The document discusses the OSI model and TCP/IP protocol suite. It describes the seven layers of the OSI model and compares it to the TCP/IP model. Each layer is responsible for certain functions in the communication process. The physical layer deals with physical interfaces, data link layer handles framing and addressing, network layer provides logical addressing and routing, transport layer handles segmentation and error checking, session layer manages dialog control and synchronization, presentation layer handles data formatting, and application layer supports user applications and services. The document also discusses addressing mechanisms used at each layer like physical, logical, port, and application-specific addresses.
Power point presentation on osi model.
A good presentation cover all topics.
For any other type of ppt's or pdf's to be created on demand contact -dhawalm8@gmail.com
mob. no-7023419969
Power point presentation on osi model.
A good presentation cover all topics.
For any other type of ppt's or pdf's to be created on demand contact -dhawalm8@gmail.com
mob. no-7023419969
A framework that helps to understand complex network interactions. It is the part of the Internet communications process where these connections occur, by sending packets of data back and forth between different networks. There are two models that are widely referenced today: OSI and TCP/IP. The concepts are similar, but the layers themselves differ between the two models.
Slides for protocol layering and network applicationsjajinekkanti
why and how Protocol layering is done in TCP/IP protocol suite, how multiplexing and demultiplexing can be done in different protocol layers in TCP\IP.
Difference between OSI Layer & TCP/IP LayerNetwax Lab
Difference between OSI Layer & TCP/IP Layer
TCP/IP OSI
It has 4 layers. It has 7 layers.
TCP/IP Protocols are considered to be standards
around which the internet has developed.
OSI Model however is a "generic, protocolindependent standard."
Follows Vertical Approach Follows Horizontal Approach
In TCP/IP Model, Transport Layer does not
Guarantees delivery of packets.
In OSI Model, Transport Layer Guarantees
delivery of packets.
Operation “Blue Star” is the only event in the history of Independent India where the state went into war with its own people. Even after about 40 years it is not clear if it was culmination of states anger over people of the region, a political game of power or start of dictatorial chapter in the democratic setup.
The people of Punjab felt alienated from main stream due to denial of their just demands during a long democratic struggle since independence. As it happen all over the word, it led to militant struggle with great loss of lives of military, police and civilian personnel. Killing of Indira Gandhi and massacre of innocent Sikhs in Delhi and other India cities was also associated with this movement.
Welcome to TechSoup New Member Orientation and Q&A (May 2024).pdfTechSoup
In this webinar you will learn how your organization can access TechSoup's wide variety of product discount and donation programs. From hardware to software, we'll give you a tour of the tools available to help your nonprofit with productivity, collaboration, financial management, donor tracking, security, and more.
More Related Content
Similar to CSC1202_3_The_OSI_Reference_Model_-_V2.pdf
A framework that helps to understand complex network interactions. It is the part of the Internet communications process where these connections occur, by sending packets of data back and forth between different networks. There are two models that are widely referenced today: OSI and TCP/IP. The concepts are similar, but the layers themselves differ between the two models.
Slides for protocol layering and network applicationsjajinekkanti
why and how Protocol layering is done in TCP/IP protocol suite, how multiplexing and demultiplexing can be done in different protocol layers in TCP\IP.
Difference between OSI Layer & TCP/IP LayerNetwax Lab
Difference between OSI Layer & TCP/IP Layer
TCP/IP OSI
It has 4 layers. It has 7 layers.
TCP/IP Protocols are considered to be standards
around which the internet has developed.
OSI Model however is a "generic, protocolindependent standard."
Follows Vertical Approach Follows Horizontal Approach
In TCP/IP Model, Transport Layer does not
Guarantees delivery of packets.
In OSI Model, Transport Layer Guarantees
delivery of packets.
Operation “Blue Star” is the only event in the history of Independent India where the state went into war with its own people. Even after about 40 years it is not clear if it was culmination of states anger over people of the region, a political game of power or start of dictatorial chapter in the democratic setup.
The people of Punjab felt alienated from main stream due to denial of their just demands during a long democratic struggle since independence. As it happen all over the word, it led to militant struggle with great loss of lives of military, police and civilian personnel. Killing of Indira Gandhi and massacre of innocent Sikhs in Delhi and other India cities was also associated with this movement.
