SlideShare a Scribd company logo
1 of 9
Download to read offline
1
Network
Reference
Models
Network
Reference
Models
Computer Networks
Khaled Hussain
BSc. Hons. (BCU, UK) MSc. (BCU, UK)
CEO, Cybernetics Robo Academy
www.cyberneticsrobo.com
(Ex. Head, Dept. of Computer Science & Engineering, SIU)
Computer Networks
Khaled Hussain
BSc. Hons. (BCU, UK) MSc. (BCU, UK)
CEO, Cybernetics Robo Academy
www.cyberneticsrobo.com
(Ex. Head, Dept. of Computer Science & Engineering, SIU)
The Army puts out a bid on some computers and DEC wins the bid.
An Imaginary Story :)
The Air Force puts out a bid and IBM wins.
The Navy bid is won by Unisys.
Then the President decides to invade the ‘Land of the Giants’ and the armed
forces discover that their computers cannot talk to each other.
LAN Media
LAN Media
The OSI Model
 International standard organization (ISO) established a committee in
1977 to develop an architecture for computer communication.
 In 1984, the Open Systems Interconnection (OSI) reference model was
approved as an international standard for communications architecture.
 Initially, communication with different entities and different vendors was
extremely difficult as every vendor would have a different mechanism to
communicate.
 Hence, there arose a need to have a common, universally accepted
platform to communicate with entities of different vendor.
2
The OSI Model [continued]
 The OSI model describes how information or data makes its way from
application programs (such as spreadsheets) through a network medium
(such as wire) to another application program located on another
network.
 The OSI reference model divides the problem of moving information
between computers over a network medium into SEVEN smaller and
more manageable problems .
 The OSI (Open System Interconnection) is a layered framework of
network systems that allows communication between all types of
computer systems.
3
1. Physical Layer
 Characteristics such as voltage levels, timing of voltage changes,
physical data rates, representation of bits, physical connectors,
physical topologies and other similar attributes are defined by physical
layer specifications.
 Operates with data in the form of bits that are sent from the physical
layer of the sending (source) device and received at the physical
layer of the destination device.
 Defines all aspects of physical communication (mechanical, electrical,
functional etc.). It is responsible for the ultimate transmission of data
over network communications media.
 Protocol used : LLC
2. Data Link Layer
 The 0's and 1's that are used in the communication are grouped into
logical encapsulation called frames.
 Handle errors by implementing an acknowledgement and retransmission
scheme.
 Implement flow control.
 Data link layer attempts to provide reliable communication over the
physical layer interface.
 Protocol used : LLC
4
 The network layer is responsible for transportation of data across
multiple networks.
3. Network Layer
 Defines logical addressing so that any endpoint can be identified.
 Defines the most optimum path the packet should take from the
source to the destination
 Protocol used : IP, ARP, RARP
ICMP, IGMP
 Ensures quality and reliable mechanism for the exchange of data
between two processes in different computers.
4. Transport Layer
 Ensures that the data units are delivered error free.
 Data packet switching is entirely handled by the transport layer
 Ensures that there is no loss or duplication of data units.
 Protocol used : TCP, ARP, RARP, SPX, NWLINK, NETBIOS
 Provides mechanism for controlling the dialogue between the two end
systems. It defines how to start, control and end conversations (called
sessions) between applications.
5. Session Layer
 The applications that use RPC's (remote procedure calls) are taken care
of by the sessions layer
 Also provides check-pointing mechanism or synchronization points
such that if a failure of some sort occurs between checkpoints, all
data can be retransmitted from the last checkpoint.
 Any necessary log-on or password validation is also handled by this layer
 Protocol used : NETBIOS
5
 Defines the format in which the data is to be exchanged between the
communicating devices.
6. Presentation Layer
 Handles data compression and decompression
 Also handles data encryption / decryption (cryptography).
 Protocol used : SMB, NCP
 Topmost layer of the OSI reference model
7. Application Layer
 The application layer provides user interfaces and support for services
such as e-mail, remote file access and transfer, shared database
management and other types of distributed information services.
 Used for applications specifically written to run over the network
 Protocol used : DNS, FTP, TFTP, BOOTP, SNMP, SMTP
6
7
1. TCP/IP model was defined before the advent of the internet whereas OSI model
was defined after the advent of internet.
2. The OSI model consists of 7 architectural layers whereas the TCP/IP only
has 4 layers
3. OSI model is strictly layered whereas TCP/IP is loosely layered.
4. TCP/IP combines the presentation and session layer issues into its application
layer.
5. TCP/IP combines the OSI data link and physical layers into the network access
layer.
6. Transport layer in the OSI model guarantees data delivery whereas Transport
layer in the TCP/IP model supports data delivery without guarantee (e.g. UDP).
7. OSI is a reference model and TCP/IP is an implementation of OSI model.
8. TCP/IP Protocols are considered to be standards around which the internet
has developed. The OSI model however is a "generic, protocol-independent
standard."
Differences between the OSI and TCP/IP model
Types of Addresses used in TCP/IP
Addresses
Physical
Addresses
Logical
Addresses
Port
Addresses
Specific
Addresses
Relationship of layers and addresses in TCP/IP
8
 The Lowest level address included in the frame used by the data link
layer
Physical Address
 Most LAN use a 48 bit (6 byte) physical address written in 12
hexadecimal digits that is imprinted on the Network Interface Card (NIC).
07:01:02:01:2C:4B
A 6-byte (12 hexadecimal digits) physical address.
 A universal addressing system in which each host can be identified
uniquely regardless of the underlying physical network.
Logical Address
 A logical address is currently a 32 bit address that can uniquely define a
host connected to the internet.
241.177.15.2
 A computer runs many different processes at the same time.
Port Address
 Port numbers allow different applications on the same computer to share
network resources simultaneously. Port numbers are associated with
network addresses.
9
 Some applications have user-friendly addresses designed for that specific
address (e.g. e-mail addresses, URLs etc.)
Specific Address
 These addresses, however, get changed to the corresponding port and
logical addresses by the sending computer.
Read section 2.5 (Forouzan) on addresses
Sources & References
Sources & References
 http://encyclopedia2.thefreedictionary.com/OSI+model
 Yale University, USA
web : www.yale.edu/pclt/COMM/TCPIP.html
 Forouzan B.A, Data Communications and Networking, 4th edition
 University of East London
web : http://homepages.uel.ac.uk/u9703493/comparison.htm
 Tanenbaum A.S., Computer Networks, 4th edition
 http://compnetworking.about.com/od/basicnetworkingconcepts/l/blbasics_osi1.htm
 Lecture notes, Indian Institute of Technology (IIT) Kanpur, India.

