SlideShare a Scribd company logo
OSI Layers Protocol Functions

Presented by
K.GAYATHRI
OSI Model
 Introduction
The Open Systems Interconnection (OSI) model is a
reference tool for understanding data communications
between any two networked systems.
 Some Benefits of OSI Model
1.Less complex,More quality
2.Easier to learn and Develop
3.Multivendor interoperability
4.Standard interface
5.Troubleshooting.
OSI Model 7 Layers With Protocols
Physical Layer
Purpose
Deals with the transmission of 0s and 1s over the physical media
Translation of bits into signals(Electrical,
Mechanical)
The Physical layer provides specifications for a variety of hardware:
• Cabling
• Connectors
• Network interface cards (NICs)
• Wireless radios
• Hubs
Ethernet
Ethernet is a family of technologies that provides datalink and physical specifications for controlling access to a
shared network medium.
Ethernet has several benefits over other LAN
technologies:
• Simple to install and manage
• Inexpensive
• Flexible and scalable
• Easy to interoperate between vendors
Cabling the LAN
Cabling is an integral part of building any network.

●

Cabling standards are a set of specifications for the installation
and testing of cables.
●

Standards specify types of cables to use in specific
environments, conductor materials, pin outs, wire sizes,
shielding, cable lengths, connector types and performance limits.
●

Media Characteristics:
Cable length

●

Ethernet Cabling Types
Coaxial

●

Fiber Optic

●

Cost

●

Ease of installation

●

Susceptibility to interference

●

Space

●

Category 5 unshielded twisted-pair
cable (Cat 5 UTP)
●
Twisted Pair Cable

●

Twisted pair cable is most
in network installations

commonly used

●

The TIA/EIA organization defines two different patterns, or
wiring schemes, called T568A and T568B.

●

Each wiring scheme defines the pin out, or order of wire
connections, on the end of the cable.

●

There are two types of twisted pair cable STP,UTP

●

(Cat 5 UTP) is mainly used in network installations.
Unshielded Twisted Pair (UTP)

Unshielded twisted-pair cable (UTP) is a four-pair wire medium
used in a variety of networks.
●

TIA/EIA-568-A contains specifications governing cable
performance.
●

RJ-45 connector

●

UTP Cable Types
Straight-Through

●

Crossover

●

Rollover

●

RJ-45 Connector
RJ-45 Connector
Straight-through Cable
A Straight-through cable is the most common cable type.

●

It maps a wire to the same pins on both ends of the cable.

●

Straight-through cables used for following connections,
Switch to router

●

Switch to PC or server

●

Hub to PC or server

●
Crossover Cable
A crossover cable uses both wiring schemes.

●

The wires on the cable are crossed over so that the receive
signal pins on the RJ-45 connector on one end are connected to
the transmit signal pins on the RJ-45 connector on the other end.
●

Crossover cables used for following connections,
Switch to switch

●

Switch to hub

●

Hub to hub

●

Router to router

●

PC to PC

●

Router to PC

●
Rollover Cable
Rollover cable (also known as Cisco console cable) is a type of
null-modem cable that is most commonly used to connect a
computer terminal to a router's console port.
●

Cisco routers and switches are normally configured over their
console ports.
●

The pin outs on one end are reversed from the other, as if the
wire had been rolled over and you were viewing it from the other
side.
●

Rollover cables used for following connections
Connect a terminal to a console port.

●
Wireless Network
802.11 standard specifies the operating parameters of
wireless local area networks (WLAN)
●

The 802.11 wireless networks operate in two basic modes:
1.Infrastructure mode
2.Ad-hoc mode

Infrastructure Mode
Infrastructure Mode
Wireless Network Security
Wired Equivalent Privacy (WEP): The original encryption protocol developed
for wireless networks.
WEP encryption is based on the RC4 stream cipher–operation

●

Wi-Fi Protected Access (WPA):Most current WPA implementations use a
preshared key (PSK), commonly referred to as WPA Personal, and the Temporal
Key Integrity Protocol (TKIP, pronounced tee-kip) for encryption.
WPA Enterprise uses an authentication server to generate keys or certificates

●

Wi-Fi Protected Access version 2 (WPA2): Based on the 802.11i wireless
security standard.
The most significant enhancement to WPA2 over WPA is the use of the
Advanced Encryption Standard (AES) for encryption
●
WEP vs WPA vs WPA2

WEP WPA WPA2
ENCRYPTION

RC4

RC4

AES

KEY ROTATION

NONE

Dynamic
Session Keys

Dynamic
Session Keys

KEY
DISTRIBUTION

Manually typed
into each device

Automatic
distribution
available

Automatic
distribution
available

AUTHENTICATIO Uses WEP key as Can use 802.1x Can use 802.1x
Authentication
& EAP
& EAP
N
Data Link Layer
Switching-Providing MAC address

●

Framing-Send blocks of data (frames) between
physical devices
●

Dealing with transmission errors(Node-Node
Error Control)
●

Regulating data flow(Flow control)

●

It mainly uses the hardware device Switches.

●
Switches
Switches do following functions,
• Hardware address learning
• Intelligent forwarding of frames
• Loop avoidance
Switches support three methods of forwarding frames.
Store-and-Forward method
Cut-Through (Real Time) method
Fragment-Free (Modified Cut-Through) method
Spanning Tree Protocol(STP)
Switches (and bridges) needed a mechanism to prevent loops from forming.



Switches utilize the Spanning Tree Protocol (STP) to maintain a loop-free
environment.


STP Process
To maintain a loop-free environment, STP performs the following functions:
• A Root Bridge is elected
• Root Ports are identified
• Designated Ports are identified
• If a loop exists, a port is placed in Blocking state. If the loop is
removed the blocked port is activated again.
STP Process
Point to Point protocol
PPP is a data-link layer protocol, PPP uses a stack of
other protocols to establish the link, to authenticate
the parties involved, and to carry the network layer
data.
Three sets of protocols are used by PPP:
●

Link control protocol

Authentication protocol

●

Network control protocol

●
Link Control Protocol (LCP)
It is responsible for establishing, maintaining, configuring, and
terminating links.
●

It also provides negotiation mechanisms to set options between
endpoints.
●

Both endpoints of the link must reach an agreement about the
options before the link can be established.
●

When PPP is carrying an LCP packet, it is either in the
establishing state or in the terminating state.
●

All LCP packets are carried in the data field of the PPP frame.

●
Authentication Protocols
Authentication plays a very important role in PPP
because PPP is designed for use over dial-up links
where verification of user identity is necessary.
●

Authentication means validating the identity of a
user who needs to access a set of resources.
●

PPP uses two protocols for authentication: Password
Authentication Protocol (PAP)
●

Challenge Handshake Authentication Protocol
(CHAP)
●
Password Authentication Protocol (PAP)
The user who wants to access a system sends an ID
(identification) and a password.
The system checks the validity of the identification and
password and either accepts or denies a connection.
Challenge Handshake Authentication Protocol (CHAP)

The CHAP protocol is a three-way handshaking
authentication protocol that provides greater security than
PAP.
In this method, the password is kept secret; it is never sent
on-line.
Network Control Protocol (NCP)
After the link is established and authentication (if
any) is successful, the connection goes on the
networking state.
●

NCP is a set of control protocols to allow the
encapsulation of data coming from network layer
protocols into the PPP frame.
●

The set of packets that establish and terminate a
network layer connection is called Internetwork
Protocol Control Protocol (IPCP).
●
NCP Example
Network Layer
Routing and Forwarding

●

Logical addressing

●

Transport packet from sending to receiving hosts

●

A logical address contains two components:
• Network ID – identifies which network a host belongs to.
• Host ID – uniquely identifies the host on that network.
Logical addressing protocols include
Internetwork Packet Exchange (IPX)

●

Internet Protocol (IP).

