This document provides an overview of computer network layers and protocols. It discusses the OSI reference model and its seven layers - physical, data link, network, transport, session, presentation, and application layer. It describes the functions of each layer and some examples of protocols used. The document also covers topics like connection-oriented vs connectionless services, network architectures, and network goals of communication and resource sharing.
The OSI (Open Systems Interconnection) model is a conceptual framework that standardizes the functions and communication protocols used in computer networks. It provides a structured approach to understanding and designing network architectures, allowing different systems and devices to communicate with each other effectively.
The OSI model consists of seven interconnected layers, each responsible for specific functions and services. Here is a brief description of each layer:
Physical Layer: The physical layer is the lowest layer of the OSI model. It deals with the physical transmission of data over the network medium, including cables, connectors, and electrical signals. It defines characteristics such as voltage levels, data rates, and physical connectors.
Data Link Layer: The data link layer provides reliable point-to-point or point-to-multipoint data transfer between network nodes. It is responsible for framing data into packets, error detection and correction, and flow control. Ethernet switches operate at this layer.
Network Layer: The network layer manages the routing and forwarding of data packets across different networks. It determines the optimal path for data transmission, handles addressing, and controls congestion in the network. Routers operate at this layer.
Transport Layer: The transport layer ensures reliable end-to-end data delivery between hosts. It segments data from the upper layers into smaller packets, manages data flow, and provides error recovery mechanisms. TCP (Transmission Control Protocol) and UDP (User Datagram Protocol) operate at this layer.
Session Layer: The session layer establishes, manages, and terminates communication sessions between applications. It provides services such as session establishment, maintenance, and synchronization, allowing multiple applications to communicate and coordinate their activities.
Presentation Layer: The presentation layer is responsible for data representation, encryption, compression, and translation. It ensures that data from the application layer is in a format that can be understood by the receiving system.
Application Layer: The application layer is the topmost layer of the OSI model. It provides a direct interface between the network and the applications. It includes protocols and services that support specific applications, such as HTTP for web browsing, SMTP for email, and FTP for file transfer.
The OSI model follows a layered approach, where each layer performs specific functions while relying on the services provided by the layers below it. This modular design allows for interoperability between different network technologies and facilitates easier troubleshooting and development of network protocols.
It's important to note that the OSI model is a conceptual framework and not a specific implementation. Actual networking protocols, such as TCP/IP, do not strictly adhere to the OSI model but borrow concepts from it.
OSI layers describes how the data can be send from one parties to another during data communication. it also gives the detailed information of how the data functionally divided into small pieces and reaches the destination.
osi model, What is osi model, osi model by shubham mishra, osi model layers, osi model protocols, osi model layer protocols, osi model used protocols, osi model used devices, osi model application, osi model advantages and dis advantages, layers of osi model, osi model layer functions, how many layers in osi model, physical later, data link layer, network layer, transport layer, session later,presentation layer, application layer, MGCGV, Shubham Mishra
The OSI (Open Systems Interconnection) model is a conceptual framework that standardizes the functions and communication protocols used in computer networks. It provides a structured approach to understanding and designing network architectures, allowing different systems and devices to communicate with each other effectively.
The OSI model consists of seven interconnected layers, each responsible for specific functions and services. Here is a brief description of each layer:
Physical Layer: The physical layer is the lowest layer of the OSI model. It deals with the physical transmission of data over the network medium, including cables, connectors, and electrical signals. It defines characteristics such as voltage levels, data rates, and physical connectors.
Data Link Layer: The data link layer provides reliable point-to-point or point-to-multipoint data transfer between network nodes. It is responsible for framing data into packets, error detection and correction, and flow control. Ethernet switches operate at this layer.
Network Layer: The network layer manages the routing and forwarding of data packets across different networks. It determines the optimal path for data transmission, handles addressing, and controls congestion in the network. Routers operate at this layer.
Transport Layer: The transport layer ensures reliable end-to-end data delivery between hosts. It segments data from the upper layers into smaller packets, manages data flow, and provides error recovery mechanisms. TCP (Transmission Control Protocol) and UDP (User Datagram Protocol) operate at this layer.
Session Layer: The session layer establishes, manages, and terminates communication sessions between applications. It provides services such as session establishment, maintenance, and synchronization, allowing multiple applications to communicate and coordinate their activities.
Presentation Layer: The presentation layer is responsible for data representation, encryption, compression, and translation. It ensures that data from the application layer is in a format that can be understood by the receiving system.
