SlideShare a Scribd company logo
Netprog:  OSI Reference Model Networking
Netprog:  OSI Reference Model Network “ ... communication system for connecting end-systems” End-systems a.k.a. “hosts” 	PCs, workstations 	dedicated computers 	network components
Netprog:  OSI Reference Model Multiaccess vs. Point-to-point Multiaccess  means shared medium. many  end-systems share the same physical communication resources (wire, frequency, ...) There must be some arbitration mechanism. Point-to-point only 2 systems involved no doubt about where data came from !
Netprog:  OSI Reference Model Multiaccess Point-to-point
Netprog:  OSI Reference Model LAN - Local Area Network connects computers that are physically close together ( < 1 mile). high speed multi-access Technologies: Ethernet	10 Mbps, 100Mbps Token Ring	16 Mbps FDDI   	100 Mbps
Netprog:  OSI Reference Model WAN - Wide Area Network connects computers that are physically far apart. “long-haul network”. typically slower than a LAN. typically less reliable than a LAN. point-to-point Technologies: telephone lines Satellite communications
Netprog:  OSI Reference Model MAN - Metropolitan Area Network Larger than a LAN and smaller than a WAN - example: campus-wide network - multi-access network Technologies: coaxial cable  microwave
Netprog:  OSI Reference Model Internetwork Connection of 2 or more distinct (possibly dissimilar) networks. Requires  some kind of network device to facilitate the connection. Net A Net B
Netprog:  OSI Reference Model OSI Reference Model Layered model: 7. Application 6. Presentation 5. Session 4. Transport 3. Network 2. Data Link 1. Physical
Netprog:  OSI Reference Model Responsibility: transmission of raw bits over a communication channel. Issues: mechanical and electrical interfaces time per bit distances The Physical Layer
Netprog:  OSI Reference Model The Data Link Layer - Data Link Control Responsibility: provide an error-free communication link Issues: framing (dividing data into chunks) header & trailer bits addressing 10110110101 01100010011 10110000001
Netprog:  OSI Reference Model The Data Link Layer - The MAC sublayer Medium Access Control - needed by mutiaccess networks. MAC provides DLC with “virtual wires” on multiaccess  networks.
Netprog:  OSI Reference Model The Network Layer Responsibilities: path selection between end-systems (routing). subnet flow control. fragmentation & reassembly translation between different network types. Issues: packet headers virtual circuits
Netprog:  OSI Reference Model The Transport Layer Responsibilities: provides  virtual end-to-end links between peer processes. end-to-end flow control Issues: headers error detection  reliable communication
Netprog:  OSI Reference Model The Session Layer Responsibilities: establishes, manages, and terminates sessions between applications. service location lookup Many protocol suites do not include a session layer.
Netprog:  OSI Reference Model The Presentation Layer Responsibilities: data encryption data compression data conversion Many protocol suites do not include a Presentation Layer.
Netprog:  OSI Reference Model The Application Layer Responsibilities: anything not provided by any of the other layers Issues: application level protocols appropriate selection of “type of service”
Netprog:  OSI Reference Model Layering & Headers  Each layer needs to add some control information to the data in order to do it’s job.  This information is typically prepended to the data before being given to the lower layer. Once the lower layers deliver the the data and control information - the peer layer uses the control information.
Netprog:  OSI Reference Model Headers DATA Process Process Transport Transport DATA H Network Network DATA H H Data Link Data Link DATA H H H
Netprog:  OSI Reference Model What are the headers? Physical: no header - just a bunch of bits. Data Link: address of the receiving endpoints address of the sending endpoint length of the data checksum.
Netprog:  OSI Reference Model Network layer header - examples protocol suite version type of service  length of the data packet identifier fragment number time to live ,[object Object]
header checksum
source network address
destination network address,[object Object]
Netprog:  OSI Reference Model Connecting Networks Repeater:  	physical layer Bridge: 		data link layer Router: 		network layer Gateway: 	network layer and above.
Netprog:  OSI Reference Model Repeater Copies bits from one network to another Does not look at any bits Allows the extension of a network beyond physical length limitations REPEATER
Netprog:  OSI Reference Model Bridge Copies frames from one network to another Can operate selectively - does not copy all frames (must look at data-link headers). Extends the network beyond physical length limitations. BRIDGE
Netprog:  OSI Reference Model Router Copies packets from one network to another. Makes decisions about what route a packet should take (looks at network headers). ROUTER
Netprog:  OSI Reference Model Gateway Operates as a router Data conversions above the network layer. Conversions: encapsulation - use an intermediate network  translation - connect different application protocols encrpyption - could be done by a gateway
Netprog:  OSI Reference Model Encapsulation Example Gateway Gateway Provides service connectivity even though intermediate network does not support protocols.
Netprog:  OSI Reference Model Translation Gateway Translate from green protocol to brown protocol
Netprog:  OSI Reference Model Encryption gateway Secure Network Secure  Network Encryption/Decryption Gateways ? GW GW ? ? InsecureNetwork
Netprog:  OSI Reference Model Hardware vs. Software Repeaters are typically hardware devices. Bridges can be implemented in hardware or software. Routers & Gateways are typically implemented in software so that they can be extended to handle new protocols. Many workstations can operate as routers or gateways.
Netprog:  OSI Reference Model Byte Ordering Different computer architectures use different byte ordering to represent multibyte values. 16 bit integer: Low Byte High Byte Address A High Byte Low Byte Address A+1
Netprog:  OSI Reference Model Byte Ordering Big-Endian IBM 370 Motorola 68000 Sun Little-Endian IBM 80x86 DEC VAX DEC PDP-11 Low Byte High Byte High Byte Low Byte Addr A Addr A+1 Addr A Addr A+1
Netprog:  OSI Reference Model Byte Order and Networking Suppose a Big Endian machine sends a 16 bit integer with the value 2: A Little Endian machine will think it got the number 512: 0000000000000010 0000001000000000
Netprog:  OSI Reference Model Network Byte Order Conversion of application-level data is left up to the presentation layer. But hold on !!! How do lower level layers communicate if they all represent values differently ? (data length fields in headers) A fixed byte order is used (called network byte order) for all control data.
Netprog:  OSI Reference Model Multiplexing “.. to combine many into one”.  Many processes sharing a single network interface. A single process could use multiple protocols. More on this when we look at TCP/IP.
Netprog:  OSI Reference Model Modes of Service connection-oriented vs. connectionless sequencing error-control flow-control byte stream vs. message based full-duplex vs. half-duplex.
Netprog:  OSI Reference Model Connection-Oriented vs. Connectionless Service A connection-oriented service includes the establishment of a logical connection between 2 processes. establish logical connection transfer data terminate connection. Connectionless services involve sending of independent messages.
Netprog:  OSI Reference Model Sequencing Sequencing provides support for an order to communications. A service that includes sequencing requires that messages (or bytes) are received in the same order they are sent.
Netprog:  OSI Reference Model Error Control Some services require error detection (it is important to know when a transmission error has occured). Checksums provide a simple error detection mechanism. Error control sometimes involves notification and retransmission.
Netprog:  OSI Reference Model Flow Control Flow control prevents the sending process from overwhelming the receiving process. Flow control can be handled a variety of ways - this is one of the major research issues in the development of the next generation of networks (ATM).
Netprog:  OSI Reference Model Byte Stream vs. Message Byte stream implies an ordered sequence of bytes with no message boundaries. Message oriented services provide communication service to chunks of data called datagrams.
Netprog:  OSI Reference Model Full- vs. Half-Duplex Full-Duplex services support the transfer of data in both directions. Half-Duplex services support the transfer of data in a single direction.
Netprog:  OSI Reference Model End-to-End vs. Hop-toHop Many service modes/features such as flow control and error control can be done either: between endpoints of the communication. -or- between every 2 nodes on the path between the endpoints.
Netprog:  OSI Reference Model End-to-End Process A Process B
Netprog:  OSI Reference Model Hop-by-Hop Process A Process B
Netprog:  OSI Reference Model Buffering Buffering can provide more efficient communications.  Buffering is most useful for byte stream services. Process A Process B Send Buffer Recv. Buffer
Netprog:  OSI Reference Model Addresses Each communication endpoint must have an address. Consider 2 processes communicating over an internet: the network must be specified the host (end-system) must be specified the process must be specified.