●
IPv4 address Classes
Class First

Octet Range

Default Subnet Mask

Class A

1 – 126

255.0.0.0

Class B

128 – 191

255.255.0.0

Class C

192 – 223

255.255.255.0

Class D

224 – 239

-

Class E

240 – 255

-

Ranges 127.x.x.x are reserved for the loopback or localhost.

●

127.0.0.1 is a comman Loopback address.

●
Routing And Forwarding
Routing algorithm determines
end-end-path through network

routing algorithm

Forwarding table determines
local forwarding at this router

local forwarding table
header value output link
0100
0101
0111
1001

3
2
2
1

value in arriving
packet’s header
0111

Routing-Determine
route taken by
packets from source
to destination

1
3 2

ForwardingMove packets from
router’s input to
appropriate router
output
Transport Layer
This layer is responsible for the reliable transfer of data, by ensuring that
data arrives at its destination error-free and in order.
It provides Port number to specifies the Application.
It is Host-to-Host layer.
Transport layer communication falls under two categories:
• Connection-oriented – requires that a connection with specific agreedupon parameters be established before data is sent.(TCP)
• Connectionless – requires no connection before data is sent.(UDP)
Some common Port numbers
Port Number

Transport Protocol

Application

20, 21

TCP

FTP

22

TCP

SSH

23

TCP

Telnet

25

TCP

SMTP

53

TCP/UDP

DNS

80

TCP

HTTP

110

TCP

POP3

443

TCP

SSL

666

TCP

Doom
Transmission Control Protocol(TCP)
Connection establishment – connections are established,
maintained, and ultimately terminated between devices.
●

Segmentation and sequencing – data is segmented into
smaller pieces for transport. Each segment is assigned a
sequence number, so that the receiving device can reassemble
the data on arrival.
●

Acknowledgments – receipt of data is confirmed through the
use of acknowledgments. If a segment is lost, data can be
retransmitted to guarantee delivery.
●

Flow control (or windowing) – data transfer rate is negotiated
to prevent congestion.
●

Connection Termination.

●
TCP Process

Segment N

H

Segment 1

H
User Datagram Protocol(UDP)
The User Datagram Protocol (UDP) is a
connectionless,unreliable transport protocol.
●

UDP experiences less latency(High speed transmission)

●

It provides no three-way handshake, no flow-control, no
sequencing, and no acknowledgment of data receipt.
●

UDP essentially forwards the segment

●

UDP ideal for applications that require speed over
reliability. For example, DNS primarily uses UDP as its
transport protocol
●
Session Layer
The session layer is responsible for dialog
control and synchronization.
●

The session layer defines how to start, control and end
conversations (called sessions) between applications.
●

This includes starting, stopping, and re-synchronizing
communications between applications on two computers.
●

The session layer offers provisions for efficient data transfer.

●

Session layer Protocols,
Structured Query Language (SQL)

●

Remote Procedure Call (RPC)

●

Network File system(NFS)

●
Basic Functions for the Session Layer
Managing multiple sessions
A computer can establish multiple sessions with several other
computers
e.g., session 1: exchanging information over the World Wide Web with
www.yahoo.com
session 2: exchanging information over the World Wide Web with www.google.com
session 3: exchanging information over the World Wide Web with www.espn.com

Two computers can also establish multiple sessions,
e.g., function 1: exchanging information over the World Wide Web;
function 2: exchanging information over the FTP;
function 3: exchanging information over the email
Session layer Examples

Software
news
music
Presentation Layer
The presentation layer is responsible for translation, compression,
and encryption.
This layer controls the formatting and syntax of user data for the
application layer.
 This ensures that data from the sending application can be
understood by the receiving application.
Examples of Presentation layer formats include:
• Text - RTF, ASCII, EBCDIC
• Images - GIF, JPG, TIF
• Audio - MIDI, MP3, WAV
• Movies - MPEG, AVI, MOV
Presentation Layer Protocols
●This layer has two protocols for secure purpose of transmission
1.Transport layer Security Protocols(TLS)
●The primary goal of the TLS protocol is to provide privacy and
data integrity between two communicating applications”
●In practice, used to protect information transmitted between
browsers and Web servers
2.Secured Socket Layer protocols(SSL)
●SSL is an Internet security protocol used by Internet browsers
and Web servers to transmit sensitive information.
●Both protocols works on three features like Confidentiality,
integrity, and Availability.
SSL/TLS
Cryptography
Cryptography is the practice and study of hiding information.
It is the Art or Science of converting a plain intelligible data
into an unintelligible data and again retransforming that
message into its original form.
It provides Confidentiality, Integrity, Accuracy.
Encryption –The process of converting plain text into an
unintelligible format (cipher text) is called Encryption.
Decryption –The process of converting cipher text into a plain
text is called Decryption
Symmetric And Asymmetric Key Methods
Symmetric Key
Cryptography (Secret Key
Cryptography)

Asymmetric Key Cryptography
(Public Key Cryptography)

Same Key is used by both
parties

Users get the Key from an
Certificate Authority

Advantages

Advantages

Simpler and Faster

More Secured

Disadvantages

Authentication

Less Secured

2 different keys are used

Disadvantages
Relatively Complex
Application Layer
It mainly provides user interface

●

Everything at this layer is application-specific.

●

This layer provides application services for file transfers, email, and other network software services
●

This layer handles issues like network transparency,
resource allocation and problem partitioning.
●
Application Layer Protocols
DNS- Domain Name system
HTTP - Hyper Text Transfer Protocol
FTP - File Transfer Protocol
POP 3-Post Office Protocol
IMAP- Internet Message Access protocol
SMTP - Simple Mail Transfer Protocol
Telnet - Remote Access
Domain Name system(DNS)
DNS is a host name to IP address translation service.

●

DNS is a distributed database implemented in a hierarchy of
name servers.
●

An application level protocol for message exchange between
clients and servers.
●

Root DNS Servers

com DNS servers
yahoo.com

amazon.com

DNS servers DNS servers

org DNS servers

edu DNS servers

pbs.org

poly.edu

umass.edu

DNS servers

DNS serversDNS servers
DNS Process
Hyper Text Transfer Protocol(HTTP)
HTTP is the protocol that supports communication between
web browsers and web servers
●

It provides web services.

●

HTTP can support multiple request-reply exchanges over a
single TCP connection.
●

The “well known” TCP port

●

for HTTP servers is port 80.
File Transfer Protocol(FTP)
File Transfer Protocol (FTP) is the standard mechanism
provided by TCP/IP for copying a file from one host to
another.
FTP uses the services of TCP. It needs two TCP connections.
The well-known port 21 is used for the control connection
and the well-known port 20 for the data connection.
Electronics Mail(SMTP,POP3,IMAP)
SMTP-Uses TCP to reliably transfer email

●

message from client to server, port 25.
It is a push protocol; it pushes the message from the client to
the server.
●

POP- Protocol used to retrieve email from a mail server.

