SlideShare a Scribd company logo
1 of 42
2.1   Copyright © The McGraw-Hill Companies, Inc. Permission required for reproduction or display.
2-1 LAYERED TASKS

We use the concept of layers in our daily life. As an
example, let us consider two friends who communicate
through postal mail. The process of sending a letter to a
friend would be complex if there were no services
available from the post office.



  Topics discussed in this section:
 Sender, Receiver, and Carrier
 Hierarchy


2.2
Figure 2.1   Tasks involved in sending a letter




2.3
2-2 THE OSI MODEL
Established in 1947, the International Standards
Organization (ISO) is a multinational body dedicated to
worldwide agreement on international standards. An ISO
standard that covers all aspects of network
communications is the Open Systems Interconnection
(OSI) model. It was first introduced in the late 1970s.



  Topics discussed in this section:
 Layered Architecture
 Peer-to-Peer Processes
 Encapsulation

2.4
Note

             ISO is the organization.
                OSI is the model.




2.5
Figure 2.2 Seven layers of the OSI model




2.6
Figure 2.3 The interaction between layers in the OSI model




2.7
Figure 2.4 An exchange using the OSI model




2.8
2-3 LAYERS IN THE OSI MODEL

In this section we briefly describe the functions of each
layer in the OSI model.


  Topics discussed in this section:
 Physical Layer
 Data Link Layer
 Network Layer
 Transport Layer
 Session Layer
 Presentation Layer
 Application Layer


2.9
Figure 2.5 Physical layer




2.10
Note

              The physical layer is responsible for movements of
               individual bits from one hop (node) to the next.




2.11
Figure 2.6 Data link layer




2.12
Note

              The data link layer is responsible for moving
                frames from one hop (node) to the next.




2.13
Figure 2.7 Hop-to-hop delivery




2.14
Figure 2.8 Network layer




2.15
Note

              The network layer is responsible for the
                delivery of individual packets from
               the source host to the destination host.




2.16
Figure 2.9 Source-to-destination delivery




2.17
Figure 2.10 Transport layer




2.18
Note

              The transport layer is responsible for the delivery
                 of a message from one process to another.




2.19
Figure 2.11 Reliable process-to-process delivery of a message




2.20
Figure 2.12 Session layer




2.21
Note

              The session layer is responsible for dialog
                     control and synchronization.




2.22
Figure 2.13 Presentation layer




2.23
Note

          The presentation layer is responsible for translation,
                    compression, and encryption.




2.24
Figure 2.14 Application layer




2.25
Note

              The application layer is responsible for
                  providing services to the user.




2.26
Figure 2.15 Summary of layers




2.27
2-4 TCP/IP PROTOCOL SUITE

The layers in the TCP/IP protocol suite do not exactly
match those in the OSI model. The original TCP/IP
protocol suite was defined as having four layers: host-to-
network, internet, transport, and application. However,
when TCP/IP is compared to OSI, we can say that the
TCP/IP protocol suite is made of five layers: physical,
data link, network, transport, and application.

 Topics discussed in this section:
 Physical and Data Link Layers
 Network Layer
 Transport Layer
 Application Layer
2.28
Figure 2.16 TCP/IP and OSI model




2.29
2-5 ADDRESSING

Four levels of addresses are used in an internet employing
the TCP/IP protocols: physical, logical, port, and specific.




  Topics discussed in this section:
 Physical Addresses
 Logical Addresses
 Port Addresses
 Specific Addresses



2.30
Figure 2.17 Addresses in TCP/IP




2.31
Figure 2.18 Relationship of layers and addresses in TCP/IP




2.32
Example 2.1

 In Figure 2.19 a node with physical address 10 sends a
 frame to a node with physical address 87. The two nodes
 are connected by a link (bus topology LAN). As the figure
 shows, the computer with physical address 10 is the
 sender, and the computer with physical address 87 is the
 receiver.