More Related Content

What's hot

CDP Indicator
CDP IndicatorCDP Indicator
CDP Indicatornpsg
 
Eric Vyncke - IPv6 security in general
Eric Vyncke - IPv6 security in generalEric Vyncke - IPv6 security in general
Eric Vyncke - IPv6 security in generalIKT-Norge
 
Unleashing End-to_end TLS Security Leveraging NGINX with Intel(r) QuickAssist...
Unleashing End-to_end TLS Security Leveraging NGINX with Intel(r) QuickAssist...Unleashing End-to_end TLS Security Leveraging NGINX with Intel(r) QuickAssist...
Unleashing End-to_end TLS Security Leveraging NGINX with Intel(r) QuickAssist...Michelle Holley
 
From NAT to NAT Traversal
From NAT to NAT TraversalFrom NAT to NAT Traversal
From NAT to NAT TraversalLi-Wei Yao
 
Nat traversal in WebRTC context
Nat traversal in WebRTC contextNat traversal in WebRTC context
Nat traversal in WebRTC contextAudioCodes
 
AVC VIDEO SECURITY ON WIRELESS CHANNEL
AVC VIDEO SECURITY ON WIRELESS CHANNELAVC VIDEO SECURITY ON WIRELESS CHANNEL
AVC VIDEO SECURITY ON WIRELESS CHANNELijma
 
In-Network Acceleration with FPGA (MEMO)
In-Network Acceleration with FPGA (MEMO)In-Network Acceleration with FPGA (MEMO)
In-Network Acceleration with FPGA (MEMO)Naoto MATSUMOTO
 
Performance Analysis of VoIP by Communicating Two Systems
Performance Analysis of VoIP by Communicating Two Systems Performance Analysis of VoIP by Communicating Two Systems
Performance Analysis of VoIP by Communicating Two Systems IOSR Journals
 
Henrik Strøm - IPv6 from the attacker's perspective
Henrik Strøm - IPv6 from the attacker's perspectiveHenrik Strøm - IPv6 from the attacker's perspective
Henrik Strøm - IPv6 from the attacker's perspectiveIKT-Norge
 
Internet of Tiny Linux (IoTL): Episode IV - SFO17-100
Internet of Tiny Linux (IoTL): Episode IV  - SFO17-100Internet of Tiny Linux (IoTL): Episode IV  - SFO17-100
Internet of Tiny Linux (IoTL): Episode IV - SFO17-100Linaro
 