●

It stores and forwards messages

●

IMAP- Keep all messages in one place(The server).

●

Allows user to organize messages in folders.

●
Electronics Mailing

Internet

Internet Message
Access Protocol

SMTP

IMAP

Mail Server
IMAP
store

POP
Store
POP
SMTP
Mail
Client

Mail
Client
SMTP
Telnet
It is the standard TCP/IP protocol

●

Telnet allows a user to log into a computer across an internet.

●

Telnet establishes a TCP connection and then passes keystrokes
from the users keyboard directly to the remote computer .
●

Telnet offers three basic services .
1. It defines a network virtual terminal that provides a standard
interface to remote systems.
2. Telnet includes a mechanism that allows the client and server to
negotiate options .
3. Telnet treats both ends of the connection symmetrically.
TELNET Operation
THANK

YOU

More Related Content

What's hot

BASICS OF ROUTING IN NETWORKS
BASICS OF ROUTING IN NETWORKSBASICS OF ROUTING IN NETWORKS
BASICS OF ROUTING IN NETWORKS
KABILESH RAMAR
 
Subnetting Presentation
Subnetting PresentationSubnetting Presentation
Subnetting PresentationTouhidul Fahim
 
Network layer tanenbaum
Network layer tanenbaumNetwork layer tanenbaum
Network layer tanenbaum
Mahesh Kumar Chelimilla
 
Presentation on arp protocol
Presentation on arp protocolPresentation on arp protocol
Presentation on arp protocol
Mohd. Ahmad Siddiqi
 
Networking devices
Networking devicesNetworking devices
Networking devicesrupinderj
 
Congestion control
Congestion controlCongestion control
Congestion control
Aman Jaiswal
 
QOS (Quality of Services) - Computer Networks
 QOS (Quality of Services) - Computer Networks QOS (Quality of Services) - Computer Networks
QOS (Quality of Services) - Computer Networks
IIIT Manipur
 
Introduction to Data Communication
Introduction to Data CommunicationIntroduction to Data Communication
Introduction to Data Communication
Kamal Acharya
 
Chapter 6
Chapter 6Chapter 6
Chapter 6
Faisal Mehmood
 
Osi model
Osi modelOsi model
Osi model
Online
 
Routing algorithms
Routing algorithmsRouting algorithms
Routing algorithms
Parameswaran Selvakumar
 
Point to-point protocol (ppp)
Point to-point protocol (ppp)Point to-point protocol (ppp)
Point to-point protocol (ppp)
Kongu Engineering College, Perundurai, Erode
 
Ethernet and token ring
Ethernet and token ringEthernet and token ring
Ethernet and token ringAbhijeet Shah
 
OsI reference model
OsI reference modelOsI reference model
OsI reference model
LakshmiSamivel
 
Qos Quality of services
Qos   Quality of services Qos   Quality of services
Qos Quality of services
HayderThary
 
Network Layer
Network LayerNetwork Layer
Network Layer
Rutwik Jadhav
 
Chapter 2 - Network Models
Chapter 2 - Network ModelsChapter 2 - Network Models
Chapter 2 - Network ModelsWayne Jones Jnr
 
Osi model
Osi modelOsi model

What's hot (20)

BASICS OF ROUTING IN NETWORKS
BASICS OF ROUTING IN NETWORKSBASICS OF ROUTING IN NETWORKS
BASICS OF ROUTING IN NETWORKS
 
Subnetting Presentation
Subnetting PresentationSubnetting Presentation
Subnetting Presentation
 
Hub vs-switch
Hub vs-switchHub vs-switch
Hub vs-switch
 
Network layer tanenbaum
Network layer tanenbaumNetwork layer tanenbaum
Network layer tanenbaum
 
Presentation on arp protocol
Presentation on arp protocolPresentation on arp protocol
Presentation on arp protocol
 
Networking devices
Networking devicesNetworking devices
Networking devices
 
Congestion control
Congestion controlCongestion control
Congestion control
 
QOS (Quality of Services) - Computer Networks
 QOS (Quality of Services) - Computer Networks QOS (Quality of Services) - Computer Networks
QOS (Quality of Services) - Computer Networks
 
Introduction to Data Communication
Introduction to Data CommunicationIntroduction to Data Communication
Introduction to Data Communication
 
Chapter 6
Chapter 6Chapter 6
Chapter 6
 
Osi model
Osi modelOsi model
Osi model
 
Routing algorithms
Routing algorithmsRouting algorithms
Routing algorithms
 
Point to-point protocol (ppp)
Point to-point protocol (ppp)Point to-point protocol (ppp)
Point to-point protocol (ppp)
 
Ethernet and token ring
Ethernet and token ringEthernet and token ring
Ethernet and token ring
 
OsI reference model
OsI reference modelOsI reference model
OsI reference model
 
Qos Quality of services
Qos   Quality of services Qos   Quality of services
Qos Quality of services
 
Network Layer
Network LayerNetwork Layer
Network Layer
 
The medium access sublayer
 The medium  access sublayer The medium  access sublayer
The medium access sublayer
 
Chapter 2 - Network Models
Chapter 2 - Network ModelsChapter 2 - Network Models
Chapter 2 - Network Models
 
Osi model
Osi modelOsi model
Osi model
 

Viewers also liked

OSI (open systems interconnection) Model
OSI (open systems interconnection) ModelOSI (open systems interconnection) Model
OSI (open systems interconnection) Model
Netwax Lab
 
20 Network Layer_Internet_Protocol
20 Network Layer_Internet_Protocol20 Network Layer_Internet_Protocol
20 Network Layer_Internet_Protocol
Ahmar Hashmi
 
Wi-Fi security – WEP, WPA and WPA2
Wi-Fi security – WEP, WPA and WPA2Wi-Fi security – WEP, WPA and WPA2
Wi-Fi security – WEP, WPA and WPA2Fábio Afonso
 
Wireless Cracking using Kali
Wireless Cracking using KaliWireless Cracking using Kali
Wireless Cracking using Kali
n|u - The Open Security Community
 
802.11r Explained.
802.11r Explained. 802.11r Explained.
802.11r Explained.
Ajay Gupta
 
Wpa vs Wpa2
Wpa vs Wpa2Wpa vs Wpa2
Wpa vs Wpa2
Nzava Luwawa
 
Data communication and communication Media
Data communication and communication Media Data communication and communication Media
Data communication and communication Media
TouQeer Ali Abbasi
 
Scada
ScadaScada
Scada
hamada13
 
Team 5 presentation
Team 5 presentationTeam 5 presentation
Team 5 presentation
rob420
 
CCN -UNIT 1 PDF Notes for 7th EC
CCN -UNIT 1 PDF Notes for 7th ECCCN -UNIT 1 PDF Notes for 7th EC
CCN -UNIT 1 PDF Notes for 7th EC
SURESHA V
 
Introduction to the OSI 7 layer model and Data Link Layer
Introduction to the OSI 7 layer model and Data Link LayerIntroduction to the OSI 7 layer model and Data Link Layer
Introduction to the OSI 7 layer model and Data Link LayerVNIT-ACM Student Chapter
 
OSI Network model ppt
OSI Network model pptOSI Network model ppt
OSI Network model pptextraganesh
 
Networking and communications security – network architecture design
Networking and communications security – network architecture designNetworking and communications security – network architecture design
Networking and communications security – network architecture design
EnterpriseGRC Solutions, Inc.
 