Application Layer: The application layer is the topmost layer of the OSI model. It provides a direct interface between the network and the applications. It includes protocols and services that support specific applications, such as HTTP for web browsing, SMTP for email, and FTP for file transfer.
The OSI model follows a layered approach, where each layer performs specific functions while relying on the services provided by the layers below it. This modular design allows for interoperability between different network technologies and facilitates easier troubleshooting and development of network protocols.
It's important to note that the OSI model is a conceptual framework and not a specific implementation. Actual networking protocols, such as TCP/IP, do not strictly adhere to the OSI model but borrow concepts from it.
OSI layers describes how the data can be send from one parties to another during data communication. it also gives the detailed information of how the data functionally divided into small pieces and reaches the destination.
osi model, What is osi model, osi model by shubham mishra, osi model layers, osi model protocols, osi model layer protocols, osi model used protocols, osi model used devices, osi model application, osi model advantages and dis advantages, layers of osi model, osi model layer functions, how many layers in osi model, physical later, data link layer, network layer, transport layer, session later,presentation layer, application layer, MGCGV, Shubham Mishra
A
PROJECT REPORT
On
CISCO CERTIFIED NETWORK ASSOCIATE
A computer network, or simply a network, is a collection of computer and other hardware components interconnected by communication channels that allow sharing of resources and information. Where at least one process in one device is able to send/receive data to/from at least one process residing in a remote device, then the two devices are said to be in a network. Simply, more than one computer interconnected through a communication medium for information interchange is called a computer network.
This presentation is about:
Uses of Networking.
Various types of networking.
Applications used for networking.
Methods of network security.
Methods of communication -2G,3G,4G,Fiber Optics
Transmission Media.
Various types of protocols.
Cloud Computing
Protection against Viruses.
Bridging the Digital Gap Brad Spiegel Macon, GA Initiative.pptxBrad Spiegel Macon GA
Brad Spiegel Macon GA’s journey exemplifies the profound impact that one individual can have on their community. Through his unwavering dedication to digital inclusion, he’s not only bridging the gap in Macon but also setting an example for others to follow.
A
PROJECT REPORT
On
CISCO CERTIFIED NETWORK ASSOCIATE
A computer network, or simply a network, is a collection of computer and other hardware components interconnected by communication channels that allow sharing of resources and information. Where at least one process in one device is able to send/receive data to/from at least one process residing in a remote device, then the two devices are said to be in a network. Simply, more than one computer interconnected through a communication medium for information interchange is called a computer network.
This presentation is about:
Uses of Networking.
Various types of networking.
Applications used for networking.
Methods of network security.
Methods of communication -2G,3G,4G,Fiber Optics
Transmission Media.
Various types of protocols.
Cloud Computing
Protection against Viruses.
Bridging the Digital Gap Brad Spiegel Macon, GA Initiative.pptxBrad Spiegel Macon GA
Brad Spiegel Macon GA’s journey exemplifies the profound impact that one individual can have on their community. Through his unwavering dedication to digital inclusion, he’s not only bridging the gap in Macon but also setting an example for others to follow.
APNIC Foundation, presented by Ellisha Heppner at the PNG DNS Forum 2024APNIC
Ellisha Heppner, Grant Management Lead, presented an update on APNIC Foundation to the PNG DNS Forum held from 6 to 10 May, 2024 in Port Moresby, Papua New Guinea.
Multi-cluster Kubernetes Networking- Patterns, Projects and GuidelinesSanjeev Rampal
Talk presented at Kubernetes Community Day, New York, May 2024.
Technical summary of Multi-Cluster Kubernetes Networking architectures with focus on 4 key topics.
1) Key patterns for Multi-cluster architectures
2) Architectural comparison of several OSS/ CNCF projects to address these patterns
3) Evolution trends for the APIs of these projects
4) Some design recommendations & guidelines for adopting/ deploying these solutions.
This 7-second Brain Wave Ritual Attracts Money To You.!nirahealhty
Discover the power of a simple 7-second brain wave ritual that can attract wealth and abundance into your life. By tapping into specific brain frequencies, this technique helps you manifest financial success effortlessly. Ready to transform your financial future? Try this powerful ritual and start attracting money today!
# Internet Security: Safeguarding Your Digital World
In the contemporary digital age, the internet is a cornerstone of our daily lives. It connects us to vast amounts of information, provides platforms for communication, enables commerce, and offers endless entertainment. However, with these conveniences come significant security challenges. Internet security is essential to protect our digital identities, sensitive data, and overall online experience. This comprehensive guide explores the multifaceted world of internet security, providing insights into its importance, common threats, and effective strategies to safeguard your digital world.
