SlideShare a Scribd company logo
1 of 23
ComputerNetworks
OSIModel,TCP/IPModelandProtocols
1
Presented By:
Sweta Kumari Barnwal
Assistant professor
Arka Jain University
Jamshedpur, Jharkhand
Contents
2
• Introduction to Layers and Protocols.
• OSI Model
• OSI Model layer functioning.
• TCP/IP Model
• Addressing scheme
LayersWorking
3
OSIModel (Open System Interconnection)
4
• Firstly introduced in 1984 by ISO – ‘International
Organization of Standardization’.
• An open system is a set of protocols that allow any two
different systems to communicate.
• Protocols: Set of Rules.
• OSI model itself is not a protocol, it is a model that
define protocols for network communication.
• Seven separate but related layers.
• These 7 layers work collaboratively to transmit the data from
one person to another across the globe.
OSIModel Representation
5
Organizationof Layers
6
7 layers of OSI Model can be further divided
into three subgroup. Named as:
Layer 1
• Physical
• Data link
• Network
Layer 2
• Transpot
Layer 3
• Session
• Presentation
• Application
1. PhysicalLayer
7
The lowest layer of the OSI reference model is the physical layer. It
is responsible for the actual physical connection between the
devices. The physical layer contains information in the form
of bits.
Define physical transmission medium (Guided or Unguided).
Interface between devices and transmission medium.
Representation of bits:
PL consist of bits (0s and 1s), so, data -> bits ->signals
(electrical or optical).
Data rate
 Transmission rate (means the number of bits sent per
second).
Synchronization of bits:
Sender and receiver must not receive the same bit rate but must be
at same time (synchronized clock).
Continued…
8
Line configuration:
Connection (point-to-point or multipoint) of devices to
the medium.
Physical topology:
Topological Structure (Bus, Star, Mesh etc)
Transmission mode:
Simplex, half-duplex or full duplex.
2. DataLinkLayer
9
It is the second layer after physical layer. The data
link layer is responsible for maintaining the data link
between two hosts or nodes. There are several functions
performed by DLL:
Framing:
Arranging bit streams into Data Frames.
Physical addressing (machine address):
Add header to the frame to define the sender and receiver of the data
packet.
Flow Control;
Not to overload receiver
Error Control:
Error Free
Access Control:
Design Issues in Data Link Layer
10
The data link layer is divided into two sub-layers :
 Logical Link Control Sub-layer (LLC) –
Provides the logic for the data link , Thus it controls the
synchronization , flow control , and error checking functions of
the data link layer. Functions are –
(i) Error Recovery.
(ii) It performs the flow control operations.
(iii) User addressing.
 Media Access Control Sub-layer (MAC) –
It is the second sub-layer of data-link layer. It controls the flow
and multiplexing for transmission medium. Transmission of data
packets is controlled by this layer. This layer is responsible for
sending the data over the network interface card. Functions are-
(i) To perform the control of access to media.
(ii) It performs the unique addressing to stations directly
connected to LAN.
(iii) Detection of errors.
Continued…
11
Design issues with data link layer are :
 Services provided to the network layer –
The data link layer act as a service interface to the network layer. The principle
service is transferring data from network layer on sending machine to the
network layer on destination machine. This transfer also takes place via DLL
(Dynamic Link Library).
 Frame synchronization –
The source machine sends data in the form of blocks called frames to the
destination machine. The starting and ending of each frame should be identified
so that the frame can be recognized by the destination machine . .
 Flow control –
Flow control is done to prevent the flow of data frame at the receiver end. The
source machine must not send data frames at a rate faster than the capacity of
destination machine to accept them.
 Error control –
Error control is done to prevent duplication of frames. The errors introduced
during transmission from source to destination machines must be detected and
corrected at the destination machine.
3. NetworkLayer
12
Network layer works for the transmission of data from one host to the
other located in different networks. It also takes care of packet
routing i.e. selection of the shortest path to transmit the packet, from
the number of routes available. The sender & receiver’s IP address
are placed in the header by the network layer.
The functions of the Network layer are :
Routing: The network layer protocols determine which route is
suitable from source to destination. This function of network layer is
known as routing.
Logical Addressing: In order to identify each device on internetwork
uniquely, network layer defines an addressing scheme. The sender &
receiver’s IP address are placed in the header by network layer. Such
an address distinguishes each device uniquely and universally.
4.TransportLayer
13
Transport Layer (Layer 4) :
Transport layer provides services to application layer and takes services from network
layer. The data in the transport layer is referred to as Segments. It is responsible for the
End to End Delivery of the complete message. The transport layer also provides the
acknowledgement of the successful data transmission and re-transmits the data if an
error is found.
 Process-to-process delivery (applications)
 Service-point addressing:
Send data to the correct process on particular computer.
 Segmentation and reassembly
Divide into segments and assign sequence number.
Reassembly at destination according to sequence number.
 Connection control
Connectionless or connection oriented
 Flow control
 Error control
Without damage, loss or duplication
5. SessionLayer
14
This layer is responsible for establishment of connection, maintenance of sessions,
authentication and also ensures security.
The functions of the session layer are :
Session establishment, maintenance and termination: The layer allows the two
processes to establish, use and terminate a connection.
Synchronization : This layer allows a process to add checkpoints which are
considered as synchronization points into the data. These synchronization point
help to identify the error so that the data is re-synchronized properly, and ends of
the messages are not cut prematurely and data loss is avoided.
Dialog Controller : The session layer allows two systems to start communication
with each other in half-duplex or full-duplex.
6. PresentationLayer
15
It is also called the Translation layer. The data from the
application layer is extracted here and manipulated as per the
required format to transmit over the network.
The functions of the presentation layer are :
Translation : For example, ASCII to EBCDIC.
Encryption/ Decryption : Data encryption translates the data into
another form or code. The encrypted data is known as the cipher text
and the decrypted data is known as plain text. A key value is used
for encrypting as well as decrypting data.
Compression: Reduces the number of bits that need to be
transmitted on the network.
7.ApplicationLayer
16
At the very top of the OSI Reference Model stack of layers, we find
Application layer which is implemented by the network applications.
These applications produce the data, which has to be transferred over
the network. This layer also serves as a window for the application
services to access the network and for displaying the received
information to the user.
 User Interface
 File transfer, access and management
 Mail services
 Directory service (database)
Communication Between The Layers In
OSI Model
17
TCP/IP(Transmission Control Protocol /
Internet Protocol.
18
The OSI Model we just looked at is just a reference/logical model. It
was designed to describe the functions of the communication system
by dividing the communication procedure into smaller and simpler
components. But when we talk about the TCP/IP model, it was
designed and developed by Department of Defense (DoD) in 1960s
and is based on standard protocols. It stands for Transmission
Control Protocol/Internet Protocol. The TCP/IP model is a concise
version of the OSI model. It contains four layers, unlike seven layers
in the OSI model. It consist Four Layers.
 Process/Application Layer
 Host-to-Host/Transport Layer
 Internet Layer
 Network Access/Link Layer
r
TCP/IPModel
19
TCP/IPLayerFunctioning
20
1. Network Access Layer –This layer corresponds to the combination
of Data Link Layer and Physical Layer of the OSI model. It looks out
for hardware addressing and the protocols present in this layer allows
for the physical transmission of data.
2. Internet Layer –This layer parallels the functions of OSI’s Network
layer. It defines the protocols which are responsible for logical
transmission of data over the entire network.
3. Host-to-Host Layer – This layer is analogous to the transport layer
of the OSI model. It is responsible for end-to-end communication and
error-free delivery of data. It shields the upper-layer applications from
the complexities of data.
4. Application Layer –
This layer performs the functions of top three layers of the OSI model:
Application, Presentation and Session Layer. It is responsible for node-
to-node communication and controls user-interface specifications.
Comparison Between OSI &TCP/IP
21
Continued…
22
TCP/IP OSI
It refers to Transmission Control
Protocol/Internet Protocol.
It refers to Open Systems Interconnection.
It consist 5 layers. It has 7 layers.
It is more reliable It is less reliable
It does not have very strict boundaries. It has strict boundaries
It follows a horizontal approach. It follows a vertical approach.
It uses both session and presentation layer in
the application layer itself.
It uses different session and presentation
layers.
It developed protocols then model. It developed model then protocol.
Transport layer in TCP/IP does not provide
assurance delivery of packets.
In this model, transport layer provides
assurance delivery of packets.
This model network layer only provides
connection less services.
Connection less and connection oriented both
services are provided by network layer in OSI
model.
Protocols cannot be replaced easily in TCP/IP
model.
While in OSI model, Protocols are better
covered and is easy to replace with the change
in technology.
Thank you
23