2.33
Figure 2.19 Physical addresses




2.34
Example 2.2

 As we will see in Chapter 13, most local-area networks
 use a 48-bit (6-byte) physical address written as 12
 hexadecimal digits; every byte (2 hexadecimal digits) is
 separated by a colon, as shown below:

                     07:01:02:01:2C:4B

       A 6-byte (12 hexadecimal digits) physical address.



2.35
Example 2.3


 Figure 2.20 shows a part of an internet with two routers
 connecting three LANs. Each device (computer or router)
 has a pair of addresses (logical and physical) for each
 connection. In this case, each computer is connected to
 only one link and therefore has only one pair of
 addresses. Each router, however, is connected to three
 networks (only two are shown in the figure). So each
 router has three pairs of addresses, one for each
 connection.


2.36
Figure 2.20 IP addresses




2.37
Example 2.4

 Figure 2.21 shows two computers communicating via the
 Internet. The sending computer is running three processes
 at this time with port addresses a, b, and c. The receiving
 computer is running two processes at this time with port
 addresses j and k. Process a in the sending computer
 needs to communicate with process j in the receiving
 computer. Note that although physical addresses change
 from hop to hop, logical and port addresses remain the
 same from the source to destination.



2.38
Figure 2.21 Port addresses




2.39
Note

          The physical addresses will change from hop to hop,
           but the logical addresses usually remain the same.




2.40
Example 2.5

 As we will see in Chapter 23, a port address is a 16-bit
 address represented by one decimal number as shown.

                          753

            A 16-bit port address represented
                 as one single number.




2.41
Note

              The physical addresses change from hop to hop,
        but the logical and port addresses usually remain the same.




2.42

More Related Content

What's hot

Chapter 2 network models -computer_network
Chapter 2   network models -computer_networkChapter 2   network models -computer_network
Chapter 2 network models -computer_networkDhairya Joshi
 
Chap 03
Chap 03Chap 03
Chap 03IGNOU
 
26 Remote Logging_Electronic_Mail_and_File_Transfer
26 Remote Logging_Electronic_Mail_and_File_Transfer26 Remote Logging_Electronic_Mail_and_File_Transfer
26 Remote Logging_Electronic_Mail_and_File_TransferAhmar Hashmi
 
Chap 02
Chap 02Chap 02
Chap 02IGNOU
 
Chapter 26 - Remote Logging, Electronic Mail & File Transfer
Chapter 26 - Remote Logging, Electronic Mail & File TransferChapter 26 - Remote Logging, Electronic Mail & File Transfer
Chapter 26 - Remote Logging, Electronic Mail & File TransferWayne Jones Jnr
 
FP 303 COMPUTER NETWORK PAPER FINAL Q
FP 303 COMPUTER NETWORK PAPER FINAL QFP 303 COMPUTER NETWORK PAPER FINAL Q
FP 303 COMPUTER NETWORK PAPER FINAL QSyahriha Ruslan
 
24 15055 current steering ijeecs 1570310518(edit)
24 15055 current steering ijeecs  1570310518(edit)24 15055 current steering ijeecs  1570310518(edit)
24 15055 current steering ijeecs 1570310518(edit)nooriasukmaningtyas
 
Computer Networking Multiple Choice Questions
Computer Networking Multiple Choice QuestionsComputer Networking Multiple Choice Questions
Computer Networking Multiple Choice QuestionsAbhishek Jaguessar
 
Transport Layer Numericals
Transport Layer NumericalsTransport Layer Numericals
Transport Layer NumericalsManisha Keim
 
FP 303 COMPUTER NETWORK FINAL PAPER JUNE 2012
FP 303 COMPUTER NETWORK FINAL PAPER JUNE 2012FP 303 COMPUTER NETWORK FINAL PAPER JUNE 2012
FP 303 COMPUTER NETWORK FINAL PAPER JUNE 2012Syahriha Ruslan
 
Electronic mail and Domain Name System
Electronic mail and Domain Name SystemElectronic mail and Domain Name System
Electronic mail and Domain Name Systemrajjo224
 