## Understanding Internet Security
Internet security encompasses the measures and protocols used to protect information, devices, and networks from unauthorized access, attacks, and damage. It involves a wide range of practices designed to safeguard data confidentiality, integrity, and availability. Effective internet security is crucial for individuals, businesses, and governments alike, as cyber threats continue to evolve in complexity and scale.
### Key Components of Internet Security
1. **Confidentiality**: Ensuring that information is accessible only to those authorized to access it.
2. **Integrity**: Protecting information from being altered or tampered with by unauthorized parties.
3. **Availability**: Ensuring that authorized users have reliable access to information and resources when needed.
## Common Internet Security Threats
Cyber threats are numerous and constantly evolving. Understanding these threats is the first step in protecting against them. Some of the most common internet security threats include:
### Malware
Malware, or malicious software, is designed to harm, exploit, or otherwise compromise a device, network, or service. Common types of malware include:
- **Viruses**: Programs that attach themselves to legitimate software and replicate, spreading to other programs and files.
- **Worms**: Standalone malware that replicates itself to spread to other computers.
- **Trojan Horses**: Malicious software disguised as legitimate software.
- **Ransomware**: Malware that encrypts a user's files and demands a ransom for the decryption key.
- **Spyware**: Software that secretly monitors and collects user information.
### Phishing
Phishing is a social engineering attack that aims to steal sensitive information such as usernames, passwords, and credit card details. Attackers often masquerade as trusted entities in email or other communication channels, tricking victims into providing their information.
### Man-in-the-Middle (MitM) Attacks
MitM attacks occur when an attacker intercepts and potentially alters communication between two parties without their knowledge. This can lead to the unauthorized acquisition of sensitive information.
### Denial-of-Service (DoS) and Distributed Denial-of-Service (DDoS) Attacks
1.Wireless Communication System_Wireless communication is a broad term that i...JeyaPerumal1
Wireless communication involves the transmission of information over a distance without the help of wires, cables or any other forms of electrical conductors.
Wireless communication is a broad term that incorporates all procedures and forms of connecting and communicating between two or more devices using a wireless signal through wireless communication technologies and devices.
Features of Wireless Communication
The evolution of wireless technology has brought many advancements with its effective features.
The transmitted distance can be anywhere between a few meters (for example, a television's remote control) and thousands of kilometers (for example, radio communication).
Wireless communication can be used for cellular telephony, wireless access to the internet, wireless home networking, and so on.
4. NETWORK GOALS
By:Dr.Eng.Muhamed.Shujaa 4
1 Physical
7 Application
The two main benefits of networking computers are…
Communications
Information can be distributed very quickly, such as
email and video conferencing.
Saving Money
Resources such as information, software, and
hardware can be shared.
CPUs and hard disks can be pooled together to
create a more powerful machine.
2 Data Link
3 Network
4 Transport
5 Session
6 Presentation
5. NETWORK ARCHITECTURES
By:Dr.Eng.Muhamed.Shujaa
7 Application
1 Physical
5
A set of layers and protocols is called the network
architecture.
.1 Protocol Hierarchies
Networks are organized as layers to reduce design
complexity. Each layer offers services to the higher
layers. Between adjacent layers is an interface.
Services – connection oriented and
connectionless.
Interface – defines which primitives and services
the lower layer will offer to the upper layer.
Primitives – operations such as request, indicate,
response, confirm.
2 Data Link
3 Network
4 Transport
5 Session
6 Presentation
6. NETWORK ARCHITECTURES
By:Dr.Eng.Muhamed.Shujaa 6
Application
2. Design Issues for the Layers(functions(
• Mechanism for connection establishment
• Rules for data transfer
• Error control
• Fast sender swamping a slow receiver
• Inability of processes to accept long messages
• Routing in the case of multiple paths
Network
Data Link
Physical
Transport
Session
6 Presentation
7. Network Protocols
By:Dr.Eng.Muhamed.Shujaa 7
• Protocol: is a format order of messages sent and
received among the net entities and action takenon msgs
transmission receipt.
Protocol process:
• The format or structure of themessage
• The process by which networking devices shareinformation
about pathways with othernetworks
• How and when error and systemmessages are passed
between devices
• The setup andtermination of data transfer sessions
9. Learning outcomes
• Understand the need of layeringin Networkedcomputing
• Understand the OSImodel and the TCP/IPmodel
– Understand the function protocols and their
role at each layer.
