaks it into individual packets that are sent and reassembled into a complete message by the Transport Layer at the receiving node </li></ul><ul><li>Also provide a signaling service for the remote node so that the sending node is notified when its data is received successfully by the receiving node </li></ul>
    15. 15. OSI Transport Layer <ul><li>Transport Layer protocols include the capability to acknowledge the receipt of a packet; if no acknowledgement is received, the Transport Layer protocol can retransmit the packet or time-out the connection and signal an error </li></ul>
    16. 16. OSI Transport Layer <ul><li>Transport protocols can also mark packets with sequencing information so that the destination system can properly order the packets if they’re received out-of-sequence </li></ul><ul><li>In addition, Transport protocols provide facilities for insuring the integrity of packets and requesting retransmission should the packet become garbled when routed. </li></ul>
    17. 17. OSI Transport Layer <ul><li>Transport protocols provide the capability for multiple application processes to access the network by using individual local addresses to determine the destination process for each data stream </li></ul>
    18. 18. TCP/IP Transport Layer <ul><li>Defines two standard transport protocols: TCP and UDP </li></ul><ul><li>TCP implements a reliable data-stream protocol </li></ul><ul><ul><li>connection oriented </li></ul></ul><ul><li>UDP implements an unreliable data-stream </li></ul><ul><ul><li>connectionless </li></ul></ul>
    19. 19. TCP/IP Transport Layer <ul><li>TCP provides reliable data transmission </li></ul><ul><li>UDP is useful in many applications </li></ul><ul><ul><li>eg. Where data needs to be broadcasted or multicasted </li></ul></ul><ul><li>Primary difference is that UDP does not necessarily provide reliable data transmission </li></ul>
    20. 20. TCP/IP Transport Layer <ul><li>Many programs will use a separate TCP connection as well as a UDP connection </li></ul>
    21. 21. TCP/IP Transport Layer <ul><li>TCP is responsible for data recovery </li></ul><ul><ul><li>by providing a sequence number with each packet that it sends </li></ul></ul><ul><li>TCP requires ACK (ackowledgement) to ensure correct data is received </li></ul><ul><li>Packet can be retransmitted if error detected </li></ul>
    22. 22. TCP/IP Transport Layer <ul><li>Use of ACK </li></ul>
    23. 23. TCP/IP Transport Layer <ul><li>Flow control with Window </li></ul><ul><ul><li>via specifying an acceptable range of sequence numbers </li></ul></ul>
    24. 24. TCP/IP Transport Layer <ul><li>TCP and UDP introduce the concept of ports </li></ul><ul><li>Common ports and the services that run on them: </li></ul><ul><ul><ul><ul><ul><li>FTP 21 and 20 </li></ul></ul></ul></ul></ul><ul><ul><ul><ul><ul><li>telnet 23 </li></ul></ul></ul></ul></ul><ul><ul><ul><ul><ul><li>SMTP 25 </li></ul></ul></ul></ul></ul><ul><ul><ul><ul><ul><li>http 80 </li></ul></ul></ul></ul></ul><ul><ul><ul><ul><ul><li>POP3 110 </li></ul></ul></ul></ul></ul>
    25. 25. TCP/IP Transport Layer <ul><li>By specifying ports and including port numbers with TCP/UDP data, multiplexing is achieved </li></ul><ul><li>Multiplexing allows multiple network connections to take place simultaneously </li></ul><ul><li>The port numbers, along with the source and destination addresses for the data, determine a socket </li></ul>
    26. 26. Comparing Transport for both Models <ul><li>The features of UDP and TCP defined at TCP/IP Transport Layer correspond to many of the requirements of the OSI Transport Layer. There is a bit of bleed over for requirements in the session layer of OSI since sequence numbers, and port values can help to allow the Operating System to keep track of sessions, but most of the TCP and UDP functions and specifications map to the OSI Transport Layer. </li></ul>
    27. 27. Comparing Transport for both Models <ul><li>The TCP/IP and OSI architecture models both employ all connection and connectionless models at transport layer. However, the internet architecture refers to the two models in TCP/IP as simply “connections” and datagrams. But the OSI reference model, with its penchant for “precise” terminology, uses the terms connection-mode and connection-oriented for the connection model and the term connectionless-mode for the connectionless model. </li></ul>