More Related Content

What's hot

OSI 7 Layer Model
OSI 7 Layer ModelOSI 7 Layer Model
OSI 7 Layer Model
Pritom Chaki
 
OSI Network Reference Model
OSI Network Reference ModelOSI Network Reference Model
OSI Network Reference Model
chandrakant Mallick
 
Osi reference model and the tcp
Osi reference model and the tcpOsi reference model and the tcp
Osi reference model and the tcp
Agrippa Mungazi
 
OSI layers
OSI layersOSI layers
OSI layers
Ahmed Elnaggar
 
OSI Model
OSI ModelOSI Model
Computer Network - OSI model
Computer Network - OSI modelComputer Network - OSI model
Computer Network - OSI model
Manoj Kumar
 
Chapter1ccna
Chapter1ccnaChapter1ccna
Chapter1ccna
ernestlithur
 
Osi model vs TCP/IP
Osi model vs TCP/IPOsi model vs TCP/IP
Osi model vs TCP/IP
Mannu Khani
 
OSI and TCPIP Model
OSI and TCPIP ModelOSI and TCPIP Model
OSI and TCPIP Model
Tapan Khilar
 
Reference models in Networks: OSI & TCP/IP
Reference models in Networks: OSI & TCP/IPReference models in Networks: OSI & TCP/IP
Reference models in Networks: OSI & TCP/IP
Mukesh Chinta
 
A Technical Seminar on OSI model
A Technical Seminar on OSI modelA Technical Seminar on OSI model
A Technical Seminar on OSI model
Likan Patra
 
Osi model
Osi modelOsi model
Osi model
bwire sedrick
 
Osi protocols
Osi protocolsOsi protocols
Osi protocols
Ali Usman
 
Network Protocols
Network ProtocolsNetwork Protocols
Network Protocols
Muhammed Sadham
 
Chap2
Chap2Chap2
Chap2
Mehedi Sagor
 
OSI model (7 LAYER )
OSI model (7 LAYER )OSI model (7 LAYER )
OSI model (7 LAYER )
AAKASH S
 
ZERO-LECTURE.pptx
ZERO-LECTURE.pptxZERO-LECTURE.pptx
ZERO-LECTURE.pptx
vishal choudhary
 
Lecture 02 networking
Lecture 02 networkingLecture 02 networking
Lecture 02 networking
HNDE Labuduwa Galle
 