• TCPprotocol
• UDPprotocol
• Understand the role of header in communication betweenlayers
• Understand how data sent from one host arrive to thetarget host.
By:Dr.Eng.Muhamed.Shujaa 9
10. What is Layering in Networked
Computing?
By:Dr.Eng.Muhamed.Shujaa 10
– Breaksdown communication into smaller, simplerparts.
11. Why alayered
model?
By:Dr.Eng.Muhamed.Shujaa 11
– Easierto teach communicationprocess.
– Speedsdevelopment, changesin one layer doesnot
affect how the other levelsworks.
– Allows different hardware and software towork
together.
– Reducescomplexity
12. What is “THEMODEL?”
By:Dr.Eng.Muhamed.Shujaa 12
• Commonly referred to asthe OSIreferencemodel.
• TheOSImodel
– is atheoretical blueprint that helps usunderstandhow
data gets from one user’s computer toanother.
– It is also amodel that helps develop standards so thatall
of our hardware and software talks nicely to eachother.
– It aids to provide an organized structure for hardware and
software developers to follow, to insure there productsare
compatible with current and future technologies.
13. 7 LayerOSIModel
• Q.Why useareference model?
– Servesasan outline of rules for how protocols canbe used to allow
communication betweencomputers.
– Eachlayer hasits own function and provides support to other
layers.
• Q.What are Other reference models are inuse.
– Most well known is the TCP/IPreferencemodel.
– Wewill compare OSIand TCP/IPmodels
• Ascomputing requirements increased, the network modeling hadto
evolve to meet ever increasing demandsof larger networks and
multiple venders.
13
• Problems and technology advancesalso added to the demandsfor
changesin network modeling.
By: Dr.Eng.Muhamed.Shujaa
14. Evolution of the 7-Layers
By:Dr.Eng.Muhamed.Shujaa 14
• SingleLayerModel - First Communication Between Computer Devices
– Dedicated copper wire or radiolink
– Hardware & software inextricablyintertwined
– Singlespecification for all aspects ofcommunication
1
DEVICEA DEVICE B
Hardware
&
Software
Hardware
&
Software
15. Evolution of the 7-Layers
By:Dr.Eng.Muhamed.Shujaa 15
• Two LayerModel
– Problem: Applications were being developed torun over ever-increasing
number of media/signalingsystems.
– Solution: Separateapplication aspects from technical (signaling and routing)
aspects
– Application Layer:Concerned with user interface, file accessand file transfer
Application
Technical
Standards
Application
Technical
Standards
16. Evolution of the7-Layers
By:Dr.Eng.Muhamed.Shujaa 16
• Four Layer Model - Network connectivity inherently requires travel over
intermediate devices (nodes)
• Technical Standards Level divided into Network, Data-link and Physical
Layers 1
Application
Network
Data-Link
Physical
Application
Network
Data-Link
Physical
17. Evolution of the7-Layers
By:Dr.Eng.Muhamed.Shujaa 17
Physical Layer
–Describes physical aspects of network: cards, wires, etc
–Specifies interconnect topologies and devices
Network Layer
–Defines a standard method for operating between nodes
–Address scheme is defined (IP)
–Accounts for varying topologies
Data-Link
–Works with Network Layer to translate logical addresses (IP) into hardware
addresses (MAC) for transmission
–Defines a single link protocol for transfer between two nodes(DLC protocol)
DLC:Data link controlprotocol
18. Evolution of the7-Layers
By:Dr.Eng.Muhamed.Shujaa 18
1
• Five Layer Model – Increase Quality of Service(QOS)
•Variable levels of data integrity in network
•Additional data exchanges to ensure connectivity over worstconditions
•Became the Transport Layer
Application
Transport
Network
Data-Link
Physical
Application
Transport
Network
Data-Link
Physical
20. Evolution of the 7-Layers
By:Dr.Eng.Muhamed.Shujaa 20
• The Seven Layer OSI Model - Addition of Management andSecurity
– Standardizing notation or syntax for application messages (abstract syntax)
1
– Set of encoding rules (transfer syntax)
– Became the Presentation Layer
Application
Presentation
Session
Transport
Network
Data-Link
Physical
Application
Presentation
Session
Transport
Network
Data-Link
Physical
25. OSI REFERENCE MODEL
By:Dr.Eng.Muhamed.Shujaa 25
7 Application
The Open Systems Interconnection is the model
developed by the International Standards Organization.