More Related Content

What's hot

TCP-IP Reference Model
TCP-IP Reference ModelTCP-IP Reference Model
TCP-IP Reference ModelMukesh Tekwani
 
Introduction to distributed system
Introduction to distributed systemIntroduction to distributed system
Introduction to distributed systemishapadhy
 
CNIT 123 Ch 10: Hacking Web Servers
CNIT 123 Ch 10: Hacking Web ServersCNIT 123 Ch 10: Hacking Web Servers
CNIT 123 Ch 10: Hacking Web ServersSam Bowne
 
Unit 3 Network Layer PPT
Unit 3 Network Layer PPTUnit 3 Network Layer PPT
Unit 3 Network Layer PPTKalpanaC14
 
Ch 19 Network-layer protocols Section 1
Ch 19  Network-layer protocols Section 1Ch 19  Network-layer protocols Section 1
Ch 19 Network-layer protocols Section 1Hossam El-Deen Osama
 
Address resolution protocol (ARP)
Address resolution protocol (ARP)Address resolution protocol (ARP)
Address resolution protocol (ARP)NetProtocol Xpert
 
The Network Layer
The Network LayerThe Network Layer
The Network Layeradil raja
 
Transmission Control Protocol (TCP)
Transmission Control Protocol (TCP)Transmission Control Protocol (TCP)
Transmission Control Protocol (TCP)k33a
 
File Transfer Protocol - FTP
File Transfer Protocol - FTPFile Transfer Protocol - FTP
File Transfer Protocol - FTPMahfuzRahman94
 