What's hot (20)

Chapter 2 network models -computer_network
Chapter 2   network models -computer_networkChapter 2   network models -computer_network
Chapter 2 network models -computer_network
 
Chapter 7: Transmission Media
Chapter 7: Transmission MediaChapter 7: Transmission Media
Chapter 7: Transmission Media
 
Chap 03
Chap 03Chap 03
Chap 03
 
Ch02
Ch02Ch02
Ch02
 
Ch19
Ch19Ch19
Ch19
 
26 Remote Logging_Electronic_Mail_and_File_Transfer
26 Remote Logging_Electronic_Mail_and_File_Transfer26 Remote Logging_Electronic_Mail_and_File_Transfer
26 Remote Logging_Electronic_Mail_and_File_Transfer
 
Chap 02
Chap 02Chap 02
Chap 02
 
Ch27
Ch27Ch27
Ch27
 
Chapter 26 - Remote Logging, Electronic Mail & File Transfer
Chapter 26 - Remote Logging, Electronic Mail & File TransferChapter 26 - Remote Logging, Electronic Mail & File Transfer
Chapter 26 - Remote Logging, Electronic Mail & File Transfer
 
Osi model
Osi modelOsi model
Osi model
 
Experimental Analysis of Small Internetwork using OPNET 9.1
Experimental Analysis of Small Internetwork using OPNET 9.1Experimental Analysis of Small Internetwork using OPNET 9.1
Experimental Analysis of Small Internetwork using OPNET 9.1
 
Chapter 26
Chapter 26Chapter 26
Chapter 26
 
FP 303 COMPUTER NETWORK PAPER FINAL Q
FP 303 COMPUTER NETWORK PAPER FINAL QFP 303 COMPUTER NETWORK PAPER FINAL Q
FP 303 COMPUTER NETWORK PAPER FINAL Q
 
24 15055 current steering ijeecs 1570310518(edit)
24 15055 current steering ijeecs  1570310518(edit)24 15055 current steering ijeecs  1570310518(edit)
24 15055 current steering ijeecs 1570310518(edit)
 
Transport laye
Transport laye Transport laye
Transport laye
 
Computer Networking Multiple Choice Questions
Computer Networking Multiple Choice QuestionsComputer Networking Multiple Choice Questions
Computer Networking Multiple Choice Questions
 
Transport Layer Numericals
Transport Layer NumericalsTransport Layer Numericals
Transport Layer Numericals
 
Chapter 27
Chapter 27Chapter 27
Chapter 27
 
FP 303 COMPUTER NETWORK FINAL PAPER JUNE 2012
FP 303 COMPUTER NETWORK FINAL PAPER JUNE 2012FP 303 COMPUTER NETWORK FINAL PAPER JUNE 2012
FP 303 COMPUTER NETWORK FINAL PAPER JUNE 2012
 
Electronic mail and Domain Name System
Electronic mail and Domain Name SystemElectronic mail and Domain Name System
Electronic mail and Domain Name System
 

Viewers also liked

4.1 PABLO DIEGO AND GALVAN
4.1 PABLO DIEGO AND GALVAN4.1 PABLO DIEGO AND GALVAN
4.1 PABLO DIEGO AND GALVANMarce Bravo
 
Cascade Designs Presentation
Cascade Designs PresentationCascade Designs Presentation
Cascade Designs Presentationasmith7688
 
Cadmun economics proyect
Cadmun economics proyectCadmun economics proyect
Cadmun economics proyectMarce Bravo
 
FSG Presentation
FSG PresentationFSG Presentation
FSG Presentationmikeafont
 
Ops 468 Superfeet Presentation
Ops 468 Superfeet PresentationOps 468 Superfeet Presentation
Ops 468 Superfeet Presentationasmith7688
 