CCNA Introducing Networks
CCNA Introducing NetworksCCNA Introducing Networks
CCNA Introducing NetworksDsunte Wilson
 
Introduction to information technology lecture 1
Introduction to information technology lecture 1Introduction to information technology lecture 1
Introduction to information technology lecture 1adpafit
 
Network topology.ppt
Network topology.pptNetwork topology.ppt
Network topology.ppt
Siddique Ibrahim
 

Viewers also liked (20)

OSI (open systems interconnection) Model
OSI (open systems interconnection) ModelOSI (open systems interconnection) Model
OSI (open systems interconnection) Model
 
20 Network Layer_Internet_Protocol
20 Network Layer_Internet_Protocol20 Network Layer_Internet_Protocol
20 Network Layer_Internet_Protocol
 
Divya
DivyaDivya
Divya
 
Wi-Fi security – WEP, WPA and WPA2
Wi-Fi security – WEP, WPA and WPA2Wi-Fi security – WEP, WPA and WPA2
Wi-Fi security – WEP, WPA and WPA2
 
Wireless Cracking using Kali
Wireless Cracking using KaliWireless Cracking using Kali
Wireless Cracking using Kali
 
802.11r Explained.
802.11r Explained. 802.11r Explained.
802.11r Explained.
 
Wpa vs Wpa2
Wpa vs Wpa2Wpa vs Wpa2
Wpa vs Wpa2
 
WPA2
WPA2WPA2
WPA2
 
Data communication and communication Media
Data communication and communication Media Data communication and communication Media
Data communication and communication Media
 
Scada
ScadaScada
Scada
 
Team 5 presentation
Team 5 presentationTeam 5 presentation
Team 5 presentation
 
CCN -UNIT 1 PDF Notes for 7th EC
CCN -UNIT 1 PDF Notes for 7th ECCCN -UNIT 1 PDF Notes for 7th EC
CCN -UNIT 1 PDF Notes for 7th EC
 
Introduction to the OSI 7 layer model and Data Link Layer
Introduction to the OSI 7 layer model and Data Link LayerIntroduction to the OSI 7 layer model and Data Link Layer
Introduction to the OSI 7 layer model and Data Link Layer
 
OSI Network model ppt
OSI Network model pptOSI Network model ppt
OSI Network model ppt
 
TCP/IP(networking)
TCP/IP(networking)TCP/IP(networking)
TCP/IP(networking)
 
Networking and communications security – network architecture design
Networking and communications security – network architecture designNetworking and communications security – network architecture design
Networking and communications security – network architecture design
 
Osi model
Osi modelOsi model
Osi model
 
CCNA Introducing Networks
CCNA Introducing NetworksCCNA Introducing Networks
CCNA Introducing Networks
 
Introduction to information technology lecture 1
Introduction to information technology lecture 1Introduction to information technology lecture 1
Introduction to information technology lecture 1
 
Network topology.ppt
Network topology.pptNetwork topology.ppt
Network topology.ppt
 

Similar to Networking- OSI Layer Protocol Functions

Networking essentials lect1
Networking essentials lect1Networking essentials lect1
Networking essentials lect1
Roman Brovko
 
G3 phase1 final ppt.pptx
G3 phase1 final ppt.pptxG3 phase1 final ppt.pptx
G3 phase1 final ppt.pptx
visheshs4
 
COMPUTER NETWORKING
COMPUTER NETWORKINGCOMPUTER NETWORKING
COMPUTER NETWORKING
Kiran Buriro
 
Final_IoT_Protocol Stack.pptx
Final_IoT_Protocol Stack.pptxFinal_IoT_Protocol Stack.pptx
Final_IoT_Protocol Stack.pptx
jainam bhavsar
 
unit2-210710110327.pptx
unit2-210710110327.pptxunit2-210710110327.pptx
unit2-210710110327.pptx
LAVANYAsrietacin
 
Web technologies: recap on TCP-IP
Web technologies: recap on TCP-IPWeb technologies: recap on TCP-IP
Web technologies: recap on TCP-IPPiero Fraternali
 
Module 1 slides
Module 1 slidesModule 1 slides
Module 1 slides
AnaniaKapala
 
MVA slides lesson 2
MVA slides lesson 2MVA slides lesson 2
Network architecure (3).pptx
Network architecure (3).pptxNetwork architecure (3).pptx
Network architecure (3).pptx
Kaythry P
 
TCP/IP model
TCP/IP modelTCP/IP model
TCP/IP model
Krishnkant Pandey
 
Protocol.ppt
Protocol.pptProtocol.ppt
Protocol.ppt
amuthadeepa
 
CISSP - Chapter 4 - Network Fundamental
CISSP - Chapter 4 - Network FundamentalCISSP - Chapter 4 - Network Fundamental
CISSP - Chapter 4 - Network Fundamental
Karthikeyan Dhayalan
 
ccna presentation 2013
ccna presentation 2013ccna presentation 2013
ccna presentation 2013RoHit VashIsht
 
Protocol and Interfaces - IPv4, IPv6, X.25 Protocol, X.75 Protocol
Protocol and Interfaces - IPv4, IPv6, X.25 Protocol, X.75 ProtocolProtocol and Interfaces - IPv4, IPv6, X.25 Protocol, X.75 Protocol
Protocol and Interfaces - IPv4, IPv6, X.25 Protocol, X.75 Protocol
Pradnya Saval
 
Protocols and Interfaces - IPv4, IPv6, X.25, X.75
Protocols and Interfaces - IPv4, IPv6, X.25, X.75Protocols and Interfaces - IPv4, IPv6, X.25, X.75
Protocols and Interfaces - IPv4, IPv6, X.25, X.75
Pradnya Saval
 
21 Scheme_ MODULE-3_CCN.pdf
21 Scheme_ MODULE-3_CCN.pdf21 Scheme_ MODULE-3_CCN.pdf
21 Scheme_ MODULE-3_CCN.pdf
Dr. Shivashankar
 
Bhargava Presentation.ppt
Bhargava Presentation.pptBhargava Presentation.ppt
Bhargava Presentation.ppt
EnumulaBhargava1
 
Bhargava Presentation.ppt
Bhargava Presentation.pptBhargava Presentation.ppt
Bhargava Presentation.ppt
EnumulaBhargava1
 

Similar to Networking- OSI Layer Protocol Functions (20)

Networking essentials lect1
Networking essentials lect1Networking essentials lect1
Networking essentials lect1
 
Cisco CCNA module 10
Cisco CCNA module 10Cisco CCNA module 10
Cisco CCNA module 10
 
G3 phase1 final ppt.pptx
G3 phase1 final ppt.pptxG3 phase1 final ppt.pptx
G3 phase1 final ppt.pptx
 
COMPUTER NETWORKING
COMPUTER NETWORKINGCOMPUTER NETWORKING
COMPUTER NETWORKING
 
Final_IoT_Protocol Stack.pptx
Final_IoT_Protocol Stack.pptxFinal_IoT_Protocol Stack.pptx
Final_IoT_Protocol Stack.pptx
 