Protocol architecture TCP IP
Protocol architecture TCP IPProtocol architecture TCP IP
Protocol architecture TCP IPToufiqueAhmed13
 
Practical Malware Analysis: Ch 0: Malware Analysis Primer & 1: Basic Static T...
Practical Malware Analysis: Ch 0: Malware Analysis Primer & 1: Basic Static T...Practical Malware Analysis: Ch 0: Malware Analysis Primer & 1: Basic Static T...
Practical Malware Analysis: Ch 0: Malware Analysis Primer & 1: Basic Static T...Sam Bowne
 
Practical Malware Analysis: Ch 10: Kernel Debugging with WinDbg
Practical Malware Analysis: Ch 10: Kernel Debugging with WinDbgPractical Malware Analysis: Ch 10: Kernel Debugging with WinDbg
Practical Malware Analysis: Ch 10: Kernel Debugging with WinDbgSam Bowne
 
RPC: Remote procedure call
RPC: Remote procedure callRPC: Remote procedure call
RPC: Remote procedure callSunita Sahu
 

What's hot (20)

TCP-IP Reference Model
TCP-IP Reference ModelTCP-IP Reference Model
TCP-IP Reference Model
 
Introduction to distributed system
Introduction to distributed systemIntroduction to distributed system
Introduction to distributed system
 
Trace route
Trace routeTrace route
Trace route
 
CNIT 123 Ch 10: Hacking Web Servers
CNIT 123 Ch 10: Hacking Web ServersCNIT 123 Ch 10: Hacking Web Servers
CNIT 123 Ch 10: Hacking Web Servers
 
Unit 3 Network Layer PPT
Unit 3 Network Layer PPTUnit 3 Network Layer PPT
Unit 3 Network Layer PPT
 
Ch 19 Network-layer protocols Section 1
Ch 19  Network-layer protocols Section 1Ch 19  Network-layer protocols Section 1
Ch 19 Network-layer protocols Section 1
 
Overview of TCP IP
Overview of TCP IPOverview of TCP IP
Overview of TCP IP
 
Address resolution protocol (ARP)
Address resolution protocol (ARP)Address resolution protocol (ARP)
Address resolution protocol (ARP)
 
Data Link Layer| Error Detection
Data Link Layer| Error DetectionData Link Layer| Error Detection
Data Link Layer| Error Detection
 
The Network Layer
The Network LayerThe Network Layer
The Network Layer
 
Transmission Control Protocol (TCP)
Transmission Control Protocol (TCP)Transmission Control Protocol (TCP)
Transmission Control Protocol (TCP)
 
File Transfer Protocol - FTP
File Transfer Protocol - FTPFile Transfer Protocol - FTP
File Transfer Protocol - FTP
 
Wireshark Tutorial
Wireshark TutorialWireshark Tutorial
Wireshark Tutorial
 
computer network OSI layer
computer network OSI layercomputer network OSI layer
computer network OSI layer
 
Protocol architecture TCP IP
Protocol architecture TCP IPProtocol architecture TCP IP
Protocol architecture TCP IP
 
Practical Malware Analysis: Ch 0: Malware Analysis Primer & 1: Basic Static T...
Practical Malware Analysis: Ch 0: Malware Analysis Primer & 1: Basic Static T...Practical Malware Analysis: Ch 0: Malware Analysis Primer & 1: Basic Static T...
Practical Malware Analysis: Ch 0: Malware Analysis Primer & 1: Basic Static T...
 
Ssl https
Ssl httpsSsl https
Ssl https
 
Application Layer
Application Layer Application Layer
Application Layer
 
Practical Malware Analysis: Ch 10: Kernel Debugging with WinDbg
Practical Malware Analysis: Ch 10: Kernel Debugging with WinDbgPractical Malware Analysis: Ch 10: Kernel Debugging with WinDbg
Practical Malware Analysis: Ch 10: Kernel Debugging with WinDbg
 
RPC: Remote procedure call
RPC: Remote procedure callRPC: Remote procedure call
RPC: Remote procedure call
 

Similar to COMPUTER NETWORK_OSI & TCP/IP

Similar to COMPUTER NETWORK_OSI & TCP/IP (20)

BAPANKAR15800121011 SOFT.pptx
BAPANKAR15800121011 SOFT.pptxBAPANKAR15800121011 SOFT.pptx
BAPANKAR15800121011 SOFT.pptx
 
OSI & TCP model
OSI & TCP modelOSI & TCP model
OSI & TCP model
 
OSI Model and TCP/IP Model.
OSI Model and TCP/IP Model.OSI Model and TCP/IP Model.
OSI Model and TCP/IP Model.
 
Osi model and tcpip model.
Osi model and tcpip model.Osi model and tcpip model.
Osi model and tcpip model.
 
