SlideShare a Scribd company logo
2

Tutun Juhana
Telecommunication Engineering
School of Electrical Engineering & Informatics
Institut Teknologi Bandung

The OSI Model
&
the TCP/IP Protocol Suite
Computer Networks
• Before 1990 everyone
believed that the OSI
model would become the
ultimate standard for
data communications but this did not happen
• The TCP/IP protocol suite became the dominant
commercial architecture because it was used
and tested extensively in the Internet
– the OSI model was never fully implemented
When Communication is simple
Example 1
• The communication is so simple that it can
occur in only one layer
(sign language)

Speak Spanish

Speak English
When Communication is not simple
Example 2
• Ann has to move to another town because of her job
• We need three layers

• It is hierarchical (the tasks must be done in the order given in the hierarchy)
• Each layer uses the services of the layer immediately below it
• Each layer gives the services to the layer immediately above it
THE OSI MODEL
• Established in 1947, the International
Standards Organization (ISO) is a
multinational body dedicated to worldwide
agreement on international standards
• An ISO standard that covers all aspects of
network communications is the Open
Systems Interconnection (OSI) model
– It was first introduced in the late 1970s
• An open system is a set of protocols that allows
any two different systems to communicate
regardless of their underlying architecture
• The OSI model is not a protocol; it is a model for
understanding and designing a network
architecture that is flexible, robust, and
interoperable
• The OSI model was intended to be the basis for
the creation of the protocols in the OSI stack
The OSI model
The user support layers; they
allow interoperability among
unrelated software systems;
They are almost always
implemented in software
the transport layer, links the two subgroups
and ensures that what the lower layers
have transmitted is in a form that the upper
layers can use

The network support layers; they deal with
the physical aspects of moving data from
one device to another (such as electrical
specifications, physical connections,
physical addressing, and transport timing
and reliability); They are a combination of
hardware and software, except for the
physical layer, which is mostly hardware
Layered Architecture
An exchange using the OSI model

Decapsulation
Encapsulation
Physical Layer

• Responsible for moving individual bits from one (node) to the next
• It coordinates the functions required to carry a bit stream over a
physical medium.
• It deals with the mechanical and electrical specifications of the
interface and transmission media
• It defines the procedures and functions that physical devices and
interfaces have to perform for transmission to occur
The physical layer is also concerned with the
following
•
•
•
•
•
•
•

Physical characteristics of interfaces and media
Representation of bits
Data rate
Synchronization of bits
Line configuration
Physical topology
Transmission mode
Data Link Layer

• The data link layer is responsible for moving frames from
one hop (node) to the next
• The data link layer transforms the physical layer, a raw
transmission facility, to a reliable link
– It makes the physical layer appear error-free to the upper layer
(network layer)
Other responsibilities of the data link layer
include the following
• Framing
• Physical addressing
• Flow control
• Error control
• Access control
Network Layer
• The network layer is responsible for the
source-to-destination delivery of a packet,
possibly across multiple networks (links)
• Whereas the data link layer oversees the
delivery of the packet between two
systems on the same network (link)
• The network layer ensures that each
packet gets from its point of origin to its
final destination
• If two systems are connected to the same
link, there is usually no need for a network
layer
• However, if the two systems are attached
to different networks (links) with
connecting devices between the networks
(links), there is often a need for the
network layer to accomplish source-todestination delivery
Other responsibilities of the network layer
include the following
• Logical addressing
• Routing
Transport Layer
• The transport layer is responsible for the
delivery of a message from one process to
another
• A process is an application program
running on the host
• Reliable process-to-process delivery of a message
• Differences with Network Layer
• Network layer oversees source-to-destination delivery
of individual packets
– It does not recognize any relationship between those
packets

• The transport layer ensures that the whole message
arrives intact and in order
– Overseeing both error control and flow control at the sourceto-destination level
• Other responsibilities of the transport layer
– Service-point addressing (port address)
– Segmentation and reassembly
– Connection control
• The transport layer can be either connectionless or
connection oriented

– Flow control
– Error control
Session Layer
• Session layer establishes, maintains, and
synchronizes the interaction between
communicating systems
• Responsibilities
– Dialog control
– Synchronization
Presentation Layer
• The presentation layer is concerned with
the syntax and semantics of the
information exchanged between two
systems
– Translation
– Encryption
– Compression
Application Layer
• The application layer enables the user, whether
human or software, to access the network
• It provides user interfaces and support for
services (email, remote file access etc.)
• Services provided :
–
–
–
–

Network virtual terminal
File transfer, access, and management (FTAM)
E-mail services
Directory services
Summary of OSI Layers
TCP/IP PROTOCOL SUITE
• The TCP/IP protocol suite was developed prior to the OSI model
TCP/IP versus OSI model
Layers in the TCP/IP Protocol Suite
• To discuss the purpose of each layer in
the TCP/IP protocol suite, we will study a
small private internet
• A link is a network that allows a set of computers
to communicate with each other
• A link can be a LAN (local area network) serving
a small area or a WAN (wide area network)
serving a larger area
• We assume that different links are connected
together by devices called routers or switches
that route the data to reach their final
destinations
Physical Layer
• TCP/IP does not define any specific
protocol for the physical layer
• It supports all of the standard and
proprietary protocols
• The communication is between two hops
or nodes, either a computer or router
• The unit of communication is a single bit
We assume that the
most efficient way to
communicate with each
other is via routers
R1, R3, and R4
if a node is connected to n links, it needs n
physical-layer protocols, one for
each link because links may use different
physical-layer protocols
• The responsibility of the physical layer, in
addition to delivery of bits, matches with
what mentioned for the physical layer of
the OSI model
• It mostly depends on the underlying
technologies that provide links
Data Link Layer
• TCP/IP does not define any specific
protocol for the data link layer either
• It supports all of the standard and
proprietary protocols
• The communication is also between two
hops or nodes
• The unit of communication however, is a
packet called a frame
• A frame is a packet that encapsulates the data received
from the network layer with an added header and
sometimes a trailer
• The header, among other communication information,
includes the source and destination of frame
• The destination address is needed to define the right
recipient of the frame because many nodes may have
been connected to the link
• The source address is needed for possible response or
acknowledgment as may be required by some protocols
These frames may be different
because link 1 and link 3 may be
using different protocols and
require frames of different
formats
Network Layer
• At the network layer (or, more accurately, the
internetwork layer), TCP/IP supports the Internet
Protocol (IP)
• IP is the transmission mechanism used by the TCP/IP
protocols
• IP transports data in packets called datagrams, each of
which is transported separately
• Datagrams can travel along different routes and can
arrive out of sequence or be duplicated
• IP does not keep track of the routes and has no facility
for reordering datagrams once they arrive at their
destination
Transport Layer
• Only the two end computers need to have the
transport layer
• The transport layer is responsible for delivering
the whole message, which is called a segment
from A to B
– A segment may consist of a few or tens of datagrams

• Where as the network layer is responsible for
sending individual datagrams from computer A
to computer B
• The segments need to be broken into datagrams
and each datagram has to be delivered to the
network layer for transmission
• Since the Internet defines a different route for
each datagram, the datagrams may arrive out of
order and may be lost
• The transport layer at computer B needs to wait
until all of these datagrams to arrive, assemble
them and make a segment out of them
• The transport layer was represented in the
TCP/IP suite by two protocols:
– User Datagram Protocol (UDP)
– Transmission Control Protocol (TCP)

• A new protocol called Stream Control
Transmission Protocol (SCTP) has been
introduced in the last few years
Application Layer
• The application layer in TCP/IP is equivalent to
the combined session, presentation, and
application layers in the OSI model
• The application layer allows a user to access the
services of our private internet or the global
Internet
– electronic mail, file transfer, accessing the World
Wide Web, etc.