CCNA 1
CCNA 1CCNA 1
CCNA 1
 
unit2-210710110327.pptx
unit2-210710110327.pptxunit2-210710110327.pptx
unit2-210710110327.pptx
 
Web technologies: recap on TCP-IP
Web technologies: recap on TCP-IPWeb technologies: recap on TCP-IP
Web technologies: recap on TCP-IP
 
Module 1 slides
Module 1 slidesModule 1 slides
Module 1 slides
 
MVA slides lesson 2
MVA slides lesson 2MVA slides lesson 2
MVA slides lesson 2
 
Network architecure (3).pptx
Network architecure (3).pptxNetwork architecure (3).pptx
Network architecure (3).pptx
 
TCP/IP model
TCP/IP modelTCP/IP model
TCP/IP model
 
Protocol.ppt
Protocol.pptProtocol.ppt
Protocol.ppt
 
CISSP - Chapter 4 - Network Fundamental
CISSP - Chapter 4 - Network FundamentalCISSP - Chapter 4 - Network Fundamental
CISSP - Chapter 4 - Network Fundamental
 
ccna presentation 2013
ccna presentation 2013ccna presentation 2013
ccna presentation 2013
 
Protocol and Interfaces - IPv4, IPv6, X.25 Protocol, X.75 Protocol
Protocol and Interfaces - IPv4, IPv6, X.25 Protocol, X.75 ProtocolProtocol and Interfaces - IPv4, IPv6, X.25 Protocol, X.75 Protocol
Protocol and Interfaces - IPv4, IPv6, X.25 Protocol, X.75 Protocol
 
Protocols and Interfaces - IPv4, IPv6, X.25, X.75
Protocols and Interfaces - IPv4, IPv6, X.25, X.75Protocols and Interfaces - IPv4, IPv6, X.25, X.75
Protocols and Interfaces - IPv4, IPv6, X.25, X.75
 
21 Scheme_ MODULE-3_CCN.pdf
21 Scheme_ MODULE-3_CCN.pdf21 Scheme_ MODULE-3_CCN.pdf
21 Scheme_ MODULE-3_CCN.pdf
 
Bhargava Presentation.ppt
Bhargava Presentation.pptBhargava Presentation.ppt
Bhargava Presentation.ppt
 
Bhargava Presentation.ppt
Bhargava Presentation.pptBhargava Presentation.ppt
Bhargava Presentation.ppt
 

Recently uploaded

Assuring Contact Center Experiences for Your Customers With ThousandEyes
Assuring Contact Center Experiences for Your Customers With ThousandEyesAssuring Contact Center Experiences for Your Customers With ThousandEyes
Assuring Contact Center Experiences for Your Customers With ThousandEyes
ThousandEyes
 
Securing your Kubernetes cluster_ a step-by-step guide to success !
Securing your Kubernetes cluster_ a step-by-step guide to success !Securing your Kubernetes cluster_ a step-by-step guide to success !
Securing your Kubernetes cluster_ a step-by-step guide to success !
KatiaHIMEUR1
 
Neuro-symbolic is not enough, we need neuro-*semantic*
Neuro-symbolic is not enough, we need neuro-*semantic*Neuro-symbolic is not enough, we need neuro-*semantic*
Neuro-symbolic is not enough, we need neuro-*semantic*
Frank van Harmelen
 
The Art of the Pitch: WordPress Relationships and Sales
The Art of the Pitch: WordPress Relationships and SalesThe Art of the Pitch: WordPress Relationships and Sales
The Art of the Pitch: WordPress Relationships and Sales
Laura Byrne
 
From Daily Decisions to Bottom Line: Connecting Product Work to Revenue by VP...
From Daily Decisions to Bottom Line: Connecting Product Work to Revenue by VP...From Daily Decisions to Bottom Line: Connecting Product Work to Revenue by VP...
From Daily Decisions to Bottom Line: Connecting Product Work to Revenue by VP...
Product School
 
Essentials of Automations: Optimizing FME Workflows with Parameters
Essentials of Automations: Optimizing FME Workflows with ParametersEssentials of Automations: Optimizing FME Workflows with Parameters
Essentials of Automations: Optimizing FME Workflows with Parameters
Safe Software
 
FIDO Alliance Osaka Seminar: Passkeys at Amazon.pdf
FIDO Alliance Osaka Seminar: Passkeys at Amazon.pdfFIDO Alliance Osaka Seminar: Passkeys at Amazon.pdf
FIDO Alliance Osaka Seminar: Passkeys at Amazon.pdf
FIDO Alliance
 
Bits & Pixels using AI for Good.........
Bits & Pixels using AI for Good.........Bits & Pixels using AI for Good.........
Bits & Pixels using AI for Good.........
Alison B. Lowndes
 
How world-class product teams are winning in the AI era by CEO and Founder, P...
How world-class product teams are winning in the AI era by CEO and Founder, P...How world-class product teams are winning in the AI era by CEO and Founder, P...
How world-class product teams are winning in the AI era by CEO and Founder, P...
Product School
 
De-mystifying Zero to One: Design Informed Techniques for Greenfield Innovati...
De-mystifying Zero to One: Design Informed Techniques for Greenfield Innovati...De-mystifying Zero to One: Design Informed Techniques for Greenfield Innovati...
De-mystifying Zero to One: Design Informed Techniques for Greenfield Innovati...
Product School
 
JMeter webinar - integration with InfluxDB and Grafana
JMeter webinar - integration with InfluxDB and GrafanaJMeter webinar - integration with InfluxDB and Grafana
JMeter webinar - integration with InfluxDB and Grafana
RTTS
 
Dev Dives: Train smarter, not harder – active learning and UiPath LLMs for do...
Dev Dives: Train smarter, not harder – active learning and UiPath LLMs for do...Dev Dives: Train smarter, not harder – active learning and UiPath LLMs for do...
Dev Dives: Train smarter, not harder – active learning and UiPath LLMs for do...
UiPathCommunity
 
Epistemic Interaction - tuning interfaces to provide information for AI support
Epistemic Interaction - tuning interfaces to provide information for AI supportEpistemic Interaction - tuning interfaces to provide information for AI support
Epistemic Interaction - tuning interfaces to provide information for AI support
Alan Dix
 
Key Trends Shaping the Future of Infrastructure.pdf
Key Trends Shaping the Future of Infrastructure.pdfKey Trends Shaping the Future of Infrastructure.pdf
Key Trends Shaping the Future of Infrastructure.pdf
Cheryl Hung
 
Mission to Decommission: Importance of Decommissioning Products to Increase E...
Mission to Decommission: Importance of Decommissioning Products to Increase E...Mission to Decommission: Importance of Decommissioning Products to Increase E...
Mission to Decommission: Importance of Decommissioning Products to Increase E...
Product School
 
LF Energy Webinar: Electrical Grid Modelling and Simulation Through PowSyBl -...
LF Energy Webinar: Electrical Grid Modelling and Simulation Through PowSyBl -...LF Energy Webinar: Electrical Grid Modelling and Simulation Through PowSyBl -...
LF Energy Webinar: Electrical Grid Modelling and Simulation Through PowSyBl -...
DanBrown980551
 