Assignment izaz sir
Assignment izaz sirAssignment izaz sir
Assignment izaz sir
 
OSI &TCP/IP Model
OSI &TCP/IP ModelOSI &TCP/IP Model
OSI &TCP/IP Model
 
006 Osi Model
006 Osi Model006 Osi Model
006 Osi Model
 
Osi model
Osi modelOsi model
Osi model
 
THE OSI MODEL
THE OSI MODELTHE OSI MODEL
THE OSI MODEL
 
OSI MODEL
OSI MODEL OSI MODEL
OSI MODEL
 
CN unit 1 part 2 2023.ppt
CN unit 1 part 2 2023.pptCN unit 1 part 2 2023.ppt
CN unit 1 part 2 2023.ppt
 
OSI and TCP/IP Model
OSI and TCP/IP ModelOSI and TCP/IP Model
OSI and TCP/IP Model
 
OSI Pankaj yadav
OSI  Pankaj yadavOSI  Pankaj yadav
OSI Pankaj yadav
 
Learn basics of ip addressing
Learn basics of  ip addressingLearn basics of  ip addressing
Learn basics of ip addressing
 
OSI MODEL AND ITS LAYERS FUNCTION
OSI  MODEL AND ITS LAYERS FUNCTIONOSI  MODEL AND ITS LAYERS FUNCTION
OSI MODEL AND ITS LAYERS FUNCTION
 
OSI Reference Model-Lecture-2.pptx
OSI Reference Model-Lecture-2.pptxOSI Reference Model-Lecture-2.pptx
OSI Reference Model-Lecture-2.pptx
 
Cisco ccna certification knowledge to pass the exam
Cisco ccna certification knowledge to pass the examCisco ccna certification knowledge to pass the exam
Cisco ccna certification knowledge to pass the exam
 
Assignment3
Assignment3Assignment3
Assignment3
 
osi and tcpip.ppt
osi and tcpip.pptosi and tcpip.ppt
osi and tcpip.ppt
 
Osi and tcpip
Osi and tcpipOsi and tcpip
Osi and tcpip
 

More from Sweta Kumari Barnwal

Computer Network-Data Link Layer-Module-2.pdf
Computer Network-Data Link Layer-Module-2.pdfComputer Network-Data Link Layer-Module-2.pdf
Computer Network-Data Link Layer-Module-2.pdfSweta Kumari Barnwal
 
Sensors in Different Applications Area.pdf
Sensors in Different Applications Area.pdfSensors in Different Applications Area.pdf
Sensors in Different Applications Area.pdfSweta Kumari Barnwal
 
Sensor technology module-3-interface electronic circuits
Sensor technology module-3-interface electronic circuitsSensor technology module-3-interface electronic circuits
Sensor technology module-3-interface electronic circuitsSweta Kumari Barnwal
 
Sensors fundamentals and characteristics, physical principle of sensing
Sensors fundamentals and characteristics, physical principle of sensingSensors fundamentals and characteristics, physical principle of sensing
Sensors fundamentals and characteristics, physical principle of sensingSweta Kumari Barnwal
 
Module 5-cloud computing-SECURITY IN THE CLOUD
Module 5-cloud computing-SECURITY IN THE CLOUDModule 5-cloud computing-SECURITY IN THE CLOUD
Module 5-cloud computing-SECURITY IN THE CLOUDSweta Kumari Barnwal
 

More from Sweta Kumari Barnwal (20)

UNIT-1 Start Learning R.pdf
UNIT-1 Start Learning R.pdfUNIT-1 Start Learning R.pdf
UNIT-1 Start Learning R.pdf
 
MODULE-2-Cloud Computing.docx.pdf
MODULE-2-Cloud Computing.docx.pdfMODULE-2-Cloud Computing.docx.pdf
MODULE-2-Cloud Computing.docx.pdf
 
Number System.pdf
Number System.pdfNumber System.pdf
Number System.pdf
 
Cloud Computing_Module-1.pdf
Cloud Computing_Module-1.pdfCloud Computing_Module-1.pdf
Cloud Computing_Module-1.pdf
 
Computer Network-Data Link Layer-Module-2.pdf
Computer Network-Data Link Layer-Module-2.pdfComputer Network-Data Link Layer-Module-2.pdf
Computer Network-Data Link Layer-Module-2.pdf
 
Sensors in Different Applications Area.pdf
Sensors in Different Applications Area.pdfSensors in Different Applications Area.pdf
Sensors in Different Applications Area.pdf
 
Sensor technology module-3-interface electronic circuits
Sensor technology module-3-interface electronic circuitsSensor technology module-3-interface electronic circuits
Sensor technology module-3-interface electronic circuits
 
Sensors fundamentals and characteristics, physical principle of sensing
Sensors fundamentals and characteristics, physical principle of sensingSensors fundamentals and characteristics, physical principle of sensing
Sensors fundamentals and characteristics, physical principle of sensing
 
Logic gates
Logic gatesLogic gates
Logic gates
 
Basic computer system
Basic computer systemBasic computer system
Basic computer system
 
Features of windows
Features of windowsFeatures of windows
Features of windows
 
Operating system and services
Operating system and servicesOperating system and services
Operating system and services
 
Introduction to computers
Introduction to computersIntroduction to computers
Introduction to computers
 
Application Layer
Application LayerApplication Layer
Application Layer
 
Network Layer & Transport Layer
Network Layer & Transport LayerNetwork Layer & Transport Layer
Network Layer & Transport Layer
 