PATRIOT ACT: MICHELLE, XIMENA, DIEGO AND PABLO
PATRIOT ACT: MICHELLE, XIMENA, DIEGO AND PABLOPATRIOT ACT: MICHELLE, XIMENA, DIEGO AND PABLO
PATRIOT ACT: MICHELLE, XIMENA, DIEGO AND PABLOMarce Bravo
 
4.1 ANDREAS MANOLO AND MARCELA
4.1 ANDREAS MANOLO AND MARCELA4.1 ANDREAS MANOLO AND MARCELA
4.1 ANDREAS MANOLO AND MARCELAMarce Bravo
 
Catálogo zara
Catálogo zaraCatálogo zara
Catálogo zaracarmenane
 
Ppp for cadmun merchandise copy
Ppp for cadmun merchandise copyPpp for cadmun merchandise copy
Ppp for cadmun merchandise copyMarce Bravo
 
Contexto social y economico del sistema de salud
Contexto social y economico del sistema de saludContexto social y economico del sistema de salud
Contexto social y economico del sistema de saludMaria Elena Lora Perez
 

Viewers also liked (16)

CADMUN PROYECT
CADMUN PROYECTCADMUN PROYECT
CADMUN PROYECT
 
4.1 PABLO DIEGO AND GALVAN
4.1 PABLO DIEGO AND GALVAN4.1 PABLO DIEGO AND GALVAN
4.1 PABLO DIEGO AND GALVAN
 
Cascade Designs Presentation
Cascade Designs PresentationCascade Designs Presentation
Cascade Designs Presentation
 
Cadmun economics proyect
Cadmun economics proyectCadmun economics proyect
Cadmun economics proyect
 
FSG Presentation
FSG PresentationFSG Presentation
FSG Presentation
 
Ops 468 Superfeet Presentation
Ops 468 Superfeet PresentationOps 468 Superfeet Presentation
Ops 468 Superfeet Presentation
 
PATRIOT ACT: MICHELLE, XIMENA, DIEGO AND PABLO
PATRIOT ACT: MICHELLE, XIMENA, DIEGO AND PABLOPATRIOT ACT: MICHELLE, XIMENA, DIEGO AND PABLO
PATRIOT ACT: MICHELLE, XIMENA, DIEGO AND PABLO
 
Mango
MangoMango
Mango
 
4.1 ANDREAS MANOLO AND MARCELA
4.1 ANDREAS MANOLO AND MARCELA4.1 ANDREAS MANOLO AND MARCELA
4.1 ANDREAS MANOLO AND MARCELA
 
Catálogo zara
Catálogo zaraCatálogo zara
Catálogo zara
 
Ppp for cadmun merchandise copy
Ppp for cadmun merchandise copyPpp for cadmun merchandise copy
Ppp for cadmun merchandise copy
 
Noun
NounNoun
Noun
 
Contexto social y economico del sistema de salud
Contexto social y economico del sistema de saludContexto social y economico del sistema de salud
Contexto social y economico del sistema de salud
 
Interculturalidad
InterculturalidadInterculturalidad
Interculturalidad
 
Examen profesional sep.2007
Examen profesional sep.2007Examen profesional sep.2007
Examen profesional sep.2007
 
Mango
MangoMango
Mango
 

Similar to Ch02 (20)

Computer Network - Chapter 2
Computer Network - Chapter 2Computer Network - Chapter 2
Computer Network - Chapter 2
 
ch2_v1.ppt
ch2_v1.pptch2_v1.ppt
ch2_v1.ppt
 
dcn 2.ppt
dcn 2.pptdcn 2.ppt
dcn 2.ppt
 
ANAND1.ppt
ANAND1.pptANAND1.ppt
ANAND1.ppt
 
ch2_v1.ppt
ch2_v1.pptch2_v1.ppt
ch2_v1.ppt
 
Ch2 v1
Ch2 v1Ch2 v1
Ch2 v1
 
ch2_v1.ppt
ch2_v1.pptch2_v1.ppt
ch2_v1.ppt
 
Network.ppt
Network.pptNetwork.ppt
Network.ppt
 
ch2_Network Model , layered task, OSI model
ch2_Network Model  , layered task, OSI modelch2_Network Model  , layered task, OSI model
ch2_Network Model , layered task, OSI model
 