• The unit of communication at the application
layer is a message
Addressing
User-friendly addresses
that are designed for
specific application
To enable communication
between processes
Needed in which each host can
be identified uniquely, regardless
of the underlying physical network
• The address of a node as defined
by its LAN or WAN
• Have authority over the link
Physical Addresses
• Also known as the link address
• Destination physical addresses can be
either
– unicast  one single recipient
– multicast  a group of recipients
– broadcast  to be received by all systems in
the network
Logical Addresses
• Logical addresses are necessary for universal
communications that are independent of
underlying physical networks
• Physical addresses are not adequate in an
internetwork environment where different
networks can have different address formats
• A universal addressing system is needed in
which each host can be identified uniquely,
regardless of the underlying physical network
• The logical addresses are designed for this
purpose
• A logical address in the Internet is
currently a 32-bit address (IPv4) and a
128-bit address (IPv6), that can uniquely
define a host connected to the Internet
• No two publicly addressed and visible
hosts on the Internet can have the same
IP address
datagram with dst.
and src. logical
address

Frame with dst.
and src. physical
address

The physical addresses will change from
hop to hop, but the logical addresses
remain the same
Port Addresses
• Computers are devices that can run multiple processes
at the same time
• The end objective of Internet communication is a
process communicating with another process
• For example, computer A can communicate with
computer C by using TELNET, at the same time,
computer A communicates with computer B by using the
File Transfer Protocol (FTP)
• In the TCP/IP architecture, the label assigned to a
process is called a port address
• A port address in TCP/IP is 16 bits in length
(represented by one decimal number)
The physical addresses change from hop to hop, but the logical and
port addresses usually remain the same
Application-Specific Addresses
• User-friendly addresses that are designed
for specific application
• Examples include the e-mail address (for
example, tutun@stei.itb.ac.id) and the
• Universal Resource Locator (URL) (for
example, www.itb.ac.id)

More Related Content

What's hot

Computer network : models and topologies
Computer network : models and topologiesComputer network : models and topologies
Computer network : models and topologies
Anup Pandey
 
Internetworking.49
Internetworking.49Internetworking.49
Internetworking.49
myrajendra
 
02 network models
02  network models02  network models
02 network models
Meenakshi Paul
 
Iso osi
Iso osiIso osi
Unit 2 cnd_22634_pranoti doke
Unit 2 cnd_22634_pranoti dokeUnit 2 cnd_22634_pranoti doke
Unit 2 cnd_22634_pranoti doke
Pranoti Doke
 
Concept of OSI Model_KSMS_BCA_4th_6th_Sem_Priyanka Bhattacharya_20th March 2020
Concept of OSI Model_KSMS_BCA_4th_6th_Sem_Priyanka Bhattacharya_20th March  2020Concept of OSI Model_KSMS_BCA_4th_6th_Sem_Priyanka Bhattacharya_20th March  2020
Concept of OSI Model_KSMS_BCA_4th_6th_Sem_Priyanka Bhattacharya_20th March 2020
PriyankaBhattacharya28
 
communication-protocols
 communication-protocols communication-protocols
communication-protocols
Ali Kamil
 
OSI layer (Network)
OSI layer (Network)OSI layer (Network)
OSI layer (Network)
swethaRajendran1
 
Dc ch02 : protocol architecture
Dc ch02 : protocol architectureDc ch02 : protocol architecture
Dc ch02 : protocol architecture
Syaiful Ahdan
 
ISO OSI Model (Infosec perspective)
ISO OSI Model (Infosec perspective)ISO OSI Model (Infosec perspective)
ISO OSI Model (Infosec perspective)
AJINKYA PATIL
 
Internetworking Overview
Internetworking OverviewInternetworking Overview
Internetworking Overview
Shisir123
 
CISSP - Chapter 4 - Network Topology
CISSP - Chapter 4 - Network TopologyCISSP - Chapter 4 - Network Topology
CISSP - Chapter 4 - Network Topology
Karthikeyan Dhayalan
 
02 protocol architecture
02 protocol architecture02 protocol architecture
02 protocol architecture
chameli devi group of institutions
 
Osi model 7 Layers
Osi model 7 LayersOsi model 7 Layers
Osi model 7 Layers
Siddique Ibrahim
 
Computer Network - OSI model
Computer Network - OSI modelComputer Network - OSI model
Computer Network - OSI model
Manoj Kumar
 
Osi model
Osi modelOsi model
Osi model
sayyed sabir
 
Internetworking
InternetworkingInternetworking
Internetworking
shubham kumar
 
Internetworking basics
Internetworking basicsInternetworking basics
Internetworking basics
Romeo Alonzo
 
Domain 4 - Communications and Network Security
Domain 4  - Communications and Network SecurityDomain 4  - Communications and Network Security
Domain 4 - Communications and Network Security
Maganathin Veeraragaloo
 
POLITEKNIK MALAYSIA
POLITEKNIK MALAYSIA POLITEKNIK MALAYSIA
POLITEKNIK MALAYSIA
Aiman Hud
 

What's hot (20)

Computer network : models and topologies
Computer network : models and topologiesComputer network : models and topologies
Computer network : models and topologies
 
Internetworking.49
Internetworking.49Internetworking.49
Internetworking.49
 
02 network models
02  network models02  network models
02 network models
 
Iso osi
Iso osiIso osi
Iso osi
 
Unit 2 cnd_22634_pranoti doke
Unit 2 cnd_22634_pranoti dokeUnit 2 cnd_22634_pranoti doke
Unit 2 cnd_22634_pranoti doke
 
Concept of OSI Model_KSMS_BCA_4th_6th_Sem_Priyanka Bhattacharya_20th March 2020
Concept of OSI Model_KSMS_BCA_4th_6th_Sem_Priyanka Bhattacharya_20th March  2020Concept of OSI Model_KSMS_BCA_4th_6th_Sem_Priyanka Bhattacharya_20th March  2020
Concept of OSI Model_KSMS_BCA_4th_6th_Sem_Priyanka Bhattacharya_20th March 2020
 
communication-protocols
 communication-protocols communication-protocols
communication-protocols
 
OSI layer (Network)
OSI layer (Network)OSI layer (Network)
OSI layer (Network)
 
Dc ch02 : protocol architecture
Dc ch02 : protocol architectureDc ch02 : protocol architecture
Dc ch02 : protocol architecture
 
ISO OSI Model (Infosec perspective)
ISO OSI Model (Infosec perspective)ISO OSI Model (Infosec perspective)
ISO OSI Model (Infosec perspective)
 
Internetworking Overview
Internetworking OverviewInternetworking Overview
Internetworking Overview
 
CISSP - Chapter 4 - Network Topology
CISSP - Chapter 4 - Network TopologyCISSP - Chapter 4 - Network Topology
CISSP - Chapter 4 - Network Topology
 