Module 5-cloud computing-SECURITY IN THE CLOUD
Module 5-cloud computing-SECURITY IN THE CLOUDModule 5-cloud computing-SECURITY IN THE CLOUD
Module 5-cloud computing-SECURITY IN THE CLOUD
 
Module 3-cyber security
Module 3-cyber securityModule 3-cyber security
Module 3-cyber security
 
Unit ii-hackers and cyber crimes
Unit ii-hackers and cyber crimesUnit ii-hackers and cyber crimes
Unit ii-hackers and cyber crimes
 
Module 3-cloud computing
Module 3-cloud computingModule 3-cloud computing
Module 3-cloud computing
 
Virtualization - cloud computing
Virtualization - cloud computingVirtualization - cloud computing
Virtualization - cloud computing
 

Recently uploaded

Introduction to ArtificiaI Intelligence in Higher Education
Introduction to ArtificiaI Intelligence in Higher EducationIntroduction to ArtificiaI Intelligence in Higher Education
Introduction to ArtificiaI Intelligence in Higher Educationpboyjonauth
 
Enzyme, Pharmaceutical Aids, Miscellaneous Last Part of Chapter no 5th.pdf
Enzyme, Pharmaceutical Aids, Miscellaneous Last Part of Chapter no 5th.pdfEnzyme, Pharmaceutical Aids, Miscellaneous Last Part of Chapter no 5th.pdf
Enzyme, Pharmaceutical Aids, Miscellaneous Last Part of Chapter no 5th.pdfSumit Tiwari
 
Roles & Responsibilities in Pharmacovigilance
Roles & Responsibilities in PharmacovigilanceRoles & Responsibilities in Pharmacovigilance
Roles & Responsibilities in PharmacovigilanceSamikshaHamane
 
18-04-UA_REPORT_MEDIALITERAСY_INDEX-DM_23-1-final-eng.pdf
18-04-UA_REPORT_MEDIALITERAСY_INDEX-DM_23-1-final-eng.pdf18-04-UA_REPORT_MEDIALITERAСY_INDEX-DM_23-1-final-eng.pdf
18-04-UA_REPORT_MEDIALITERAСY_INDEX-DM_23-1-final-eng.pdfssuser54595a
 
भारत-रोम व्यापार.pptx, Indo-Roman Trade,
भारत-रोम व्यापार.pptx, Indo-Roman Trade,भारत-रोम व्यापार.pptx, Indo-Roman Trade,
भारत-रोम व्यापार.pptx, Indo-Roman Trade,Virag Sontakke
 
Full Stack Web Development Course for Beginners
Full Stack Web Development Course  for BeginnersFull Stack Web Development Course  for Beginners
Full Stack Web Development Course for BeginnersSabitha Banu
 
internship ppt on smartinternz platform as salesforce developer
internship ppt on smartinternz platform as salesforce developerinternship ppt on smartinternz platform as salesforce developer
internship ppt on smartinternz platform as salesforce developerunnathinaik
 
“Oh GOSH! Reflecting on Hackteria's Collaborative Practices in a Global Do-It...
“Oh GOSH! Reflecting on Hackteria's Collaborative Practices in a Global Do-It...“Oh GOSH! Reflecting on Hackteria's Collaborative Practices in a Global Do-It...
“Oh GOSH! Reflecting on Hackteria's Collaborative Practices in a Global Do-It...Marc Dusseiller Dusjagr
 
Hierarchy of management that covers different levels of management
Hierarchy of management that covers different levels of managementHierarchy of management that covers different levels of management
Hierarchy of management that covers different levels of managementmkooblal
 
Presiding Officer Training module 2024 lok sabha elections
Presiding Officer Training module 2024 lok sabha electionsPresiding Officer Training module 2024 lok sabha elections
Presiding Officer Training module 2024 lok sabha electionsanshu789521
 
Solving Puzzles Benefits Everyone (English).pptx
Solving Puzzles Benefits Everyone (English).pptxSolving Puzzles Benefits Everyone (English).pptx
Solving Puzzles Benefits Everyone (English).pptxOH TEIK BIN
 
CELL CYCLE Division Science 8 quarter IV.pptx
CELL CYCLE Division Science 8 quarter IV.pptxCELL CYCLE Division Science 8 quarter IV.pptx
CELL CYCLE Division Science 8 quarter IV.pptxJiesonDelaCerna
 
Pharmacognosy Flower 3. Compositae 2023.pdf
Pharmacognosy Flower 3. Compositae 2023.pdfPharmacognosy Flower 3. Compositae 2023.pdf
Pharmacognosy Flower 3. Compositae 2023.pdfMahmoud M. Sallam
 
History Class XII Ch. 3 Kinship, Caste and Class (1).pptx
History Class XII Ch. 3 Kinship, Caste and Class (1).pptxHistory Class XII Ch. 3 Kinship, Caste and Class (1).pptx
History Class XII Ch. 3 Kinship, Caste and Class (1).pptxsocialsciencegdgrohi
 