Osi model
Osi modelOsi model
Osi model
Priyanka Sharma
 
Introduction to Computer Networks
Introduction to Computer NetworksIntroduction to Computer Networks
Introduction to Computer Networks
Venkatesh Iyer
 

What's hot (20)

OSI 7 Layer Model
OSI 7 Layer ModelOSI 7 Layer Model
OSI 7 Layer Model
 
OSI Network Reference Model
OSI Network Reference ModelOSI Network Reference Model
OSI Network Reference Model
 
Osi reference model and the tcp
Osi reference model and the tcpOsi reference model and the tcp
Osi reference model and the tcp
 
OSI layers
OSI layersOSI layers
OSI layers
 
OSI Model
OSI ModelOSI Model
OSI Model
 
Computer Network - OSI model
Computer Network - OSI modelComputer Network - OSI model
Computer Network - OSI model
 
Chapter1ccna
Chapter1ccnaChapter1ccna
Chapter1ccna
 
Osi model vs TCP/IP
Osi model vs TCP/IPOsi model vs TCP/IP
Osi model vs TCP/IP
 
OSI and TCPIP Model
OSI and TCPIP ModelOSI and TCPIP Model
OSI and TCPIP Model
 
Reference models in Networks: OSI & TCP/IP
Reference models in Networks: OSI & TCP/IPReference models in Networks: OSI & TCP/IP
Reference models in Networks: OSI & TCP/IP
 
A Technical Seminar on OSI model
A Technical Seminar on OSI modelA Technical Seminar on OSI model
A Technical Seminar on OSI model
 
Osi model
Osi modelOsi model
Osi model
 
Osi protocols
Osi protocolsOsi protocols
Osi protocols
 
Network Protocols
Network ProtocolsNetwork Protocols
Network Protocols
 
Chap2
Chap2Chap2
Chap2
 
OSI model (7 LAYER )
OSI model (7 LAYER )OSI model (7 LAYER )
OSI model (7 LAYER )
 
ZERO-LECTURE.pptx
ZERO-LECTURE.pptxZERO-LECTURE.pptx
ZERO-LECTURE.pptx
 
Lecture 02 networking
Lecture 02 networkingLecture 02 networking
Lecture 02 networking
 
Osi model
Osi modelOsi model
Osi model
 
Introduction to Computer Networks
Introduction to Computer NetworksIntroduction to Computer Networks
Introduction to Computer Networks
 

Viewers also liked

Internet protocol (ip) ppt
Internet protocol (ip) pptInternet protocol (ip) ppt
Internet protocol (ip) ppt
Dulith Kasun
 
Call Admission Control (CAC) with Load Balancing Approach for the WLAN Networks
Call Admission Control (CAC) with Load Balancing Approach for the WLAN NetworksCall Admission Control (CAC) with Load Balancing Approach for the WLAN Networks
Call Admission Control (CAC) with Load Balancing Approach for the WLAN Networks
IJARIIT
 
Call Admission Control In Mobile Wireless Networks
Call Admission Control In Mobile Wireless NetworksCall Admission Control In Mobile Wireless Networks
Call Admission Control In Mobile Wireless Networks
Mervat AbuElkheir
 
Utilizing Call Admission Control To Derive Optimal Pricing Of Multiple Servic...
Utilizing Call Admission Control To Derive Optimal Pricing Of Multiple Servic...Utilizing Call Admission Control To Derive Optimal Pricing Of Multiple Servic...
Utilizing Call Admission Control To Derive Optimal Pricing Of Multiple Servic...
jSHOW
 
Internet Domain Names
Internet Domain NamesInternet Domain Names
Internet Domain Names
Ross University School of Medicine
 
IP address and Domain name
IP address and Domain nameIP address and Domain name
IP address and Domain name
University of Technology - Iraq
 
Finance information system
Finance information systemFinance information system
Finance information system
Suby A John
 
OSI layers
OSI layersOSI layers
OSI layers
PRINCE KUMAR
 
Financial Information Systems
Financial Information SystemsFinancial Information Systems
Financial Information Systems
catch_ashutosh
 
Financial Information System
Financial Information SystemFinancial Information System
Financial Information System
university of education,Lahore
 
Ip address
Ip addressIp address
Ip address
Amandeep Kaur
 
Cellphone based home automation
Cellphone based home automationCellphone based home automation
Cellphone based home automation
PROJECTRONICS
 
Ip address and subnetting
Ip address and subnettingIp address and subnetting
Ip address and subnetting
IGZ Software house
 

Viewers also liked (13)

Internet protocol (ip) ppt
Internet protocol (ip) pptInternet protocol (ip) ppt
Internet protocol (ip) ppt
 
Call Admission Control (CAC) with Load Balancing Approach for the WLAN Networks
Call Admission Control (CAC) with Load Balancing Approach for the WLAN NetworksCall Admission Control (CAC) with Load Balancing Approach for the WLAN Networks
Call Admission Control (CAC) with Load Balancing Approach for the WLAN Networks
 
Call Admission Control In Mobile Wireless Networks
Call Admission Control In Mobile Wireless NetworksCall Admission Control In Mobile Wireless Networks
Call Admission Control In Mobile Wireless Networks
 
Utilizing Call Admission Control To Derive Optimal Pricing Of Multiple Servic...
Utilizing Call Admission Control To Derive Optimal Pricing Of Multiple Servic...Utilizing Call Admission Control To Derive Optimal Pricing Of Multiple Servic...
Utilizing Call Admission Control To Derive Optimal Pricing Of Multiple Servic...
 