Model Jaringan network jaringan komputer.pdf
Model Jaringan network jaringan komputer.pdfModel Jaringan network jaringan komputer.pdf
Model Jaringan network jaringan komputer.pdf
 
All about Network Models under Data Communications
All about Network Models under Data CommunicationsAll about Network Models under Data Communications
All about Network Models under Data Communications
 
ch2_v1.ppt
ch2_v1.pptch2_v1.ppt
ch2_v1.ppt
 
ch2_v1.pptx
ch2_v1.pptxch2_v1.pptx
ch2_v1.pptx
 
Data Communications and Networking ch02
Data Communications and Networking  ch02Data Communications and Networking  ch02
Data Communications and Networking ch02
 
Ch02
Ch02Ch02
Ch02
 
Lec2_CH02.PPT
Lec2_CH02.PPTLec2_CH02.PPT
Lec2_CH02.PPT
 
Network Models.ppt
Network Models.pptNetwork Models.ppt
Network Models.ppt
 
Chapter 2
Chapter 2Chapter 2
Chapter 2
 
Chapter 2 - Network Models
Chapter 2 - Network ModelsChapter 2 - Network Models
Chapter 2 - Network Models
 
ch02.ppt
ch02.pptch02.ppt
ch02.ppt
 

Recently uploaded

My Hashitalk Indonesia April 2024 Presentation
My Hashitalk Indonesia April 2024 PresentationMy Hashitalk Indonesia April 2024 Presentation
My Hashitalk Indonesia April 2024 PresentationRidwan Fadjar
 
Maximizing Board Effectiveness 2024 Webinar.pptx
Maximizing Board Effectiveness 2024 Webinar.pptxMaximizing Board Effectiveness 2024 Webinar.pptx
Maximizing Board Effectiveness 2024 Webinar.pptxOnBoard
 
FULL ENJOY 🔝 8264348440 🔝 Call Girls in Diplomatic Enclave | Delhi
FULL ENJOY 🔝 8264348440 🔝 Call Girls in Diplomatic Enclave | DelhiFULL ENJOY 🔝 8264348440 🔝 Call Girls in Diplomatic Enclave | Delhi
FULL ENJOY 🔝 8264348440 🔝 Call Girls in Diplomatic Enclave | Delhisoniya singh
 
Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...
Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...
Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...Neo4j
 
Unblocking The Main Thread Solving ANRs and Frozen Frames
Unblocking The Main Thread Solving ANRs and Frozen FramesUnblocking The Main Thread Solving ANRs and Frozen Frames
Unblocking The Main Thread Solving ANRs and Frozen FramesSinan KOZAK
 
Azure Monitor & Application Insight to monitor Infrastructure & Application
Azure Monitor & Application Insight to monitor Infrastructure & ApplicationAzure Monitor & Application Insight to monitor Infrastructure & Application
Azure Monitor & Application Insight to monitor Infrastructure & ApplicationAndikSusilo4
 
Advanced Test Driven-Development @ php[tek] 2024
Advanced Test Driven-Development @ php[tek] 2024Advanced Test Driven-Development @ php[tek] 2024
Advanced Test Driven-Development @ php[tek] 2024Scott Keck-Warren
 
IAC 2024 - IA Fast Track to Search Focused AI Solutions
IAC 2024 - IA Fast Track to Search Focused AI SolutionsIAC 2024 - IA Fast Track to Search Focused AI Solutions
IAC 2024 - IA Fast Track to Search Focused AI SolutionsEnterprise Knowledge
 
Benefits Of Flutter Compared To Other Frameworks
Benefits Of Flutter Compared To Other FrameworksBenefits Of Flutter Compared To Other Frameworks
Benefits Of Flutter Compared To Other FrameworksSoftradix Technologies
 
Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365
Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365
Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 3652toLead Limited
 
SIEMENS: RAPUNZEL – A Tale About Knowledge Graph
SIEMENS: RAPUNZEL – A Tale About Knowledge GraphSIEMENS: RAPUNZEL – A Tale About Knowledge Graph
SIEMENS: RAPUNZEL – A Tale About Knowledge GraphNeo4j
 
Making_way_through_DLL_hollowing_inspite_of_CFG_by_Debjeet Banerjee.pptx
Making_way_through_DLL_hollowing_inspite_of_CFG_by_Debjeet Banerjee.pptxMaking_way_through_DLL_hollowing_inspite_of_CFG_by_Debjeet Banerjee.pptx
Making_way_through_DLL_hollowing_inspite_of_CFG_by_Debjeet Banerjee.pptxnull - The Open Security Community
 
Transforming Data Streams with Kafka Connect: An Introduction to Single Messa...
Transforming Data Streams with Kafka Connect: An Introduction to Single Messa...Transforming Data Streams with Kafka Connect: An Introduction to Single Messa...
Transforming Data Streams with Kafka Connect: An Introduction to Single Messa...HostedbyConfluent
 
GenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day PresentationGenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day PresentationMichael W. Hawkins
 
Install Stable Diffusion in windows machine
Install Stable Diffusion in windows machineInstall Stable Diffusion in windows machine
Install Stable Diffusion in windows machinePadma Pradeep
 
Transcript: #StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
Transcript: #StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024Transcript: #StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
Transcript: #StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024BookNet Canada
 
WhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure service
WhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure serviceWhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure service
WhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure servicePooja Nehwal
 
Human Factors of XR: Using Human Factors to Design XR Systems
Human Factors of XR: Using Human Factors to Design XR SystemsHuman Factors of XR: Using Human Factors to Design XR Systems
Human Factors of XR: Using Human Factors to Design XR SystemsMark Billinghurst
 

Recently uploaded (20)

My Hashitalk Indonesia April 2024 Presentation
My Hashitalk Indonesia April 2024 PresentationMy Hashitalk Indonesia April 2024 Presentation
My Hashitalk Indonesia April 2024 Presentation
 
Maximizing Board Effectiveness 2024 Webinar.pptx
Maximizing Board Effectiveness 2024 Webinar.pptxMaximizing Board Effectiveness 2024 Webinar.pptx
Maximizing Board Effectiveness 2024 Webinar.pptx
 
FULL ENJOY 🔝 8264348440 🔝 Call Girls in Diplomatic Enclave | Delhi
FULL ENJOY 🔝 8264348440 🔝 Call Girls in Diplomatic Enclave | DelhiFULL ENJOY 🔝 8264348440 🔝 Call Girls in Diplomatic Enclave | Delhi
FULL ENJOY 🔝 8264348440 🔝 Call Girls in Diplomatic Enclave | Delhi
 
Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...
Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...
Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...
 
Unblocking The Main Thread Solving ANRs and Frozen Frames
Unblocking The Main Thread Solving ANRs and Frozen FramesUnblocking The Main Thread Solving ANRs and Frozen Frames
Unblocking The Main Thread Solving ANRs and Frozen Frames
 
The transition to renewables in India.pdf
The transition to renewables in India.pdfThe transition to renewables in India.pdf
The transition to renewables in India.pdf
 
Azure Monitor & Application Insight to monitor Infrastructure & Application
Azure Monitor & Application Insight to monitor Infrastructure & ApplicationAzure Monitor & Application Insight to monitor Infrastructure & Application
Azure Monitor & Application Insight to monitor Infrastructure & Application
 
Advanced Test Driven-Development @ php[tek] 2024
Advanced Test Driven-Development @ php[tek] 2024Advanced Test Driven-Development @ php[tek] 2024
Advanced Test Driven-Development @ php[tek] 2024
 