Benefits-Advantage
• Interconnection of different systems (open)
• Not limited to a single vendor solution
Negative Aspect (disadvantage(
• Systems might be less secure
• Systems might be less stable
1 Physical
2 Data Link
3 Network
4 Transport
5 Session
6 Presentation
26. OSI REFERENCE MODEL
By:Dr.Eng.Muhamed.Shujaa 26
Application
1. Physical Layer
a)Convert the logical 1’s and 0’s coming from
layer 2 into electrical signals.
b)Transmission of the electrical signals over a
communication channel.
Main topics:
• Transmission mediums
• Encoding
• Modulation
• RS232 and RS422 standards
• Repeaters
• Hubs (multi-port repeater)
Physical
Data Link
Network
Transport
Session
Presentation
27. OSI REFERENCE MODEL
By:Dr.Eng.Muhamed.Shujaa 27
Application
Physical
2. Data Link Layer
a)Error control to compensate for the
imperfections of the physical layer.
b)Flow control to keep a fast sender from
swamping a slow receiver.
Main topics:
• Framing methods
• Error detection and correction methods
• Flow control
• Frame format
• IEEE LAN standards
• Bridges
• Switches (multi-port bridges)
Data Link
Network
Transport
Session
Presentation
28. OSI REFERENCE MODEL
By:Dr.Eng.Muhamed.Shujaa 28
Application
Physical
3. Network Layer
a) Controls the operation of the subnet.
b) Routing packets from source to destination.
c) Logical addressing.
Main topics:
• Internetworking
• Routing algorithms
• Internet Protocol (IP) addressing
• Routers
Data Link
Network
Transport
Session
Presentation
29. OSI REFERENCE MODEL
By:Dr.Eng.Muhamed.Shujaa 29
Application
Physical
4. Transport Layer
a) Provides additional Quality of Service.
b) Heart of the OSI model.
Main topics:
• Connection-oriented and connectionless services
• Transmission Control Protocol (TCP)
• User Datagram Protocol (UDP)
•ACK
Data Link
Network
Transport
Session
Presentation
30. OSI REFERENCE MODEL
By:Dr.Eng.Muhamed.Shujaa 30
Application
Physical
5. Session Layer
a)Allows users on different machines to establish
sessions (dialogue) between them.
b)One of the services is managing dialogue
control.
c) Token management.
d) Synchronization.
Data Link
Network
Transport
Session
Presentation
31. OSI REFERENCE MODEL
By:Dr.Eng.Muhamed.Shujaa 31
Application
Physical
6. Presentation Layer
a)Concerned with the syntax and semantics of the
information.
b) Preserves the meaning of the information.
c) Data compression.
d) Data encryption.
Data Link
Network
Transport
Session
Presentation
32. OSI REFERENCE MODEL
By:Dr.Eng.Muhamed.Shujaa 32
Application
Physical
7. Application Layer
a) Provides protocols that are commonly needed.
Main topics:
• File Transfer Protocol (FTP)
• HyperText Transfer Protocol (HTTP)
• Simple Mail Transfer Protocol (SMTP)
• Simple Network Management Protocol (SNMP)
• Network File System (NFS)
• Telnet
Data Link
Network
Transport
Session
Presentation
33. SERVICES
By:Dr.Eng.Muhamed.Shujaa 33
Physical
Application
Each layer provides services to the layer above it.
1. Terminologies (scientific words means)
Entities – active elements in each layer (e.g.
process, intelligent I/O chip).
Peer Entities – entities in the same layer on
different machines.
Service Provider – Layer N.
Service User – Layer N + 1.
Service Access Points – places where layer N + 1
can access services offered by layer N.
Data Link
Network
Transport
Session
Presentation
34. SERVICES
By:Dr.Eng.Muhamed.Shujaa 34
Physical
Application
2. Connection-Oriented and Connectionless
Connection-Oriented – before data is sent, the
service from the sending computer must establish
a connection with the receiving computer.
Connectionless – data can be sent at any time by
the service from the sending computer.
Q: Is downloading a music file from the Internet
connection-oriented or connectionless?
Q: Is email connection-oriented or connectionless?
Data Link
Network
Transport
Session
Presentation
35. SERVICES
By:Dr.Eng.Muhamed.Shujaa 35
Application
4 Transport
4 Transport
3. Service Primitives
Request – entity wants the service to do some
work
Indicate – entity is to be informed about an event
Response – entity responds to an event
Confirm – entity is to be informed about its request
Sending Computer Receiving Computer
1. request 4. confirm 2. indicate 3. response
3 Network 3 Network
Physical
Data Link
Network
Transport
Session
Presentation