Welcome to TechSoup New Member Orientation and Q&A (May 2024).pdfTechSoup
In this webinar you will learn how your organization can access TechSoup's wide variety of product discount and donation programs. From hardware to software, we'll give you a tour of the tools available to help your nonprofit with productivity, collaboration, financial management, donor tracking, security, and more.
Francesca Gottschalk - How can education support child empowerment.pptxEduSkills OECD
Francesca Gottschalk from the OECD’s Centre for Educational Research and Innovation presents at the Ask an Expert Webinar: How can education support child empowerment?
Embracing GenAI - A Strategic ImperativePeter Windle
Artificial Intelligence (AI) technologies such as Generative AI, Image Generators and Large Language Models have had a dramatic impact on teaching, learning and assessment over the past 18 months. The most immediate threat AI posed was to Academic Integrity with Higher Education Institutes (HEIs) focusing their efforts on combating the use of GenAI in assessment. Guidelines were developed for staff and students, policies put in place too. Innovative educators have forged paths in the use of Generative AI for teaching, learning and assessments leading to pockets of transformation springing up across HEIs, often with little or no top-down guidance, support or direction.
This Gasta posits a strategic approach to integrating AI into HEIs to prepare staff, students and the curriculum for an evolving world and workplace. We will highlight the advantages of working with these technologies beyond the realm of teaching, learning and assessment by considering prompt engineering skills, industry impact, curriculum changes, and the need for staff upskilling. In contrast, not engaging strategically with Generative AI poses risks, including falling behind peers, missed opportunities and failing to ensure our graduates remain employable. The rapid evolution of AI technologies necessitates a proactive and strategic approach if we are to remain relevant.
Read| The latest issue of The Challenger is here! We are thrilled to announce that our school paper has qualified for the NATIONAL SCHOOLS PRESS CONFERENCE (NSPC) 2024. Thank you for your unwavering support and trust. Dive into the stories that made us stand out!
How to Make a Field invisible in Odoo 17Celine George
It is possible to hide or invisible some fields in odoo. Commonly using “invisible” attribute in the field definition to invisible the fields. This slide will show how to make a field invisible in odoo 17.
The French Revolution, which began in 1789, was a period of radical social and political upheaval in France. It marked the decline of absolute monarchies, the rise of secular and democratic republics, and the eventual rise of Napoleon Bonaparte. This revolutionary period is crucial in understanding the transition from feudalism to modernity in Europe.
For more information, visit-www.vavaclasses.com
2024.06.01 Introducing a competency framework for languag learning materials ...Sandy Millin
http://sandymillin.wordpress.com/iateflwebinar2024
Published classroom materials form the basis of syllabuses, drive teacher professional development, and have a potentially huge influence on learners, teachers and education systems. All teachers also create their own materials, whether a few sentences on a blackboard, a highly-structured fully-realised online course, or anything in between. Despite this, the knowledge and skills needed to create effective language learning materials are rarely part of teacher training, and are mostly learnt by trial and error.
Knowledge and skills frameworks, generally called competency frameworks, for ELT teachers, trainers and managers have existed for a few years now. However, until I created one for my MA dissertation, there wasn’t one drawing together what we need to know and do to be able to effectively produce language learning materials.
This webinar will introduce you to my framework, highlighting the key competencies I identified from my research. It will also show how anybody involved in language teaching (any language, not just English!), teacher training, managing schools or developing language learning materials can benefit from using the framework.
Honest Reviews of Tim Han LMA Course Program.pptxtimhan337
Personal development courses are widely available today, with each one promising life-changing outcomes. Tim Han’s Life Mastery Achievers (LMA) Course has drawn a lot of interest. In addition to offering my frank assessment of Success Insider’s LMA Course, this piece examines the course’s effects via a variety of Tim Han LMA course reviews and Success Insider comments.
Acetabularia Information For Class 9 .docxvaibhavrinwa19
Acetabularia acetabulum is a single-celled green alga that in its vegetative state is morphologically differentiated into a basal rhizoid and an axially elongated stalk, which bears whorls of branching hairs. The single diploid nucleus resides in the rhizoid.