Linux Based Advanced Routing with Firewall and Traffic Control
Linux Based Advanced Routing with Firewall and Traffic ControlLinux Based Advanced Routing with Firewall and Traffic Control
Linux Based Advanced Routing with Firewall and Traffic Controlsandy_vasan
 
Introduction to DPDK
Introduction to DPDKIntroduction to DPDK
Introduction to DPDKKernel TLV
 
Minimum Viable FIB
Minimum Viable FIBMinimum Viable FIB
Minimum Viable FIBAPNIC
 
An Application Gateway to Deploy High-quality Video Communications in Various...
An Application Gateway to Deploy High-quality Video Communications in Various...An Application Gateway to Deploy High-quality Video Communications in Various...
An Application Gateway to Deploy High-quality Video Communications in Various...Takashi Kishida
 
Cellular technology with Embedded Linux - COSCUP 2016
Cellular technology with Embedded Linux - COSCUP 2016Cellular technology with Embedded Linux - COSCUP 2016
Cellular technology with Embedded Linux - COSCUP 2016SZ Lin
 
Jan Zorz - IPv6 and mobile emergency response teams
Jan Zorz - IPv6 and mobile emergency response teamsJan Zorz - IPv6 and mobile emergency response teams
Jan Zorz - IPv6 and mobile emergency response teamsIKT-Norge
 

What's hot (20)

CDP Indicator
CDP IndicatorCDP Indicator
CDP Indicator
 
Eric Vyncke - IPv6 security in general
Eric Vyncke - IPv6 security in generalEric Vyncke - IPv6 security in general
Eric Vyncke - IPv6 security in general
 
NAT Traversal
NAT TraversalNAT Traversal
NAT Traversal
 
uCluster
uClusteruCluster
uCluster
 
Unleashing End-to_end TLS Security Leveraging NGINX with Intel(r) QuickAssist...
Unleashing End-to_end TLS Security Leveraging NGINX with Intel(r) QuickAssist...Unleashing End-to_end TLS Security Leveraging NGINX with Intel(r) QuickAssist...
Unleashing End-to_end TLS Security Leveraging NGINX with Intel(r) QuickAssist...
 
From NAT to NAT Traversal
From NAT to NAT TraversalFrom NAT to NAT Traversal
From NAT to NAT Traversal
 
Nat traversal in WebRTC context
Nat traversal in WebRTC contextNat traversal in WebRTC context
Nat traversal in WebRTC context
 
AVC VIDEO SECURITY ON WIRELESS CHANNEL
AVC VIDEO SECURITY ON WIRELESS CHANNELAVC VIDEO SECURITY ON WIRELESS CHANNEL
AVC VIDEO SECURITY ON WIRELESS CHANNEL
 
In-Network Acceleration with FPGA (MEMO)
In-Network Acceleration with FPGA (MEMO)In-Network Acceleration with FPGA (MEMO)
In-Network Acceleration with FPGA (MEMO)
 
Performance Analysis of VoIP by Communicating Two Systems
Performance Analysis of VoIP by Communicating Two Systems Performance Analysis of VoIP by Communicating Two Systems
Performance Analysis of VoIP by Communicating Two Systems
 
Henrik Strøm - IPv6 from the attacker's perspective
Henrik Strøm - IPv6 from the attacker's perspectiveHenrik Strøm - IPv6 from the attacker's perspective
Henrik Strøm - IPv6 from the attacker's perspective
 
Userspace networking
Userspace networkingUserspace networking
Userspace networking
 
ICE basic
ICE basicICE basic
ICE basic
 
Internet of Tiny Linux (IoTL): Episode IV - SFO17-100
Internet of Tiny Linux (IoTL): Episode IV  - SFO17-100Internet of Tiny Linux (IoTL): Episode IV  - SFO17-100
Internet of Tiny Linux (IoTL): Episode IV - SFO17-100
 
Linux Based Advanced Routing with Firewall and Traffic Control
Linux Based Advanced Routing with Firewall and Traffic ControlLinux Based Advanced Routing with Firewall and Traffic Control
Linux Based Advanced Routing with Firewall and Traffic Control
 
Introduction to DPDK
Introduction to DPDKIntroduction to DPDK
Introduction to DPDK
 
Minimum Viable FIB
Minimum Viable FIBMinimum Viable FIB
Minimum Viable FIB
 
An Application Gateway to Deploy High-quality Video Communications in Various...
An Application Gateway to Deploy High-quality Video Communications in Various...An Application Gateway to Deploy High-quality Video Communications in Various...
An Application Gateway to Deploy High-quality Video Communications in Various...
 