Internet Domain Names
Internet Domain NamesInternet Domain Names
Internet Domain Names
 
IP address and Domain name
IP address and Domain nameIP address and Domain name
IP address and Domain name
 
Finance information system
Finance information systemFinance information system
Finance information system
 
OSI layers
OSI layersOSI layers
OSI layers
 
Financial Information Systems
Financial Information SystemsFinancial Information Systems
Financial Information Systems
 
Financial Information System
Financial Information SystemFinancial Information System
Financial Information System
 
Ip address
Ip addressIp address
Ip address
 
Cellphone based home automation
Cellphone based home automationCellphone based home automation
Cellphone based home automation
 
Ip address and subnetting
Ip address and subnettingIp address and subnetting
Ip address and subnetting
 

Similar to Networking

Osimodelwithneworkingoverview 150618094119-lva1-app6892
Osimodelwithneworkingoverview 150618094119-lva1-app6892Osimodelwithneworkingoverview 150618094119-lva1-app6892
Osimodelwithneworkingoverview 150618094119-lva1-app6892
Aswini Badatya
 
Osimodelwithneworkingoverview 150618094119-lva1-app6892
Osimodelwithneworkingoverview 150618094119-lva1-app6892Osimodelwithneworkingoverview 150618094119-lva1-app6892
Osimodelwithneworkingoverview 150618094119-lva1-app6892
Saumendra Pradhan
 
Computer networking
Computer networkingComputer networking
IMD 251 - Networking
IMD 251 - NetworkingIMD 251 - Networking
IMD 251 - Networking
isma ishak
 
Chapter1ccna
Chapter1ccnaChapter1ccna
Chapter1ccna
ernestlithur
 
Lecture 1 networking &amp; internetworking
Lecture 1 networking &amp; internetworkingLecture 1 networking &amp; internetworking
Lecture 1 networking &amp; internetworking
Md. Mashiur Rahman
 
layering.pdf
layering.pdflayering.pdf
layering.pdf
BoostHub
 
Osi model 7 Layers
Osi model 7 LayersOsi model 7 Layers
Osi model 7 Layers
Siddique Ibrahim
 
OSI and TCP/IP reference models in networking
OSI and TCP/IP reference models in networkingOSI and TCP/IP reference models in networking
OSI and TCP/IP reference models in networking
MeenakshiGupta233101
 
pppppppppppppppppjjjjjjjjjjjpppppppp.pptx
pppppppppppppppppjjjjjjjjjjjpppppppp.pptxpppppppppppppppppjjjjjjjjjjjpppppppp.pptx
pppppppppppppppppjjjjjjjjjjjpppppppp.pptx
zeyadosama505
 
Internet (i mcom)
Internet (i mcom)Internet (i mcom)
Internet (i mcom)
priya Nithya
 
Concept of networking
Concept of networkingConcept of networking
Concept of networking
sumit dimri
 
Networrrrrrrrkkkk secuiiirtyyyyyyyyyyyyyyyyyyyy
Networrrrrrrrkkkk secuiiirtyyyyyyyyyyyyyyyyyyyyNetworrrrrrrrkkkk secuiiirtyyyyyyyyyyyyyyyyyyyy
Networrrrrrrrkkkk secuiiirtyyyyyyyyyyyyyyyyyyyy
Avishek Maitra
 
Chapter 1.2 osi model
Chapter 1.2 osi modelChapter 1.2 osi model
Chapter 1.2 osi model
Naiyan Noor
 
CN unit 1 part 2 2023.ppt
CN unit 1 part 2 2023.pptCN unit 1 part 2 2023.ppt
CN unit 1 part 2 2023.ppt
mohanravi1986
 
Ccna notes
Ccna notesCcna notes
Ccna notes
Panos Brinias
 
Computer networking (nnm)
Computer networking (nnm)Computer networking (nnm)
Computer networking (nnm)
nnmaurya
 
Cisco doc
Cisco docCisco doc
Cisco doc
Prakash V
 
CN Module 1 ppt final 20.08.2020.ppt
CN Module 1 ppt final 20.08.2020.pptCN Module 1 ppt final 20.08.2020.ppt
CN Module 1 ppt final 20.08.2020.ppt
deeplearning6
 
1658897215230.pdf
1658897215230.pdf1658897215230.pdf
1658897215230.pdf
Javier Crisostomo
 

Similar to Networking (20)

Osimodelwithneworkingoverview 150618094119-lva1-app6892
Osimodelwithneworkingoverview 150618094119-lva1-app6892Osimodelwithneworkingoverview 150618094119-lva1-app6892
Osimodelwithneworkingoverview 150618094119-lva1-app6892
 
Osimodelwithneworkingoverview 150618094119-lva1-app6892
Osimodelwithneworkingoverview 150618094119-lva1-app6892Osimodelwithneworkingoverview 150618094119-lva1-app6892
Osimodelwithneworkingoverview 150618094119-lva1-app6892
 
Computer networking
Computer networkingComputer networking
Computer networking
 
IMD 251 - Networking
IMD 251 - NetworkingIMD 251 - Networking
IMD 251 - Networking
 