Transcript: Selling digital books in 2024: Insights from industry leaders - T...
Transcript: Selling digital books in 2024: Insights from industry leaders - T...Transcript: Selling digital books in 2024: Insights from industry leaders - T...
Transcript: Selling digital books in 2024: Insights from industry leaders - T...
BookNet Canada
 
Leading Change strategies and insights for effective change management pdf 1.pdf
Leading Change strategies and insights for effective change management pdf 1.pdfLeading Change strategies and insights for effective change management pdf 1.pdf
Leading Change strategies and insights for effective change management pdf 1.pdf
OnBoard
 
GenAISummit 2024 May 28 Sri Ambati Keynote: AGI Belongs to The Community in O...
GenAISummit 2024 May 28 Sri Ambati Keynote: AGI Belongs to The Community in O...GenAISummit 2024 May 28 Sri Ambati Keynote: AGI Belongs to The Community in O...
GenAISummit 2024 May 28 Sri Ambati Keynote: AGI Belongs to The Community in O...
Sri Ambati
 
UiPath Test Automation using UiPath Test Suite series, part 4
UiPath Test Automation using UiPath Test Suite series, part 4UiPath Test Automation using UiPath Test Suite series, part 4
UiPath Test Automation using UiPath Test Suite series, part 4
DianaGray10
 

Recently uploaded (20)

Assuring Contact Center Experiences for Your Customers With ThousandEyes
Assuring Contact Center Experiences for Your Customers With ThousandEyesAssuring Contact Center Experiences for Your Customers With ThousandEyes
Assuring Contact Center Experiences for Your Customers With ThousandEyes
 
Securing your Kubernetes cluster_ a step-by-step guide to success !
Securing your Kubernetes cluster_ a step-by-step guide to success !Securing your Kubernetes cluster_ a step-by-step guide to success !
Securing your Kubernetes cluster_ a step-by-step guide to success !
 
Neuro-symbolic is not enough, we need neuro-*semantic*
Neuro-symbolic is not enough, we need neuro-*semantic*Neuro-symbolic is not enough, we need neuro-*semantic*
Neuro-symbolic is not enough, we need neuro-*semantic*
 
The Art of the Pitch: WordPress Relationships and Sales
The Art of the Pitch: WordPress Relationships and SalesThe Art of the Pitch: WordPress Relationships and Sales
The Art of the Pitch: WordPress Relationships and Sales
 
From Daily Decisions to Bottom Line: Connecting Product Work to Revenue by VP...
From Daily Decisions to Bottom Line: Connecting Product Work to Revenue by VP...From Daily Decisions to Bottom Line: Connecting Product Work to Revenue by VP...
From Daily Decisions to Bottom Line: Connecting Product Work to Revenue by VP...
 
Essentials of Automations: Optimizing FME Workflows with Parameters
Essentials of Automations: Optimizing FME Workflows with ParametersEssentials of Automations: Optimizing FME Workflows with Parameters
Essentials of Automations: Optimizing FME Workflows with Parameters
 
FIDO Alliance Osaka Seminar: Passkeys at Amazon.pdf
FIDO Alliance Osaka Seminar: Passkeys at Amazon.pdfFIDO Alliance Osaka Seminar: Passkeys at Amazon.pdf
FIDO Alliance Osaka Seminar: Passkeys at Amazon.pdf
 
Bits & Pixels using AI for Good.........
Bits & Pixels using AI for Good.........Bits & Pixels using AI for Good.........
Bits & Pixels using AI for Good.........
 
How world-class product teams are winning in the AI era by CEO and Founder, P...
How world-class product teams are winning in the AI era by CEO and Founder, P...How world-class product teams are winning in the AI era by CEO and Founder, P...
How world-class product teams are winning in the AI era by CEO and Founder, P...
 
De-mystifying Zero to One: Design Informed Techniques for Greenfield Innovati...
De-mystifying Zero to One: Design Informed Techniques for Greenfield Innovati...De-mystifying Zero to One: Design Informed Techniques for Greenfield Innovati...
De-mystifying Zero to One: Design Informed Techniques for Greenfield Innovati...
 
JMeter webinar - integration with InfluxDB and Grafana
JMeter webinar - integration with InfluxDB and GrafanaJMeter webinar - integration with InfluxDB and Grafana
JMeter webinar - integration with InfluxDB and Grafana
 
Dev Dives: Train smarter, not harder – active learning and UiPath LLMs for do...
Dev Dives: Train smarter, not harder – active learning and UiPath LLMs for do...Dev Dives: Train smarter, not harder – active learning and UiPath LLMs for do...
Dev Dives: Train smarter, not harder – active learning and UiPath LLMs for do...
 
Epistemic Interaction - tuning interfaces to provide information for AI support
Epistemic Interaction - tuning interfaces to provide information for AI supportEpistemic Interaction - tuning interfaces to provide information for AI support
Epistemic Interaction - tuning interfaces to provide information for AI support
 
Key Trends Shaping the Future of Infrastructure.pdf
Key Trends Shaping the Future of Infrastructure.pdfKey Trends Shaping the Future of Infrastructure.pdf
Key Trends Shaping the Future of Infrastructure.pdf
 
Mission to Decommission: Importance of Decommissioning Products to Increase E...
Mission to Decommission: Importance of Decommissioning Products to Increase E...Mission to Decommission: Importance of Decommissioning Products to Increase E...
Mission to Decommission: Importance of Decommissioning Products to Increase E...
 
LF Energy Webinar: Electrical Grid Modelling and Simulation Through PowSyBl -...
LF Energy Webinar: Electrical Grid Modelling and Simulation Through PowSyBl -...LF Energy Webinar: Electrical Grid Modelling and Simulation Through PowSyBl -...
LF Energy Webinar: Electrical Grid Modelling and Simulation Through PowSyBl -...
 
Transcript: Selling digital books in 2024: Insights from industry leaders - T...
Transcript: Selling digital books in 2024: Insights from industry leaders - T...Transcript: Selling digital books in 2024: Insights from industry leaders - T...
Transcript: Selling digital books in 2024: Insights from industry leaders - T...
 
Leading Change strategies and insights for effective change management pdf 1.pdf
Leading Change strategies and insights for effective change management pdf 1.pdfLeading Change strategies and insights for effective change management pdf 1.pdf
Leading Change strategies and insights for effective change management pdf 1.pdf
 
GenAISummit 2024 May 28 Sri Ambati Keynote: AGI Belongs to The Community in O...
GenAISummit 2024 May 28 Sri Ambati Keynote: AGI Belongs to The Community in O...GenAISummit 2024 May 28 Sri Ambati Keynote: AGI Belongs to The Community in O...
GenAISummit 2024 May 28 Sri Ambati Keynote: AGI Belongs to The Community in O...
 