IAC 2024 - IA Fast Track to Search Focused AI Solutions
IAC 2024 - IA Fast Track to Search Focused AI SolutionsIAC 2024 - IA Fast Track to Search Focused AI Solutions
IAC 2024 - IA Fast Track to Search Focused AI Solutions
 
Benefits Of Flutter Compared To Other Frameworks
Benefits Of Flutter Compared To Other FrameworksBenefits Of Flutter Compared To Other Frameworks
Benefits Of Flutter Compared To Other Frameworks
 
Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365
Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365
Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365
 
SIEMENS: RAPUNZEL – A Tale About Knowledge Graph
SIEMENS: RAPUNZEL – A Tale About Knowledge GraphSIEMENS: RAPUNZEL – A Tale About Knowledge Graph
SIEMENS: RAPUNZEL – A Tale About Knowledge Graph
 
Making_way_through_DLL_hollowing_inspite_of_CFG_by_Debjeet Banerjee.pptx
Making_way_through_DLL_hollowing_inspite_of_CFG_by_Debjeet Banerjee.pptxMaking_way_through_DLL_hollowing_inspite_of_CFG_by_Debjeet Banerjee.pptx
Making_way_through_DLL_hollowing_inspite_of_CFG_by_Debjeet Banerjee.pptx
 
Vulnerability_Management_GRC_by Sohang Sengupta.pptx
Vulnerability_Management_GRC_by Sohang Sengupta.pptxVulnerability_Management_GRC_by Sohang Sengupta.pptx
Vulnerability_Management_GRC_by Sohang Sengupta.pptx
 
Transforming Data Streams with Kafka Connect: An Introduction to Single Messa...
Transforming Data Streams with Kafka Connect: An Introduction to Single Messa...Transforming Data Streams with Kafka Connect: An Introduction to Single Messa...
Transforming Data Streams with Kafka Connect: An Introduction to Single Messa...
 
GenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day PresentationGenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day Presentation
 
Install Stable Diffusion in windows machine
Install Stable Diffusion in windows machineInstall Stable Diffusion in windows machine
Install Stable Diffusion in windows machine
 
Transcript: #StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
Transcript: #StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024Transcript: #StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
Transcript: #StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
 
WhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure service
WhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure serviceWhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure service
WhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure service
 
Human Factors of XR: Using Human Factors to Design XR Systems
Human Factors of XR: Using Human Factors to Design XR SystemsHuman Factors of XR: Using Human Factors to Design XR Systems
Human Factors of XR: Using Human Factors to Design XR Systems
 