Cellular technology with Embedded Linux - COSCUP 2016
Cellular technology with Embedded Linux - COSCUP 2016Cellular technology with Embedded Linux - COSCUP 2016
Cellular technology with Embedded Linux - COSCUP 2016
 
Jan Zorz - IPv6 and mobile emergency response teams
Jan Zorz - IPv6 and mobile emergency response teamsJan Zorz - IPv6 and mobile emergency response teams
Jan Zorz - IPv6 and mobile emergency response teams
 

Similar to Network Reference Models Guide

OSI and TCPIP Model
OSI and TCPIP ModelOSI and TCPIP Model
OSI and TCPIP ModelTapan Khilar
 
pppppppppppppppppjjjjjjjjjjjpppppppp.pptx
pppppppppppppppppjjjjjjjjjjjpppppppp.pptxpppppppppppppppppjjjjjjjjjjjpppppppp.pptx
pppppppppppppppppjjjjjjjjjjjpppppppp.pptxzeyadosama505
 
computer network and chapter 7 OSI layers.pptx
computer network and chapter 7 OSI layers.pptxcomputer network and chapter 7 OSI layers.pptx
computer network and chapter 7 OSI layers.pptxgadisaAdamu
 
| IJMER | ISSN: 2249–6645 | www.ijmer.com | Vol. 4 | Iss. 4 | April 2014 ...
    | IJMER | ISSN: 2249–6645 | www.ijmer.com | Vol. 4 | Iss. 4 | April 2014 ...    | IJMER | ISSN: 2249–6645 | www.ijmer.com | Vol. 4 | Iss. 4 | April 2014 ...
| IJMER | ISSN: 2249–6645 | www.ijmer.com | Vol. 4 | Iss. 4 | April 2014 ...IJMER
 
OSI reference Model
OSI reference ModelOSI reference Model
OSI reference ModelJohnson Ubah
 
Automation Networking By Shivam Singh
Automation Networking By Shivam SinghAutomation Networking By Shivam Singh
Automation Networking By Shivam SinghShivam Singh
 
Osi reference model and the tcp
Osi reference model and the tcpOsi reference model and the tcp
Osi reference model and the tcpAgrippa Mungazi
 
Chapter 1.2 osi model
Chapter 1.2 osi modelChapter 1.2 osi model
Chapter 1.2 osi modelNaiyan Noor
 
Networking fundamentals
Networking  fundamentalsNetworking  fundamentals
Networking fundamentalsThe Avi Sharma
 
Lecture 2 - Host to host communication.pptx
Lecture 2 - Host to host communication.pptxLecture 2 - Host to host communication.pptx
Lecture 2 - Host to host communication.pptxMohamedFouardKanu
 
CN-OSI-TCP-Models-001.pdf
CN-OSI-TCP-Models-001.pdfCN-OSI-TCP-Models-001.pdf
CN-OSI-TCP-Models-001.pdfskknowledge
 

Similar to Network Reference Models Guide (20)

OSI and TCPIP Model
OSI and TCPIP ModelOSI and TCPIP Model
OSI and TCPIP Model
 
chapter 4.pptx
chapter 4.pptxchapter 4.pptx
chapter 4.pptx
 
pppppppppppppppppjjjjjjjjjjjpppppppp.pptx
pppppppppppppppppjjjjjjjjjjjpppppppp.pptxpppppppppppppppppjjjjjjjjjjjpppppppp.pptx
pppppppppppppppppjjjjjjjjjjjpppppppp.pptx
 
OSI model.pptx
OSI model.pptxOSI model.pptx
OSI model.pptx
 
computer network and chapter 7 OSI layers.pptx
computer network and chapter 7 OSI layers.pptxcomputer network and chapter 7 OSI layers.pptx
computer network and chapter 7 OSI layers.pptx
 
| IJMER | ISSN: 2249–6645 | www.ijmer.com | Vol. 4 | Iss. 4 | April 2014 ...
    | IJMER | ISSN: 2249–6645 | www.ijmer.com | Vol. 4 | Iss. 4 | April 2014 ...    | IJMER | ISSN: 2249–6645 | www.ijmer.com | Vol. 4 | Iss. 4 | April 2014 ...
| IJMER | ISSN: 2249–6645 | www.ijmer.com | Vol. 4 | Iss. 4 | April 2014 ...
 