POINT- BIOCHEMISTRY SEM 2 ENZYMES UNIT 5.pptx
POINT- BIOCHEMISTRY SEM 2 ENZYMES UNIT 5.pptxPOINT- BIOCHEMISTRY SEM 2 ENZYMES UNIT 5.pptx
POINT- BIOCHEMISTRY SEM 2 ENZYMES UNIT 5.pptxSayali Powar
 
call girls in Kamla Market (DELHI) 🔝 >༒9953330565🔝 genuine Escort Service 🔝✔️✔️
call girls in Kamla Market (DELHI) 🔝 >༒9953330565🔝 genuine Escort Service 🔝✔️✔️call girls in Kamla Market (DELHI) 🔝 >༒9953330565🔝 genuine Escort Service 🔝✔️✔️
call girls in Kamla Market (DELHI) 🔝 >༒9953330565🔝 genuine Escort Service 🔝✔️✔️9953056974 Low Rate Call Girls In Saket, Delhi NCR
 
Historical philosophical, theoretical, and legal foundations of special and i...
Historical philosophical, theoretical, and legal foundations of special and i...Historical philosophical, theoretical, and legal foundations of special and i...
Historical philosophical, theoretical, and legal foundations of special and i...jaredbarbolino94
 
Earth Day Presentation wow hello nice great
Earth Day Presentation wow hello nice greatEarth Day Presentation wow hello nice great
Earth Day Presentation wow hello nice greatYousafMalik24
 

Recently uploaded (20)

Introduction to ArtificiaI Intelligence in Higher Education
Introduction to ArtificiaI Intelligence in Higher EducationIntroduction to ArtificiaI Intelligence in Higher Education
Introduction to ArtificiaI Intelligence in Higher Education
 
Enzyme, Pharmaceutical Aids, Miscellaneous Last Part of Chapter no 5th.pdf
Enzyme, Pharmaceutical Aids, Miscellaneous Last Part of Chapter no 5th.pdfEnzyme, Pharmaceutical Aids, Miscellaneous Last Part of Chapter no 5th.pdf
Enzyme, Pharmaceutical Aids, Miscellaneous Last Part of Chapter no 5th.pdf
 
Roles & Responsibilities in Pharmacovigilance
Roles & Responsibilities in PharmacovigilanceRoles & Responsibilities in Pharmacovigilance
Roles & Responsibilities in Pharmacovigilance
 
18-04-UA_REPORT_MEDIALITERAСY_INDEX-DM_23-1-final-eng.pdf
18-04-UA_REPORT_MEDIALITERAСY_INDEX-DM_23-1-final-eng.pdf18-04-UA_REPORT_MEDIALITERAСY_INDEX-DM_23-1-final-eng.pdf
18-04-UA_REPORT_MEDIALITERAСY_INDEX-DM_23-1-final-eng.pdf
 
भारत-रोम व्यापार.pptx, Indo-Roman Trade,
भारत-रोम व्यापार.pptx, Indo-Roman Trade,भारत-रोम व्यापार.pptx, Indo-Roman Trade,
भारत-रोम व्यापार.pptx, Indo-Roman Trade,
 
Full Stack Web Development Course for Beginners
Full Stack Web Development Course  for BeginnersFull Stack Web Development Course  for Beginners
Full Stack Web Development Course for Beginners
 
internship ppt on smartinternz platform as salesforce developer
internship ppt on smartinternz platform as salesforce developerinternship ppt on smartinternz platform as salesforce developer
internship ppt on smartinternz platform as salesforce developer
 
“Oh GOSH! Reflecting on Hackteria's Collaborative Practices in a Global Do-It...
“Oh GOSH! Reflecting on Hackteria's Collaborative Practices in a Global Do-It...“Oh GOSH! Reflecting on Hackteria's Collaborative Practices in a Global Do-It...
“Oh GOSH! Reflecting on Hackteria's Collaborative Practices in a Global Do-It...
 
Hierarchy of management that covers different levels of management
Hierarchy of management that covers different levels of managementHierarchy of management that covers different levels of management
Hierarchy of management that covers different levels of management
 
Presiding Officer Training module 2024 lok sabha elections
Presiding Officer Training module 2024 lok sabha electionsPresiding Officer Training module 2024 lok sabha elections
Presiding Officer Training module 2024 lok sabha elections
 
Solving Puzzles Benefits Everyone (English).pptx
Solving Puzzles Benefits Everyone (English).pptxSolving Puzzles Benefits Everyone (English).pptx
Solving Puzzles Benefits Everyone (English).pptx
 
CELL CYCLE Division Science 8 quarter IV.pptx
CELL CYCLE Division Science 8 quarter IV.pptxCELL CYCLE Division Science 8 quarter IV.pptx
CELL CYCLE Division Science 8 quarter IV.pptx
 
Model Call Girl in Tilak Nagar Delhi reach out to us at 🔝9953056974🔝
Model Call Girl in Tilak Nagar Delhi reach out to us at 🔝9953056974🔝Model Call Girl in Tilak Nagar Delhi reach out to us at 🔝9953056974🔝
Model Call Girl in Tilak Nagar Delhi reach out to us at 🔝9953056974🔝
 
OS-operating systems- ch04 (Threads) ...
OS-operating systems- ch04 (Threads) ...OS-operating systems- ch04 (Threads) ...
OS-operating systems- ch04 (Threads) ...
 