Chapter1ccna
Chapter1ccnaChapter1ccna
Chapter1ccna
 
Lecture 1 networking &amp; internetworking
Lecture 1 networking &amp; internetworkingLecture 1 networking &amp; internetworking
Lecture 1 networking &amp; internetworking
 
layering.pdf
layering.pdflayering.pdf
layering.pdf
 
Osi model 7 Layers
Osi model 7 LayersOsi model 7 Layers
Osi model 7 Layers
 
OSI and TCP/IP reference models in networking
OSI and TCP/IP reference models in networkingOSI and TCP/IP reference models in networking
OSI and TCP/IP reference models in networking
 
pppppppppppppppppjjjjjjjjjjjpppppppp.pptx
pppppppppppppppppjjjjjjjjjjjpppppppp.pptxpppppppppppppppppjjjjjjjjjjjpppppppp.pptx
pppppppppppppppppjjjjjjjjjjjpppppppp.pptx
 
Internet (i mcom)
Internet (i mcom)Internet (i mcom)
Internet (i mcom)
 
Concept of networking
Concept of networkingConcept of networking
Concept of networking
 
Networrrrrrrrkkkk secuiiirtyyyyyyyyyyyyyyyyyyyy
Networrrrrrrrkkkk secuiiirtyyyyyyyyyyyyyyyyyyyyNetworrrrrrrrkkkk secuiiirtyyyyyyyyyyyyyyyyyyyy
Networrrrrrrrkkkk secuiiirtyyyyyyyyyyyyyyyyyyyy
 
Chapter 1.2 osi model
Chapter 1.2 osi modelChapter 1.2 osi model
Chapter 1.2 osi model
 
CN unit 1 part 2 2023.ppt
CN unit 1 part 2 2023.pptCN unit 1 part 2 2023.ppt
CN unit 1 part 2 2023.ppt
 
Ccna notes
Ccna notesCcna notes
Ccna notes
 
Computer networking (nnm)
Computer networking (nnm)Computer networking (nnm)
Computer networking (nnm)
 
Cisco doc
Cisco docCisco doc
Cisco doc
 
CN Module 1 ppt final 20.08.2020.ppt
CN Module 1 ppt final 20.08.2020.pptCN Module 1 ppt final 20.08.2020.ppt
CN Module 1 ppt final 20.08.2020.ppt
 
1658897215230.pdf
1658897215230.pdf1658897215230.pdf
1658897215230.pdf
 

Recently uploaded

AI 101: An Introduction to the Basics and Impact of Artificial Intelligence
AI 101: An Introduction to the Basics and Impact of Artificial IntelligenceAI 101: An Introduction to the Basics and Impact of Artificial Intelligence
AI 101: An Introduction to the Basics and Impact of Artificial Intelligence
IndexBug
 
Main news related to the CCS TSI 2023 (2023/1695)
Main news related to the CCS TSI 2023 (2023/1695)Main news related to the CCS TSI 2023 (2023/1695)
Main news related to the CCS TSI 2023 (2023/1695)
Jakub Marek
 
Cosa hanno in comune un mattoncino Lego e la backdoor XZ?
Cosa hanno in comune un mattoncino Lego e la backdoor XZ?Cosa hanno in comune un mattoncino Lego e la backdoor XZ?
Cosa hanno in comune un mattoncino Lego e la backdoor XZ?
Speck&Tech
 
Generating privacy-protected synthetic data using Secludy and Milvus
Generating privacy-protected synthetic data using Secludy and MilvusGenerating privacy-protected synthetic data using Secludy and Milvus
Generating privacy-protected synthetic data using Secludy and Milvus
Zilliz
 
Building Production Ready Search Pipelines with Spark and Milvus
Building Production Ready Search Pipelines with Spark and MilvusBuilding Production Ready Search Pipelines with Spark and Milvus
Building Production Ready Search Pipelines with Spark and Milvus
Zilliz
 
Best 20 SEO Techniques To Improve Website Visibility In SERP
Best 20 SEO Techniques To Improve Website Visibility In SERPBest 20 SEO Techniques To Improve Website Visibility In SERP
Best 20 SEO Techniques To Improve Website Visibility In SERP
Pixlogix Infotech
 
Webinar: Designing a schema for a Data Warehouse
Webinar: Designing a schema for a Data WarehouseWebinar: Designing a schema for a Data Warehouse
Webinar: Designing a schema for a Data Warehouse
Federico Razzoli
 
Presentation of the OECD Artificial Intelligence Review of Germany
Presentation of the OECD Artificial Intelligence Review of GermanyPresentation of the OECD Artificial Intelligence Review of Germany
Presentation of the OECD Artificial Intelligence Review of Germany
innovationoecd
 
Recommendation System using RAG Architecture
Recommendation System using RAG ArchitectureRecommendation System using RAG Architecture
Recommendation System using RAG Architecture
fredae14
 
Your One-Stop Shop for Python Success: Top 10 US Python Development Providers
Your One-Stop Shop for Python Success: Top 10 US Python Development ProvidersYour One-Stop Shop for Python Success: Top 10 US Python Development Providers
Your One-Stop Shop for Python Success: Top 10 US Python Development Providers
akankshawande
 
Ocean lotus Threat actors project by John Sitima 2024 (1).pptx
Ocean lotus Threat actors project by John Sitima 2024 (1).pptxOcean lotus Threat actors project by John Sitima 2024 (1).pptx
Ocean lotus Threat actors project by John Sitima 2024 (1).pptx
SitimaJohn
 
Artificial Intelligence for XMLDevelopment
Artificial Intelligence for XMLDevelopmentArtificial Intelligence for XMLDevelopment
Artificial Intelligence for XMLDevelopment
Octavian Nadolu
 