Digital Artifact 2 - Investigating Pavilion Designs
CSC1202_3_The_OSI_Reference_Model_-_V2.pdf
1. The OSI Model and the TCP/IP
Protocol Suite
Outline:
1. Protocol Layers
2. OSI Model
3. TCP/IP Model
4. Addressing
2. OBJECTIVES
To discuss the OSI model and its layer architecture
and to show the interface between the layers.
To briefly discuss the functions of each layer in the
OSI model.
To introduce the TCP/IP protocol suite and compare
its layers with the ones in the OSI model.
To show the functionality of each layer in the TCP/IP
protocol with some examples.
To discuss the addressing mechanism used in some
layers of the TCP/IP protocol suite for the delivery of
a message from the source to the destination.
TCP/IP Protocol Suite 2
3. Computer Network Components
Components of a computer network:
Computer with NIC (PCs, laptops, handhelds)
routers & switches (IP router, Ethernet switch)
Links”Transmission media” (wired, wireless)
protocols (IP,TCP,CSMA/CD,CSMA/CA)
applications (network services)
i.e. Network Operating System (NOS)
humans and service agents
2/17/2013 Fatimah AlAkeel - Network 1 3
4. we discussed that a protocol is required when
two entities need to communicate.
When communication is not simple, we may
divide the complex task of communication into
several layers.
The sending computer must:
◦ Recognize the data.
◦ Divide the data into manageable chunks.
◦ Add information to each chunk of data to determine the
location of the data and to identify the receiver.
◦ Add timing and error-checking information.
◦ Put the data on the network and send it on its way.
In this case, we may need several protocols,
one for each layer.
TCP/IP Protocol Suite 4
PROTOCOL LAYERS
5. PROTOCOL LAYERS
Let us use a scenario in
communication in which the role of
protocol layering may be better
understood.
We use two examples. In the first
example, communication is so simple
that it can occur in only one layer.
6. Assume Maria and Ann are neighbors with a lot of common ideas. However,
Maria speaks only Spanish, and Ann speaks only English.
Since both have learned the sign language in their childhood, they enjoy
meeting in a cafe a couple of days per week and exchange their ideas using
signs.
Occasionally, they also use a bilingual dictionary. Communication is face to
face and Happens in one layer as shown in Figure.
TCP/IP Protocol Suite 6
Example 1
7. TCP/IP Protocol Suite 7
Example 2
Now assume that Ann has to move
to another town because of her job.
Before she moves, the two meet for
the last time in the same cafe.
Although both are sad, Maria
surprises Ann when she opens a
packet that contains two small
machines.
• The first machine can scan and
transform a letter in English to a secret
code or vice versa.
• The other machine can scan and
translate a letter in Spanish to the
same secret code or vice versa.
Ann takes the first machine; Maria
keeps the second one.
The two friends can still
communicate using the secret code,
as shown in Figure.
8. • Established in 1947, the International
Standards Organization (ISO) is a
multinational body dedicated to
worldwide agreement on international
standards.
• Almost three-fourths of countries in the
world are represented in the ISO.
• An ISO standard that covers all aspects
of network communications is the Open
Systems Interconnection (OSI) model.
• It was first introduced in the late 1970s.
TCP/IP Protocol Suite 8
THE OSI MODEL
9. Topics Discussed in the Section
Layered Architecture
Layer-to-layer Communication
Encapsulation
Layers in the OSI Model
TCP/IP Protocol Suite 9
11. OSI Model and Nora
Application 7th floor Nora gets secret message from Number One
Presentation 6th floor Message is translated, encrypted and miniaturized
Session 5th floor
Security checks message, adds checkpoints to
ensure the embassy receives whole message
Transport 4th floor
Message is analysed, combined if necessary and
broken into smaller pieces
Network
3rd
floor
Personnel check the message, determine the
address, indicate fastest route to Embassy
Data Link
2nd
floor
Message placed in special packet contains message,
sender and destination ID
Physical 1st floor Prepared for a trip to the KSA Embassy
16. The TCP/IP
protocol suite was
developed prior to
the OSI model.