Ch02

  • 1. 2.1 Copyright © The McGraw-Hill Companies, Inc. Permission required for reproduction or display.
  • 2. 2-1 LAYERED TASKS We use the concept of layers in our daily life. As an example, let us consider two friends who communicate through postal mail. The process of sending a letter to a friend would be complex if there were no services available from the post office. Topics discussed in this section: Sender, Receiver, and Carrier Hierarchy 2.2
  • 3. Figure 2.1 Tasks involved in sending a letter 2.3
  • 4. 2-2 THE OSI MODEL Established in 1947, the International Standards Organization (ISO) is a multinational body dedicated to worldwide agreement on international standards. An ISO standard that covers all aspects of network communications is the Open Systems Interconnection (OSI) model. It was first introduced in the late 1970s. Topics discussed in this section: Layered Architecture Peer-to-Peer Processes Encapsulation 2.4
  • 5. Note ISO is the organization. OSI is the model. 2.5
  • 6. Figure 2.2 Seven layers of the OSI model 2.6
  • 7. Figure 2.3 The interaction between layers in the OSI model 2.7
  • 8. Figure 2.4 An exchange using the OSI model 2.8
  • 9. 2-3 LAYERS IN THE OSI MODEL In this section we briefly describe the functions of each layer in the OSI model. Topics discussed in this section: Physical Layer Data Link Layer Network Layer Transport Layer Session Layer Presentation Layer Application Layer 2.9
  • 10. Figure 2.5 Physical layer 2.10
  • 11. Note The physical layer is responsible for movements of individual bits from one hop (node) to the next. 2.11
  • 12. Figure 2.6 Data link layer 2.12
  • 13. Note The data link layer is responsible for moving frames from one hop (node) to the next. 2.13
  • 14. Figure 2.7 Hop-to-hop delivery 2.14
  • 15. Figure 2.8 Network layer 2.15
  • 16. Note The network layer is responsible for the delivery of individual packets from the source host to the destination host. 2.16
  • 18. Figure 2.10 Transport layer 2.18
  • 19. Note The transport layer is responsible for the delivery of a message from one process to another. 2.19
  • 20. Figure 2.11 Reliable process-to-process delivery of a message 2.20
  • 21. Figure 2.12 Session layer 2.21
  • 22. Note The session layer is responsible for dialog control and synchronization. 2.22
  • 24. Note The presentation layer is responsible for translation, compression, and encryption. 2.24
  • 26. Note The application layer is responsible for providing services to the user. 2.26
  • 27. Figure 2.15 Summary of layers 2.27
  • 28. 2-4 TCP/IP PROTOCOL SUITE The layers in the TCP/IP protocol suite do not exactly match those in the OSI model. The original TCP/IP protocol suite was defined as having four layers: host-to- network, internet, transport, and application. However, when TCP/IP is compared to OSI, we can say that the TCP/IP protocol suite is made of five layers: physical, data link, network, transport, and application. Topics discussed in this section: Physical and Data Link Layers Network Layer Transport Layer Application Layer 2.28
  • 29. Figure 2.16 TCP/IP and OSI model 2.29
  • 30. 2-5 ADDRESSING Four levels of addresses are used in an internet employing the TCP/IP protocols: physical, logical, port, and specific. Topics discussed in this section: Physical Addresses Logical Addresses Port Addresses Specific Addresses 2.30
  • 31. Figure 2.17 Addresses in TCP/IP 2.31
  • 32. Figure 2.18 Relationship of layers and addresses in TCP/IP 2.32
  • 33. Example 2.1 In Figure 2.19 a node with physical address 10 sends a frame to a node with physical address 87. The two nodes are connected by a link (bus topology LAN). As the figure shows, the computer with physical address 10 is the sender, and the computer with physical address 87 is the receiver. 2.33
  • 34. Figure 2.19 Physical addresses 2.34
  • 35. Example 2.2 As we will see in Chapter 13, most local-area networks use a 48-bit (6-byte) physical address written as 12 hexadecimal digits; every byte (2 hexadecimal digits) is separated by a colon, as shown below: 07:01:02:01:2C:4B A 6-byte (12 hexadecimal digits) physical address. 2.35
  • 36. Example 2.3 Figure 2.20 shows a part of an internet with two routers connecting three LANs. Each device (computer or router) has a pair of addresses (logical and physical) for each connection. In this case, each computer is connected to only one link and therefore has only one pair of addresses. Each router, however, is connected to three networks (only two are shown in the figure). So each router has three pairs of addresses, one for each connection. 2.36
  • 37. Figure 2.20 IP addresses 2.37
  • 38. Example 2.4 Figure 2.21 shows two computers communicating via the Internet. The sending computer is running three processes at this time with port addresses a, b, and c. The receiving computer is running two processes at this time with port addresses j and k. Process a in the sending computer needs to communicate with process j in the receiving computer. Note that although physical addresses change from hop to hop, logical and port addresses remain the same from the source to destination. 2.38
  • 39. Figure 2.21 Port addresses 2.39
  • 40. Note The physical addresses will change from hop to hop, but the logical addresses usually remain the same. 2.40
  • 41. Example 2.5 As we will see in Chapter 23, a port address is a 16-bit address represented by one decimal number as shown. 753 A 16-bit port address represented as one single number. 2.41
  • 42. Note The physical addresses change from hop to hop, but the logical and port addresses usually remain the same. 2.42