02 protocol architecture
02 protocol architecture02 protocol architecture
02 protocol architecture
 
Osi model 7 Layers
Osi model 7 LayersOsi model 7 Layers
Osi model 7 Layers
 
Computer Network - OSI model
Computer Network - OSI modelComputer Network - OSI model
Computer Network - OSI model
 
Osi model
Osi modelOsi model
Osi model
 
Internetworking
InternetworkingInternetworking
Internetworking
 
Internetworking basics
Internetworking basicsInternetworking basics
Internetworking basics
 
Domain 4 - Communications and Network Security
Domain 4  - Communications and Network SecurityDomain 4  - Communications and Network Security
Domain 4 - Communications and Network Security
 
POLITEKNIK MALAYSIA
POLITEKNIK MALAYSIA POLITEKNIK MALAYSIA
POLITEKNIK MALAYSIA
 

Viewers also liked

Network telnet ssh
Network telnet sshNetwork telnet ssh
Network telnet ssh
Stefan Fodor
 
Q1 On Ch11 Tcpip And Application Layer
Q1 On Ch11 Tcpip And Application LayerQ1 On Ch11 Tcpip And Application Layer
Q1 On Ch11 Tcpip And Application Layer
jerometnewman
 
Q1 On Ch09 Tcpip Protocol Suite And Ip Addressing
Q1 On Ch09 Tcpip Protocol Suite And Ip AddressingQ1 On Ch09 Tcpip Protocol Suite And Ip Addressing
Q1 On Ch09 Tcpip Protocol Suite And Ip Addressing
jerometnewman
 
Networking session-4-final by aravind.R
Networking session-4-final by aravind.RNetworking session-4-final by aravind.R
Networking session-4-final by aravind.R
Navaneethan Naveen
 
Hearn and Baker 2 D transformations
Hearn and Baker 2 D transformations   Hearn and Baker 2 D transformations
Hearn and Baker 2 D transformations
Taher Barodawala
 
TCP/IP Protocol Architeture
TCP/IP Protocol ArchitetureTCP/IP Protocol Architeture
TCP/IP Protocol Architeture
Manoj Kumar
 
Two dimensional geometric transformations
Two dimensional geometric transformationsTwo dimensional geometric transformations
Two dimensional geometric transformations
Mohammad Sadiq
 
3d transformation computer graphics
3d transformation computer graphics 3d transformation computer graphics
3d transformation computer graphics
University of Potsdam
 
3D Geometric Transformations
3D Geometric Transformations3D Geometric Transformations
3D Geometric Transformations
Ishan Parekh
 
2 d transformations by amit kumar (maimt)
2 d transformations by amit kumar (maimt)2 d transformations by amit kumar (maimt)
2 d transformations by amit kumar (maimt)
Amit Kapoor
 
2 d geometric transformations
2 d geometric transformations2 d geometric transformations
2 d geometric transformations
Mohd Arif
 
Notes 2D-Transformation Unit 2 Computer graphics
Notes 2D-Transformation Unit 2 Computer graphicsNotes 2D-Transformation Unit 2 Computer graphics
Notes 2D-Transformation Unit 2 Computer graphics
NANDINI SHARMA
 
TCP/IP Model
TCP/IP ModelTCP/IP Model
TCP/IP Model
farhan516
 
TCP/IP(networking)
TCP/IP(networking)TCP/IP(networking)
TCP/IP(networking)
welcometofacebook
 
3D transformation in computer graphics
3D transformation in computer graphics3D transformation in computer graphics
3D transformation in computer graphics
SHIVANI SONI
 
TCP-IP Reference Model
TCP-IP Reference ModelTCP-IP Reference Model
TCP-IP Reference Model
Mukesh Tekwani
 
TCP/IP Presentation
TCP/IP PresentationTCP/IP Presentation
TCP/IP Presentation
eleinepagtakhan
 
TCP/IP Network ppt
TCP/IP Network pptTCP/IP Network ppt
TCP/IP Network ppt
extraganesh
 
TCP/IP Basics
TCP/IP BasicsTCP/IP Basics
TCP/IP Basics
sanjoysanyal
 

Viewers also liked (19)

Network telnet ssh
Network telnet sshNetwork telnet ssh
Network telnet ssh
 
Q1 On Ch11 Tcpip And Application Layer
Q1 On Ch11 Tcpip And Application LayerQ1 On Ch11 Tcpip And Application Layer
Q1 On Ch11 Tcpip And Application Layer
 
Q1 On Ch09 Tcpip Protocol Suite And Ip Addressing
Q1 On Ch09 Tcpip Protocol Suite And Ip AddressingQ1 On Ch09 Tcpip Protocol Suite And Ip Addressing
Q1 On Ch09 Tcpip Protocol Suite And Ip Addressing
 
Networking session-4-final by aravind.R
Networking session-4-final by aravind.RNetworking session-4-final by aravind.R
Networking session-4-final by aravind.R
 
Hearn and Baker 2 D transformations
Hearn and Baker 2 D transformations   Hearn and Baker 2 D transformations
Hearn and Baker 2 D transformations
 
TCP/IP Protocol Architeture
TCP/IP Protocol ArchitetureTCP/IP Protocol Architeture
TCP/IP Protocol Architeture
 
Two dimensional geometric transformations
Two dimensional geometric transformationsTwo dimensional geometric transformations
Two dimensional geometric transformations
 
3d transformation computer graphics
3d transformation computer graphics 3d transformation computer graphics
3d transformation computer graphics
 
3D Geometric Transformations
3D Geometric Transformations3D Geometric Transformations
3D Geometric Transformations
 
2 d transformations by amit kumar (maimt)
2 d transformations by amit kumar (maimt)2 d transformations by amit kumar (maimt)
2 d transformations by amit kumar (maimt)
 
2 d geometric transformations
2 d geometric transformations2 d geometric transformations
2 d geometric transformations
 
Notes 2D-Transformation Unit 2 Computer graphics
Notes 2D-Transformation Unit 2 Computer graphicsNotes 2D-Transformation Unit 2 Computer graphics
Notes 2D-Transformation Unit 2 Computer graphics
 
TCP/IP Model
TCP/IP ModelTCP/IP Model
TCP/IP Model
 
TCP/IP(networking)
TCP/IP(networking)TCP/IP(networking)
TCP/IP(networking)
 
3D transformation in computer graphics
3D transformation in computer graphics3D transformation in computer graphics
3D transformation in computer graphics
 
TCP-IP Reference Model
TCP-IP Reference ModelTCP-IP Reference Model
TCP-IP Reference Model
 
TCP/IP Presentation
TCP/IP PresentationTCP/IP Presentation
TCP/IP Presentation
 
TCP/IP Network ppt
TCP/IP Network pptTCP/IP Network ppt
TCP/IP Network ppt
 
TCP/IP Basics
TCP/IP BasicsTCP/IP Basics
TCP/IP Basics
 

Similar to ET3003-2 OSI-TCPIP (Semester II 2013-2014)

OSI Reference Model and TCP/IP (Lecture #3 ET3003 Sem1 2014/2015)
OSI Reference Model and TCP/IP (Lecture #3 ET3003 Sem1 2014/2015)OSI Reference Model and TCP/IP (Lecture #3 ET3003 Sem1 2014/2015)
OSI Reference Model and TCP/IP (Lecture #3 ET3003 Sem1 2014/2015)
Tutun Juhana
 