5th LF Energy Power Grid Model Meet-up Slides
5th LF Energy Power Grid Model Meet-up Slides5th LF Energy Power Grid Model Meet-up Slides
5th LF Energy Power Grid Model Meet-up Slides
DanBrown980551
 
Programming Foundation Models with DSPy - Meetup Slides
Programming Foundation Models with DSPy - Meetup SlidesProgramming Foundation Models with DSPy - Meetup Slides
Programming Foundation Models with DSPy - Meetup Slides
Zilliz
 
Salesforce Integration for Bonterra Impact Management (fka Social Solutions A...
Salesforce Integration for Bonterra Impact Management (fka Social Solutions A...Salesforce Integration for Bonterra Impact Management (fka Social Solutions A...
Salesforce Integration for Bonterra Impact Management (fka Social Solutions A...
Jeffrey Haguewood
 
Introduction of Cybersecurity with OSS at Code Europe 2024
Introduction of Cybersecurity with OSS  at Code Europe 2024Introduction of Cybersecurity with OSS  at Code Europe 2024
Introduction of Cybersecurity with OSS at Code Europe 2024
Hiroshi SHIBATA
 
National Security Agency - NSA mobile device best practices
National Security Agency - NSA mobile device best practicesNational Security Agency - NSA mobile device best practices
National Security Agency - NSA mobile device best practices
Quotidiano Piemontese
 
Mariano G Tinti - Decoding SpaceX
Mariano G Tinti - Decoding SpaceXMariano G Tinti - Decoding SpaceX
Mariano G Tinti - Decoding SpaceX
Mariano Tinti
 
Monitoring and Managing Anomaly Detection on OpenShift.pdf
Monitoring and Managing Anomaly Detection on OpenShift.pdfMonitoring and Managing Anomaly Detection on OpenShift.pdf
Monitoring and Managing Anomaly Detection on OpenShift.pdf
Tosin Akinosho
 
Serial Arm Control in Real Time Presentation
Serial Arm Control in Real Time PresentationSerial Arm Control in Real Time Presentation
Serial Arm Control in Real Time Presentation
tolgahangng
 

Recently uploaded (20)

AI 101: An Introduction to the Basics and Impact of Artificial Intelligence
AI 101: An Introduction to the Basics and Impact of Artificial IntelligenceAI 101: An Introduction to the Basics and Impact of Artificial Intelligence
AI 101: An Introduction to the Basics and Impact of Artificial Intelligence
 
Main news related to the CCS TSI 2023 (2023/1695)
Main news related to the CCS TSI 2023 (2023/1695)Main news related to the CCS TSI 2023 (2023/1695)
Main news related to the CCS TSI 2023 (2023/1695)
 
Cosa hanno in comune un mattoncino Lego e la backdoor XZ?
Cosa hanno in comune un mattoncino Lego e la backdoor XZ?Cosa hanno in comune un mattoncino Lego e la backdoor XZ?
Cosa hanno in comune un mattoncino Lego e la backdoor XZ?
 
Generating privacy-protected synthetic data using Secludy and Milvus
Generating privacy-protected synthetic data using Secludy and MilvusGenerating privacy-protected synthetic data using Secludy and Milvus
Generating privacy-protected synthetic data using Secludy and Milvus
 
Building Production Ready Search Pipelines with Spark and Milvus
Building Production Ready Search Pipelines with Spark and MilvusBuilding Production Ready Search Pipelines with Spark and Milvus
Building Production Ready Search Pipelines with Spark and Milvus
 
Best 20 SEO Techniques To Improve Website Visibility In SERP
Best 20 SEO Techniques To Improve Website Visibility In SERPBest 20 SEO Techniques To Improve Website Visibility In SERP
Best 20 SEO Techniques To Improve Website Visibility In SERP
 
Webinar: Designing a schema for a Data Warehouse
Webinar: Designing a schema for a Data WarehouseWebinar: Designing a schema for a Data Warehouse
Webinar: Designing a schema for a Data Warehouse
 
Presentation of the OECD Artificial Intelligence Review of Germany
Presentation of the OECD Artificial Intelligence Review of GermanyPresentation of the OECD Artificial Intelligence Review of Germany
Presentation of the OECD Artificial Intelligence Review of Germany
 
Recommendation System using RAG Architecture
Recommendation System using RAG ArchitectureRecommendation System using RAG Architecture
Recommendation System using RAG Architecture
 
Your One-Stop Shop for Python Success: Top 10 US Python Development Providers
Your One-Stop Shop for Python Success: Top 10 US Python Development ProvidersYour One-Stop Shop for Python Success: Top 10 US Python Development Providers
Your One-Stop Shop for Python Success: Top 10 US Python Development Providers
 
Ocean lotus Threat actors project by John Sitima 2024 (1).pptx
Ocean lotus Threat actors project by John Sitima 2024 (1).pptxOcean lotus Threat actors project by John Sitima 2024 (1).pptx
Ocean lotus Threat actors project by John Sitima 2024 (1).pptx
 
Artificial Intelligence for XMLDevelopment
Artificial Intelligence for XMLDevelopmentArtificial Intelligence for XMLDevelopment
Artificial Intelligence for XMLDevelopment
 
5th LF Energy Power Grid Model Meet-up Slides
5th LF Energy Power Grid Model Meet-up Slides5th LF Energy Power Grid Model Meet-up Slides
5th LF Energy Power Grid Model Meet-up Slides
 
Programming Foundation Models with DSPy - Meetup Slides
Programming Foundation Models with DSPy - Meetup SlidesProgramming Foundation Models with DSPy - Meetup Slides
Programming Foundation Models with DSPy - Meetup Slides
 
Salesforce Integration for Bonterra Impact Management (fka Social Solutions A...
Salesforce Integration for Bonterra Impact Management (fka Social Solutions A...Salesforce Integration for Bonterra Impact Management (fka Social Solutions A...
Salesforce Integration for Bonterra Impact Management (fka Social Solutions A...
 