UiPath Test Automation using UiPath Test Suite series, part 4
UiPath Test Automation using UiPath Test Suite series, part 4UiPath Test Automation using UiPath Test Suite series, part 4
UiPath Test Automation using UiPath Test Suite series, part 4
 

Networking- OSI Layer Protocol Functions

  • 1. OSI Layers Protocol Functions Presented by K.GAYATHRI
  • 2. OSI Model  Introduction The Open Systems Interconnection (OSI) model is a reference tool for understanding data communications between any two networked systems.  Some Benefits of OSI Model 1.Less complex,More quality 2.Easier to learn and Develop 3.Multivendor interoperability 4.Standard interface 5.Troubleshooting.
  • 3. OSI Model 7 Layers With Protocols
  • 4. Physical Layer Purpose Deals with the transmission of 0s and 1s over the physical media Translation of bits into signals(Electrical, Mechanical) The Physical layer provides specifications for a variety of hardware: • Cabling • Connectors • Network interface cards (NICs) • Wireless radios • Hubs
  • 5. Ethernet Ethernet is a family of technologies that provides datalink and physical specifications for controlling access to a shared network medium. Ethernet has several benefits over other LAN technologies: • Simple to install and manage • Inexpensive • Flexible and scalable • Easy to interoperate between vendors
  • 6. Cabling the LAN Cabling is an integral part of building any network. ● Cabling standards are a set of specifications for the installation and testing of cables. ● Standards specify types of cables to use in specific environments, conductor materials, pin outs, wire sizes, shielding, cable lengths, connector types and performance limits. ● Media Characteristics: Cable length ● Ethernet Cabling Types Coaxial ● Fiber Optic ● Cost ● Ease of installation ● Susceptibility to interference ● Space ● Category 5 unshielded twisted-pair cable (Cat 5 UTP) ●
  • 7. Twisted Pair Cable ● Twisted pair cable is most in network installations commonly used ● The TIA/EIA organization defines two different patterns, or wiring schemes, called T568A and T568B. ● Each wiring scheme defines the pin out, or order of wire connections, on the end of the cable. ● There are two types of twisted pair cable STP,UTP ● (Cat 5 UTP) is mainly used in network installations.
  • 8. Unshielded Twisted Pair (UTP) Unshielded twisted-pair cable (UTP) is a four-pair wire medium used in a variety of networks. ● TIA/EIA-568-A contains specifications governing cable performance. ● RJ-45 connector ● UTP Cable Types Straight-Through ● Crossover ● Rollover ● RJ-45 Connector RJ-45 Connector
  • 9. Straight-through Cable A Straight-through cable is the most common cable type. ● It maps a wire to the same pins on both ends of the cable. ● Straight-through cables used for following connections, Switch to router ● Switch to PC or server ● Hub to PC or server ●
  • 10. Crossover Cable A crossover cable uses both wiring schemes. ● The wires on the cable are crossed over so that the receive signal pins on the RJ-45 connector on one end are connected to the transmit signal pins on the RJ-45 connector on the other end. ● Crossover cables used for following connections, Switch to switch ● Switch to hub ● Hub to hub ● Router to router ● PC to PC ● Router to PC ●
  • 11. Rollover Cable Rollover cable (also known as Cisco console cable) is a type of null-modem cable that is most commonly used to connect a computer terminal to a router's console port. ● Cisco routers and switches are normally configured over their console ports. ● The pin outs on one end are reversed from the other, as if the wire had been rolled over and you were viewing it from the other side. ● Rollover cables used for following connections Connect a terminal to a console port. ●
  • 12. Wireless Network 802.11 standard specifies the operating parameters of wireless local area networks (WLAN) ● The 802.11 wireless networks operate in two basic modes: 1.Infrastructure mode 2.Ad-hoc mode Infrastructure Mode Infrastructure Mode
  • 13. Wireless Network Security Wired Equivalent Privacy (WEP): The original encryption protocol developed for wireless networks. WEP encryption is based on the RC4 stream cipher–operation ● Wi-Fi Protected Access (WPA):Most current WPA implementations use a preshared key (PSK), commonly referred to as WPA Personal, and the Temporal Key Integrity Protocol (TKIP, pronounced tee-kip) for encryption. WPA Enterprise uses an authentication server to generate keys or certificates ● Wi-Fi Protected Access version 2 (WPA2): Based on the 802.11i wireless security standard. The most significant enhancement to WPA2 over WPA is the use of the Advanced Encryption Standard (AES) for encryption ●
  • 14. WEP vs WPA vs WPA2 WEP WPA WPA2 ENCRYPTION RC4 RC4 AES KEY ROTATION NONE Dynamic Session Keys Dynamic Session Keys KEY DISTRIBUTION Manually typed into each device Automatic distribution available Automatic distribution available AUTHENTICATIO Uses WEP key as Can use 802.1x Can use 802.1x Authentication & EAP & EAP N
  • 15. Data Link Layer Switching-Providing MAC address ● Framing-Send blocks of data (frames) between physical devices ● Dealing with transmission errors(Node-Node Error Control) ● Regulating data flow(Flow control) ● It mainly uses the hardware device Switches. ●
  • 16. Switches Switches do following functions, • Hardware address learning • Intelligent forwarding of frames • Loop avoidance Switches support three methods of forwarding frames. Store-and-Forward method Cut-Through (Real Time) method Fragment-Free (Modified Cut-Through) method
  • 17. Spanning Tree Protocol(STP) Switches (and bridges) needed a mechanism to prevent loops from forming.  Switches utilize the Spanning Tree Protocol (STP) to maintain a loop-free environment.  STP Process To maintain a loop-free environment, STP performs the following functions: • A Root Bridge is elected • Root Ports are identified • Designated Ports are identified • If a loop exists, a port is placed in Blocking state. If the loop is removed the blocked port is activated again.
  • 19. Point to Point protocol PPP is a data-link layer protocol, PPP uses a stack of other protocols to establish the link, to authenticate the parties involved, and to carry the network layer data. Three sets of protocols are used by PPP: ● Link control protocol Authentication protocol ● Network control protocol ●
  • 20. Link Control Protocol (LCP) It is responsible for establishing, maintaining, configuring, and terminating links. ● It also provides negotiation mechanisms to set options between endpoints. ● Both endpoints of the link must reach an agreement about the options before the link can be established. ● When PPP is carrying an LCP packet, it is either in the establishing state or in the terminating state. ● All LCP packets are carried in the data field of the PPP frame. ●
  • 21. Authentication Protocols Authentication plays a very important role in PPP because PPP is designed for use over dial-up links where verification of user identity is necessary. ● Authentication means validating the identity of a user who needs to access a set of resources. ● PPP uses two protocols for authentication: Password Authentication Protocol (PAP) ● Challenge Handshake Authentication Protocol (CHAP) ●
  • 22. Password Authentication Protocol (PAP) The user who wants to access a system sends an ID (identification) and a password. The system checks the validity of the identification and password and either accepts or denies a connection.
  • 23. Challenge Handshake Authentication Protocol (CHAP) The CHAP protocol is a three-way handshaking authentication protocol that provides greater security than PAP. In this method, the password is kept secret; it is never sent on-line.
  • 24. Network Control Protocol (NCP) After the link is established and authentication (if any) is successful, the connection goes on the networking state. ● NCP is a set of control protocols to allow the encapsulation of data coming from network layer protocols into the PPP frame. ● The set of packets that establish and terminate a network layer connection is called Internetwork Protocol Control Protocol (IPCP). ●