OSI reference Model
OSI reference ModelOSI reference Model
OSI reference Model
 
Automation Networking By Shivam Singh
Automation Networking By Shivam SinghAutomation Networking By Shivam Singh
Automation Networking By Shivam Singh
 
Avani
AvaniAvani
Avani
 
Osi reference model and the tcp
Osi reference model and the tcpOsi reference model and the tcp
Osi reference model and the tcp
 
Chapter 1.2 osi model
Chapter 1.2 osi modelChapter 1.2 osi model
Chapter 1.2 osi model
 
Networking fundamentals
Networking  fundamentalsNetworking  fundamentals
Networking fundamentals
 
Lecture 2 - Host to host communication.pptx
Lecture 2 - Host to host communication.pptxLecture 2 - Host to host communication.pptx
Lecture 2 - Host to host communication.pptx
 
CN-OSI-TCP-Models-001.pdf
CN-OSI-TCP-Models-001.pdfCN-OSI-TCP-Models-001.pdf
CN-OSI-TCP-Models-001.pdf
 
Wp simoneau osi_model
Wp simoneau osi_modelWp simoneau osi_model
Wp simoneau osi_model
 
osi and tcpip.ppt
osi and tcpip.pptosi and tcpip.ppt
osi and tcpip.ppt
 
Osi and tcpip
Osi and tcpipOsi and tcpip
Osi and tcpip
 
Bhargava Presentation.ppt
Bhargava Presentation.pptBhargava Presentation.ppt
Bhargava Presentation.ppt
 
Bhargava Presentation.ppt
Bhargava Presentation.pptBhargava Presentation.ppt
Bhargava Presentation.ppt
 
OSI Model
OSI ModelOSI Model
OSI Model
 

Recently uploaded

Difference Between Search & Browse Methods in Odoo 17
Difference Between Search & Browse Methods in Odoo 17Difference Between Search & Browse Methods in Odoo 17
Difference Between Search & Browse Methods in Odoo 17Celine George
 
Employee wellbeing at the workplace.pptx
Employee wellbeing at the workplace.pptxEmployee wellbeing at the workplace.pptx
Employee wellbeing at the workplace.pptxNirmalaLoungPoorunde1
 
MICROBIOLOGY biochemical test detailed.pptx
MICROBIOLOGY biochemical test detailed.pptxMICROBIOLOGY biochemical test detailed.pptx
MICROBIOLOGY biochemical test detailed.pptxabhijeetpadhi001
 
Meghan Sutherland In Media Res Media Component
Meghan Sutherland In Media Res Media ComponentMeghan Sutherland In Media Res Media Component
Meghan Sutherland In Media Res Media ComponentInMediaRes1
 
Introduction to AI in Higher Education_draft.pptx
Introduction to AI in Higher Education_draft.pptxIntroduction to AI in Higher Education_draft.pptx
Introduction to AI in Higher Education_draft.pptxpboyjonauth
 
AmericanHighSchoolsprezentacijaoskolama.
AmericanHighSchoolsprezentacijaoskolama.AmericanHighSchoolsprezentacijaoskolama.
AmericanHighSchoolsprezentacijaoskolama.arsicmarija21
 
Roles & Responsibilities in Pharmacovigilance
Roles & Responsibilities in PharmacovigilanceRoles & Responsibilities in Pharmacovigilance
Roles & Responsibilities in PharmacovigilanceSamikshaHamane
 
Crayon Activity Handout For the Crayon A
Crayon Activity Handout For the Crayon ACrayon Activity Handout For the Crayon A
Crayon Activity Handout For the Crayon AUnboundStockton
 
18-04-UA_REPORT_MEDIALITERAСY_INDEX-DM_23-1-final-eng.pdf
18-04-UA_REPORT_MEDIALITERAСY_INDEX-DM_23-1-final-eng.pdf18-04-UA_REPORT_MEDIALITERAСY_INDEX-DM_23-1-final-eng.pdf
18-04-UA_REPORT_MEDIALITERAСY_INDEX-DM_23-1-final-eng.pdfssuser54595a
 
Framing an Appropriate Research Question 6b9b26d93da94caf993c038d9efcdedb.pdf
Framing an Appropriate Research Question 6b9b26d93da94caf993c038d9efcdedb.pdfFraming an Appropriate Research Question 6b9b26d93da94caf993c038d9efcdedb.pdf
Framing an Appropriate Research Question 6b9b26d93da94caf993c038d9efcdedb.pdfUjwalaBharambe
 