Introduction of Cybersecurity with OSS at Code Europe 2024
Introduction of Cybersecurity with OSS  at Code Europe 2024Introduction of Cybersecurity with OSS  at Code Europe 2024
Introduction of Cybersecurity with OSS at Code Europe 2024
 
National Security Agency - NSA mobile device best practices
National Security Agency - NSA mobile device best practicesNational Security Agency - NSA mobile device best practices
National Security Agency - NSA mobile device best practices
 
Mariano G Tinti - Decoding SpaceX
Mariano G Tinti - Decoding SpaceXMariano G Tinti - Decoding SpaceX
Mariano G Tinti - Decoding SpaceX
 
Monitoring and Managing Anomaly Detection on OpenShift.pdf
Monitoring and Managing Anomaly Detection on OpenShift.pdfMonitoring and Managing Anomaly Detection on OpenShift.pdf
Monitoring and Managing Anomaly Detection on OpenShift.pdf
 
Serial Arm Control in Real Time Presentation
Serial Arm Control in Real Time PresentationSerial Arm Control in Real Time Presentation
Serial Arm Control in Real Time Presentation
 

Networking

  • 1. Netprog: OSI Reference Model Networking
  • 2. Netprog: OSI Reference Model Network “ ... communication system for connecting end-systems” End-systems a.k.a. “hosts” PCs, workstations dedicated computers network components
  • 3. Netprog: OSI Reference Model Multiaccess vs. Point-to-point Multiaccess means shared medium. many end-systems share the same physical communication resources (wire, frequency, ...) There must be some arbitration mechanism. Point-to-point only 2 systems involved no doubt about where data came from !
  • 4. Netprog: OSI Reference Model Multiaccess Point-to-point
  • 5. Netprog: OSI Reference Model LAN - Local Area Network connects computers that are physically close together ( < 1 mile). high speed multi-access Technologies: Ethernet 10 Mbps, 100Mbps Token Ring 16 Mbps FDDI 100 Mbps
  • 6. Netprog: OSI Reference Model WAN - Wide Area Network connects computers that are physically far apart. “long-haul network”. typically slower than a LAN. typically less reliable than a LAN. point-to-point Technologies: telephone lines Satellite communications
  • 7. Netprog: OSI Reference Model MAN - Metropolitan Area Network Larger than a LAN and smaller than a WAN - example: campus-wide network - multi-access network Technologies: coaxial cable microwave
  • 8. Netprog: OSI Reference Model Internetwork Connection of 2 or more distinct (possibly dissimilar) networks. Requires some kind of network device to facilitate the connection. Net A Net B
  • 9. Netprog: OSI Reference Model OSI Reference Model Layered model: 7. Application 6. Presentation 5. Session 4. Transport 3. Network 2. Data Link 1. Physical
  • 10. Netprog: OSI Reference Model Responsibility: transmission of raw bits over a communication channel. Issues: mechanical and electrical interfaces time per bit distances The Physical Layer
  • 11. Netprog: OSI Reference Model The Data Link Layer - Data Link Control Responsibility: provide an error-free communication link Issues: framing (dividing data into chunks) header & trailer bits addressing 10110110101 01100010011 10110000001
  • 12. Netprog: OSI Reference Model The Data Link Layer - The MAC sublayer Medium Access Control - needed by mutiaccess networks. MAC provides DLC with “virtual wires” on multiaccess networks.
  • 13. Netprog: OSI Reference Model The Network Layer Responsibilities: path selection between end-systems (routing). subnet flow control. fragmentation & reassembly translation between different network types. Issues: packet headers virtual circuits
  • 14. Netprog: OSI Reference Model The Transport Layer Responsibilities: provides virtual end-to-end links between peer processes. end-to-end flow control Issues: headers error detection reliable communication
  • 15. Netprog: OSI Reference Model The Session Layer Responsibilities: establishes, manages, and terminates sessions between applications. service location lookup Many protocol suites do not include a session layer.
  • 16. Netprog: OSI Reference Model The Presentation Layer Responsibilities: data encryption data compression data conversion Many protocol suites do not include a Presentation Layer.
  • 17. Netprog: OSI Reference Model The Application Layer Responsibilities: anything not provided by any of the other layers Issues: application level protocols appropriate selection of “type of service”
  • 18. Netprog: OSI Reference Model Layering & Headers Each layer needs to add some control information to the data in order to do it’s job. This information is typically prepended to the data before being given to the lower layer. Once the lower layers deliver the the data and control information - the peer layer uses the control information.
  • 19. Netprog: OSI Reference Model Headers DATA Process Process Transport Transport DATA H Network Network DATA H H Data Link Data Link DATA H H H
  • 20. Netprog: OSI Reference Model What are the headers? Physical: no header - just a bunch of bits. Data Link: address of the receiving endpoints address of the sending endpoint length of the data checksum.
  • 21.
  • 24.
  • 25. Netprog: OSI Reference Model Connecting Networks Repeater: physical layer Bridge: data link layer Router: network layer Gateway: network layer and above.
  • 26. Netprog: OSI Reference Model Repeater Copies bits from one network to another Does not look at any bits Allows the extension of a network beyond physical length limitations REPEATER
  • 27. Netprog: OSI Reference Model Bridge Copies frames from one network to another Can operate selectively - does not copy all frames (must look at data-link headers). Extends the network beyond physical length limitations. BRIDGE