Pharmacognosy Flower 3. Compositae 2023.pdf
Pharmacognosy Flower 3. Compositae 2023.pdfPharmacognosy Flower 3. Compositae 2023.pdf
Pharmacognosy Flower 3. Compositae 2023.pdf
 
History Class XII Ch. 3 Kinship, Caste and Class (1).pptx
History Class XII Ch. 3 Kinship, Caste and Class (1).pptxHistory Class XII Ch. 3 Kinship, Caste and Class (1).pptx
History Class XII Ch. 3 Kinship, Caste and Class (1).pptx
 
POINT- BIOCHEMISTRY SEM 2 ENZYMES UNIT 5.pptx
POINT- BIOCHEMISTRY SEM 2 ENZYMES UNIT 5.pptxPOINT- BIOCHEMISTRY SEM 2 ENZYMES UNIT 5.pptx
POINT- BIOCHEMISTRY SEM 2 ENZYMES UNIT 5.pptx
 
call girls in Kamla Market (DELHI) 🔝 >༒9953330565🔝 genuine Escort Service 🔝✔️✔️
call girls in Kamla Market (DELHI) 🔝 >༒9953330565🔝 genuine Escort Service 🔝✔️✔️call girls in Kamla Market (DELHI) 🔝 >༒9953330565🔝 genuine Escort Service 🔝✔️✔️
call girls in Kamla Market (DELHI) 🔝 >༒9953330565🔝 genuine Escort Service 🔝✔️✔️
 
Historical philosophical, theoretical, and legal foundations of special and i...
Historical philosophical, theoretical, and legal foundations of special and i...Historical philosophical, theoretical, and legal foundations of special and i...
Historical philosophical, theoretical, and legal foundations of special and i...
 
Earth Day Presentation wow hello nice great
Earth Day Presentation wow hello nice greatEarth Day Presentation wow hello nice great
Earth Day Presentation wow hello nice great
 