    28. 28. Network vs. Internet <ul><li>Like all the other OSI Layers, the network layer provides both connectionless and connection-oriented services. As for the TCP/IP architecture, the internet layer is exclusively connectionless. </li></ul>OSI TCP / IP Network (Layer 3) Internet
    29. 29. Network vs. Internet <ul><li>X.25 Packet Level Protocol – OSI’s Connection-oriented Network Protocol </li></ul><ul><li>The CCITT standard for X.25 defines the DTE/DCE interface standard to provide access to a packet-switched network. It is the network level interface, which specifies a virtual circuit (VC) service. A source host must establish a connection (a VC) with the destination host before data transfer can take place. The network attempts to deliver packets flowing over a VC in sequence. </li></ul>
    30. 30. Network vs. Internet <ul><li>Internet (IP) Addresses </li></ul><ul><ul><li>The lnternet network address is more commonly called the “IP address.” It consists of 32 bits, some of which are allocated to a high-order network-number part and the remainder of which are allocated to a low-order host-number part. The distribution of bits - how many form the network number, and how many are therefore left for the host number - can be done in one of three different ways, giving three different classes of IP address </li></ul></ul>
    31. 31. Network vs. Internet <ul><li>OSI Network Layer Addressing </li></ul><ul><ul><li>ISO/IEC and CCITT jointly administer the global network addressing domain. The initial hierarchical decomposition of the NSAP address is defined by (ISO/IEC 8348). The standard specifies the syntax and the allowable values for the high-order part of the address - the Initial Domain Part (IDP), which consists of the Authority and Format Identifier (AFI) and the Initial Domain Identifier (IDI) - but specifically eschews constraints on or recommendations concerning the syntax or semantics of the domain specific part (DSP). </li></ul></ul>
    32. 32. Network vs. Internet <ul><li>OSI Routing Architecture </li></ul><ul><ul><li>End systems (ESs) and intermediate systems (ISs) use routing protocols to distribute (“advertise”) some or all of the information stored in their locally maintained routing information base. ESs and ISs send and receive these routing updates and use the information that they contain (and information that may be available from the local environment, such as information entered manually by an operator) to modify their routing information base. </li></ul></ul>
    33. 33. Network vs. Internet <ul><li>TCP/IP Routing Architecture </li></ul><ul><ul><li>The TCP/IP routing architecture looks very much like the OSI routing architecture. Hosts use a discovery protocol to obtain the identification of gateways and other hosts attached to the same network (subnetwork). Gateways within autonomous systems (routing domains) operate an interior gateway protocol (intradomain IS-IS routing protocol), and between autonomous systems, they operate exterior or border gateway protocols (interdomain routing protocols). The details are different but the principles are the same. </li></ul></ul>
    34. 34. Data link / Physical vs. Subnet <ul><li>Data link layer </li></ul><ul><ul><li>The function of the Data Link Layer is “provides for the control of the physical layer, and detects and possibly corrects errors which may occur” (IOS/IEC 7498:1984). In another words, the Data Link Layer transforms a stream of raw bits (0s and 1s) from the physical into a data frame and provides an error-free transfer from one node to another, allowing the layers above it to assume virtually error-free transmission </li></ul></ul>  OSI TCP / IP Data Link (Layer 2) Subnet Physical (Layer 1)
    35. 35. Data link / Physical vs. Subnet <ul><li>Physical layer </li></ul><ul><ul><li>The function of the Physical Layer is to provide “mechanical, electrical, functional, and procedural means to activate a physical connection for bit transmission” (ISO/IEC 7498:1984). Basically, this means that the typical role of the physical layer is to transform bits in a computer system into electromagnetic (or equivalent) signals for a particular transmission medium (wire, fiber, ether, etc.) </li></ul></ul>