Unit 2 ppt-idc
Unit 2 ppt-idcUnit 2 ppt-idc
Unit 2 ppt-idc
hiya123jes
 
Sargation university's open system interconnection
Sargation university's open system interconnectionSargation university's open system interconnection
Sargation university's open system interconnection
KingPinYT
 
OSI Model.ppt
OSI Model.pptOSI Model.ppt
OSI Model.ppt
ShantanuBhushanMishr
 
unit1 network model osi and tcpip.pptx
unit1  network model osi and tcpip.pptxunit1  network model osi and tcpip.pptx
unit1 network model osi and tcpip.pptx
183JAIDEEP
 
06 - OSI Model.ppt
06 - OSI Model.ppt06 - OSI Model.ppt
06 - OSI Model.ppt
ssuserf7cd2b
 
06 - OSI Model.ppt
06 - OSI Model.ppt06 - OSI Model.ppt
06 - OSI Model.ppt
ssuserf7cd2b
 
Iso osi and tcp-ip reference models
Iso osi and tcp-ip reference modelsIso osi and tcp-ip reference models
Iso osi and tcp-ip reference models
bhavanatmithun
 
PC 106 PPT-06
PC 106 PPT-06PC 106 PPT-06
lecture 4.pptx
lecture 4.pptxlecture 4.pptx
lecture 4.pptx
MelkamuEndale1
 
open system interconnection referencemodel.ppt
open system interconnection referencemodel.pptopen system interconnection referencemodel.ppt
open system interconnection referencemodel.ppt
AnkitaAggarwal68
 
Pwani notes-Network Essentials.pp for Internet Protocoltx
Pwani notes-Network Essentials.pp  for Internet ProtocoltxPwani notes-Network Essentials.pp  for Internet Protocoltx
Pwani notes-Network Essentials.pp for Internet Protocoltx
MosesOkumu4
 
osireferencemodel-170703104058 (1).pdf
osireferencemodel-170703104058 (1).pdfosireferencemodel-170703104058 (1).pdf
osireferencemodel-170703104058 (1).pdf
Fira253524
 
Osi reference model
Osi reference modelOsi reference model
Osi reference model
Sagar Gor
 
ch5-osi.pdf
ch5-osi.pdfch5-osi.pdf
ch5-osi.pdf
ssuserc8e1481
 
Open system interference reference model.pptx
Open system interference reference model.pptxOpen system interference reference model.pptx
Open system interference reference model.pptx
SwapnilGaikwad138578
 
MVA slides lesson 2
MVA slides lesson 2MVA slides lesson 2
lecture 2.pptx
lecture 2.pptxlecture 2.pptx
lecture 2.pptx
MelkamuEndale1
 
Protocol layer,OSI model & POP3
Protocol layer,OSI model & POP3Protocol layer,OSI model & POP3
Protocol layer,OSI model & POP3
Zakirul Islam
 
Network architecure (3).pptx
Network architecure (3).pptxNetwork architecure (3).pptx
Network architecure (3).pptx
Kaythry P
 

Similar to ET3003-2 OSI-TCPIP (Semester II 2013-2014) (20)

OSI Reference Model and TCP/IP (Lecture #3 ET3003 Sem1 2014/2015)
OSI Reference Model and TCP/IP (Lecture #3 ET3003 Sem1 2014/2015)OSI Reference Model and TCP/IP (Lecture #3 ET3003 Sem1 2014/2015)
OSI Reference Model and TCP/IP (Lecture #3 ET3003 Sem1 2014/2015)
 
Unit 2 ppt-idc
Unit 2 ppt-idcUnit 2 ppt-idc
Unit 2 ppt-idc
 
Sargation university's open system interconnection
Sargation university's open system interconnectionSargation university's open system interconnection
Sargation university's open system interconnection
 
OSI Model.ppt
OSI Model.pptOSI Model.ppt
OSI Model.ppt
 
unit1 network model osi and tcpip.pptx
unit1  network model osi and tcpip.pptxunit1  network model osi and tcpip.pptx
unit1 network model osi and tcpip.pptx
 
06 - OSI Model.ppt
06 - OSI Model.ppt06 - OSI Model.ppt
06 - OSI Model.ppt
 
06 - OSI Model.ppt
06 - OSI Model.ppt06 - OSI Model.ppt
06 - OSI Model.ppt
 
Iso osi and tcp-ip reference models
Iso osi and tcp-ip reference modelsIso osi and tcp-ip reference models
Iso osi and tcp-ip reference models
 
PC 106 PPT-06
PC 106 PPT-06PC 106 PPT-06
PC 106 PPT-06
 
lecture 4.pptx
lecture 4.pptxlecture 4.pptx
lecture 4.pptx
 
open system interconnection referencemodel.ppt
open system interconnection referencemodel.pptopen system interconnection referencemodel.ppt
open system interconnection referencemodel.ppt
 
Pwani notes-Network Essentials.pp for Internet Protocoltx
Pwani notes-Network Essentials.pp  for Internet ProtocoltxPwani notes-Network Essentials.pp  for Internet Protocoltx
Pwani notes-Network Essentials.pp for Internet Protocoltx
 
osireferencemodel-170703104058 (1).pdf
osireferencemodel-170703104058 (1).pdfosireferencemodel-170703104058 (1).pdf
osireferencemodel-170703104058 (1).pdf
 
Osi reference model
Osi reference modelOsi reference model
Osi reference model
 
ch5-osi.pdf
ch5-osi.pdfch5-osi.pdf
ch5-osi.pdf
 
Open system interference reference model.pptx
Open system interference reference model.pptxOpen system interference reference model.pptx
Open system interference reference model.pptx
 
MVA slides lesson 2
MVA slides lesson 2MVA slides lesson 2
MVA slides lesson 2
 
lecture 2.pptx
lecture 2.pptxlecture 2.pptx
lecture 2.pptx
 
Protocol layer,OSI model & POP3
Protocol layer,OSI model & POP3Protocol layer,OSI model & POP3
Protocol layer,OSI model & POP3
 
Network architecure (3).pptx
Network architecure (3).pptxNetwork architecure (3).pptx
Network architecure (3).pptx
 

More from Tutun Juhana

What should you prepare for industry 4.0 era
What should you prepare for industry 4.0 eraWhat should you prepare for industry 4.0 era
What should you prepare for industry 4.0 era
Tutun Juhana
 
Internet of Things Security
Internet of Things SecurityInternet of Things Security
Internet of Things Security
Tutun Juhana
 
Et4045-3-attacks-2
Et4045-3-attacks-2Et4045-3-attacks-2
Et4045-3-attacks-2
Tutun Juhana
 
ET4045-3-attacks-1
ET4045-3-attacks-1ET4045-3-attacks-1
ET4045-3-attacks-1
Tutun Juhana
 
ET4045-2-cryptography-3
ET4045-2-cryptography-3ET4045-2-cryptography-3
ET4045-2-cryptography-3
Tutun Juhana
 
ET4045-2-cryptography-2
ET4045-2-cryptography-2ET4045-2-cryptography-2
ET4045-2-cryptography-2
Tutun Juhana
 