COMPUTER NETWORK_OSI & TCP/IP

  • 1. ComputerNetworks OSIModel,TCP/IPModelandProtocols 1 Presented By: Sweta Kumari Barnwal Assistant professor Arka Jain University Jamshedpur, Jharkhand
  • 2. Contents 2 • Introduction to Layers and Protocols. • OSI Model • OSI Model layer functioning. • TCP/IP Model • Addressing scheme
  • 4. OSIModel (Open System Interconnection) 4 • Firstly introduced in 1984 by ISO – ‘International Organization of Standardization’. • An open system is a set of protocols that allow any two different systems to communicate. • Protocols: Set of Rules. • OSI model itself is not a protocol, it is a model that define protocols for network communication. • Seven separate but related layers. • These 7 layers work collaboratively to transmit the data from one person to another across the globe.
  • 6. Organizationof Layers 6 7 layers of OSI Model can be further divided into three subgroup. Named as: Layer 1 • Physical • Data link • Network Layer 2 • Transpot Layer 3 • Session • Presentation • Application
  • 7. 1. PhysicalLayer 7 The lowest layer of the OSI reference model is the physical layer. It is responsible for the actual physical connection between the devices. The physical layer contains information in the form of bits. Define physical transmission medium (Guided or Unguided). Interface between devices and transmission medium. Representation of bits: PL consist of bits (0s and 1s), so, data -> bits ->signals (electrical or optical). Data rate  Transmission rate (means the number of bits sent per second). Synchronization of bits: Sender and receiver must not receive the same bit rate but must be at same time (synchronized clock).
  • 8. Continued… 8 Line configuration: Connection (point-to-point or multipoint) of devices to the medium. Physical topology: Topological Structure (Bus, Star, Mesh etc) Transmission mode: Simplex, half-duplex or full duplex.
  • 9. 2. DataLinkLayer 9 It is the second layer after physical layer. The data link layer is responsible for maintaining the data link between two hosts or nodes. There are several functions performed by DLL: Framing: Arranging bit streams into Data Frames. Physical addressing (machine address): Add header to the frame to define the sender and receiver of the data packet. Flow Control; Not to overload receiver Error Control: Error Free Access Control:
  • 10. Design Issues in Data Link Layer 10 The data link layer is divided into two sub-layers :  Logical Link Control Sub-layer (LLC) – Provides the logic for the data link , Thus it controls the synchronization , flow control , and error checking functions of the data link layer. Functions are – (i) Error Recovery. (ii) It performs the flow control operations. (iii) User addressing.  Media Access Control Sub-layer (MAC) – It is the second sub-layer of data-link layer. It controls the flow and multiplexing for transmission medium. Transmission of data packets is controlled by this layer. This layer is responsible for sending the data over the network interface card. Functions are- (i) To perform the control of access to media. (ii) It performs the unique addressing to stations directly connected to LAN. (iii) Detection of errors.
  • 11. Continued… 11 Design issues with data link layer are :  Services provided to the network layer – The data link layer act as a service interface to the network layer. The principle service is transferring data from network layer on sending machine to the network layer on destination machine. This transfer also takes place via DLL (Dynamic Link Library).  Frame synchronization – The source machine sends data in the form of blocks called frames to the destination machine. The starting and ending of each frame should be identified so that the frame can be recognized by the destination machine . .  Flow control – Flow control is done to prevent the flow of data frame at the receiver end. The source machine must not send data frames at a rate faster than the capacity of destination machine to accept them.  Error control – Error control is done to prevent duplication of frames. The errors introduced during transmission from source to destination machines must be detected and corrected at the destination machine.
  • 12. 3. NetworkLayer 12 Network layer works for the transmission of data from one host to the other located in different networks. It also takes care of packet routing i.e. selection of the shortest path to transmit the packet, from the number of routes available. The sender & receiver’s IP address are placed in the header by the network layer. The functions of the Network layer are : Routing: The network layer protocols determine which route is suitable from source to destination. This function of network layer is known as routing. Logical Addressing: In order to identify each device on internetwork uniquely, network layer defines an addressing scheme. The sender & receiver’s IP address are placed in the header by network layer. Such an address distinguishes each device uniquely and universally.
  • 13. 4.TransportLayer 13 Transport Layer (Layer 4) : Transport layer provides services to application layer and takes services from network layer. The data in the transport layer is referred to as Segments. It is responsible for the End to End Delivery of the complete message. The transport layer also provides the acknowledgement of the successful data transmission and re-transmits the data if an error is found.  Process-to-process delivery (applications)  Service-point addressing: Send data to the correct process on particular computer.  Segmentation and reassembly Divide into segments and assign sequence number. Reassembly at destination according to sequence number.  Connection control Connectionless or connection oriented  Flow control  Error control Without damage, loss or duplication
  • 14. 5. SessionLayer 14 This layer is responsible for establishment of connection, maintenance of sessions, authentication and also ensures security. The functions of the session layer are : Session establishment, maintenance and termination: The layer allows the two processes to establish, use and terminate a connection. Synchronization : This layer allows a process to add checkpoints which are considered as synchronization points into the data. These synchronization point help to identify the error so that the data is re-synchronized properly, and ends of the messages are not cut prematurely and data loss is avoided. Dialog Controller : The session layer allows two systems to start communication with each other in half-duplex or full-duplex.
  • 15. 6. PresentationLayer 15 It is also called the Translation layer. The data from the application layer is extracted here and manipulated as per the required format to transmit over the network. The functions of the presentation layer are : Translation : For example, ASCII to EBCDIC. Encryption/ Decryption : Data encryption translates the data into another form or code. The encrypted data is known as the cipher text and the decrypted data is known as plain text. A key value is used for encrypting as well as decrypting data. Compression: Reduces the number of bits that need to be transmitted on the network.
  • 16. 7.ApplicationLayer 16 At the very top of the OSI Reference Model stack of layers, we find Application layer which is implemented by the network applications. These applications produce the data, which has to be transferred over the network. This layer also serves as a window for the application services to access the network and for displaying the received information to the user.  User Interface  File transfer, access and management  Mail services  Directory service (database)
  • 17. Communication Between The Layers In OSI Model 17
  • 18. TCP/IP(Transmission Control Protocol / Internet Protocol. 18 The OSI Model we just looked at is just a reference/logical model. It was designed to describe the functions of the communication system by dividing the communication procedure into smaller and simpler components. But when we talk about the TCP/IP model, it was designed and developed by Department of Defense (DoD) in 1960s and is based on standard protocols. It stands for Transmission Control Protocol/Internet Protocol. The TCP/IP model is a concise version of the OSI model. It contains four layers, unlike seven layers in the OSI model. It consist Four Layers.  Process/Application Layer  Host-to-Host/Transport Layer  Internet Layer  Network Access/Link Layer r
  • 20. TCP/IPLayerFunctioning 20 1. Network Access Layer –This layer corresponds to the combination of Data Link Layer and Physical Layer of the OSI model. It looks out for hardware addressing and the protocols present in this layer allows for the physical transmission of data. 2. Internet Layer –This layer parallels the functions of OSI’s Network layer. It defines the protocols which are responsible for logical transmission of data over the entire network. 3. Host-to-Host Layer – This layer is analogous to the transport layer of the OSI model. It is responsible for end-to-end communication and error-free delivery of data. It shields the upper-layer applications from the complexities of data. 4. Application Layer – This layer performs the functions of top three layers of the OSI model: Application, Presentation and Session Layer. It is responsible for node- to-node communication and controls user-interface specifications.
  • 22. Continued… 22 TCP/IP OSI It refers to Transmission Control Protocol/Internet Protocol. It refers to Open Systems Interconnection. It consist 5 layers. It has 7 layers. It is more reliable It is less reliable It does not have very strict boundaries. It has strict boundaries It follows a horizontal approach. It follows a vertical approach. It uses both session and presentation layer in the application layer itself. It uses different session and presentation layers. It developed protocols then model. It developed model then protocol. Transport layer in TCP/IP does not provide assurance delivery of packets. In this model, transport layer provides assurance delivery of packets. This model network layer only provides connection less services. Connection less and connection oriented both services are provided by network layer in OSI model. Protocols cannot be replaced easily in TCP/IP model. While in OSI model, Protocols are better covered and is easy to replace with the change in technology.