    36. 36. Data link / Physical vs. Subnet <ul><li>Comparing to TCP/IP </li></ul><ul><ul><li>These 2 layers of the OSI correspond directly to the subnet layer of the TCP/IP model. </li></ul></ul><ul><ul><li>Majority of the time, the lower layers below the Interface or Network layer of the TCP/IP model are seldom or rarely discussed. The TCP/IP model does nothing but to high light the fact the host has to connect to the network using some protocol so it can send IP packets over it. Because the protocol used is not defines, it will vary from host to host and network to network </li></ul></ul>
    37. 37. Data link / Physical vs. Subnet <ul><li>Comparing to TCP/IP </li></ul><ul><ul><li>After much deliberation by organizations, it was decided that the Network Interface Layer in the TCP/IP model corresponds to a combination of the OSI Data Link Layer and network specific functions of the OSI network layer (eg IEEE 203.3). </li></ul></ul><ul><ul><li>Since these two layers deal with functions that are so inherently specific to each individual networking technology, the layering principle of grouping them together related functions is largely irrelevant. </li></ul></ul>
    38. 38. General Comparison <ul><li>Focus of Reliability Control </li></ul><ul><li>Roles of Host System </li></ul><ul><li>De-jure vs. De-facto </li></ul>
    39. 39. Focus of Reliability Control <ul><li>Implementation of the OSI model places emphasis on providing a reliable data transfer service, while the TCP/IP model treats reliability as an end-to-end problem. </li></ul><ul><li>Each layer of the OSI model detects and handles errors, all data transmitted includes checksums. The transport layer of the OSI model checks source-to-destination reliability. </li></ul><ul><li>In the TCP/IP model, reliability control is concentrated at the transport layer. The transport layer handles all error detection and recovery. The TCP/IP transport layer uses checksums, acknowledgments, and timeouts to control transmissions and provides end-to-end verification . </li></ul>
    40. 40. Roles of Host System <ul><li>Hosts on OSI implementations do not handle network operations (simple terminal), but TCP/IP hosts participate in most network protocols. TCP/IP hosts carry out such functions as end-to-end verification, routing, and network control. The TCP/IP internet can be viewed as a data stream delivery system involving intelligent hosts. </li></ul>
    41. 41. De-jure vs. De-facto (OSI) <ul><li>OSI </li></ul><ul><ul><li>Standard legislated by official recognized body. (ISO) </li></ul></ul><ul><ul><li>The OSI reference model was devised before the protocols were invented. This ordering means that the model was not biased toward one particular set of protocols, which made it quite general. The down side of this ordering is that the designers did not have much experience with the subject and did not have a good idea of which functionality to put in which layer. </li></ul></ul><ul><ul><li>Being general,the protocols in the OSI model are better hidden than in the TCP/IP model and can be replaced relatively easily as the technology changes. </li></ul></ul><ul><ul><li>Not so widespread as compared with TCP/IP. (complex , costly) </li></ul></ul><ul><ul><li>More commonly used as teaching aids. </li></ul></ul>
    42. 42. De-jure vs. De-facto (TCP/IP) <ul><li>TCP/IP </li></ul><ul><ul><li>Standards adopted due to widespread use. (Internet) </li></ul></ul><ul><ul><li>The protocols came first, and the model was really just a description of the existing protocols. There was no problem with the protocols fitting the model, but it is hardly possible to be use to describe other models . </li></ul></ul><ul><ul><li>“ Get the job done&quot; orientation. </li></ul></ul><ul><ul><li>Over the years it has handled most challenges by growing to meet the needs. </li></ul></ul><ul><ul><li>More popular standard for internetworking for several reasons : </li></ul></ul><ul><ul><ul><li>relatively simple and robust compared to alternatives such as OSI </li></ul></ul></ul><ul><ul><ul><li>available on virtually every hardware and operating system platform (often free) </li></ul></ul></ul><ul><ul><ul><li>the protocol suite on which the Internet depends. </li></ul></ul></ul>
    1. A particular slide catching your eye?

      Clipping is a handy way to collect important slides you want to go back to later.

    ×