ET4045-2-cryptography-1-2014
ET4045-2-cryptography-1-2014ET4045-2-cryptography-1-2014
ET4045-2-cryptography-1-2014
Tutun Juhana
 
ET4045-1-Introduction-2014
ET4045-1-Introduction-2014ET4045-1-Introduction-2014
ET4045-1-Introduction-2014
Tutun Juhana
 
Underlying Technologies Part I (Lecture #4 ET3003 Sem1 2014/2015)
Underlying Technologies Part I (Lecture #4 ET3003 Sem1 2014/2015)Underlying Technologies Part I (Lecture #4 ET3003 Sem1 2014/2015)
Underlying Technologies Part I (Lecture #4 ET3003 Sem1 2014/2015)
Tutun Juhana
 
Switching Techniques (Lecture #2 ET3003 Sem1 2014/2015)
Switching Techniques (Lecture #2 ET3003 Sem1 2014/2015)Switching Techniques (Lecture #2 ET3003 Sem1 2014/2015)
Switching Techniques (Lecture #2 ET3003 Sem1 2014/2015)
Tutun Juhana
 
Et3003 sem2-1314-10 vlans
Et3003 sem2-1314-10 vlansEt3003 sem2-1314-10 vlans
Et3003 sem2-1314-10 vlans
Tutun Juhana
 
Et3003 sem2-1314-9 network layers vi (routing protocols)
Et3003 sem2-1314-9 network layers vi (routing protocols)Et3003 sem2-1314-9 network layers vi (routing protocols)
Et3003 sem2-1314-9 network layers vi (routing protocols)
Tutun Juhana
 
Et3003 sem2-1314-8 network layers v (icmpv4)
Et3003 sem2-1314-8 network layers v (icmpv4)Et3003 sem2-1314-8 network layers v (icmpv4)
Et3003 sem2-1314-8 network layers v (icmpv4)
Tutun Juhana
 
Et3003 sem2-1314-7 network layers iv (ipv4)
Et3003 sem2-1314-7 network layers iv (ipv4)Et3003 sem2-1314-7 network layers iv (ipv4)
Et3003 sem2-1314-7 network layers iv (ipv4)
Tutun Juhana
 
Et3003 sem2-1314-6 network layers iii (arp)
Et3003 sem2-1314-6 network layers iii (arp)Et3003 sem2-1314-6 network layers iii (arp)
Et3003 sem2-1314-6 network layers iii (arp)
Tutun Juhana
 
Et3003 sem2-1314-5 network layers ii (intro to routing)
Et3003 sem2-1314-5 network layers ii (intro to routing)Et3003 sem2-1314-5 network layers ii (intro to routing)
Et3003 sem2-1314-5 network layers ii (intro to routing)
Tutun Juhana
 
Et3003 sem2-1314-4 network layers i (ipv4 addressing)
Et3003 sem2-1314-4 network layers i (ipv4 addressing)Et3003 sem2-1314-4 network layers i (ipv4 addressing)
Et3003 sem2-1314-4 network layers i (ipv4 addressing)
Tutun Juhana
 
Et3003 sem2-1314-3 ethernets
Et3003 sem2-1314-3 ethernetsEt3003 sem2-1314-3 ethernets
Et3003 sem2-1314-3 ethernets
Tutun Juhana
 
ET3003-1 introduction (Semester II 2013-2014)
ET3003-1 introduction (Semester II 2013-2014)ET3003-1 introduction (Semester II 2013-2014)
ET3003-1 introduction (Semester II 2013-2014)
Tutun Juhana
 
IPv6 Introduction
IPv6 IntroductionIPv6 Introduction
IPv6 Introduction
Tutun Juhana
 

More from Tutun Juhana (20)

What should you prepare for industry 4.0 era
What should you prepare for industry 4.0 eraWhat should you prepare for industry 4.0 era
What should you prepare for industry 4.0 era
 
Internet of Things Security
Internet of Things SecurityInternet of Things Security
Internet of Things Security
 
Et4045-3-attacks-2
Et4045-3-attacks-2Et4045-3-attacks-2
Et4045-3-attacks-2
 
ET4045-3-attacks-1
ET4045-3-attacks-1ET4045-3-attacks-1
ET4045-3-attacks-1
 
ET4045-2-cryptography-3
ET4045-2-cryptography-3ET4045-2-cryptography-3
ET4045-2-cryptography-3
 
ET4045-2-cryptography-2
ET4045-2-cryptography-2ET4045-2-cryptography-2
ET4045-2-cryptography-2
 
ET4045-2-cryptography-1-2014
ET4045-2-cryptography-1-2014ET4045-2-cryptography-1-2014
ET4045-2-cryptography-1-2014
 
ET4045-1-Introduction-2014
ET4045-1-Introduction-2014ET4045-1-Introduction-2014
ET4045-1-Introduction-2014
 
Underlying Technologies Part I (Lecture #4 ET3003 Sem1 2014/2015)
Underlying Technologies Part I (Lecture #4 ET3003 Sem1 2014/2015)Underlying Technologies Part I (Lecture #4 ET3003 Sem1 2014/2015)
Underlying Technologies Part I (Lecture #4 ET3003 Sem1 2014/2015)
 
Switching Techniques (Lecture #2 ET3003 Sem1 2014/2015)
Switching Techniques (Lecture #2 ET3003 Sem1 2014/2015)Switching Techniques (Lecture #2 ET3003 Sem1 2014/2015)
Switching Techniques (Lecture #2 ET3003 Sem1 2014/2015)
 
Et3003 sem2-1314-10 vlans
Et3003 sem2-1314-10 vlansEt3003 sem2-1314-10 vlans
Et3003 sem2-1314-10 vlans
 
Et3003 sem2-1314-9 network layers vi (routing protocols)
Et3003 sem2-1314-9 network layers vi (routing protocols)Et3003 sem2-1314-9 network layers vi (routing protocols)
Et3003 sem2-1314-9 network layers vi (routing protocols)
 
Et3003 sem2-1314-8 network layers v (icmpv4)
Et3003 sem2-1314-8 network layers v (icmpv4)Et3003 sem2-1314-8 network layers v (icmpv4)
Et3003 sem2-1314-8 network layers v (icmpv4)
 
Et3003 sem2-1314-7 network layers iv (ipv4)
Et3003 sem2-1314-7 network layers iv (ipv4)Et3003 sem2-1314-7 network layers iv (ipv4)
Et3003 sem2-1314-7 network layers iv (ipv4)
 
Et3003 sem2-1314-6 network layers iii (arp)
Et3003 sem2-1314-6 network layers iii (arp)Et3003 sem2-1314-6 network layers iii (arp)
Et3003 sem2-1314-6 network layers iii (arp)
 
Et3003 sem2-1314-5 network layers ii (intro to routing)
Et3003 sem2-1314-5 network layers ii (intro to routing)Et3003 sem2-1314-5 network layers ii (intro to routing)
Et3003 sem2-1314-5 network layers ii (intro to routing)
 
Et3003 sem2-1314-4 network layers i (ipv4 addressing)
Et3003 sem2-1314-4 network layers i (ipv4 addressing)Et3003 sem2-1314-4 network layers i (ipv4 addressing)
Et3003 sem2-1314-4 network layers i (ipv4 addressing)
 