Enzyme, Pharmaceutical Aids, Miscellaneous Last Part of Chapter no 5th.pdf
Enzyme, Pharmaceutical Aids, Miscellaneous Last Part of Chapter no 5th.pdfEnzyme, Pharmaceutical Aids, Miscellaneous Last Part of Chapter no 5th.pdf
Enzyme, Pharmaceutical Aids, Miscellaneous Last Part of Chapter no 5th.pdfSumit Tiwari
 
Proudly South Africa powerpoint Thorisha.pptx
Proudly South Africa powerpoint Thorisha.pptxProudly South Africa powerpoint Thorisha.pptx
Proudly South Africa powerpoint Thorisha.pptxthorishapillay1
 
How to Make a Pirate ship Primary Education.pptx
How to Make a Pirate ship Primary Education.pptxHow to Make a Pirate ship Primary Education.pptx
How to Make a Pirate ship Primary Education.pptxmanuelaromero2013
 
Solving Puzzles Benefits Everyone (English).pptx
Solving Puzzles Benefits Everyone (English).pptxSolving Puzzles Benefits Everyone (English).pptx
Solving Puzzles Benefits Everyone (English).pptxOH TEIK BIN
 
Introduction to ArtificiaI Intelligence in Higher Education
Introduction to ArtificiaI Intelligence in Higher EducationIntroduction to ArtificiaI Intelligence in Higher Education
Introduction to ArtificiaI Intelligence in Higher Educationpboyjonauth
 
MARGINALIZATION (Different learners in Marginalized Group
MARGINALIZATION (Different learners in Marginalized GroupMARGINALIZATION (Different learners in Marginalized Group
MARGINALIZATION (Different learners in Marginalized GroupJonathanParaisoCruz
 
Types of Journalistic Writing Grade 8.pptx
Types of Journalistic Writing Grade 8.pptxTypes of Journalistic Writing Grade 8.pptx
Types of Journalistic Writing Grade 8.pptxEyham Joco
 
Computed Fields and api Depends in the Odoo 17
Computed Fields and api Depends in the Odoo 17Computed Fields and api Depends in the Odoo 17
Computed Fields and api Depends in the Odoo 17Celine George
 

Recently uploaded (20)

Difference Between Search & Browse Methods in Odoo 17
Difference Between Search & Browse Methods in Odoo 17Difference Between Search & Browse Methods in Odoo 17
Difference Between Search & Browse Methods in Odoo 17
 
Model Call Girl in Bikash Puri Delhi reach out to us at 🔝9953056974🔝
Model Call Girl in Bikash Puri  Delhi reach out to us at 🔝9953056974🔝Model Call Girl in Bikash Puri  Delhi reach out to us at 🔝9953056974🔝
Model Call Girl in Bikash Puri Delhi reach out to us at 🔝9953056974🔝
 
Employee wellbeing at the workplace.pptx
Employee wellbeing at the workplace.pptxEmployee wellbeing at the workplace.pptx
Employee wellbeing at the workplace.pptx
 
MICROBIOLOGY biochemical test detailed.pptx
MICROBIOLOGY biochemical test detailed.pptxMICROBIOLOGY biochemical test detailed.pptx
MICROBIOLOGY biochemical test detailed.pptx
 
Meghan Sutherland In Media Res Media Component
Meghan Sutherland In Media Res Media ComponentMeghan Sutherland In Media Res Media Component
Meghan Sutherland In Media Res Media Component
 
Introduction to AI in Higher Education_draft.pptx
Introduction to AI in Higher Education_draft.pptxIntroduction to AI in Higher Education_draft.pptx
Introduction to AI in Higher Education_draft.pptx
 
AmericanHighSchoolsprezentacijaoskolama.
AmericanHighSchoolsprezentacijaoskolama.AmericanHighSchoolsprezentacijaoskolama.
AmericanHighSchoolsprezentacijaoskolama.
 
Roles & Responsibilities in Pharmacovigilance
Roles & Responsibilities in PharmacovigilanceRoles & Responsibilities in Pharmacovigilance
Roles & Responsibilities in Pharmacovigilance
 
Crayon Activity Handout For the Crayon A
Crayon Activity Handout For the Crayon ACrayon Activity Handout For the Crayon A
Crayon Activity Handout For the Crayon A
 
18-04-UA_REPORT_MEDIALITERAСY_INDEX-DM_23-1-final-eng.pdf
18-04-UA_REPORT_MEDIALITERAСY_INDEX-DM_23-1-final-eng.pdf18-04-UA_REPORT_MEDIALITERAСY_INDEX-DM_23-1-final-eng.pdf
18-04-UA_REPORT_MEDIALITERAСY_INDEX-DM_23-1-final-eng.pdf
 