  • 28. Netprog: OSI Reference Model Router Copies packets from one network to another. Makes decisions about what route a packet should take (looks at network headers). ROUTER
  • 29. Netprog: OSI Reference Model Gateway Operates as a router Data conversions above the network layer. Conversions: encapsulation - use an intermediate network translation - connect different application protocols encrpyption - could be done by a gateway
  • 30. Netprog: OSI Reference Model Encapsulation Example Gateway Gateway Provides service connectivity even though intermediate network does not support protocols.
  • 31. Netprog: OSI Reference Model Translation Gateway Translate from green protocol to brown protocol
  • 32. Netprog: OSI Reference Model Encryption gateway Secure Network Secure Network Encryption/Decryption Gateways ? GW GW ? ? InsecureNetwork
  • 33. Netprog: OSI Reference Model Hardware vs. Software Repeaters are typically hardware devices. Bridges can be implemented in hardware or software. Routers & Gateways are typically implemented in software so that they can be extended to handle new protocols. Many workstations can operate as routers or gateways.
  • 34. Netprog: OSI Reference Model Byte Ordering Different computer architectures use different byte ordering to represent multibyte values. 16 bit integer: Low Byte High Byte Address A High Byte Low Byte Address A+1
  • 35. Netprog: OSI Reference Model Byte Ordering Big-Endian IBM 370 Motorola 68000 Sun Little-Endian IBM 80x86 DEC VAX DEC PDP-11 Low Byte High Byte High Byte Low Byte Addr A Addr A+1 Addr A Addr A+1
  • 36. Netprog: OSI Reference Model Byte Order and Networking Suppose a Big Endian machine sends a 16 bit integer with the value 2: A Little Endian machine will think it got the number 512: 0000000000000010 0000001000000000
  • 37. Netprog: OSI Reference Model Network Byte Order Conversion of application-level data is left up to the presentation layer. But hold on !!! How do lower level layers communicate if they all represent values differently ? (data length fields in headers) A fixed byte order is used (called network byte order) for all control data.
  • 38. Netprog: OSI Reference Model Multiplexing “.. to combine many into one”. Many processes sharing a single network interface. A single process could use multiple protocols. More on this when we look at TCP/IP.
  • 39. Netprog: OSI Reference Model Modes of Service connection-oriented vs. connectionless sequencing error-control flow-control byte stream vs. message based full-duplex vs. half-duplex.
  • 40. Netprog: OSI Reference Model Connection-Oriented vs. Connectionless Service A connection-oriented service includes the establishment of a logical connection between 2 processes. establish logical connection transfer data terminate connection. Connectionless services involve sending of independent messages.
  • 41. Netprog: OSI Reference Model Sequencing Sequencing provides support for an order to communications. A service that includes sequencing requires that messages (or bytes) are received in the same order they are sent.
  • 42. Netprog: OSI Reference Model Error Control Some services require error detection (it is important to know when a transmission error has occured). Checksums provide a simple error detection mechanism. Error control sometimes involves notification and retransmission.
  • 43. Netprog: OSI Reference Model Flow Control Flow control prevents the sending process from overwhelming the receiving process. Flow control can be handled a variety of ways - this is one of the major research issues in the development of the next generation of networks (ATM).
  • 44. Netprog: OSI Reference Model Byte Stream vs. Message Byte stream implies an ordered sequence of bytes with no message boundaries. Message oriented services provide communication service to chunks of data called datagrams.
  • 45. Netprog: OSI Reference Model Full- vs. Half-Duplex Full-Duplex services support the transfer of data in both directions. Half-Duplex services support the transfer of data in a single direction.
  • 46. Netprog: OSI Reference Model End-to-End vs. Hop-toHop Many service modes/features such as flow control and error control can be done either: between endpoints of the communication. -or- between every 2 nodes on the path between the endpoints.
  • 47. Netprog: OSI Reference Model End-to-End Process A Process B
  • 48. Netprog: OSI Reference Model Hop-by-Hop Process A Process B
  • 49. Netprog: OSI Reference Model Buffering Buffering can provide more efficient communications. Buffering is most useful for byte stream services. Process A Process B Send Buffer Recv. Buffer
  • 50. Netprog: OSI Reference Model Addresses Each communication endpoint must have an address. Consider 2 processes communicating over an internet: the network must be specified the host (end-system) must be specified the process must be specified.
  • 51. Netprog: OSI Reference Model Addresses at Layers Physical Layer: no address necessary Data Link Layer - address must be able to select any host on the network. Network Layer - address must be able to provide information to enable routing. Transport Layer - address must identify the destination process.
  • 52. Netprog: OSI Reference Model Broadcasts Many networks support the notion of sending a message from one host to all other hosts on the network. A special address called the “broadcast address” is often used. Some popular network services are based on broadcasting (YP/NIS, rup, rusers)