Et3003 sem2-1314-3 ethernets
Et3003 sem2-1314-3 ethernetsEt3003 sem2-1314-3 ethernets
Et3003 sem2-1314-3 ethernets
 
ET3003-1 introduction (Semester II 2013-2014)
ET3003-1 introduction (Semester II 2013-2014)ET3003-1 introduction (Semester II 2013-2014)
ET3003-1 introduction (Semester II 2013-2014)
 
IPv6 Introduction
IPv6 IntroductionIPv6 Introduction
IPv6 Introduction
 

Recently uploaded

GraphSummit Singapore | Enhancing Changi Airport Group's Passenger Experience...
GraphSummit Singapore | Enhancing Changi Airport Group's Passenger Experience...GraphSummit Singapore | Enhancing Changi Airport Group's Passenger Experience...
GraphSummit Singapore | Enhancing Changi Airport Group's Passenger Experience...
Neo4j
 
TrustArc Webinar - 2024 Global Privacy Survey
TrustArc Webinar - 2024 Global Privacy SurveyTrustArc Webinar - 2024 Global Privacy Survey
TrustArc Webinar - 2024 Global Privacy Survey
TrustArc
 
Removing Uninteresting Bytes in Software Fuzzing
Removing Uninteresting Bytes in Software FuzzingRemoving Uninteresting Bytes in Software Fuzzing
Removing Uninteresting Bytes in Software Fuzzing
Aftab Hussain
 
20240609 QFM020 Irresponsible AI Reading List May 2024
20240609 QFM020 Irresponsible AI Reading List May 202420240609 QFM020 Irresponsible AI Reading List May 2024
20240609 QFM020 Irresponsible AI Reading List May 2024
Matthew Sinclair
 
みなさんこんにちはこれ何文字まで入るの?40文字以下不可とか本当に意味わからないけどこれ限界文字数書いてないからマジでやばい文字数いけるんじゃないの?えこ...
みなさんこんにちはこれ何文字まで入るの?40文字以下不可とか本当に意味わからないけどこれ限界文字数書いてないからマジでやばい文字数いけるんじゃないの?えこ...みなさんこんにちはこれ何文字まで入るの?40文字以下不可とか本当に意味わからないけどこれ限界文字数書いてないからマジでやばい文字数いけるんじゃないの?えこ...
みなさんこんにちはこれ何文字まで入るの?40文字以下不可とか本当に意味わからないけどこれ限界文字数書いてないからマジでやばい文字数いけるんじゃないの?えこ...
名前 です男
 
GraphSummit Singapore | The Future of Agility: Supercharging Digital Transfor...
GraphSummit Singapore | The Future of Agility: Supercharging Digital Transfor...GraphSummit Singapore | The Future of Agility: Supercharging Digital Transfor...
GraphSummit Singapore | The Future of Agility: Supercharging Digital Transfor...
Neo4j
 
UiPath Test Automation using UiPath Test Suite series, part 5
UiPath Test Automation using UiPath Test Suite series, part 5UiPath Test Automation using UiPath Test Suite series, part 5
UiPath Test Automation using UiPath Test Suite series, part 5
DianaGray10
 
Full-RAG: A modern architecture for hyper-personalization
Full-RAG: A modern architecture for hyper-personalizationFull-RAG: A modern architecture for hyper-personalization
Full-RAG: A modern architecture for hyper-personalization
Zilliz
 
Alt. GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using ...
Alt. GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using ...Alt. GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using ...
Alt. GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using ...
James Anderson
 
How to Get CNIC Information System with Paksim Ga.pptx
How to Get CNIC Information System with Paksim Ga.pptxHow to Get CNIC Information System with Paksim Ga.pptx
How to Get CNIC Information System with Paksim Ga.pptx
danishmna97
 
PCI PIN Basics Webinar from the Controlcase Team
PCI PIN Basics Webinar from the Controlcase TeamPCI PIN Basics Webinar from the Controlcase Team
PCI PIN Basics Webinar from the Controlcase Team
ControlCase
 
20240607 QFM018 Elixir Reading List May 2024
20240607 QFM018 Elixir Reading List May 202420240607 QFM018 Elixir Reading List May 2024
20240607 QFM018 Elixir Reading List May 2024
Matthew Sinclair
 
Artificial Intelligence for XMLDevelopment
Artificial Intelligence for XMLDevelopmentArtificial Intelligence for XMLDevelopment
Artificial Intelligence for XMLDevelopment
Octavian Nadolu
 
UiPath Test Automation using UiPath Test Suite series, part 6
UiPath Test Automation using UiPath Test Suite series, part 6UiPath Test Automation using UiPath Test Suite series, part 6
UiPath Test Automation using UiPath Test Suite series, part 6
DianaGray10
 
Encryption in Microsoft 365 - ExpertsLive Netherlands 2024
Encryption in Microsoft 365 - ExpertsLive Netherlands 2024Encryption in Microsoft 365 - ExpertsLive Netherlands 2024
Encryption in Microsoft 365 - ExpertsLive Netherlands 2024
Albert Hoitingh
 
Cosa hanno in comune un mattoncino Lego e la backdoor XZ?
Cosa hanno in comune un mattoncino Lego e la backdoor XZ?Cosa hanno in comune un mattoncino Lego e la backdoor XZ?
Cosa hanno in comune un mattoncino Lego e la backdoor XZ?
Speck&Tech
 
Mind map of terminologies used in context of Generative AI
Mind map of terminologies used in context of Generative AIMind map of terminologies used in context of Generative AI
Mind map of terminologies used in context of Generative AI
Kumud Singh
 
GraphSummit Singapore | Neo4j Product Vision & Roadmap - Q2 2024
GraphSummit Singapore | Neo4j Product Vision & Roadmap - Q2 2024GraphSummit Singapore | Neo4j Product Vision & Roadmap - Q2 2024
GraphSummit Singapore | Neo4j Product Vision & Roadmap - Q2 2024
Neo4j
 
Unlock the Future of Search with MongoDB Atlas_ Vector Search Unleashed.pdf
Unlock the Future of Search with MongoDB Atlas_ Vector Search Unleashed.pdfUnlock the Future of Search with MongoDB Atlas_ Vector Search Unleashed.pdf
Unlock the Future of Search with MongoDB Atlas_ Vector Search Unleashed.pdf
Malak Abu Hammad
 
Communications Mining Series - Zero to Hero - Session 1
Communications Mining Series - Zero to Hero - Session 1Communications Mining Series - Zero to Hero - Session 1
Communications Mining Series - Zero to Hero - Session 1
DianaGray10
 

Recently uploaded (20)

GraphSummit Singapore | Enhancing Changi Airport Group's Passenger Experience...
GraphSummit Singapore | Enhancing Changi Airport Group's Passenger Experience...GraphSummit Singapore | Enhancing Changi Airport Group's Passenger Experience...
GraphSummit Singapore | Enhancing Changi Airport Group's Passenger Experience...
 