Framing an Appropriate Research Question 6b9b26d93da94caf993c038d9efcdedb.pdf
Framing an Appropriate Research Question 6b9b26d93da94caf993c038d9efcdedb.pdfFraming an Appropriate Research Question 6b9b26d93da94caf993c038d9efcdedb.pdf
Framing an Appropriate Research Question 6b9b26d93da94caf993c038d9efcdedb.pdf
 
Enzyme, Pharmaceutical Aids, Miscellaneous Last Part of Chapter no 5th.pdf
Enzyme, Pharmaceutical Aids, Miscellaneous Last Part of Chapter no 5th.pdfEnzyme, Pharmaceutical Aids, Miscellaneous Last Part of Chapter no 5th.pdf
Enzyme, Pharmaceutical Aids, Miscellaneous Last Part of Chapter no 5th.pdf
 
Proudly South Africa powerpoint Thorisha.pptx
Proudly South Africa powerpoint Thorisha.pptxProudly South Africa powerpoint Thorisha.pptx
Proudly South Africa powerpoint Thorisha.pptx
 
How to Make a Pirate ship Primary Education.pptx
How to Make a Pirate ship Primary Education.pptxHow to Make a Pirate ship Primary Education.pptx
How to Make a Pirate ship Primary Education.pptx
 
Solving Puzzles Benefits Everyone (English).pptx
Solving Puzzles Benefits Everyone (English).pptxSolving Puzzles Benefits Everyone (English).pptx
Solving Puzzles Benefits Everyone (English).pptx
 
Introduction to ArtificiaI Intelligence in Higher Education
Introduction to ArtificiaI Intelligence in Higher EducationIntroduction to ArtificiaI Intelligence in Higher Education
Introduction to ArtificiaI Intelligence in Higher Education
 
MARGINALIZATION (Different learners in Marginalized Group
MARGINALIZATION (Different learners in Marginalized GroupMARGINALIZATION (Different learners in Marginalized Group
MARGINALIZATION (Different learners in Marginalized Group
 
Types of Journalistic Writing Grade 8.pptx
Types of Journalistic Writing Grade 8.pptxTypes of Journalistic Writing Grade 8.pptx
Types of Journalistic Writing Grade 8.pptx
 
Computed Fields and api Depends in the Odoo 17
Computed Fields and api Depends in the Odoo 17Computed Fields and api Depends in the Odoo 17
Computed Fields and api Depends in the Odoo 17
 
9953330565 Low Rate Call Girls In Rohini Delhi NCR
9953330565 Low Rate Call Girls In Rohini  Delhi NCR9953330565 Low Rate Call Girls In Rohini  Delhi NCR
9953330565 Low Rate Call Girls In Rohini Delhi NCR
 