  • 26. Network Layer Routing and Forwarding ● Logical addressing ● Transport packet from sending to receiving hosts ● A logical address contains two components: • Network ID – identifies which network a host belongs to. • Host ID – uniquely identifies the host on that network. Logical addressing protocols include Internetwork Packet Exchange (IPX) ● Internet Protocol (IP). ●
  • 27. IPv4 address Classes Class First Octet Range Default Subnet Mask Class A 1 – 126 255.0.0.0 Class B 128 – 191 255.255.0.0 Class C 192 – 223 255.255.255.0 Class D 224 – 239 - Class E 240 – 255 - Ranges 127.x.x.x are reserved for the loopback or localhost. ● 127.0.0.1 is a comman Loopback address. ●
  • 28. Routing And Forwarding Routing algorithm determines end-end-path through network routing algorithm Forwarding table determines local forwarding at this router local forwarding table header value output link 0100 0101 0111 1001 3 2 2 1 value in arriving packet’s header 0111 Routing-Determine route taken by packets from source to destination 1 3 2 ForwardingMove packets from router’s input to appropriate router output
  • 29. Transport Layer This layer is responsible for the reliable transfer of data, by ensuring that data arrives at its destination error-free and in order. It provides Port number to specifies the Application. It is Host-to-Host layer. Transport layer communication falls under two categories: • Connection-oriented – requires that a connection with specific agreedupon parameters be established before data is sent.(TCP) • Connectionless – requires no connection before data is sent.(UDP)
  • 30. Some common Port numbers Port Number Transport Protocol Application 20, 21 TCP FTP 22 TCP SSH 23 TCP Telnet 25 TCP SMTP 53 TCP/UDP DNS 80 TCP HTTP 110 TCP POP3 443 TCP SSL 666 TCP Doom
  • 31. Transmission Control Protocol(TCP) Connection establishment – connections are established, maintained, and ultimately terminated between devices. ● Segmentation and sequencing – data is segmented into smaller pieces for transport. Each segment is assigned a sequence number, so that the receiving device can reassemble the data on arrival. ● Acknowledgments – receipt of data is confirmed through the use of acknowledgments. If a segment is lost, data can be retransmitted to guarantee delivery. ● Flow control (or windowing) – data transfer rate is negotiated to prevent congestion. ● Connection Termination. ●
  • 33. User Datagram Protocol(UDP) The User Datagram Protocol (UDP) is a connectionless,unreliable transport protocol. ● UDP experiences less latency(High speed transmission) ● It provides no three-way handshake, no flow-control, no sequencing, and no acknowledgment of data receipt. ● UDP essentially forwards the segment ● UDP ideal for applications that require speed over reliability. For example, DNS primarily uses UDP as its transport protocol ●
  • 34. Session Layer The session layer is responsible for dialog control and synchronization. ● The session layer defines how to start, control and end conversations (called sessions) between applications. ● This includes starting, stopping, and re-synchronizing communications between applications on two computers. ● The session layer offers provisions for efficient data transfer. ● Session layer Protocols, Structured Query Language (SQL) ● Remote Procedure Call (RPC) ● Network File system(NFS) ●
  • 35. Basic Functions for the Session Layer Managing multiple sessions A computer can establish multiple sessions with several other computers e.g., session 1: exchanging information over the World Wide Web with www.yahoo.com session 2: exchanging information over the World Wide Web with www.google.com session 3: exchanging information over the World Wide Web with www.espn.com Two computers can also establish multiple sessions, e.g., function 1: exchanging information over the World Wide Web; function 2: exchanging information over the FTP; function 3: exchanging information over the email
  • 37. Presentation Layer The presentation layer is responsible for translation, compression, and encryption. This layer controls the formatting and syntax of user data for the application layer.  This ensures that data from the sending application can be understood by the receiving application. Examples of Presentation layer formats include: • Text - RTF, ASCII, EBCDIC • Images - GIF, JPG, TIF • Audio - MIDI, MP3, WAV • Movies - MPEG, AVI, MOV
  • 38. Presentation Layer Protocols ●This layer has two protocols for secure purpose of transmission 1.Transport layer Security Protocols(TLS) ●The primary goal of the TLS protocol is to provide privacy and data integrity between two communicating applications” ●In practice, used to protect information transmitted between browsers and Web servers 2.Secured Socket Layer protocols(SSL) ●SSL is an Internet security protocol used by Internet browsers and Web servers to transmit sensitive information. ●Both protocols works on three features like Confidentiality, integrity, and Availability.
  • 40. Cryptography Cryptography is the practice and study of hiding information. It is the Art or Science of converting a plain intelligible data into an unintelligible data and again retransforming that message into its original form. It provides Confidentiality, Integrity, Accuracy. Encryption –The process of converting plain text into an unintelligible format (cipher text) is called Encryption. Decryption –The process of converting cipher text into a plain text is called Decryption
  • 41. Symmetric And Asymmetric Key Methods Symmetric Key Cryptography (Secret Key Cryptography) Asymmetric Key Cryptography (Public Key Cryptography) Same Key is used by both parties Users get the Key from an Certificate Authority Advantages Advantages Simpler and Faster More Secured Disadvantages Authentication Less Secured 2 different keys are used Disadvantages Relatively Complex
  • 42. Application Layer It mainly provides user interface ● Everything at this layer is application-specific. ● This layer provides application services for file transfers, email, and other network software services ● This layer handles issues like network transparency, resource allocation and problem partitioning. ●
  • 43. Application Layer Protocols DNS- Domain Name system HTTP - Hyper Text Transfer Protocol FTP - File Transfer Protocol POP 3-Post Office Protocol IMAP- Internet Message Access protocol SMTP - Simple Mail Transfer Protocol Telnet - Remote Access
  • 44. Domain Name system(DNS) DNS is a host name to IP address translation service. ● DNS is a distributed database implemented in a hierarchy of name servers. ● An application level protocol for message exchange between clients and servers. ● Root DNS Servers com DNS servers yahoo.com amazon.com DNS servers DNS servers org DNS servers edu DNS servers pbs.org poly.edu umass.edu DNS servers DNS serversDNS servers
  • 46. Hyper Text Transfer Protocol(HTTP) HTTP is the protocol that supports communication between web browsers and web servers ● It provides web services. ● HTTP can support multiple request-reply exchanges over a single TCP connection. ● The “well known” TCP port ● for HTTP servers is port 80.
  • 47. File Transfer Protocol(FTP) File Transfer Protocol (FTP) is the standard mechanism provided by TCP/IP for copying a file from one host to another. FTP uses the services of TCP. It needs two TCP connections. The well-known port 21 is used for the control connection and the well-known port 20 for the data connection.
  • 48. Electronics Mail(SMTP,POP3,IMAP) SMTP-Uses TCP to reliably transfer email ● message from client to server, port 25. It is a push protocol; it pushes the message from the client to the server. ● POP- Protocol used to retrieve email from a mail server. ● It stores and forwards messages ● IMAP- Keep all messages in one place(The server). ● Allows user to organize messages in folders. ●
  • 49. Electronics Mailing Internet Internet Message Access Protocol SMTP IMAP Mail Server IMAP store POP Store POP SMTP Mail Client Mail Client SMTP
  • 50. Telnet It is the standard TCP/IP protocol ● Telnet allows a user to log into a computer across an internet. ● Telnet establishes a TCP connection and then passes keystrokes from the users keyboard directly to the remote computer . ● Telnet offers three basic services . 1. It defines a network virtual terminal that provides a standard interface to remote systems. 2. Telnet includes a mechanism that allows the client and server to negotiate options . 3. Telnet treats both ends of the connection symmetrically.