TrustArc Webinar - 2024 Global Privacy Survey
TrustArc Webinar - 2024 Global Privacy SurveyTrustArc Webinar - 2024 Global Privacy Survey
TrustArc Webinar - 2024 Global Privacy Survey
 
Removing Uninteresting Bytes in Software Fuzzing
Removing Uninteresting Bytes in Software FuzzingRemoving Uninteresting Bytes in Software Fuzzing
Removing Uninteresting Bytes in Software Fuzzing
 
20240609 QFM020 Irresponsible AI Reading List May 2024
20240609 QFM020 Irresponsible AI Reading List May 202420240609 QFM020 Irresponsible AI Reading List May 2024
20240609 QFM020 Irresponsible AI Reading List May 2024
 
みなさんこんにちはこれ何文字まで入るの?40文字以下不可とか本当に意味わからないけどこれ限界文字数書いてないからマジでやばい文字数いけるんじゃないの?えこ...
みなさんこんにちはこれ何文字まで入るの?40文字以下不可とか本当に意味わからないけどこれ限界文字数書いてないからマジでやばい文字数いけるんじゃないの?えこ...みなさんこんにちはこれ何文字まで入るの?40文字以下不可とか本当に意味わからないけどこれ限界文字数書いてないからマジでやばい文字数いけるんじゃないの?えこ...
みなさんこんにちはこれ何文字まで入るの?40文字以下不可とか本当に意味わからないけどこれ限界文字数書いてないからマジでやばい文字数いけるんじゃないの?えこ...
 
GraphSummit Singapore | The Future of Agility: Supercharging Digital Transfor...
GraphSummit Singapore | The Future of Agility: Supercharging Digital Transfor...GraphSummit Singapore | The Future of Agility: Supercharging Digital Transfor...
GraphSummit Singapore | The Future of Agility: Supercharging Digital Transfor...
 
UiPath Test Automation using UiPath Test Suite series, part 5
UiPath Test Automation using UiPath Test Suite series, part 5UiPath Test Automation using UiPath Test Suite series, part 5
UiPath Test Automation using UiPath Test Suite series, part 5
 
Full-RAG: A modern architecture for hyper-personalization
Full-RAG: A modern architecture for hyper-personalizationFull-RAG: A modern architecture for hyper-personalization
Full-RAG: A modern architecture for hyper-personalization
 
Alt. GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using ...
Alt. GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using ...Alt. GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using ...
Alt. GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using ...
 
How to Get CNIC Information System with Paksim Ga.pptx
How to Get CNIC Information System with Paksim Ga.pptxHow to Get CNIC Information System with Paksim Ga.pptx
How to Get CNIC Information System with Paksim Ga.pptx
 
PCI PIN Basics Webinar from the Controlcase Team
PCI PIN Basics Webinar from the Controlcase TeamPCI PIN Basics Webinar from the Controlcase Team
PCI PIN Basics Webinar from the Controlcase Team
 
20240607 QFM018 Elixir Reading List May 2024
20240607 QFM018 Elixir Reading List May 202420240607 QFM018 Elixir Reading List May 2024
20240607 QFM018 Elixir Reading List May 2024
 
Artificial Intelligence for XMLDevelopment
Artificial Intelligence for XMLDevelopmentArtificial Intelligence for XMLDevelopment
Artificial Intelligence for XMLDevelopment
 
UiPath Test Automation using UiPath Test Suite series, part 6
UiPath Test Automation using UiPath Test Suite series, part 6UiPath Test Automation using UiPath Test Suite series, part 6
UiPath Test Automation using UiPath Test Suite series, part 6
 
Encryption in Microsoft 365 - ExpertsLive Netherlands 2024
Encryption in Microsoft 365 - ExpertsLive Netherlands 2024Encryption in Microsoft 365 - ExpertsLive Netherlands 2024
Encryption in Microsoft 365 - ExpertsLive Netherlands 2024
 
Cosa hanno in comune un mattoncino Lego e la backdoor XZ?
Cosa hanno in comune un mattoncino Lego e la backdoor XZ?Cosa hanno in comune un mattoncino Lego e la backdoor XZ?
Cosa hanno in comune un mattoncino Lego e la backdoor XZ?
 
Mind map of terminologies used in context of Generative AI
Mind map of terminologies used in context of Generative AIMind map of terminologies used in context of Generative AI
Mind map of terminologies used in context of Generative AI
 
GraphSummit Singapore | Neo4j Product Vision & Roadmap - Q2 2024
GraphSummit Singapore | Neo4j Product Vision & Roadmap - Q2 2024GraphSummit Singapore | Neo4j Product Vision & Roadmap - Q2 2024
GraphSummit Singapore | Neo4j Product Vision & Roadmap - Q2 2024
 
Unlock the Future of Search with MongoDB Atlas_ Vector Search Unleashed.pdf
Unlock the Future of Search with MongoDB Atlas_ Vector Search Unleashed.pdfUnlock the Future of Search with MongoDB Atlas_ Vector Search Unleashed.pdf
Unlock the Future of Search with MongoDB Atlas_ Vector Search Unleashed.pdf
 
Communications Mining Series - Zero to Hero - Session 1
Communications Mining Series - Zero to Hero - Session 1Communications Mining Series - Zero to Hero - Session 1
Communications Mining Series - Zero to Hero - Session 1
 

ET3003-2 OSI-TCPIP (Semester II 2013-2014)