Network Reference Models Guide

  • 1. 1 Network Reference Models Network Reference Models Computer Networks Khaled Hussain BSc. Hons. (BCU, UK) MSc. (BCU, UK) CEO, Cybernetics Robo Academy www.cyberneticsrobo.com (Ex. Head, Dept. of Computer Science & Engineering, SIU) Computer Networks Khaled Hussain BSc. Hons. (BCU, UK) MSc. (BCU, UK) CEO, Cybernetics Robo Academy www.cyberneticsrobo.com (Ex. Head, Dept. of Computer Science & Engineering, SIU) The Army puts out a bid on some computers and DEC wins the bid. An Imaginary Story :) The Air Force puts out a bid and IBM wins. The Navy bid is won by Unisys. Then the President decides to invade the ‘Land of the Giants’ and the armed forces discover that their computers cannot talk to each other. LAN Media LAN Media The OSI Model  International standard organization (ISO) established a committee in 1977 to develop an architecture for computer communication.  In 1984, the Open Systems Interconnection (OSI) reference model was approved as an international standard for communications architecture.  Initially, communication with different entities and different vendors was extremely difficult as every vendor would have a different mechanism to communicate.  Hence, there arose a need to have a common, universally accepted platform to communicate with entities of different vendor.
  • 2. 2 The OSI Model [continued]  The OSI model describes how information or data makes its way from application programs (such as spreadsheets) through a network medium (such as wire) to another application program located on another network.  The OSI reference model divides the problem of moving information between computers over a network medium into SEVEN smaller and more manageable problems .  The OSI (Open System Interconnection) is a layered framework of network systems that allows communication between all types of computer systems.
  • 3. 3 1. Physical Layer  Characteristics such as voltage levels, timing of voltage changes, physical data rates, representation of bits, physical connectors, physical topologies and other similar attributes are defined by physical layer specifications.  Operates with data in the form of bits that are sent from the physical layer of the sending (source) device and received at the physical layer of the destination device.  Defines all aspects of physical communication (mechanical, electrical, functional etc.). It is responsible for the ultimate transmission of data over network communications media.  Protocol used : LLC 2. Data Link Layer  The 0's and 1's that are used in the communication are grouped into logical encapsulation called frames.  Handle errors by implementing an acknowledgement and retransmission scheme.  Implement flow control.  Data link layer attempts to provide reliable communication over the physical layer interface.  Protocol used : LLC
  • 4. 4  The network layer is responsible for transportation of data across multiple networks. 3. Network Layer  Defines logical addressing so that any endpoint can be identified.  Defines the most optimum path the packet should take from the source to the destination  Protocol used : IP, ARP, RARP ICMP, IGMP  Ensures quality and reliable mechanism for the exchange of data between two processes in different computers. 4. Transport Layer  Ensures that the data units are delivered error free.  Data packet switching is entirely handled by the transport layer  Ensures that there is no loss or duplication of data units.  Protocol used : TCP, ARP, RARP, SPX, NWLINK, NETBIOS  Provides mechanism for controlling the dialogue between the two end systems. It defines how to start, control and end conversations (called sessions) between applications. 5. Session Layer  The applications that use RPC's (remote procedure calls) are taken care of by the sessions layer  Also provides check-pointing mechanism or synchronization points such that if a failure of some sort occurs between checkpoints, all data can be retransmitted from the last checkpoint.  Any necessary log-on or password validation is also handled by this layer  Protocol used : NETBIOS
  • 5. 5  Defines the format in which the data is to be exchanged between the communicating devices. 6. Presentation Layer  Handles data compression and decompression  Also handles data encryption / decryption (cryptography).  Protocol used : SMB, NCP  Topmost layer of the OSI reference model 7. Application Layer  The application layer provides user interfaces and support for services such as e-mail, remote file access and transfer, shared database management and other types of distributed information services.  Used for applications specifically written to run over the network  Protocol used : DNS, FTP, TFTP, BOOTP, SNMP, SMTP
  • 6. 6
  • 7. 7 1. TCP/IP model was defined before the advent of the internet whereas OSI model was defined after the advent of internet. 2. The OSI model consists of 7 architectural layers whereas the TCP/IP only has 4 layers 3. OSI model is strictly layered whereas TCP/IP is loosely layered. 4. TCP/IP combines the presentation and session layer issues into its application layer. 5. TCP/IP combines the OSI data link and physical layers into the network access layer. 6. Transport layer in the OSI model guarantees data delivery whereas Transport layer in the TCP/IP model supports data delivery without guarantee (e.g. UDP). 7. OSI is a reference model and TCP/IP is an implementation of OSI model. 8. TCP/IP Protocols are considered to be standards around which the internet has developed. The OSI model however is a "generic, protocol-independent standard." Differences between the OSI and TCP/IP model Types of Addresses used in TCP/IP Addresses Physical Addresses Logical Addresses Port Addresses Specific Addresses Relationship of layers and addresses in TCP/IP
  • 8. 8  The Lowest level address included in the frame used by the data link layer Physical Address  Most LAN use a 48 bit (6 byte) physical address written in 12 hexadecimal digits that is imprinted on the Network Interface Card (NIC). 07:01:02:01:2C:4B A 6-byte (12 hexadecimal digits) physical address.  A universal addressing system in which each host can be identified uniquely regardless of the underlying physical network. Logical Address  A logical address is currently a 32 bit address that can uniquely define a host connected to the internet. 241.177.15.2  A computer runs many different processes at the same time. Port Address  Port numbers allow different applications on the same computer to share network resources simultaneously. Port numbers are associated with network addresses.
  • 9. 9  Some applications have user-friendly addresses designed for that specific address (e.g. e-mail addresses, URLs etc.) Specific Address  These addresses, however, get changed to the corresponding port and logical addresses by the sending computer. Read section 2.5 (Forouzan) on addresses Sources & References Sources & References  http://encyclopedia2.thefreedictionary.com/OSI+model  Yale University, USA web : www.yale.edu/pclt/COMM/TCPIP.html  Forouzan B.A, Data Communications and Networking, 4th edition  University of East London web : http://homepages.uel.ac.uk/u9703493/comparison.htm  Tanenbaum A.S., Computer Networks, 4th edition  http://compnetworking.about.com/od/basicnetworkingconcepts/l/blbasics_osi1.htm  Lecture notes, Indian Institute of Technology (IIT) Kanpur, India.