Therefore, the
layers in the
TCP/IP protocol
suite do not match
exactly with those
in the OSI model.
• Troubleshooting, file
sharing, internet
Application
• Flow control, error
control
Transport
• IP addressing and
routing of network
traffic
Internet
• Interface with the
physical network
Network
Access
TCP/IP Protocol Suite 16
TCP/IP Model
17. Comparison between OSI and
TCP/IP
IOS Model TCP/IP Model
Application
Presentation
Session
Transport
Network
Data Link
Physical
Application
Transport
Internet
Network
Access
19. LAYERS INTHE OSI
MODEL
In this section we briefly describe the functions of each
layer in the OSI model.
20. Physical layer
defines the procedures and functions that physical
devices and interfaces have to perform for transmission
occur.
The physical layer is concerned with the following:
◦ Physical characteristics of interfaces and media:
◦ Representation of the bits
◦ Data rate, the number of bits sent each second.
◦ Line configuration, Point to point or multipoint configuration.
◦ Physical topology
◦ Transmission Mode : Simplex, half duplex or full duplex
2/17/2013
Nouf Aljaffan (C) 2012 - CSC 1202 Course
at KSU
21. TCP/IP Protocol Suite 21
Communication at the physical layer
A
Physical
layer
Physical
layer
R1 R3 R4 B
Source Destination
Legend
011 ... 101
0
1
1
.
.
.
1
0
1
011 ... 101 011 ... 101
Link 3 Link 5 Link 6
Link 1
22. TCP/IP Protocol Suite 22
The unit of communication at the physical
layer is a bit.
Note
23. Data Link Layer
The data link layer transforms the
physical layer, a raw transmission facility,
to a reliable link and is responsible for
node-to-node delivery.
The Data Link layer is concerned with the
following:
◦ Framing.
◦ Physical addressing, each node has its unique address.
◦ Flow Control.
◦ Access Control.
◦ Error control, normally achieved through a trailer to the end of the frame.
24. TCP/IP Protocol Suite 24
Communication at the data link layer
A
Physical Physical
Data link
Data link
R1 R3 R4 B
Source Destination Data
D Header
H
Legend
Link 1 Link 3 Link 5 Link 6
Frame
D2 H2
F
r
a
m
e
D
2
H
2
Frame
D2 H2
Frame
D2 H2
25. TCP/IP Protocol Suite 25
The unit of communication at the data link
layer is a frame.
Note
26. Network Layer
• Is responsible for the source-to-
destination delivery of a packet possible
across multiple networks.
Functions:
• Logical addressing.
• Routing, It determines which path the data
should take based on network conditions,
priority of service, and other factors.
27. TCP/IP Protocol Suite 27
The unit of communication at the network
layer is a datagram (Packet).
Note
28. Transport Layer
The transport layer is responsible for process-to-process delivery of the
entire message.
Makes sure that the data arrives without errors, in the proper sequence
and in a reliable condition.
Functions:
◦ Port addressing,The network layer gets each packet to the correct computer;the transport
layer gets the entire message to the correct process on that computer.
◦ Segmentation and reassembly: a message is divided into transmittable segments, each having
a sequence number
◦ Connection control:The transport layer can be either connectionless or connection-
oriented.
◦ Flow control
◦ Error control
2/17/2013
Nouf Aljaffan (C) 2012 - CSC 1202 Course
at KSU
29. TCP/IP Protocol Suite 29
Communication at transport layer
A
Physical Physical
Data link
Data link
R1 R3 R4
B
Network
Network
Transport Transport
Source Destination Data
D Header
H
Legend
Segment
D4 H4
Segment
D4 H4
30. TCP/IP Protocol Suite 30
The unit of communication at the transport
layer is a segment, user datagram, or a
packet, depending on the specific protocol
used in this layer.
Note
31. Session Layer
the session layer, allows two applications on different computers to
open, use, and close a connection called a session.
◦ (A session is a highly structured dialog between two workstations.)
Functions:
◦ Dialog control
It also makes sure the session is orderly, establishing which node transmits first,
how long it can transmit, and what to do in case of an error.