  • 1. 2 Tutun Juhana Telecommunication Engineering School of Electrical Engineering & Informatics Institut Teknologi Bandung The OSI Model & the TCP/IP Protocol Suite Computer Networks
  • 2. • Before 1990 everyone believed that the OSI model would become the ultimate standard for data communications but this did not happen
  • 3. • The TCP/IP protocol suite became the dominant commercial architecture because it was used and tested extensively in the Internet – the OSI model was never fully implemented
  • 4. When Communication is simple Example 1 • The communication is so simple that it can occur in only one layer (sign language) Speak Spanish Speak English
  • 5. When Communication is not simple Example 2 • Ann has to move to another town because of her job • We need three layers • It is hierarchical (the tasks must be done in the order given in the hierarchy) • Each layer uses the services of the layer immediately below it • Each layer gives the services to the layer immediately above it
  • 7. • Established in 1947, the International Standards Organization (ISO) is a multinational body dedicated to worldwide agreement on international standards • An ISO standard that covers all aspects of network communications is the Open Systems Interconnection (OSI) model – It was first introduced in the late 1970s
  • 8. • An open system is a set of protocols that allows any two different systems to communicate regardless of their underlying architecture • The OSI model is not a protocol; it is a model for understanding and designing a network architecture that is flexible, robust, and interoperable • The OSI model was intended to be the basis for the creation of the protocols in the OSI stack
  • 9. The OSI model The user support layers; they allow interoperability among unrelated software systems; They are almost always implemented in software the transport layer, links the two subgroups and ensures that what the lower layers have transmitted is in a form that the upper layers can use The network support layers; they deal with the physical aspects of moving data from one device to another (such as electrical specifications, physical connections, physical addressing, and transport timing and reliability); They are a combination of hardware and software, except for the physical layer, which is mostly hardware
  • 11. An exchange using the OSI model Decapsulation Encapsulation
  • 12. Physical Layer • Responsible for moving individual bits from one (node) to the next • It coordinates the functions required to carry a bit stream over a physical medium. • It deals with the mechanical and electrical specifications of the interface and transmission media • It defines the procedures and functions that physical devices and interfaces have to perform for transmission to occur
  • 13. The physical layer is also concerned with the following • • • • • • • Physical characteristics of interfaces and media Representation of bits Data rate Synchronization of bits Line configuration Physical topology Transmission mode
  • 14. Data Link Layer • The data link layer is responsible for moving frames from one hop (node) to the next • The data link layer transforms the physical layer, a raw transmission facility, to a reliable link – It makes the physical layer appear error-free to the upper layer (network layer)
  • 15.
  • 16. Other responsibilities of the data link layer include the following • Framing • Physical addressing • Flow control • Error control • Access control
  • 17. Network Layer • The network layer is responsible for the source-to-destination delivery of a packet, possibly across multiple networks (links) • Whereas the data link layer oversees the delivery of the packet between two systems on the same network (link) • The network layer ensures that each packet gets from its point of origin to its final destination
  • 18. • If two systems are connected to the same link, there is usually no need for a network layer • However, if the two systems are attached to different networks (links) with connecting devices between the networks (links), there is often a need for the network layer to accomplish source-todestination delivery
  • 19.
  • 20.
  • 21. Other responsibilities of the network layer include the following • Logical addressing • Routing
  • 22. Transport Layer • The transport layer is responsible for the delivery of a message from one process to another • A process is an application program running on the host
  • 23. • Reliable process-to-process delivery of a message
  • 24. • Differences with Network Layer • Network layer oversees source-to-destination delivery of individual packets – It does not recognize any relationship between those packets • The transport layer ensures that the whole message arrives intact and in order – Overseeing both error control and flow control at the sourceto-destination level
  • 25. • Other responsibilities of the transport layer – Service-point addressing (port address) – Segmentation and reassembly – Connection control • The transport layer can be either connectionless or connection oriented – Flow control – Error control
  • 26. Session Layer • Session layer establishes, maintains, and synchronizes the interaction between communicating systems • Responsibilities – Dialog control – Synchronization
  • 27.
  • 28. Presentation Layer • The presentation layer is concerned with the syntax and semantics of the information exchanged between two systems – Translation – Encryption – Compression
  • 29.
  • 30. Application Layer • The application layer enables the user, whether human or software, to access the network • It provides user interfaces and support for services (email, remote file access etc.) • Services provided : – – – – Network virtual terminal File transfer, access, and management (FTAM) E-mail services Directory services
  • 31.
  • 32. Summary of OSI Layers
  • 34. • The TCP/IP protocol suite was developed prior to the OSI model
  • 36. Layers in the TCP/IP Protocol Suite • To discuss the purpose of each layer in the TCP/IP protocol suite, we will study a small private internet
  • 37. • A link is a network that allows a set of computers to communicate with each other • A link can be a LAN (local area network) serving a small area or a WAN (wide area network) serving a larger area • We assume that different links are connected together by devices called routers or switches that route the data to reach their final destinations
  • 38.
  • 39. Physical Layer • TCP/IP does not define any specific protocol for the physical layer • It supports all of the standard and proprietary protocols • The communication is between two hops or nodes, either a computer or router • The unit of communication is a single bit
  • 40. We assume that the most efficient way to communicate with each other is via routers R1, R3, and R4 if a node is connected to n links, it needs n physical-layer protocols, one for each link because links may use different physical-layer protocols
  • 41. • The responsibility of the physical layer, in addition to delivery of bits, matches with what mentioned for the physical layer of the OSI model • It mostly depends on the underlying technologies that provide links
  • 42. Data Link Layer • TCP/IP does not define any specific protocol for the data link layer either • It supports all of the standard and proprietary protocols • The communication is also between two hops or nodes • The unit of communication however, is a packet called a frame
  • 43. • A frame is a packet that encapsulates the data received from the network layer with an added header and sometimes a trailer • The header, among other communication information, includes the source and destination of frame • The destination address is needed to define the right recipient of the frame because many nodes may have been connected to the link • The source address is needed for possible response or acknowledgment as may be required by some protocols
  • 44. These frames may be different because link 1 and link 3 may be using different protocols and require frames of different formats
  • 45. Network Layer • At the network layer (or, more accurately, the internetwork layer), TCP/IP supports the Internet Protocol (IP) • IP is the transmission mechanism used by the TCP/IP protocols • IP transports data in packets called datagrams, each of which is transported separately • Datagrams can travel along different routes and can arrive out of sequence or be duplicated • IP does not keep track of the routes and has no facility for reordering datagrams once they arrive at their destination
  • 46.
  • 47. Transport Layer • Only the two end computers need to have the transport layer • The transport layer is responsible for delivering the whole message, which is called a segment from A to B – A segment may consist of a few or tens of datagrams • Where as the network layer is responsible for sending individual datagrams from computer A to computer B
  • 48. • The segments need to be broken into datagrams and each datagram has to be delivered to the network layer for transmission • Since the Internet defines a different route for each datagram, the datagrams may arrive out of order and may be lost • The transport layer at computer B needs to wait until all of these datagrams to arrive, assemble them and make a segment out of them
  • 49. • The transport layer was represented in the TCP/IP suite by two protocols: – User Datagram Protocol (UDP) – Transmission Control Protocol (TCP) • A new protocol called Stream Control Transmission Protocol (SCTP) has been introduced in the last few years
  • 50.
  • 51. Application Layer • The application layer in TCP/IP is equivalent to the combined session, presentation, and application layers in the OSI model • The application layer allows a user to access the services of our private internet or the global Internet – electronic mail, file transfer, accessing the World Wide Web, etc. • The unit of communication at the application layer is a message
  • 52.
  • 53. Addressing User-friendly addresses that are designed for specific application To enable communication between processes Needed in which each host can be identified uniquely, regardless of the underlying physical network • The address of a node as defined by its LAN or WAN • Have authority over the link
  • 54. Physical Addresses • Also known as the link address
  • 55. • Destination physical addresses can be either – unicast  one single recipient – multicast  a group of recipients – broadcast  to be received by all systems in the network
  • 56. Logical Addresses • Logical addresses are necessary for universal communications that are independent of underlying physical networks • Physical addresses are not adequate in an internetwork environment where different networks can have different address formats • A universal addressing system is needed in which each host can be identified uniquely, regardless of the underlying physical network • The logical addresses are designed for this purpose
  • 57. • A logical address in the Internet is currently a 32-bit address (IPv4) and a 128-bit address (IPv6), that can uniquely define a host connected to the Internet • No two publicly addressed and visible hosts on the Internet can have the same IP address
  • 58. datagram with dst. and src. logical address Frame with dst. and src. physical address The physical addresses will change from hop to hop, but the logical addresses remain the same
  • 59. Port Addresses • Computers are devices that can run multiple processes at the same time • The end objective of Internet communication is a process communicating with another process • For example, computer A can communicate with computer C by using TELNET, at the same time, computer A communicates with computer B by using the File Transfer Protocol (FTP) • In the TCP/IP architecture, the label assigned to a process is called a port address • A port address in TCP/IP is 16 bits in length (represented by one decimal number)
  • 60. The physical addresses change from hop to hop, but the logical and port addresses usually remain the same
  • 61. Application-Specific Addresses • User-friendly addresses that are designed for specific application • Examples include the e-mail address (for example, tutun@stei.itb.ac.id) and the • Universal Resource Locator (URL) (for example, www.itb.ac.id)