It performs name-recognition and other functions, such as security, that are needed
to allow two applications to communicate over the network.
◦ Synchronization
The session layer synchronizes user tasks by placing checkpoints in the data
stream.
The checkpoints break the data into smaller groups for error detection. It allows
information of different streams, perhaps originating from different sources, to be
properly combined or synchronized.
An example application is web conferencing, in which the streams of audio and video must
be synchronous to avoid so-called lip synch problems. It ensures that the person displayed
on screen is the current speaker.
32. presentation layer
The presentation layer is responsible for
translation, compression, and encryption.
Deals with the actual formatting of
the data.
◦ For example, data might be converted from
EBCDIC to ASCII formatting so that the
receiving node can understand it.
2/17/2013
Nouf Aljaffan (C) 2012 - CSC 1202 Course
at KSU
33. Application Layer
This layer relates to the services that directly provide user
interfaces support user applications or services, such as software
for file transfers, database access, and e-mail.
In other words, it serves as a window through which application
processes can access network services.
The application layer enables the user to access the network.
This would be the layer that a programmer uses to allow his
application to access a network service, such as linking into a
database.
2/17/2013
Nouf Aljaffan (C) 2012 - CSC 1202 Course
at KSU
34. TCP/IP Protocol Suite 34
Communication at application layer
A
Physical Physical
Data link
Data link
R1 R3 R4
B
Network
Network
Transport Transport
Application
Application Source Destination Data
D Header
H
Legend
Message
D5 D5
D5 D5
Message
35. TCP/IP Protocol Suite 35
The unit of communication at the
application layer is a message.
Note
36. Four levels of addresses are used in
an internet employing the TCP/IP
protocols:
◦ physical address
◦ logical address
◦ port address
◦ application-specific address.
TCP/IP Protocol Suite 36
ADDRESSING
37. Each address is related to a one layer in the
TCP/IP architecture, as shown in Figure.
IOS Model TCP/IP Model
Application
Presentation
Session
Transport
Network
Data Link
Physical
Application
Transport
Internet
Network
Access
Logic Address
Port Address
Application Spec.Address
Physical Address
38. TCP/IP Protocol Suite 38
Example 1: physical addresses
Data
87 10
1 packet
accepted
Data
87 10
4
39. TCP/IP Protocol Suite 39
As we will see later, most local area networks represent the
physical address in two ways:
• IPv4
• use a 32-bit (4-byte) physical address written as
decimal digits; every byte (2 hexadecimal digits) is
separated by a dot, as shown below
• IPv6 ( new version)
• use a 48-bit (6-byte) physical address written as 12
hexadecimal digits; every byte (2 hexadecimal digits)
is separated by a colon, as shown below:
Example 1
07:01:02:01:2C:4B
A 6-byte (12 hexadecimal digits) physical address
128.7.0.0
A 4-byte (a byte represent 8 bits called octet ) physical address
40. TCP/IP Protocol Suite 40
Example 2: logical addresses
Data
A P
20 10 Data
A P
20 10
Physical
addresses
changed
Data
A P
33 99
Data
A P
33 99
Physical
addresses
changed
Data
A P
95 66 Data
A P
95 66
41. TCP/IP Protocol Suite 41
The physical addresses will change from
hop to hop, but the logical addresses
remain the same.
Note
42. the purpose of ports is to uniquely
identify different applications or
processes running on a single
computer and thereby enable them to
share a single physical connection to
a packet-switched network like the
Internet.
TCP/IP Protocol Suite 42
Example 2
43. TCP/IP Protocol Suite 43
A Sender Receiver P
Internet
Example 3: port numbers
a Data
j
A P
H2
a Data
j
A P
a Data
j
Data
a Data
j
A P
H2
a Data
j
A P
a Data
j
Data
44. TCP/IP Protocol Suite 44
The physical addresses change from hop to
hop, but the logical and port addresses
usually remain the same.
Note
45. TCP/IP Protocol Suite 45
a port address is a 16-bit address represented by one decimal
number as shown.
Example 3
753
A 16-bit port address represented as one single number